• Teknikal@eviltoast.org
    link
    fedilink
    English
    arrow-up
    11
    ·
    2 hours ago

    Bane of my life as about a year ago my dad switched his sim and immediately started pestering me about not being able to log into his accounts.

    Yes he got rid of the old number completly and expected me to somehow make his logins work. This is still going on to this day when he complains to me something doesn’t work it’s because he’s tied it to his old phone number.

  • jpablo68@infosec.pub
    link
    fedilink
    English
    arrow-up
    12
    ·
    7 hours ago

    I’m in a quest to find a good email provider that doesn’t ask for a cellphone or another email address while creating an account, cock.li used to do this but now it’s “getting back on its feet”

  • D_Air1@lemmy.ml
    link
    fedilink
    English
    arrow-up
    78
    ·
    edit-2
    21 minutes ago
    • Phone numbers
    • social security numbers

    Stop making personal information into digital ids because when it inevitably ends up in some kind of data breach. These companies all throw their hands up saying sucks to be you.

  • ERROR: Earth.exe has crashed@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    120
    arrow-down
    2
    ·
    13 hours ago

    This should be what digital ID looks like:

    -----BEGIN PGP PUBLIC KEY BLOCK-----

    mDMEZ26+ARYJKwYBBAHaRw8BAQdAsUGMjbGNUyyz9PHsHKP4xj/tIfYIuHb4miPH 0iCPpu60K0VSUk9SOiBFYXJ0aC5leGUgaGFzIGNyYXNoZWQgPG5vQGVtYWlsLmV4 ZT6IcgQTFggAGgQLCQgHAhUIAhYBAhkBBYJnbr4BAp4BApsDAAoJEI6E3uMn31Z3 028BAM5o8ER0dqTsxFlZSgZOvvgFHGuy2eFgF3rULkGKl1KrAP9fdE7WwnYbBer/ AVmw5jr0P5m/XsEQQrSueuk/FLYBBbg4BGduvgESCisGAQQBl1UBBQEBB0BDR0Bv pf4jxbwp9rVowFTnL59NGqnnh6XyF/LjAoYDGgMBCAeIYQQYFggACQWCZ26+AQKb DAAKCRCOhN7jJ99Wd1dMAP45xmN03SodkWHi7PYOORqNXJUBdMzzfsRXdqE8ZXaW vAD+PqNqPcbwJYCOEAXkg7DlZ0SX3o9MViZLdzHFQ3TpUA8= =krDh -----END PGP PUBLIC KEY BLOCK-----

    PGP Key Fingerprint: 857957d40f06cc816fd3d29a8e84dee327df5677

    Should be good until quantum computers come around

      • Korhaka@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        1
        ·
        21 minutes ago

        Yeah… I did this kind of thing before as a password and found that out the hard way

      • ayyy@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        23
        arrow-down
        3
        ·
        7 hours ago

        The California DMV requires you to renew your vehicle registration every year by paying with a bank account number (no card) which is like a 30ish digit number and they disable paste. If you get it wrong they won’t notify you in any way until you get pulled over by a cop who is one bad sneeze away from murdering you. It’s a great system.

        • azl@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          2
          ·
          4 hours ago

          I have renewed my CA registration with a credit card going back to at least 2016. A responsible driver would know their renewal failed when their registration document did not arrive via mail.

          • mox@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            2
            ·
            edit-2
            2 hours ago

            I think my question was clear enough. The comment didn’t mention banks, I’ve never had a bank that did that, and we generally don’t try to hide our identities from our banks anyway. My best guess was that they misunderstood how public/private keys work, but since that was only a guess, I asked.

        • AbidanYre@lemmy.world
          link
          fedilink
          English
          arrow-up
          13
          ·
          8 hours ago

          I’ve seen a few. They’re super annoying when trying to use a password manager with a decent password.

    • Zak@lemmy.world
      link
      fedilink
      English
      arrow-up
      58
      ·
      12 hours ago

      I’m sad PGP didn’t become a popular way to log into websites. A challenge-response protocol could have even been built into web browsers. Big tech is reinventing that idea as Passkey, but with a very big tech flavor.

        • Kusimulkku@lemm.ee
          link
          fedilink
          English
          arrow-up
          16
          ·
          9 hours ago

          I’m already hearing about restrictions on exporting passkeys and some apps requiring that you’re not running a custom ROM on Android and stuff like that. Makes me worried they’re going to fuck that up and make it restrictive bs

    • Pika@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      2
      ·
      edit-2
      11 hours ago

      I want to preface this response saying I full agree with this, I want something like this to happen, I am responding because of some concerns I have. The real major one: How do you verify the authentication part of the data security chain?

