I was watching Eric Murphy’s video on “Privacy faigue” and it certainly provided some food for thought. (https://www.youtube.com/watch?v=Ab6ryHD_ahQ)

I like how he conceptualizes privacy as multilevelled, with no one-size-fits-all solution, which should be tailored based on the individual’s threat model.

So, with that in mind: what would y’all consider your threat model?

As far as I’m concerned I suppose my main goal is to avoid advertisements, particularly targeted advertisement. Additionally I would obviously like to avoid getting hacked, but I know I’m not being targeted particularly (and wouldn’t be a worthwhile target anyway). Curious to see if I have any obvious blindspots that could be remedied based on everyone else’s answers.

  • qpsLCV5@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    5 months ago

    i’m thinking long term - sure, right now google knowing everything about me isn’t dangerous. but if a massive political slide to the right happens in countries that host services, suddenly all the saved data from many years ago can be used against me. and don’t fall for the “end to end encryped” bullshit either - all these services can flip a switch and have your encryption keys instantly. (or, if its an open source app that ACTUALLY keeps keys on the device only, which is extremely rare, it’s one update away from happening, and you better read the whole diff every update and compile the app yourself.)

    that’s why i choose to self host everything. yes there’s a risk of being hacked, or installing something malicious because i don’t read every diff on every update. but i feel more confortable with it being my own responsibility, and my services are also all on seperate virtual machines to hopefully isolate any breaches.

    • Imprint9816@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 months ago

      That’s not how end to end encryption works.

      Your scared of a slide to the right but already falling for their propaganda to undermine privacy by destroying encryption.