Below you will find pages that utilize the taxonomy term “Privacy”
Systems Built on Trust
Introduction
Recently, another exploit was discovered on the Turkish government’s web-based platform “E-devlet”. On this platform is stored a high amount of personal data that belong to citizens living in Turkey, such as:
Their student certificate/student transcript
Criminal record
Name, surname, government ID, mother’s and father’s name
etc.
Unfortunately, this important data is not handled with care at all, and there’s been leaks in the past. In Turkey, as soon as you’re born, you’re already out in the open.
Submission and Mass Production
Introduction
According to a speech Aldous Huxley made in 1962, on the contrary to the novel 1984, in which control is forced upon society; an authority figure must receive at least some form of consent, to achieve control.
He tells that with pure force and terror, authority can’t last forever, that it’ll eventually be faced with some form of backlash. And that society must eventually be convinced and guided.
Upon these thoughts Huxley had written Brave New World.
Why Should I Maintain Privacy In The Internet?
“Why should I care?”, is a question often asked to me when I talk about privacy. There are plenty of reasons to preserve your privacy, but before that I must present some definitions:
Privacy, anonymity, security, and keeping secrets are seperate concepts from each other. “Keeping secrets” can be defined as hiding an embarrassing situation or event from public knowledge.
What I’ll be talking about in this post will be privacy. Before continuing, I’ll also say that these concepts can be quite related to each other. If one aims to achieve privacy, one must aim for security aswell.
Achieving Privacy on the Internet
Before I begin, I will say that for most people this is more a case of damage control than absolute true privacy. Aside from that, I will also not cover threat modeling in this post as there already exist two blogposts 1 2 which explain what it is in detail. Please do read it if you do not know what “threat modeling” means. As a TL;DR, threat modeling is defining what you want privacy against.
How do I Install and Update Ungoogled Chromium on Windows?
Now that you’ve finally made the decision to switch; here’s the how-to:
- Install ungoogled-update.bat
1,5. Your browser may block this install (because it’s a file that executes a command), so select “Keep” on Chrome or other browsers based on chromium (vivaldi, opera, brave, etc…)
- Run it (double click)
- Click “y” if prompted
And you’re done. Windows will handle the rest.
What’s written in this command, if you don’t trust: “winget install –id=eloston.ungoogled-chromium -e”