I was watching Eric Murphy’s video on “Privacy faigue” and it certainly provided some food for thought. (https://www.youtube.com/watch?v=Ab6ryHD_ahQ)

I like how he conceptualizes privacy as multilevelled, with no one-size-fits-all solution, which should be tailored based on the individual’s threat model.

So, with that in mind: what would y’all consider your threat model?

As far as I’m concerned I suppose my main goal is to avoid advertisements, particularly targeted advertisement. Additionally I would obviously like to avoid getting hacked, but I know I’m not being targeted particularly (and wouldn’t be a worthwhile target anyway). Curious to see if I have any obvious blindspots that could be remedied based on everyone else’s answers.

  • Deckweiss@lemmy.world
    link
    fedilink
    arrow-up
    29
    ·
    edit-2
    6 months ago

    I once talked with a colleague from the data-analysis field. Apparently the company they work at is somewhat in the legally grey area.

    They advised other companies on hiring candidates, by scraping all possible data about them online (which included buying anonymized advertising data and correlating it to all their publically available data and the data from the application). Using that, they claim to predict worker motivation, loyalty, how often they are sick, their political alignment, what their acceptable rate is, if they are going to ask for a raise, how well they work under pressure and much much more.

    Since hearing it this has basically become my thread model.

    As I am writing this, I realize that it is probably time to delete my Lemmy account and never post here again lol

    • GolfNovemberUniform@lemmy.ml
      link
      fedilink
      arrow-up
      4
      ·
      6 months ago

      I think you can stay anonymous (as in your threat model) on Lemmy as long as you use a VPN and keep your style of speech different than your “real” one

      • grue@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        6 months ago

        and keep your style of speech different than your “real” one

        Good luck with that!

        I kinda feel like you’d need to run your comments through a style transfer LLM in order to do that successfully and consistently.

    • InputZero@lemmy.ml
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      6 months ago

      If those companies that say they get other companies to delete your data weren’t just going to turn around and sell their data I might actually sign up for one at this point. Sadly, even the heroes are villains in this story.

  • JoeKrogan@lemmy.world
    link
    fedilink
    arrow-up
    11
    ·
    edit-2
    6 months ago

    Random hackers, companies, dragnet surveillance.

    The companies are probably the biggest exposure as we are forced to interact with them for utilities, flights etc . They get hacked all of the time and dont bother to secure their data.

    Also as a side note I hate how lots of places just assume you want to download their shitty spyware ridden apps or hand over your phone number or an email.

    • SentientFishbowl@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 months ago

      Would you consider all activists on the same threat level? I was imagining what the Just Stop Oil protesters in the UK might consider their threat model, I’d imagine it would be different to an activist in Iran or Russia for instance. Am I wrong?

  • d00phy@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    6 months ago

    Awhile back, I got a bookbub deal alert email about a series called the Lattice Trilogy. When I read the synopsis, I wasn’t sure I’d buy the premise: a future where privacy simply doesn’t exist. Still, out of curiosity and an extremely low price, I gave it a read. Wound up reading all three books. Since then, I’ve been watching privacy die in much less sci-fi-y circumstances.

  • qpsLCV5@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    6 months ago

    i’m thinking long term - sure, right now google knowing everything about me isn’t dangerous. but if a massive political slide to the right happens in countries that host services, suddenly all the saved data from many years ago can be used against me. and don’t fall for the “end to end encrypted” bullshit either - all these services can flip a switch and have your encryption keys instantly. (or, if its an open source app that ACTUALLY keeps keys on the device only, which is extremely rare, it’s one update away from happening, and you better read the whole diff every update and compile the app yourself.)

    that’s why i choose to self host everything. yes there’s a risk of being hacked, or installing something malicious because i don’t read every diff on every update. but i feel more confortable with it being my own responsibility, and my services are also all on seperate virtual machines to hopefully isolate any breaches.

    • Imprint9816@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 months ago

      That’s not how end to end encryption works.

      Your scared of a slide to the right but already falling for their propaganda to undermine privacy by destroying encryption.

  • icedcoffee@lemm.ee
    link
    fedilink
    arrow-up
    2
    ·
    6 months ago

    I found the Anarcho-Texh security guide helpful in getting started thinking about this with more nuance. I’m including the link below but here’s a short summary

    Are you an: Individual Journalist Targeted Activist

    Are you annoying: Random assholes Assholes with resources The State

    Each category has bigger security needs on one side and more powerful tools on the other. It’s kind of humbling to realize that I’m just an individual and the NSA has no special interest in me, but that makes me feel better using a separate browser without additional security to shop on sites that block a VPN etc

    (Also tbh I’m not sure when this page was last updated and I have no involvement with the org. Just a cool resource)

    https://github.com/AnarchoTechNYC/meta/wiki/Persona-based-training-matrix

  • lud@lemm.ee
    link
    fedilink
    arrow-up
    1
    ·
    6 months ago

    Mainly it’s similar to yours but recently I’m at an elevated risk of targeted attacks due to work. I don’t think anyone will or has tried to hack me though except by trying random old leaked credentials, but that doesn’t count.

  • tetris11@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    6 months ago

    (Aww yeah,)
    Threat model: midnight
    Makes all the trackers fail all right
    From Apple to the Metaverse fall guy