Georges Rouault, The Old King, 1937
Anaïs Nin operating her handpress and setting type for Winter of Artifice in Macdougal Street Studio, 1944
Tilla Durieux as Circe, by Franz von Stuck, 1913
Unpaid Interns Fight Back
In a big victory for unpaid internship lawsuits, a federal…
Furisode (long-sleeved kimono), 19th century, Japan. “Long-sleeved light blue silk satin robe (furisode) with design of sprays of narcissus and lines suggesting water embroidered with green, white and yellow silk.”
MFA. (William Sturgis Bigelow Collection)
(Source: whoamitofeelsopretty, via faggot-interrupted)
Could you single out one recommendation that in your opinion, greatly increases ones digital privacy significantly and if you can, please explain how this can be achieved.
[–]jenvalentino[S] 11 points 3 hours ago*
I think it’s important to consider something called a “threat model.” In other words, you need to determine what kind of surveillance worries you, and what type of surveillance you’re most likely to see.
For many people, this will just mean that they want to make sure tracking companies don’t have information about them that could be used to influence the deals and offers they get. THAT mostly requires deleting cookies and using tools like Disconnect and Ghostery.
Other people might want to protect their Web browsing further and really be anonymized as much as possible. That requires something called Tor.
Then beyond that, you can use encryption. I find that a great introductory encryption tool is something called CryptoCat. That allows you to conduct encrypted chats and have cat emoticons. This is a good way to ease yourself into understanding that you can, indeed, use this sort of thing.
Beyond even that, you can check out Adium and Pidgin and something called OTR (off the record) chat. There is an IM server, jabber.ccc.de, that is quite good about not logging, etc. A hacker called The Grugq, who is good at this stuff, recommends using Pidgin and OTR over Tor and creating multiple jabber.ccc.de addresses. He also recommends CryptoCat used over Tor.
And you can use PGP or GPG encryption for email and other things. I wrote up some instructions on it on my personal blog, but it’s a little out-of-date. Could be helpful, though.
But all that said, if you are really in danger, be careful about relying on any of these things. There was a huge brouhaha over CryptoCat, for example, and whether it was safe enough for dissidents to use. The creators of that really do warn people whose lives are in danger, for example during the Arab Spring, that they should be careful about anything.
If someone is really after you, well, that’s probably beyond a Reddit thread.
But anyway, that gives you an idea of threat modeling and the depths to which you can g — I am Jennifer Valentino-DeVries, a reporter and co-author of the WSJ award-winning series on digital privacy, “What They Know” - AMA! : IAmA
Su mirada lo dice todo…
Vendedora de Flores. México