freeborn | ἐλεύθερος on Nostr: #privacy - connect to VPN, get pseudo 'from' IP address - log in to site/account that ...
#privacy
- connect to VPN, get pseudo 'from' IP address
- log in to site/account that has your KYC information (including mailing address)
- pseudo 'from' IP address added to your 'known aliases'
- them: "...OK what other sites were visited by that IP around the same time? ...wait, he uses the *same* public IP address all day, every day? ...wow, he's not even trying...LOL."
- VPN useless
Seems to me that there's no point in trying to keep our online activity private if we're logging in to our bank or any other site that already has all our info anyway--then we've only exposed our 'fake' public IP address as *me*. Think how easy it would be to then track *that* IP address. Silly to think this is an effective way to remain private.
I guess this is why so many privacy advocates have emphasized some combination of VPN + Tor for IP address obfuscation. But the minute you log in to a site that has your KYC info, you're "burned." It's like putting on a disguise to get cash out of the ATM--by inserting your card and entering your code, your "disguise" is pointless: it's you--and you even verified it's you with a password!
I've been adamant about getting whole-home VPN set up, but now I don't know if I even care. As long as we have adequate DNS content filtering (especially for the kids' sakes), then maybe that's good enough for now. Have everyone use tor-browser, or Brave's Private window-with-Tor, and call it a day. But even then, "Tor is not a panacea."
Thoughts welcome.
Published at
2024-10-16 14:16:29Event JSON
{
"id": "e3199ad706b9b8bb88bc5972d01249aeb5b18987dc0be2c97f79b56d3ac7853a",
"pubkey": "eda96cb93aecdd61ade0c1f9d2bfdf95a7e76cf1ca89820c38e6e4cea55c0c05",
"created_at": 1729088189,
"kind": 1,
"tags": [
[
"t",
"privacy"
]
],
"content": "#privacy \n\n- connect to VPN, get pseudo 'from' IP address\n- log in to site/account that has your KYC information (including mailing address)\n- pseudo 'from' IP address added to your 'known aliases'\n- them: \"...OK what other sites were visited by that IP around the same time? ...wait, he uses the *same* public IP address all day, every day? ...wow, he's not even trying...LOL.\"\n- VPN useless\n\nSeems to me that there's no point in trying to keep our online activity private if we're logging in to our bank or any other site that already has all our info anyway--then we've only exposed our 'fake' public IP address as *me*. Think how easy it would be to then track *that* IP address. Silly to think this is an effective way to remain private.\n\nI guess this is why so many privacy advocates have emphasized some combination of VPN + Tor for IP address obfuscation. But the minute you log in to a site that has your KYC info, you're \"burned.\" It's like putting on a disguise to get cash out of the ATM--by inserting your card and entering your code, your \"disguise\" is pointless: it's you--and you even verified it's you with a password!\n\nI've been adamant about getting whole-home VPN set up, but now I don't know if I even care. As long as we have adequate DNS content filtering (especially for the kids' sakes), then maybe that's good enough for now. Have everyone use tor-browser, or Brave's Private window-with-Tor, and call it a day. But even then, \"Tor is not a panacea.\"\n\nThoughts welcome.",
"sig": "5c3de88384d45a0ac965da0d399b2098d676204da5136f52b7a5d16dd7259fee88f1b4fc4c8decb8d4d0d383893df6f05c366d2c61506f400f126dff43e5450e"
}