      A PGP key alone does not authentically validate that you are who you say you are. When the source is the untrusted party, it doesn’t accomplish the site’s goal. It’s the equivalent to me handing you a piece of paper saying “I’m John Smith and this is what I use to say I’m this” which works amazing for trusted exchanges, but when the source is “just trust me bro” it doesn’t solve anything for the website owner.

      Websites get around this by having trust certificates/root servers that are co-signed with the PGP key. However, we lack any system like that for personal identities. Arguably, setting up such a system would isolate most of the known internet, as it is a significant roadblock, much like how SSL certificate usage was a huge roadblock for sites before Let’s Encrypt became a thing.

      This setup would be amazing for logging into sites. However, it fails to accomplish what the websites that are asking for PII are looking for, which is verification that their user is who they say they are, and not a random third party.

      To reliably use this setup, we would need something similar to Let’s Encrypt, but for user identification. The issue with that is it would become the de-facto attack vector (for both law enforcement and criminal parties), and that site would need to require PII to address the biggest concern on these sites, which is that you are who you say you are, and not Jo Smo or a bot looking to harvest data. Additionally, as mentioned earlier, a massive retraining of the internet would need to be done, which would mostly affect non-tech folk.

      I am hopeful that an easy function that won’t violate users privacy comes out, but I don’t think the two topics are compatible sadly

      • socsa@piefed.social
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        edit-2
        9 hours ago

        The solution here is distributed trust by proxy. You start with a single exchange between two trusted peers, and build from there. As long as every individual link within the network is trusted, then any route between two disconnected endpoints can be trusted as well. As the network grows there is a very high statistical likelihood that there will exist many individual trust graphs between two nodes, which provides redundant validation.

        I have always thought this would make a cool chat app. You enter the network by scanning someone’s QR code to become their validated peer, and then you can theoretically communicate with anyone else on the network by exchanging keys via trust graphs. You could then build a social network on top of it which shows you how many hops it takes you to get to some celebrity or some shit.

        • Pika@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          9 hours ago

          tox did something similar with this outcome, but it never took off. Basically with tox each account is actually stored locally, much like how Skype did when it was p2p, but the difference is your account is actually on your device, as in if you lost your “key” you lost your account, when you connected with others, you gave your friends your TOXID which was essentially your public key signature with some added information regarding what you wanted for privacy added to it, and then your messages were relayed through a p2p DHS network. Every communication was encrypted e2e. With tox anyone could create an account with any information, but only people you added were able to message you, and visa versa. The only time you were ever publicly disclosed was during adding contacts to people you didn’t already have, which helped minimize botting on it as bots wouldn’t be able to message you without your ID. The issue with that method was, both parties had to be online to message each other, there was no central server to manage identity and handle users, so every connection was considered trusted since you had to manually add the person via their tox ID.

          I expect this solution /could/ be moved into a centralized system for all user accounts, since the only way to add people was manually adding their private key, but I would expect that on large scale, the lack of ability to actually stop problematic users might dissuade platforms from wanting to implement it, since account creation was as easy as just clicking “create account” and no accounts were ever verified server side, which in order to do, brings back to the issue topic: Privacy vs Security

      • wellbuddyweek@lemm.ee
        link
        fedilink
        English
        arrow-up
        3
        ·
        9 hours ago

        How do they currently solve this problem for passwords? You could just have the register/create account button lead to a pubkey upload instead of a ‘set password’, no?

        • Pika@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          6
          ·
          9 hours ago

          This problem isn’t addressing password authentication, its the website knowing who you are and that you are legitimate. Websites that collect things such as phone numbers during account creation don’t collect your PII as part of your password procedure. They collect it as a verification that you are an actual being and not a fake account/bot. The ease of being able to go through a forgot password thing is just a positive side effect.

          This solution would work amazingly for logging in, there’s no argument for that, but it doesn’t address the elephant in the room: That the website wants to make sure you are a person/legitimate account and not a fake alias or a bot to scrape info, and when you are the only one providing that information that claim can’t be verified.

    • Phoenixz@lemmy.ca
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      9 hours ago

      Nah, there are more than enough algorithms available that won’t work on quantum computers, I’m not too worried about that

  • undefined@lemmy.hogru.ch
    link
    fedilink
    English
    arrow-up
    238
    arrow-down
    1
    ·
    edit-2
    9 hours ago

    To the same audience: quit selling my fucking phone number!

    I ditched a phone number I had for 10+ years because it was leaked everywhere. Only a few short months after updating my number with the DMV and a handful of other government agencies I started receiving scam calls/messages again.

