I was watching Eric Murphy’s video on “Privacy faigue” and it certainly provided some food for thought. (https://www.youtube.com/watch?v=Ab6ryHD_ahQ)

I like how he conceptualizes privacy as multilevelled, with no one-size-fits-all solution, which should be tailored based on the individual’s threat model.

So, with that in mind: what would y’all consider your threat model?

As far as I’m concerned I suppose my main goal is to avoid advertisements, particularly targeted advertisement. Additionally I would obviously like to avoid getting hacked, but I know I’m not being targeted particularly (and wouldn’t be a worthwhile target anyway). Curious to see if I have any obvious blindspots that could be remedied based on everyone else’s answers.

  • Deckweiss@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    3 months ago

    I once talked with a colleague from the data-analysis field. Apparently the company they work at is somewhat in the legally grey area.

    They advised other companies on hiring candidates, by scraping all possible data about them online (which included buying anonymized advertising data and correlating it to all their publically available data and the data from the application). Using that, they claim to predict worker motivation, loyalty, how often they are sick, their political alignment, what their acceptable rate is, if they are going to ask for a raise, how well they work under pressure and much much more.

    Since hearing it this has basically become my thread model.

    As I am writing this, I realize that it is probably time to delete my Lemmy account and never post here again lol

    • GolfNovemberUniform@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      3 months ago

      I think you can stay anonymous (as in your threat model) on Lemmy as long as you use a VPN and keep your style of speech different than your “real” one

      • grue@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        3 months ago

        and keep your style of speech different than your “real” one

        Good luck with that!

        I kinda feel like you’d need to run your comments through a style transfer LLM in order to do that successfully and consistently.

  • icedcoffee@lemm.ee
    link
    fedilink
    arrow-up
    1
    ·
    3 months ago

    I found the Anarcho-Texh security guide helpful in getting started thinking about this with more nuance. I’m including the link below but here’s a short summary

    Are you an: Individual Journalist Targeted Activist

    Are you annoying: Random assholes Assholes with resources The State

    Each category has bigger security needs on one side and more powerful tools on the other. It’s kind of humbling to realize that I’m just an individual and the NSA has no special interest in me, but that makes me feel better using a separate browser without additional security to shop on sites that block a VPN etc

    (Also tbh I’m not sure when this page was last updated and I have no involvement with the org. Just a cool resource)

    https://github.com/AnarchoTechNYC/meta/wiki/Persona-based-training-matrix

  • kbal@fedia.io
    link
    fedilink
    arrow-up
    1
    ·
    3 months ago

    Default threat model: Some malignant demon, who is at once exceedingly potent and deceitful, has employed all his artifice to deceive me