Privacy Guides
In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.
You can subscribe to this community from any Kbin or Lemmy instance:
Check out our website at privacyguides.org before asking your questions here. We've tried answering the common questions and recommendations there!
Want to get involved? The website is open-source on GitHub, and your help would be appreciated!
This community is the "official" Privacy Guides community on Lemmy, which can be verified here. Other "Privacy Guides" communities on other Lemmy servers are not moderated by this team or associated with the website.
Moderation Rules:
- We prefer posting about open-source software whenever possible.
- This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
- No soliciting engagement: Don't ask for upvotes, follows, etc.
- Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
- Be civil, no violence, hate speech. Assume people here are posting in good faith.
- Don't repost topics which have already been covered here.
- News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
- Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
- No help vampires: This is not a tech support subreddit, don't abuse our community's willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
- No misinformation: Extraordinary claims must be matched with evidence.
- Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
- General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.
Additional Resources:
- EFF: Surveillance Self-Defense
- Consumer Reports Security Planner
- Jonah Aragon (YouTube)
- r/Privacy
- Big Ass Data Broker Opt-Out List
view the rest of the comments
The Nice: This is possible because the original web protocol allows sites with CORS disabled to be able to still access 127.0.0.1 This allows for websites to assist in setting up installed programs, and plugged in devices. (Long before the days of Electron) or registering warranty. It can also allow locally installed software to communicate with their web counterparts. Your local Steam website could potentially host a site on 127.0.0.1 and tell steampowered.com what games are installed. It can also be used to see if someone is remoting into your computer (or similarly acting malware) and thusly increasing fraud likelihood score, or asking for 2FA. Think grandmas getting scammed over the phone. This is why it is so prevalent on banking sites.
The Naughty: This can also be used as part of a larger scheme to uniquely Identify users and help detect fraud. Identifying users speeds up login and can reduce local storage duplication even in the case of cookie clearing. They scan as much data about you as they possibly can: 1rdt and 3rd party cookies, local storage, browser size, screen size, operating system, browser, what extensions do you have installed, what ports you have open, etc etc. Faster login and fraud detection sound like noble goals, but in reality these are used to generate an ad profile about you. The more data they collect on you the higher a price ad agencies will pay to advertise. In some cases they will have your name and DOB (think Google and Facebook) but modern systems are complex enough that they don't need that anymore. In many cases their match of you is more accurate then a literal fingerprint. Now most people don't have ports open so I don't know of, off hand, any websites that are doing this but it's entirely possible. Did you open a port for World of Warcraft? If so we can target WoW and RPG ads to you, etc.
The evil However you feel about large corporations fingerprinting your online presence this is a reconnaissance technique used by bad actors to find insecurities on your network and device so they can identify ones to hack.
Consider this analogy: imagine if a corporation went around door to door checking to see if your door is unlocked. They tell you and the government that the reason they are doing that is to see who is liable to get broken into. They also take this data and use it to send you advertisements for door locks. Now someone else goes around door to door dressed like the corporation and actually breaks into your house. The robber definitely broke the law, but was facilitated by the corporation that was borderline breaking the law.
If you implement a system where they have to ask before testing your lock (like Brave is) you can get the best of both worlds, but you alone are responsible for identifying bad actors.