zlacker

[parent] [thread] 35 comments
1. dredmo+(OP)[view] [source] 2021-06-06 00:58:14
In an age where newspapers were bought at news stands for cash, identity of the reader was entirely anonymous.

In an age where printed periodicals were delivered by subscription, the subscriber information was available (and yes, often tracked by local and federal law enforcement), but not the specifics of what articles were read.

Today, with Web-based document delivery and Javascript instrumentation, the specifics of who reads what articles, time on page, sections read, interactions, shares, and more, are available not just to the publishere but advertisers, any entities hacking into or accessing their systems, app developers, and more.

And, yes, law enforcement, whether under warrant, subpoena, or ... other methods.

replies(5): >>qualud+Ge >>user39+Sp >>simfoo+kt >>blabla+tw >>sgt+IM
2. qualud+Ge[view] [source] 2021-06-06 03:55:38
>>dredmo+(OP)
You can get around that if you search for link urls in archive sites.

Someone usually will have archived the article there.

If you feel a bit more ambitious you could make a bot that runs on a vps somewhere and automatically scrapes news articles.

replies(2): >>TooCle+rf >>dredmo+tf
◧◩
3. TooCle+rf[view] [source] [discussion] 2021-06-06 04:05:22
>>qualud+Ge
Sure. But that's not the point.
◧◩
4. dredmo+tf[view] [source] [discussion] 2021-06-06 04:05:40
>>qualud+Ge
Tor seems to work reasonably well, except that many mainstream media sites block, throttle, or CAPTCHA it.
replies(3): >>pabs3+Vg >>qualud+Wg >>nuker+Zk
◧◩◪
5. pabs3+Vg[view] [source] [discussion] 2021-06-06 04:27:42
>>dredmo+tf
Combine Tor Browser with the archive.org/archive.is sites?
replies(1): >>dredmo+ci
◧◩◪
6. qualud+Wg[view] [source] [discussion] 2021-06-06 04:28:08
>>dredmo+tf
Yeah I like tor because the tor browser has built in fingerprinting protection.

Otherwise you could use a privacy hardened firefox version along with some kinda proxy.

I would say you could rent your own vps, use a vpn service that maintains their own servers, use a decentralized vpn (these are a new development) or just use someone else’s wifi that you don’t also use with your „real“ identity.

Opsec can be hard to maintain but boy is doing so fun.

replies(1): >>hannia+nL
◧◩◪◨
7. dredmo+ci[view] [source] [discussion] 2021-06-06 04:51:10
>>pabs3+Vg
Internet Archive / Wayback Machine works.

Archive.is runs Tor through a Cloudfront captcha which fails consistently in my experience.

replies(1): >>skissa+Pq
◧◩◪
8. nuker+Zk[view] [source] [discussion] 2021-06-06 05:41:07
>>dredmo+tf
VPN plus incognito (private) browser window is easier than tor and roughly same protection level. That is for general use, not for hardcore anonymity.
replies(2): >>dredmo+Cq >>xxs+ku
9. user39+Sp[view] [source] 2021-06-06 07:03:37
>>dredmo+(OP)
The "other methods" is the curious facet of this story to me. With stuff like this [1] [2] I wonder if the FBI really "needs" USA Today to comply to get this information or rather, this is part of a long-term strategy to get legal precedent on their side. The same dynamics were in play with the San Bernardino shooting, where they made a big deal out of getting data they didn't seem to actually need.

1 https://en.wikipedia.org/wiki/Utah_Data_Center

2 https://en.wikipedia.org/wiki/Room_641A

replies(2): >>dredmo+wq >>tooman+P31
◧◩
10. dredmo+wq[view] [source] [discussion] 2021-06-06 07:19:20
>>user39+Sp
I hadn't considered the precedent angle. That's an interesting one.

I was thinking along the lines that evidence already exists that would provide much the same value as the access logs might, but the access logs would either provide cover for introducing that evidence, or provide the value without disclosing other surveillance methods.

Either of those prospects is troubling.

replies(1): >>Capita+rB
◧◩◪◨
11. dredmo+Cq[view] [source] [discussion] 2021-06-06 07:21:26
>>nuker+Zk
History's shown that for numerous VPN providers that's not the case.

