• 9 Posts
  • 154 Comments
Joined 6 months ago
cake
Cake day: March 19th, 2024

help-circle








  • I think, when you explain things to people (i.e. in instances where it’s not an absence of knowledge that’s the problem), the vast majority of people know we’re correct, but are held back by convenience. They’re embedded into the Google ecosystem or whatever, and it is a pain in the ass to migrate. There are many popular services for which there isn’t a 1:1 private alternative. I can openly and confidently say that I sacrifice some convenience for privacy, and to me it is worth it. But other people, while they agree that they don’t like being spied on, are used to being spied on and therefore have a “if it ain’t broke don’t fix it” attitude. They’re already using spyware and it’s not had an immediately obvious acute consequence for them, so there’s not really any turning point at which they would go “this is enough” and change.

    I think so long as they’re aware, if they do value privacy, over time they should slowly replace the things they use. Also, some of my friends get Signal just to speak to me since I’m not really on anything else (unless they want to email me lol), so that kind of effect may push them in the right direction.

    If your brother doesn’t care though, he just doesn’t care. Privacy is actually very straightforward: it’s creepy for someone to be spying on me and watching my every move, therefore I take precautions to make that difficult for people wanting to spy on me. You don’t need to convince people that being spied on is creepy. They know that, and are stopped by inertia, which they can only overcome on their own. I don’t think it’s worth nagging them about it when they already know what is to be known.





  • For context, my threat model doesn’t need to account for real people breaking in and accessing my computer, the damage would be very contained.

    I mean if you don’t have open ssh ports on your computer or whatever I don’t think you need a strong password, given that you’re not concerned about physical access. I would say that at the very least have a reasonably secure root password (/user password if you’re a sudoer/anyone else who can get root permissions with your user account) because if you end up with some malware on your computer that can, say, enter passwords, you don’t want it to be ridiculously easy to bruteforce.