home.social

#privacyguides — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #privacyguides, aggregated by home.social.

  1. Privacy Guides explains how to deploy a Signal proxy so users can bypass state blocks and retain access to encrypted messaging. 🔐
    The guide outlines self-hosted setup steps and highlights how Signal’s centralized design can restrict access during censorship. 🌍

    🔗 privacyguides.org/videos/2026/

    @privacyguides
    @signalapp

    #TechNews #Signal #PrivacyGuides #SignalProxy #Proxy #State #Encryption #Censorship #Privacy #FOSS #Cybersecurity #OpenSource #Freedom #DigitalRights #SelfHosting

  2. Privacy Guides explains how to deploy a Signal proxy so users can bypass state blocks and retain access to encrypted messaging. 🔐
    The guide outlines self-hosted setup steps and highlights how Signal’s centralized design can restrict access during censorship. 🌍

    🔗 privacyguides.org/videos/2026/

    @privacyguides
    @signalapp

    #TechNews #Signal #PrivacyGuides #SignalProxy #Proxy #State #Encryption #Censorship #Privacy #FOSS #Cybersecurity #OpenSource #Freedom #DigitalRights #SelfHosting

  3. Privacy Guides explains how to deploy a Signal proxy so users can bypass state blocks and retain access to encrypted messaging. 🔐
    The guide outlines self-hosted setup steps and highlights how Signal’s centralized design can restrict access during censorship. 🌍

    🔗 privacyguides.org/videos/2026/

    @privacyguides
    @signalapp

    #TechNews #Signal #PrivacyGuides #SignalProxy #Proxy #State #Encryption #Censorship #Privacy #FOSS #Cybersecurity #OpenSource #Freedom #DigitalRights #SelfHosting

  4. Privacy Guides explains how to deploy a Signal proxy so users can bypass state blocks and retain access to encrypted messaging. 🔐
    The guide outlines self-hosted setup steps and highlights how Signal’s centralized design can restrict access during censorship. 🌍

    🔗 privacyguides.org/videos/2026/

    @privacyguides
    @signalapp

    #TechNews #Signal #PrivacyGuides #SignalProxy #Proxy #State #Encryption #Censorship #Privacy #FOSS #Cybersecurity #OpenSource #Freedom #DigitalRights #SelfHosting

  5. Privacy Guides explains how to deploy a Signal proxy so users can bypass state blocks and retain access to encrypted messaging. 🔐
    The guide outlines self-hosted setup steps and highlights how Signal’s centralized design can restrict access during censorship. 🌍

    🔗 privacyguides.org/videos/2026/

    @privacyguides
    @signalapp

    #TechNews #Signal #PrivacyGuides #SignalProxy #Proxy #State #Encryption #Censorship #Privacy #FOSS #Cybersecurity #OpenSource #Freedom #DigitalRights #SelfHosting

  6. 🚨 This Week In Privacy #52 will be live in 30 minutes, we'll be giving our thoughts on CalyxOS returning with an Android 16 test build and we will also be covering the latest in privacy & security news. 🗞️ Come say hi! 😊 youtube.com/live/WclDBuy... Privacy #PrivacyGuides #TWIP

  7. 🚨 This Week In Privacy #52 will be live in 30 minutes, we'll be giving our thoughts on CalyxOS returning with an Android 16 test build and we will also be covering the latest in privacy & security news. 🗞️

    Come say hi and chat with us live! 😊

    youtube.com/@privacyguides/live or streamyard.com/watch/gaehAHBzC

    #Privacy #PrivacyGuides #TWIP

  8. We're thrilled to announce the next section of our Privacy Activism resources! 🎉

    📑 The Data Protection Authority Directory is a new tool to help you find the main consumer privacy law in your region, and the authority mandated to enforce that law.

    We sincerely hope our DPA Directory will be a useful tool for building your knowledge about what privacy protections you're entitled to. Paired with our resource on reporting privacy violations in our Privacy Activist Toolbox, you can take a stand against violations of your privacy rights, and make a significant impact benefiting both you and your community.

    Find your country/state/region here: privacyguides.org/en/activism/

    #Privacy #Activism #PrivacyActivistToolbox #PrivacyGuides

  9. 🚨 This Week In Privacy #51 will be live in 30 minutes, we'll be talking about
    Ubuntu adding AI features and using it in their development pipeline 😬, we will also be covering the latest in privacy & security news. 🗞️

    We will also be answering questions from the community, come say hi! 😊

    streamyard.com/watch/zsBB6viVS

    #Privacy #PrivacyGuides #TWIP

  10. 🚨 This Week In Privacy #51 will be live in 30 minutes, we'll be talking about Ubuntu adding AI features and using it in their development pipeline 😬, we will also be covering the latest in privacy & security news. 🗞️ youtube.com/live/eOqAQjr... #Privacy #PrivacyGuides #TWIP

  11. ICYMI, this week we interviewed Carissa Véliz, author of Privacy is Power and associate professor at the Institute for Ethics in AI at the University of Oxford.

    We talked about predictive AI, lifelike chatbots, and the importance of preserving our privacy.

    Her new book Prophecy is now available at a bookstore near you. youtube.com/watch?v=E00mNfH75qM

    #Interview #PredictiveAI #Prophecy #CarissaVeliz #Privacy #OxfordUniversity #PrivacyGuides

  12. We just had a chance to interview Carissa Véliz, author of Privacy is Power and associate professor at the Institute for Ethics in AI at the University of Oxford.