Chief value of (public/general) VPNs seems to be 1) accessing region-zoned content or 2) protection against local-segment interception.

The benefit of 2) is balanced against the fairly strong probability that the VPN provider itself is heavily surveilled or actively aiding in monitoring activities.

replies(1): >>qualud+dX
◧◩◪◨⬒
12. skissa+Pq[view] [source] [discussion] 2021-06-06 07:25:04
>>dredmo+ci
> Archive.is runs Tor through a Cloudfront captcha which fails consistently in my experience.

Just tried it now and works for me.

It is an annoying captcha, it had something like five steps to complete, but I've seen worse. I'd rather this captcha than the one that Roblox uses.

replies(1): >>Scound+pz
13. simfoo+kt[view] [source] 2021-06-06 08:05:05
>>dredmo+(OP)
Actually this track-ability is what is keeping me from subscribing to news websites. I'd easily pay a few bucks to them for the privilege, but I don't want to log-in or identify myself every time I read an article.
replies(5): >>dredmo+Qt >>chrisr+4w >>jacque+0I >>lixtra+R41 >>gentle+G61
◧◩
14. dredmo+Qt[view] [source] [discussion] 2021-06-06 08:12:47
>>simfoo+kt
Absolutely this, yes.
◧◩◪◨
15. xxs+ku[view] [source] [discussion] 2021-06-06 08:19:42
>>nuker+Zk
Those youtube ads sure helped the VPN popularity. There is absolutely no reason to believe VPNs are even remotely secure.
◧◩
16. chrisr+4w[view] [source] [discussion] 2021-06-06 08:46:39
>>simfoo+kt
Yeah for this you would need to sign up using a one-use mailbox, pay by mailing in a cashier's check, atop hiding your traffic. Possible with the NY Times, at least.
replies(1): >>Scound+az
17. blabla+tw[view] [source] 2021-06-06 08:54:56
>>dredmo+(OP)
> In an age where newspapers were bought at news stands for cash, identity of the reader was entirely anonymous.

Still, everybody on the street could see what we read while carrying the paper home. That can easily be dozens or hundreds of people. In some sense the periodic subscription via snail mail is in some sense the most private form. Sure, in the Web everything is tracked but in the average case literally nobody is aware of what we read. The worst case scenario can be quite bad though...

◧◩◪
18. Scound+az[view] [source] [discussion] 2021-06-06 09:40:29
>>chrisr+4w
Why a cashier’s check? Shouldn’t you send in $1 coins (after baking them) and pray that they arrive?
replies(1): >>1f60c+8D
◧◩◪◨⬒⬓
19. Scound+pz[view] [source] [discussion] 2021-06-06 09:43:25
>>skissa+Pq
You only get that far with JavaScript on. At that point, tor is like a hot pink tank. In theory safer than nothing, but standing out a lot.
replies(1): >>skissa+FC
◧◩◪
20. Capita+rB[view] [source] [discussion] 2021-06-06 10:17:34
>>dredmo+wq
Parallel construction.

https://en.m.wikipedia.org/wiki/Parallel_construction

◧◩◪◨⬒⬓⬔
21. skissa+FC[view] [source] [discussion] 2021-06-06 10:38:31
>>Scound+pz
Yes that's true. I had JavaScript on.

I agree that turning on JavaScript with Tor is risky from a security viewpoint. It significantly increases the risk that your real identity may be unmasked.

◧◩◪◨
22. 1f60c+8D[view] [source] [discussion] 2021-06-06 10:43:32
>>Scound+az
What do you mean by "baking"? Google is unhelpfully showing me results about crypto currencies and how to literally bake coins into a cake.
replies(1): >>Scound+CM
◧◩
23. jacque+0I[view] [source] [discussion] 2021-06-06 11:49:11
>>simfoo+kt
It's quite likely that if you do not use an add blocker and disable all social media tags on those pages using a js blocker that what you read is already coupled to your profile in some database.
◧◩◪◨
24. hannia+nL[view] [source] [discussion] 2021-06-06 12:28:08
>>qualud+Wg
Haven't heard of decentralized vpn yet, have any suggestions to look into?
replies(1): >>qualud+WW
◧◩◪◨⬒
25. Scound+CM[view] [source] [discussion] 2021-06-06 12:41:53
>>1f60c+8D
Heating them in the oven to clean off any identifying residue.
replies(2): >>spinax+wR >>shkkmo+Xu1
26. sgt+IM[view] [source] 2021-06-06 12:43:14
>>dredmo+(OP)
I still read my "primary" newspaper like an old newspaper, in a sense.

