• 2 Posts
  • 25 Comments
Joined 1 year ago
cake
Cake day: August 22nd, 2023

help-circle





  • That is the correct question, and mostly no, I don’t have any specific problem.

    The biggest motivator for me looking at it is probably just hobby/interest/how-does-this-work.

    That said, my partner and I both work from home ~50% and are often pulling files/data that are a couple GB from the work network, and having those go faster would be nice. Probably the limiting factor in those, though, is the upload from the work network and so faster download for us likely wouldn’t matter, but I’d like to be able to say “I looked into it, honey.”




  • If you arent an actual journalist who is being personally, specifically hunted then you probably don’t need to take the same precautions as one.

    And yea, the guide boils down to “none of these things are 100% safe but they are realistic things you can do that can offer more protection than not doing them.”

    Your skimming of the article missed how they do indeed talk about the shortcomings of every suggestion they have. For example, the article also does indeed talk about how you can turn off gps but your phone will still ping towers revealing your location, and goes on to say that you can put your phone in a faraday bag but that isnt practical for most people but is indeed an option if you want to do it.



  • This article isnt about how emails associated with logins got released in a breach, but that documents that are uploaded to the archive are stamped with the email address of the account that uploaded it and that can be viewed by anyone who downloads the document.

    So in standard, everyday use of the site, email addresses are being revealed and are associated with the actions of that person. Like if I upload a copy of the manual for my washing machine or something, which is a more benign example, my email is linked to that document now.

    Then combine this with (1) the internet archive says in multiple spots that they dont reveal this info anywhere, and (2) the issue has been raised to the organization, and it becomes more of a specific negligence from them.


  • This article isnt about how emails associated with logins got released in a breach, but that documents that are uploaded to the archive are stamped with the email address of the account that uploaded it and that can be viewed by anyone who downloads the document.

    So in standard, everyday use of the site, email addresses are being revealed and are associated with the actions of that person. Like if I upload a copy of the manual for my washing machine or something, which is a more benign example, my email is linked to that document now.

    Then combine this with (1) the internet archive says in multiple spots that they dont reveal this info anywhere, and (2) the issue has been raised to the organization, and it becomes more of a specific negligence from them.