8 PRIVACY & security MYTHS that need to die!

Subscribers:
390,000
Published on ● Video Link: https://www.youtube.com/watch?v=TiLahJp8UEs



Duration: 16:05
70,183 views
5,400


Try out Proton Mail, the secure email that protects your privacy: https://proton.me/mail/TheLinuxEXP

Get a PC that supports Linux perfectly: https://www.tuxedocomputers.com/en#

๐Ÿ‘ SUPPORT THE CHANNEL:
Get access to a weekly podcast, vote on the next topics I cover, and get your name in the credits:

YouTube: https://www.youtube.com/@thelinuxexp/join
Patreon: https://www.patreon.com/thelinuxexperiment
Liberapay: https://liberapay.com/TheLinuxExperiment/

Or, you can donate whatever you want: https://paypal.me/thelinuxexp

๐Ÿ‘• GET TLE MERCH
Support the channel AND get cool new gear: https://the-linux-experiment.creator-spring.com/

๐ŸŽ™๏ธ LINUX AND OPEN SOURCE NEWS PODCAST:
Listen to the latest Linux and open source news, with more in depth coverage, and ad-free! https://podcast.thelinuxexp.com

๐Ÿ† FOLLOW ME ELSEWHERE:
Website: https://thelinuxexp.com
Mastodon: https://mastodon.social/web/@thelinuxEXP
Pixelfed: https://pixelfed.social/TLENick
PeerTube: https://tilvids.com/c/thelinuxexperiment_channel/videos
Discord: https://discord.gg/XMuQrcYd

#privacy #security #mythbusting

00:00 Intro
00:27 Security = Privacy
01:51 Sponsor: Private and secure email with Proton Mail
02:52 Telemetry is evil
05:18 Tor is a honeypot
06:52 Big Companies are more secure
08:58 Incognito mode is private
09:55 VPNs are the only tool you need
11:02 Privacy is impossible
12:07 I have nothing to hide
13:27 Always research yourself
14:09 Sponsor: Get a PC made to run Linux


Security = privacy

This one is obviously not true. Security and privacy aren't linked in any way. The general best practice is to find the services you need that have a good reputation for security, and among these services, try and find one that is private enough for your needs.

Telemetry is always bad

This is simply not true. Telemetry isn't always bad. The image we have of telemetry is that of Windows or macOS, but there are plenty of other ways to do telemetry.

In itself telemetry is a very useful thing: it lets projects or companies identify what is important, what they should fix first. It doesn't mean this data is used to profile you, or being sold to anyone.

If the company or project is something you trust, and that has no current business in data collection, or advertising, then it's probably not a problem.

Tor is an NSA honeypot

TOR is regularly accused of being a honeypot for the NSA. Something that is completely false, as far as anyone knows**

Yes, TOR is based on code developed by the US Navy. Funding for Tor also came from the US government, mostly. The code, however, is open source, and audited.

Is Tor entirely safe? Of course not. It's not a silver bullet, nothing is, and it can be vulnerable to man in the middle attacks or to specific types of monitoring, but it's not an NSA project that's designed to trap you.

Big companies are more secure

This statement is debatable. It's true in some cases. A recent report shows that smaller firms are 3 times more likely to be attacked than big businesses. 60% of cyberattacks seem to target smaller companies. But that's likelihood to be attacked, not necessarily successful attacks.

What is also true is that not all big tech companies are very good on the security front. So, while yes, bigger companies can be more secure than smaller ones, it's not a one size fits all thing, and what you need to look for is what kind of security the company you're interested in for a specific service or app has put in place.

Incognito mode is private

It isn't. What incognito mode does, is make you private locally, on your device, as it doesn't store data on what you've visited, your credentials, and the like.

Incognito mode doesn't, however, prevent websites from tracking you, or fingerprinting you.

VPNs are the only privacy tool you need

VPNs aren't a magical thing that instantly makes you private. Using a VPN will change your IP address and make you harder to track online, that's true. They're a good tool, but you need to make sure that the company that provides the VPN service doesn't log everything you do, and doesn't give these logs to various other actors. If you log into a service or website while using a VPN, it still knows it's you, obviously.

Privacy is impossible

This one has to be the most nefarious myth ever. Privacy is NOT impossible. It's not easy, but it's not impossible. Generally, this statement just betrays a lack of motivation. It will never be 100% perfect, but you can limit immensely what is known or collected about you.

I have nothing to hide

This is complete bogus. First, if you think you have nothing to hide, you're wrong. Everyone has something that might not be illegal, but might be deemed immoral or unacceptable by someone else.

Second, you might feel this way now, but circumstances change, and the data collected about you doesn't go away. By leaving all these tidbits of data stored everywhere, you're basically giving ammunition to the future.




Other Videos By The Linux Experiment


2023-09-21OPEN SOURCE alternatives to the MOST POPULAR productivity apps!
2023-09-19GNOME 45 Review: the best Linux desktop (IMO) gets even better
2023-09-16ANOTHER Linux tablet, HDR gaming & GNOME 45 RC: Linux & Open Source News
2023-09-14Linux on a MacBook Pro (M1 Pro): How good is Asahi now?
2023-09-11UBUNTU without the CONTROVERSIAL choices: try these 5 Linux distros!
2023-09-08Plasma 6 release date, new Ubuntu App Store, GNOME breaks extensions: Linux & Open Source News
2023-09-05What I run on my NAS / Home Server
2023-08-23All the OPEN SOURCE SOFTWARE I use on my servers, laptop & desktop
2023-08-20New Linux tablet, GNOME 45 beta, COSMIC theming, SUSE goes private: Linux & Open Source News
2023-08-18What are immutable distros, and are they the future of Linux?
2023-08-158 PRIVACY & security MYTHS that need to die!
2023-08-12New CPU flaws, Plasma 6 & GNOME 45, SUSE & Oracle team up: Linux & Open Source News
2023-08-09FLATPAK EXPLAINED: Theming, permissions, command line, browser installs...
2023-08-06ChromeOS becomes a Linux distro, GNOME Activities changes, Mint 21.3: Linux & Open Source News
2023-08-02Access your PCs from ANYWHERE with REMOTE DESKTOPS (Linux, Mac, and Windows)
2023-07-29Google wants web DRM, GNOME's window management, Plasma 6 removes features: Linux & Open Source News
2023-07-26I used a MAC for 30 days, and Iโ€™m glad itโ€™s over
2023-07-22EU threatens FOSS, 10% Intel boost & repairable laptops: Linux & Open Source News
2023-07-20Sometimes, I get tired of Linux
2023-07-18Linux already has macOS Sonoma's features, but did Apple do them better?
2023-07-15SUSE forks RHEL, Thunderbird Supernova, Linux passes 3%: Linux & Open Source News



Tags:
tor nsa backdoor
tor honeypot
proton honeypot
proton nsa backdoor
proton privacy
tor privacy
online privacy
digital privacy
privacy is dead
telemetry is evil
incognito mode privacy
incognito mode
i have nothing to hide
how to stay private
how to online privacy
online security
cybersecurity myths
privacy myths
privacy misconceptions
online privacy guide
nsa backdoor
online privacy it doesnt exist
online security tips
tor browser privacy settings