![]() As you use screenshots more and more, it’s important to have a set of tools that allow you to identify what is important in an image. Once you start using screenshots, they form a helpful routine that makes it easy to be clear and concise. Just because Lightshot's terms state upload to the cloud, do they really avoid that much liability on user protection? My personal opinion is probably not but I'm eager to hear everyone else's.Īlso there's a really shoddy bash script I hashed out which randomly downloads X amount of screenshots from the site.Capturing images of your screen is a great way to share information.īut, what happens when there’s something in the screenshot you don’t want to share? Meet the blur screenshot tool. Smaller things that others (including myself) might've overlooked.īeyond that, there's a real conversation to be had about Terms of Service vs practical use. Obviously there're the standard risks of fraud, identity theft, unlawful use of PII, extortion from some of the more NSFW screenshots on there etc.īut I want to know whether anyone has any ideas of what else this can be used for. I'm looking into this a little more as a potential for new forms of phishing/other attack vectors, but would just like to hear everyone's thoughts on what the other risks are. It also seems as though not everyone realises their screenshots get uploaded to the cloud. Problem is, those links are easily traversed and have no protection or authentication mechanism in place. Lightshot is a screenshotting programme that allows one to share links to screenshots via an API upload service & hosting on prnt.sc. Orgīuilding the global movement for the protection of privacy.Ī know this has been posted here before, but if you're unfamiliar with it so far here's a general synopsis: Tails - a live system that aims at preserving your privacy and anonymityĬonsider donating to one of the organizations that fight for your rights. Tor Browser, a pre-configured web browser intended to protect your anonymity when used with safe browsing practices. No one solution can guarantee your anonymity. Note this section has software that is under ongoing development. ![]() The Electronic Frontier Foundation’s, “Surveillance Self-Defense”ĮFF’s, “Digital Privacy at US Borders Guide”Ĭontinuing discussion about frustrating the efforts of organizations that spy on citizens and consumers. If you can't find the time, then this article should at least get you thinking about why privacy matters.Ĭory Doctorow “On the Upcoming Privacy Wars” Learn how to spot fake news so you can focus on the facts and protect yourself from fictions.īefore you use the "I have nothing to hide" argument please read this paper – all of it. It’s really appreciated, and makes us proud of all the work you and we’ve done! Ongoing We’ve since grown a bit larger, and we’d like to thank everyone who’s subscribed, before and after then. I think… I think we’re going to have 100,000 subscribers this week and that’s all kinds of awesome. u/blackhawk_12 Subreddit Rules and Wikiīefore posting in /r/privacy, read the Sidebar Rules.Įnjoy our Wiki! It has all sorts of nifty advice and explains most topics you’re interested in if you’re reading this. "I don't have anything to hide but I don't have anything I want to show you either" Dedicated to the intersection of technology, privacy, and freedom in the digital world.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |