I was watching Eric Murphy’s video on “Privacy faigue” and it certainly provided some food for thought. (https://www.youtube.com/watch?v=Ab6ryHD_ahQ)

I like how he conceptualizes privacy as multilevelled, with no one-size-fits-all solution, which should be tailored based on the individual’s threat model.

So, with that in mind: what would y’all consider your threat model?

As far as I’m concerned I suppose my main goal is to avoid advertisements, particularly targeted advertisement. Additionally I would obviously like to avoid getting hacked, but I know I’m not being targeted particularly (and wouldn’t be a worthwhile target anyway). Curious to see if I have any obvious blindspots that could be remedied based on everyone else’s answers.

  • Deckweiss@lemmy.world
    link
    fedilink
    arrow-up
    48
    ·
    edit-2
    6 months ago

    I once talked with a colleague from the data-analysis field. Apparently the company they work at is somewhat in the legally grey area.

    They advised other companies on hiring candidates, by scraping all possible data about them online (which included buying anonymized advertising data and correlating it to all their publically available data and the data from the application). Using that, they claim to predict worker motivation, loyalty, how often they are sick, their political alignment, what their acceptable rate is, if they are going to ask for a raise, how well they work under pressure and much much more.

    Since hearing it this has basically become my thread model.

    As I am writing this, I realize that it is probably time to delete my Lemmy account and never post here again lol

    • GolfNovemberUniform@lemmy.ml
      link
      fedilink
      arrow-up
      7
      ·
      6 months ago

      I think you can stay anonymous (as in your threat model) on Lemmy as long as you use a VPN and keep your style of speech different than your “real” one

      • grue@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        edit-2
        6 months ago

        and keep your style of speech different than your “real” one

        Good luck with that!

        I kinda feel like you’d need to run your comments through a style transfer LLM in order to do that successfully and consistently.

    • InputZero@lemmy.ml
      link
      fedilink
      arrow-up
      4
      arrow-down
      1
      ·
      6 months ago

      If those companies that say they get other companies to delete your data weren’t just going to turn around and sell their data I might actually sign up for one at this point. Sadly, even the heroes are villains in this story.

  • JoeKrogan@lemmy.world
    link
    fedilink
    arrow-up
    18
    ·
    edit-2
    6 months ago

    Random hackers, companies, dragnet surveillance.

    The companies are probably the biggest exposure as we are forced to interact with them for utilities, flights etc . They get hacked all of the time and dont bother to secure their data.

    Also as a side note I hate how lots of places just assume you want to download their shitty spyware ridden apps or hand over your phone number or an email.

    • TheButtonJustSpins@infosec.pub
      link
      fedilink
      English
      arrow-up
      11
      ·
      6 months ago

      Also as a side note I hate how lots of places just assume you want to download their shitty spyware ridden apps or hand over your phone number or an email.

      Or want notifications. No, recipe site, I don’t want desktop notifications from you.

  • kbal@fedia.io
    link
    fedilink
    arrow-up
    16
    ·
    6 months ago

    Default threat model: Some malignant demon, who is at once exceedingly potent and deceitful, has employed all his artifice to deceive me

    • synopsis9408@fedia.io
      link
      fedilink
      arrow-up
      1
      ·
      6 months ago

      Just a tip, there are sites where you can auto-generate usernames, so you don’t have to struggle to create one every time.

    • SentientFishbowl@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      3
      ·
      6 months ago

      Would you consider all activists on the same threat level? I was imagining what the Just Stop Oil protesters in the UK might consider their threat model, I’d imagine it would be different to an activist in Iran or Russia for instance. Am I wrong?

  • Possibly linux
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    6 months ago

    EVERYONE AND I’M ALWAYS BEHIND THE CURVE

    Seriously though the world is scary for privacy and freedom

  • d00phy@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    6 months ago

    Awhile back, I got a bookbub deal alert email about a series called the Lattice Trilogy. When I read the synopsis, I wasn’t sure I’d buy the premise: a future where privacy simply doesn’t exist. Still, out of curiosity and an extremely low price, I gave it a read. Wound up reading all three books. Since then, I’ve been watching privacy die in much less sci-fi-y circumstances.

  • qpsLCV5@lemmy.ml
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    6 months ago

    i’m thinking long term - sure, right now google knowing everything about me isn’t dangerous. but if a massive political slide to the right happens in countries that host services, suddenly all the saved data from many years ago can be used against me. and don’t fall for the “end to end encrypted” bullshit either - all these services can flip a switch and have your encryption keys instantly. (or, if its an open source app that ACTUALLY keeps keys on the device only, which is extremely rare, it’s one update away from happening, and you better read the whole diff every update and compile the app yourself.)

    that’s why i choose to self host everything. yes there’s a risk of being hacked, or installing something malicious because i don’t read every diff on every update. but i feel more confortable with it being my own responsibility, and my services are also all on seperate virtual machines to hopefully isolate any breaches.

    • Imprint9816@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 months ago

      That’s not how end to end encryption works.

      Your scared of a slide to the right but already falling for their propaganda to undermine privacy by destroying encryption.

  • icedcoffee@lemm.ee
    link
    fedilink
    arrow-up
    2
    ·
    6 months ago

    I found the Anarcho-Texh security guide helpful in getting started thinking about this with more nuance. I’m including the link below but here’s a short summary

    Are you an: Individual Journalist Targeted Activist

    Are you annoying: Random assholes Assholes with resources The State

    Each category has bigger security needs on one side and more powerful tools on the other. It’s kind of humbling to realize that I’m just an individual and the NSA has no special interest in me, but that makes me feel better using a separate browser without additional security to shop on sites that block a VPN etc

    (Also tbh I’m not sure when this page was last updated and I have no involvement with the org. Just a cool resource)

    https://github.com/AnarchoTechNYC/meta/wiki/Persona-based-training-matrix

  • Rentlar@lemmy.ca
    link
    fedilink
    arrow-up
    2
    ·
    6 months ago

    No one person/company/entity can know everything about me.

    Well, they could, but the price would be high and I suppose I’d end up dating someone who went through that level of effort to know me anyway. :P

  • Hirom@beehaw.org
    link
    fedilink
    arrow-up
    1
    ·
    6 months ago

    Scams, identity thefts, manipulation through targeted ads (eg Cambridge Analytica), malware delivered via ads

  • trickster@infosec.pub
    link
    fedilink
    arrow-up
    1
    ·
    6 months ago

    Privacy to me is not the goal, not an end. Rather, it’s means to an end.

    My threat model resembles one of an activist.

    If you’re interested, here’s a great framework for approaching privacy and security in a complex, systematic and consistent way: https://linddun.org/go/

    It helped me and the people.

  • eveninghere@beehaw.org
    link
    fedilink
    arrow-up
    1
    ·
    6 months ago

    My online activities. I don’t want the attacker to identify them with me. Well, it’s never perfect, but yeah. I don’t really care about personalized ads. m

    I’d even prefer them over stupid semi-pornographic ads for the average person. I don’t know other countries but nearly all Japanese websites are full of such semi-porns to the level I wouldn’t screen-share my webbrowser…

  • tetris11@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    6 months ago

    (Aww yeah,)
    Threat model: midnight
    Makes all the trackers fail all right
    From Apple to the Metaverse fall guy