• 0 Posts
  • 56 Comments
Joined 1 year ago
cake
Cake day: February 10th, 2025

help-circle


  • You can’t.

    Social media is public, period.

    If you want private social interactions then use end-to-end encrypted communication services.

    Any oppressive regime will have multiple tools that can identify your access to social media services and determine who the human is behind the keyboard. Assume that everything you post on public social media has your real life name and address attached to it.

    Unless you’re an expert and taking extreme measures (and you wouldn’t be asking this question if you were such an expert) then anonymous access to online services with respect to a sovereign power with an intelligence service is impossible.











  • It feels like people are just punching themselves in the face.

    Yes, Microsoft has taken over a lot of projects which made coding easy. So either you submit to Microsoft’s control or you spend the time to learn to use the alternatives.

    Emacs is basically older than computers, stable and has a huge amount of support and plug-ins. Nvim is newer, but vi/vim have existed since before electrons learned to jump bandgaps and has a similarly deep level of community expertise/support.

    If you’re just starting off, your school is likely deep in Micrsoft’s sphere of influence so you probably learned VS Code/Visual Studio. Moving to Emacs or Nvim is much harder than it would be if you had learned them in the first place, but believe me (a random stranger on the Internet wouldn’t lie to you!) it is worth the time to learn.








  • They advertise and are professionally licensed. Many specialize in counter-surveillance.

    Other then the advice to “look”, theres not much you can do.

    To do this in a way that will locate well-hidden devices you should hire a professional who owns the right tools.

    Otherwise, install kismet and monitor for unknown BLE and wifi signals and use video surveillance to detect people attempting to remove passive devices.

    You won’t be able to locate devices that use other wireless technology without specialized tools.

    If this is a serious worry then hire a professional