this post was submitted on 16 Jun 2025
29 points (100.0% liked)

askchapo

23036 readers
151 users here now

Ask Hexbear is the place to ask and answer ~~thought-provoking~~ questions.

Rules:

  1. Posts must ask a question.

  2. If the question asked is serious, answer seriously.

  3. Questions where you want to learn more about socialism are allowed, but questions in bad faith are not.

  4. Try [email protected] if you're having questions about regarding moderation, site policy, the site itself, development, volunteering or the mod team.

founded 4 years ago
MODERATORS
 

nothing more to add

top 17 comments
sorted by: hot top controversial new old
[–] [email protected] 1 points 10 minutes ago

There’s a lot of funny responses in this thread. What you change in your life depends on what you do now and how you expect to be targeted.

If you’re a normal person, my advice is always to speak less and recognize your surroundings. Recognize that the internet is a social media advertising platform.

[–] [email protected] 10 points 1 day ago (1 children)

Post your passwords here so we can weigh in on how secure they are and provide recommendations for better ones if needed.

[–] [email protected] 4 points 1 day ago
[–] [email protected] 20 points 1 day ago (3 children)

Build a threat model. I don't know what that means but thats what every opsec thread always say.

[–] [email protected] 18 points 1 day ago

I accidentally ordered some Gunpla and made a treat model.

[–] [email protected] 12 points 1 day ago* (last edited 1 day ago)

The basic idea is to identify what you’re trying to protect, what threats exist or may exist, and outline possible protections against those threats, as well as the tradeoffs of those protections. So for example, someone who doesn’t do any praxis and browses Hexbear all day (not trying to call anyone out) doesn’t need to be running Edward Snowden levels of opsec and privacy software, but they should almost certainly get a cheap VPN and be regularly cycling accounts.

[–] [email protected] 7 points 1 day ago* (last edited 1 day ago)

What this basically means is that it's a set of assumptions about how powerful and skilled your potential adversaries are in ways to compromise you and your data, and then you list all those avenues of attack and try to safeguard your privacy and devices against each of those.

For example let's take the CIA as an adversary, on one extreme you could assume they have incredible sci-fi quantum whatever technology where they can breach any system arbitrarily and completely, or on the other extreme you could assume they're entirely incompetent and can barely turn on the computer, leaving you to do whatever you want online. Obviously neither of those extremes are true, the truth is somewhere in the middle but getting closer to the truth unfortunately requires a lot of technical knowledge and experience.

I'm not extremely knowledgeable myself but I think you can go a long way with just the basics like getting a good VPN (make sure your payment is anonymous tho, I personally use Mullvad) and not posting any personally identifiable details online.

[–] [email protected] 8 points 1 day ago

https://privacyguides.org/ has overall good recs and advice, beware run by libertarian ish westerners ignore the politics

[–] MnemonicBump 13 points 1 day ago

Don't talk to cops.

[–] [email protected] 6 points 1 day ago

who are you protecting against and what are you protecting. eg. 1) your phone comms - read about the hacks and backdoors in ios and android phones (especially those published by kaspersky) etc. then decide on how to mitigate it. tossing the phone altogether if the threat is the state or something. 2) posting publicly - identity construction, typing analysis blah blah

[–] [email protected] 10 points 1 day ago* (last edited 1 day ago)

If you're going to do the revolution or anything remotely illegal don't discuss it on or even near a computer, phone, or any device that can send or received telecommunication signals.

[–] [email protected] 10 points 1 day ago

Lie frequently and realistically about pretty much any personal details about yourself. Once somebody knows enough details about you pretty much no matter how small, they or someone else listening in will be able to figure out your identity.

[–] [email protected] 4 points 1 day ago

ask your nearest Iranian general what they do, then do the exact opposite.

[–] [email protected] 4 points 1 day ago

Telling people you have no opsec makes your opsec worse btw

[–] [email protected] 5 points 1 day ago (1 children)

Take the SIM out of your phone before throwing it through someone's window

[–] [email protected] 2 points 1 day ago

This only works if you brick your phone first

[–] [email protected] 4 points 1 day ago

Sew your mouth, eyes and ears shut (maybe not in that order)