    At some point we need to adopt some fucking privacy laws. This is absolutely bonkers—is no one else fed up??

    Edit: I already know how to silence unknown callers. What I want is to not have the problem in the first place, ideally by 1) having companies not sell personal data to third parties and 2) being able to block spoofed (non-encrypted) caller ID.

    • Shimitar@feddit.it
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 hours ago

      Don’t worry, here in Europe we are full of privacy laws but I still receive tents of spam calls per day. Usually from non UE countries faking the number with my country numbers.

    • Snot Flickerman@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      106
      arrow-down
      7
      ·
      14 hours ago

      Oh everyone is fed up but we just elected a guy and government who is sure to make it all way way way worse.

      He just helped put the nail in the coffin of the lie that crypto is for anything but scams, don’t worry, it’s gonna get real bad before it gets any better.

      • tourist@lemmy.world
        link
        fedilink
        English
        arrow-up
        21
        ·
        12 hours ago

        In South Africa, where I live, everyone is assigned an ID Number at Birth. You need an ID number, thumbprint scan AND proof of address to get issued a SIM card number due to a law introduced called RICA. It was meant to help fight crime. Worried that the government could listen in to calls or read their SMSs, the criminals just switched to WhatsApp, which also happened to become cheaper than SMSs and gained popularity in this time.

        The cops never seemed to crack WhatsApp. The only drug busts that happen are when an open secret becomes laughably too open and when they harass every person arriving from South America at O.R. Tambo international airport just to catch the decoy mules carrying 12g of cocaine (total). Every dealer I ever organised with was over WhatsApp.

        So now, woopsi, RICA stopped nothing and just became a liability. That treasure trove of fragile data made its way to scammers and spammers. A total net negative.

        I’d encourage everyone else in other countries to apply major pushback to any government proposals in this direction.

        • sunzu2@thebrainbin.org
          link
          fedilink
          arrow-up
          9
          ·
          9 hours ago

          Do people still believe that drug trade is ran by criminals?

          I am pretty sure in every country, it is controlled either police or the spooks.

          I am done pretending otherwise. Criminals are just useful idiots, the real thugs are the police and security apparatus

        • nyan@lemmy.cafe
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          1
          ·
          11 hours ago

          There’s a subset of Americans who are rather like ostriches: heads so deeply buried in the sand that they forget anything exists outside their immediate surroundings. Reminding them that the rest of the world is out there rarely has any positive results, however.

    • pHr34kY@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      edit-2
      10 hours ago

      Australia has a “do not call register”. It seems to mostly work, but telcos are having trouble with calls originating from outside the network with spoofed caller ID. We still get spam/scam calls from India among other places.

      Even if they’re not calling you directly, they are still using your phone number to link you to things and create a shadow profile behind the scenes.

    • DaddleDew@lemmy.world
      link
      fedilink
      English
      arrow-up
      44
      ·
      13 hours ago

      I’m pretty sure a lot of scam calls use machines that call every possible phone number within an area code and see who answers. There is no way to avoid it.

      • Pika@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        9
        ·
        12 hours ago

        this right here. I stopped getting scam calls years ago, I stopped answering and they just eventually stopped calling. If you don’t interact with the call (interact being ignore it or mute it NOT reject it) and it just goes to voicemail, they seem to eventually stop

        • BlemboTheThird@lemmy.ca
          link
          fedilink
          English
          arrow-up
          10
          ·
          11 hours ago

          Lucky you. I’ve been letting calls from any number I don’t recognize go to voicemail for years and nothing ever seems to change.

        • atrielienz@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          edit-2
          7 hours ago

          If you’re job hunting, or work in specific fields this may not be a reasonable thing to do and that’s at least part of the problem.

          • Pika@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            2
            ·
            11 hours ago

            This would deem troublesome yea, being said I firmly believe in separating work and home. I wouldn’t be willing to use a personal number for work related activities, at least not public related activities. Being said, I have no good solution for that, at least you are being paid for the scam call I guess.

            • atrielienz@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              7 hours ago

              Job hunting is what I meant. And you pretty much have to use your personal phone for that. I haven’t ever had a company phone. Doubt they’d give it to techs.

    • adarza@lemmy.ca
      link
      fedilink
      English
      arrow-up
      19
      ·
      14 hours ago

      lists sourced from drivers licenses and motor vehicle registration records are literally sold by some states.

    • Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      3
      ·
      11 hours ago

      I set my phone to decline calls from unknown callers years ago.

