Simplified Privacy

Fast solutions to privacy leaks

Leak: Cloudflare correlates all your activity
How: The bulk of the internet uses Cloudflare’s CDN so they oversee all logins
Solution: Use AnonAddy, SimpleLogin, or other burner email masking to separate accounts

_______________________

Leak: Uploaded Images leak (to Big Tech) your location, despite a VPN
How: Your phone attaches EXIF metadata to images
Solution: There’s apps to remove EXIF data such as Scrambled EXIF

_______________________

Leak: Your IP address is sent to the sender on opening an email
How: tiny images called ‘pixels’ call upon 3rd party JavaScript
Solution: Block third party images/content

_______________________

Leak: Every Linux program sees all the others
How: Linux has zero graphical isolation, any program with access to the display can see everything
Solution: Run untrusted proprietary software in a virtual machine, or at least not at the same time as your KeePass open. Also Android has better app isolation.

_______________________

Leak: On mobile, Tor exit nodes can correlate activity
How: Orbot isn’t giving you new Tor circuits for each app, so your anonymous Signal burner and KYC Telegram number are both pulled to the same Tor exit
Solution: Use different profiles or firewall toggle them off. (Calyx has a great one)

_______________________

If you get a lot out of this series, please consider a micro-donation. Monero address:

89gbof7fHub9dSMGVX2mGhDggU8TWXuFtGxbKefVNCpWCa377BS8uPzRr831Qd86FWRvPDTrvjkbHYZHgs5nmohRL5j1KiH

Related Articles

Why is Telegram horrible

–No MetaData Protection(Who and When) –Only Mobile is Encrypted(Phones have insecure hardware) [1] –Invented their own encryption algorithmUnaudited with a history of security vulnerabilities [2]

Read More »

Leaked Lies at Google

Google accidentally leaked their search API on Github, giving everyone insight into that they: –Lied that they track users clicks as a factor for search

Read More »