I'm seriously considering getting rid of phone contracts/sim card. Preaching about privacy but using the cell network on a daily basis feels hypocritical.
To begin with, I turned off mobile data on my phone for the last 7 days. There's still plenty of stuff to do while traveling offline like consuming RSS, podcasts, videocasts, ebooks, ... I'm missing looking things up online thou. Offline messaging actually feels way less stressful to me.
@uniq wow, applaudable! I should try one day too :D
@uniq By using the Single-file extension, which is supported by Firefox, you can also clip the entire webpage offline for latter reading.
@uniq We often say the Internet has a permanent memory,but the truth is that the Internet is also so forgetful which it comes to the articles you bookmarked earlier on but become censored the other day or some videos you liked before but somehow was deleted by the platform due to copyright violations.
What I feel now is that the cloud isn't trustworthy,the platforms aren't trustworthy,it is a wise decision to keep offline records.
@uniq The problem is that without mobile connection there's no way to check Matrix or Mastodon in the break or in the bus.Well,the bus has a free wifi hotspot but speed and stability are shit 😢 But you can always connect to mobile data over Tor/Orbot,then your ISP knows that you were online but not what you did.When using internet at home,they also know that you're online.What's the big difference here?
@hexmasteen @uniq Your Wifi ISP also knows that you are at home when you are using the Wifi.And they know where your home is because you have to tell them at sign-up.If I want that nobody knows where I am,I can simply leave my phone at home.But I don't care that they know that I go to work every day at 7:00 and come back home every day at 17:30.
@nipos nothing to hide? ;)
A home ISP knows when there are active devices at an address.
A mobile carrier has a pretty complete movement profile of every customer.
The only way I see to not let the ISP know when you're home is to use a VPN and have a base-load module of some kind that just transmits random data to and from the VPN so that at the exit node it all looks random. The module will have to adapt its effect while you're actually browsing to make sure total traffic keeps looking random. Would code you a ton of bandwidth though...
@stevenroose @nipos @hexmasteen Tor could help with the particular problem masking home WiFi traffic. I could run a low volume relay node for generating constant loads and route all my traffic through #Tor. That should make it hard to find patterns. Of course you'd have to be in a position where Tor only internet works for everyone on your WiFi. This might be combinable with a VPN service, but I'm having a hard time trusting those.
@uniq @nipos @hexmasteen Yeah routing a your traffic through Tor is not really a good idea, it very much degrades experience.
I think VPNs can be decent, as long as they (1) don't know your identity and (2) don't track any data so they can't really reveal/leak much. The second is hard to verify, granted. Being in a foreign jurisdiction to your own helps. It makes it harder for law enforcers to force the provider to reveal data on you.
@hexmasteen @nipos Yes, cell radio constantly leaking my personal location is the major concern for me. There's a lot of sensitive data in there:
* political: clubs, protests, ..
* health: practitioners, stamina, ..
* business: partners, customers, retail stores, ..
@uniq Good Luck! I tried similar, but wasn't successful. I've been connected too long. 😎
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!