      These calls are already illegal. I used to report them to the FTC but I never heard anything back so I have no idea what happens, but I presume nothing. If I had the time to take them, and if they spoke English, I would record them with the Cube ACR app (which no longer works) and convince them to incriminate themselves. Ask their name, company, location, time/date, whether they ran my number through the DNC registry.

    • Pika@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      12 hours ago

      I’m confused of how this keeps happening to people.

      Like I use my phone on most sites that allow it and I’ve never had spam/scam calls really, but I’ve also explicitly unchecked the marketing boxes that appear on the signup so maybe that it.

      The last instance that actually happened to me was with entering my university a few years ago for my BS degree. They 1000% sold my contact information as some part of the deans/honors list process. I reached out to them and stopped that so fast.

  • finitebanjo@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    5
    ·
    9 hours ago

    Theres an LTT video where one of the boys intercept all Linus’ calls and texts, classic prank.

  • snooggums@lemmy.world
    link
    fedilink
    English
    arrow-up
    41
    arrow-down
    1
    ·
    14 hours ago

    It is the same thing that happened with US Social Security Numbers, which were originally just tracking numbers for that one purpose that were coopted by capitalists and treated like something special.

    • Corkyskog@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      9
      ·
      11 hours ago

      I remember I was flipping through some of my mom’s old college stuff and there was a club that she was involved with and everyone listed their address and social security numbers. It was wild, no idea why they felt the need to collect socials. But this was a very long time ago.

      • grysbok@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 hours ago

        My college ID used to be my social security number, so maybe it was something like that? Iirc that’s no longer allowed in the US.

    • sugar_in_your_tea@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      2
      ·
      7 hours ago

      It’s not just “capitalists” (whatever that means), every government agency seems to want it, employers and banks are required to ask for it, etc. It’s more than just “some people misused it,” we actually wrote it into regulations.

  • Pika@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    1
    ·
    edit-2
    11 hours ago

    Are internet security and internet privacy incompatible goals?

    Yes. They are completely incompatible goals when anything relating to identity/being is linked to it. Examples of this could be anything from your name, to your behavioral patterns, to your phone number

    Disregarding the entire possibility that ANY site is hack-able/breach-able, the issue stands that the reasons that most sites request PII is valid, for security reasons. There does not exist any valid method of ensuring users identity that does not violate users privacy. CAPTCHAS are proven inefficient, email domains are easy as a 1-2 click. Once the setup is done server side changing to a new address is as easy as changing your server settings and registering a new domain, then just pointing your MX records there. Heck depending on your postfix setup you might not even have to change server settings, if your account lookup is setup to ignore the domain and it all uses the same database. Even phone numbers have proven troublesome but its the least troublesome method available

    The entire reason PII style setups are used, is because its an easy verification site side, but a hard to spoof verification customer side. Like the article says, phone numbers are hard to change for verification, many only let you change so many times in X period, and usually require some form of physical identity to register, and the ones who don’t are forced such as VOIP style numbers get blocked.

    We lack currently a good system aside from that, because at the end of the day, how do you prove you are who you say you are, without disclosing your identity. I personally think it should be fine to give up some PII for security purposes, but this NEEDS to be restricted only to security and should never be shared with any entity, and this includes government overreach. Alas this will never happen.

    • AnAmericanPotato@programming.dev
      link
      fedilink
      English
      arrow-up
      8
      ·
      9 hours ago

      This assumes a legitimate need to prove who you are outside the context of that specific site, rather than just within it. Sometimes that need is real, sometimes it is not.

      When it’s not, and you only need to prove you are the same person who created the account, then a simple username and password is sufficient. Use 2FA (via authenticator app or key, NOT via SMS or email) on top of that. This allows users to prove to a sufficient degree that they are the owner of that account.

      This is how most Lemmy instances work, for example. I can sign up by creating a username and password, with optional 2FA. They do not need my email. They do not need my phone number. They do not need my name, or my contacts, or anything else that is not related to my identity within their server.

      I realize that this is untenable at large scales for any communications platform. Spam (and worse) is a problem wherever there are easy and anonymous signups. I’m honestly not sure how Lemmy is as clean as it is. I guess it’s just not popular enough to attract spammers.

      • Pika@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        3
        ·
        8 hours ago

        You are correct with this comment yea, the biggest drawback (which as acknowledged we have seen on lemmy) is the anonymous of the account. It’s easy to spin up spam instances, and due to how federation works its hard to combat against it. I remember LW had an issue regarding that a bit ago with someone threatening to just keep changing domains to avoid blocking, which is indeed a problem for any of these style services. I agree at large scale, most sites are not going to want to have to put up with losing that level of control moderation side. It creates a lot of headaches and for most sites it’s just easier to enforce a policy that forces disclosing PII.

