Migrated account from @CosmicTurtle@lemmy.world

  • 3 Posts
  • 174 Comments
Joined 1 year ago
cake
Cake day: April 9th, 2024

help-circle


  • There is a point of diminishing returns. Like most things, you have to evaluate what you are willing to live with and let go.

    I know someone who only browses incognito because they don’t want cookies tracking them. They log into everything every day. Which, imo, is worse because those cookies are still tracking you but you now have to log in everyday.

    But for them they like the control.

    I’ve moved most of my incidental link on my phone clicking to Firefox Focus (thanks to URL Checker) which has upped my privacy. I wouldn’t have made that change without the prompt that URL Checker provides though.

    I use a VPN outside of my house and I use pihole at home. I am tempted to switch my DNS to unbound but the juice doesn’t seem to be worth the squeeze. We’ll see the next time I need to rebuild my pi.












  • It’s illegal if the company is coercing you to spend money at their “preferred” stores.

    That said, so many states have business friendly laws that it’s likely a civil tort and not a criminal one.

    OP, call your attorney general or department of labor (depending on the state). You may want to even call your state’s taxation board and you know for fuck sure they are doing something scammy with their taxes if they are watching you this closely.






  • When you’re discussing your own OPSEC (Operational Security for those unaware), you have to evaluate and determine your personal threat profile. Generally speaking, you need to determine what risks you’re willing to accept, what risks you’re willing to mitigate, and what risks you will not tolerate. There’s a whole field of IT dedicated to this but the general idea is for you to understand that there is no perfect solution and everything is a trade off.

    There is an inherent risk to downloading pirated software, especially software that you use for private activities (e.g. finances, etc.). With today’s landscape of mining crypto, I’d go so far as to say almost any pirated software is at risk of this.

    I would agree that generally playing media files is relatively low risk (though there was a vulnerability I read about a few years back of a zip-type attack. The details allude me at the moment).

    But for executables, you basically have two options:

    • spin up a VM to host your executable, sandboxing it from everything else.
    • trust the people who are providing the executable and run it on your computer

    Personally, I avoid pirated executables. More often than not I can find a similar open source product that I can download. My risk tolerance is not only low, but I don’t see the benefits of using a particular company’s software especially if an open source is available.