Yes, I read it on my iPad through an app, but it simply renders a PDF of the actual physical newspaper and its layout.

So there's no way to fit dynamic ads, JavaScript nuggets, etc. They can't really determine what article I read.

I think that should really be the norm for electronic newspapers. How is it in other parts of the world?

◧◩◪◨⬒⬓
27. spinax+wR[view] [source] [discussion] 2021-06-06 13:38:57
>>Scound+CM
I would use an acetone soak.
◧◩◪◨⬒
28. qualud+WW[view] [source] [discussion] 2021-06-06 14:27:10
>>hannia+nL
Two providers that I know of are Sentinel vpn and Mysterium vpn.

They‘re like tor where anyone can run their own node, but unlike tor there is a financial incentive to run them because they come with built in payment processing solutions via cryptocurrencies.

Some people are skeptical of cryptocurrencies but I consider this to be an excellent use case:

Securing coordination between actors that don’t necessarily trust each other through market incentives.

This would incentivize people to run their own nodes and it would be less like tor where most exit nodes are allegedly run by intelligence agencies.

replies(1): >>hannia+Sn2
◧◩◪◨⬒
29. qualud+dX[view] [source] [discussion] 2021-06-06 14:29:26
>>dredmo+Cq
With some vpn providers you can look them up in court records to see if there are any mentions of them keeping logs.
◧◩
30. tooman+P31[view] [source] [discussion] 2021-06-06 15:33:17
>>user39+Sp
I this case, I think it's a genuine mea culpa from the FBI, without explicitly admitting they were wrong.

The subpoena, and USA Today's response [1] paints a picture of an incompetent and/or inexperienced FBI agent, who is unaware of existing Justice department guidelines specifically prohibiting her from serving such a subpoena.

Reading between the lines, citing "other methods" is the FBI's way of quietly withdrawing a subpoena that should never have been served.

[1] https://storage.courtlistener.com/recap/gov.uscourts.dcd.231...

replies(1): >>shkkmo+Ju1
◧◩
31. lixtra+R41[view] [source] [discussion] 2021-06-06 15:43:01
>>simfoo+kt
Same here. They could send out a daily e-paper though (and some do!).
◧◩
32. gentle+G61[view] [source] [discussion] 2021-06-06 15:59:13
>>simfoo+kt
Ads technica disables tracking if you are a paying subscriber last I checked
◧◩◪
33. shkkmo+Ju1[view] [source] [discussion] 2021-06-06 19:16:33
>>tooman+P31
I think describing this as a "mea culpa" when the FBI has refused to admit any wrong doing or mistake and also has issued nothing like an apology, is not reasonable.

> "The subpoena is being withdrawn because intervening investigative developments have rendered it unnecessary," an FBI spokesperson said.

I think this is nothing like a "mea culpa", but instead has absolutely everything to do with managing the establishment of precedents to work in the favor of the FBI whenever possible.

◧◩◪◨⬒⬓
34. shkkmo+Xu1[view] [source] [discussion] 2021-06-06 19:18:07
>>Scound+CM
I highly doubt baking them will do that.
◧◩◪◨⬒⬓
35. hannia+Sn2[view] [source] [discussion] 2021-06-07 04:09:41
>>qualud+WW
I suppose nothing is stopping nodes from logging activity from each ip address?
replies(1): >>qualud+zv2
◧◩◪◨⬒⬓⬔
36. qualud+zv2[view] [source] [discussion] 2021-06-07 05:46:25
>>hannia+Sn2
I don’t know. Maybe there’s a hash value for the code that you can look at to make sure it’s the right code. Haven’t personally looked into this.
[go to top]