  • HobbitFoot @thelemmy.club
    link
    fedilink
    English
    arrow-up
    14
    ·
    13 hours ago

    Are Internet security and Internet privacy incompatible goals?

    They are if the security is tied to knowing that an account is a person.

  • Ulrich@feddit.org
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    2
    ·
    edit-2
    11 hours ago

    It’s not an accident. They’re not stupid. It is intentional. They want your personal information. Most of your personal information is tied to your email but it’s easy enough to spin up an alias to sign in with. Requiring a phone number ensures that they know exactly who you are and can buy/sell/use your data accordingly. They also know what a giant pain in the dick it is to change your phone number, especially when you need it for these security checks. They also know sales conversion rates are much higher if they can get you on the phone. So yeah, they’re not going to stop doing that.

  • werefreeatlast@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    11 hours ago

    I have absolutely no need for my phone number, nor do I use it for anything that I couldn’t use a voice app for. Just get rid of them altogether.

    • Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      11 hours ago

      Yeah I mean I’d get rid of that and email entirely if I could but unfortunately there are legal and societal expectations.

      • pHr34kY@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        1
        ·
        10 hours ago

        We need email. It’s one of the few protocols that are 100% in the user’s control. I run my own mail server. I can’t do the same for whatsapp.

        We’ve added a lot of checks to email (SSL, DKIM, DMARC, SPF) so it’s very easy to identify spam these days. It’s also easy to avoid giving any two companies the same email address. That’s something much harder to avoid with a phone number.

        For 2FA, per-account email addresses and authenticor apps are the best approach for privacy.

        • Ulrich@feddit.org
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          2
          ·
          edit-2
          10 hours ago

          I run my own mail server. I can’t do the same for whatsapp.

          No, but you can do the same for a wide variety of chat apps.

          it’s very easy to identify spam these days

          LOL then why is my inbox constantly full of spam?

          Platforms like SimpleX solve spam by requiring participants to have an invitation to message you. You can either send them a 1-time invitation or you can use a semi-permanent one that can be posted publicly and rolled as necessary without losing contact with anyone you’ve already connected with, so by the time it’s mined somehow and sold to some company, it’s already changed.

          For 2FA, per-account email addresses and authenticor apps are the best approach for privacy.

          LOL what? No they’re not. How does an email protect your privacy over just a username?

            • Ulrich@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              2 hours ago

              Zoomer spotted

              Haha, not even close

              Email >>>>> chat apps.

              Wrong again. But please, do go on.

          • mox@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            1
            ·
            edit-2
            9 hours ago

            LOL what? No they’re not. How does an email protect your privacy over just a username?

            They said per-account email addresses, presumably meaning that when giving out an email address, you would use a different one for each service. That way, they couldn’t be used to link you across services, and you could easily delete one (and know who to blame) if it was abused.

            • Ulrich@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              9 hours ago

              Yes, I understand how email aliasing works. Again, how is that more private than a username?

              • mox@lemmy.sdf.org
                link
                fedilink
                English
                arrow-up
                3
                arrow-down
                1
                ·
                edit-2
                7 hours ago

                I don’t see a claim of it being more private than a username. Perhaps the person you’re arguing with views them as equally private, or is thinking of services that require some form of contact info. I can’t speak for them.

                • Ulrich@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  4
                  ·
                  edit-2
                  6 hours ago

                  It’s right here:

                  For 2FA, per-account email addresses and authenticor apps are the best approach for privacy.

                  I can’t speak for them.

                  But you just did.

      • corsicanguppy@lemmy.ca
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        10 hours ago

        You’ll pry email from my #coldDeadHands, but I haven’t had a phone number for a decade.

  • Ogmios@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    9
    ·
    edit-2
    13 hours ago

    Computer technology is fundamentally insecure so long as everything is connected all the time. It drives me mental that idiots keep trying to foist the whole of human society onto devices which are clearly unfit for the task.

    • corroded@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      13 hours ago

      Technology exists to keep all your personal data exceptionally secure. Modern encryption is incredibly difficult to break (impossible really).

      Humans are fundamentally insecure. Any time you read about a data leak, it’s because somebody stupidly opened an attachment or fell for a scam. Any time someone gets “hacked,” they didn’t. They gave away their information. Human error and a lack of education are the problems.

      • sevon@lemmy.kde.social
        link
        fedilink
        English
        arrow-up
        3
        ·
        12 hours ago

        While I also disagree with the claim that technology is “fundamentally” insecure, it’s unfortunately not that often made by smart and caring people.