this post was submitted on 24 Apr 2025
15 points (94.1% liked)

privacy

3806 readers
104 users here now

Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.

Partners:

founded 2 years ago
MODERATORS
top 12 comments
sorted by: hot top controversial new old
[–] [email protected] 5 points 1 day ago (1 children)
[–] [email protected] 3 points 1 day ago (1 children)

Encryption is just locks and since locks can be opened it must be assumed they will be. For sensitive data, destruction is the only option.

But yes, also encrypt your darn data.

[–] [email protected] 1 points 1 day ago (1 children)

That is assuming anyone still gives two hoots about your data by the time that lock can be cracked by anything that's not a supercomputer

[–] [email protected] 2 points 1 day ago* (last edited 1 day ago) (2 children)

Your encryption might take the age of the universe to break with current computing hardware, but we wouldn't be having this conversation if vacuum tubes were still a thing. 1024-bit DKIM used to be the gold standard, now it's unusably weak and 2048-bit is king, due to advances in computing hardware.

Are you really going to bet we don't make faster computers in the next 20 years? Or that you'll be aware an adversary can break your encryption the instant they have the capability?

[–] [email protected] 1 points 13 hours ago* (last edited 13 hours ago) (1 children)

Modern solutions for modern problems, ie, update as needed (and algorithms potentially invented)

Alternatively hide it under the floorboards, with a nail over it and a hammer nearby as needed

[–] [email protected] 1 points 8 hours ago* (last edited 8 hours ago) (1 children)

Uh-huh. Scenario: you're breached and your encrypted data is exfiltrated. Please describe the update process for the encryption of the copy the attackers now hold.

[–] [email protected] 1 points 8 hours ago* (last edited 8 hours ago) (1 children)

I was by no means saying this is an 'after breach' scenario. Modern solutions don't save you retroactively, that wasn't the point.

[–] [email protected] 1 points 8 hours ago* (last edited 8 hours ago) (1 children)

And the point of my original comment is that encryption alone will not save you; please go read the thread from the start. All I've been saying is that sometimes destroying the data before an imminent breach, like this tool does, is the only way to be sure you haven't been breached. The person I responded to clearly thinks encryption would be enough and this tool is unnecessary even in the event of a breach, as does every response after, including yours, and that is simply untrue. Encrypt, and consider using this tool or one like it. Like you said, hammer + nail (though that isn't a guarantee 😋).

[–] [email protected] 2 points 8 hours ago* (last edited 8 hours ago) (1 children)

Sorry, I don't mean to say it's unnecessary in the event of a breach, you're absolutely correct there, I was just spitballing on the idea of encryptions without self-destruct buttons in majority non I-am-highly-targeted-by-CIA scenarios, how vigilant you'd have to be. With house warrants for instance, I was like "well, as the likelihood of them going being able to decrypt increases you should be on the look-out for alternative methods or harder encryption yeah"

[–] [email protected] 2 points 8 hours ago* (last edited 8 hours ago) (1 children)

All good, thanks for clarifying! Yeah, the warrantless searches the government thinks they can do, along with the ability to change the rules to target anyone they don't like, means that everyone is now in a "highly targeted by the CIA" scenario. At least, I've updated my threat model, and I'm ready to nuke everything at the first kick on my door. I don't have anything to hide, but I also don't plan to give anyone anything without my consent.

[–] [email protected] 2 points 8 hours ago
[–] [email protected] 1 points 1 day ago* (last edited 1 day ago)

In a billion years I'm probably irrelevant. But is the data on my system right still relevant to anyone even in just 20 years time? I doubt it. No passwords or tokens will be valid anymore. Worst case they see some family photos or old browser history