this post was submitted on 06 Dec 2024
1658 points (99.2% liked)

Technology

59877 readers
4334 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 109 points 5 days ago (12 children)

You think having a fake online name will stop them from finding out who you are? Did you even pay attention to the Snowden leaks?

[–] [email protected] 60 points 5 days ago (7 children)

Make them spend more resources doing deanonymizations. First they have to get the IP from instance admins, then trace the tor routing, then the VPN that I use, then ask for my ISP. Make them do all that work.

(Or maybe they already have access by simply activating their backdoors within Intel ME, AMD PSP, and whatever baseband backdoor on the phones they have, and have just gotten everyone's real identities in an instant, we can't know for sure.)

[–] pennomi 12 points 5 days ago (6 children)

They also have backdoors in most implementations of TLS, according to a person I know who worked government security.

[–] Hawke 17 points 5 days ago

Still takes more work than just giving them that information.

load more comments (5 replies)
load more comments (5 replies)
load more comments (9 replies)