    We talked about how predictive AI will make a 'meritocracy' impossible, how lifelike chat bots are designed to deceive you, and the importance of privacy in the digital age. Catch the episode on our YouTube channel or your favorite podcast app now!

    Carissa Véliz is an associate professor at the Institute for Ethics in AI at the University of Oxford, a renowned author and speaker, a board member of the Proton Foundation, and a member of UNESCO's Women 4 Ethical AI.

    Her new book Prophecy comes out April 21st and is now available for pre-order.

    Prophecy is about how extensive use of predictive analytics is undermining our abilities to defy the odds, making systems unaccountable, and increasing risk in business and society while creating a false sense of security.

    privacyguides.org/videos/2026/

    #AIEthics #Data #Interview #PredictiveAI #Prophecy #PrivacyIsPower #CarissaVeliz #Privacy #OxfordUniversity #PrivacyGuides

  13. Inclusivity is not only the right thing, it's also essential to grow our movement. If we want privacy rights to succeed, we must build communities where everyone feels safe and welcome.

    ➕ Learn more on how to keep your communities inclusive.

    🧰 Check our Privacy Activist Toolbox tip to Keep Your Posts and Community Inclusive: privacyguides.org/en/activism/

    #PrivacyGuides #Activism #PrivacyActivistToolbox #Privacy #Inclusivity

  14. Everyone have different needs and face different dangers when their personal data gets exposed. To give actionable privacy advice, it's essential to consider each person's unique situation.

    👤 Learn more on how to evaluate each person's threat model.

    🧰 Check our Privacy Activist Toolbox tip to Consider Everyone's Unique Situation: privacyguides.org/en/activism/

    #PrivacyGuides #Activism #PrivacyActivistToolbox #Privacy #ThreatModelling

  15. Everyone have different needs and face different dangers when their personal data gets exposed. To give actionable privacy advice, it's essential to consider each person's unique situation.

    👤 Learn more on how to evaluate each person's threat model.

    🧰 Check our Privacy Activist Toolbox tip to Consider Everyone's Unique Situation: privacyguides.org/en/activism/

    #PrivacyGuides #Activism #PrivacyActivistToolbox #Privacy #ThreatModelling

  16. Everyone have different needs and face different dangers when their personal data gets exposed. To give actionable privacy advice, it's essential to consider each person's unique situation.

    👤 Learn more on how to evaluate each person's threat model.

    🧰 Check our Privacy Activist Toolbox tip to Consider Everyone's Unique Situation: privacyguides.org/en/activism/

    #PrivacyGuides #Activism #PrivacyActivistToolbox #Privacy #ThreatModelling

  17. Everyone have different needs and face different dangers when their personal data gets exposed. To give actionable privacy advice, it's essential to consider each person's unique situation.

    👤 Learn more on how to evaluate each person's threat model.

    🧰 Check our Privacy Activist Toolbox tip to Consider Everyone's Unique Situation: privacyguides.org/en/activism/

    #PrivacyGuides #Activism #PrivacyActivistToolbox #Privacy #ThreatModelling

  18. Everyone have different needs and face different dangers when their personal data gets exposed. To give actionable privacy advice, it's essential to consider each person's unique situation.

    👤 Learn more on how to evaluate each person's threat model.

    🧰 Check our Privacy Activist Toolbox tip to Consider Everyone's Unique Situation: privacyguides.org/en/activism/

    #PrivacyGuides #Activism #PrivacyActivistToolbox #Privacy #ThreatModelling

  19. Being well-informed about the data protection regulations in your own jurisdiction can be a significant asset for your personal and collective battles to improve privacy.

    📘 Learn more on what to look for when researching your local privacy laws.

    🧰 Check our Privacy Activist Toolbox tip to Know Your Privacy Laws: privacyguides.org/en/activism/

    #PrivacyGuides #Activism #PrivacyActivistToolbox #Privacy #PrivacyLaw

  20. RE: mastodon.social/@effaustin/116

    📅 Save the date! Nate Bartram and Jonah Aragon will be in Austin, TX on March 13 to host a live, in-person episode of 🔴 This Week in Privacy; then attend EFF-Austin's party at The Butterfly Bar/Vortex!!

    If you're in town, come say hi to @nateb and @jonah, and find out more about privacy from all the excellent guest speakers 💛

    #Austin #EFFAustin #Party #AustinTX #EFF #Privacy #PrivacyGuides #Events

  21. 9 of 10

    Massimo anonimato per #Attivisti, #Giornalisti #Dissidenti e #Whistleblowers.

    #SESSION (Rete Loki/Decentralizzata)
    Chi lo usa: Attivisti a Hong Kong, Bielorussia, Iran e gruppi di protesta in occidente.Perché: Se un attivista viene fermato, la polizia controlla il telefono. In Session non c'è il numero di telefono, non c'è la rubrica, non ci sono log di chi ha parlato con chi. È la scelta migliore se il rischio è che ti sequestrino il dispositivo e provino a risalire alla tua rete di contatti.

    #SIMPLEX Chi lo usa: Whistleblowers, informatori, crypto-anarchici. Perché: È l'unica app dove davvero non esiste un "profilo utente" sul server. Se il server viene sequestrato, non c'è nulla da trovare. È usato quando la segretezza del contatto è vitale più della facilità d'uso.

    #EdwardSnowden #Tor #BlockChain #WilsonBright #AmnestyInternational #PrivacyGuides #VPN #Snowden #Anonymous

    9 of 10 ⤵️