MESSAGE
DATE | 2023-06-20 |
FROM | From: "Miriam Bastian, FSF"
|
SUBJECT | Subject: [Hangout - NYLXS] We have nothing to hide,
|
From hangout-bounces-at-nylxs.com Tue Jun 20 21:26:56 2023 Return-Path: X-Original-To: archive-at-mrbrklyn.com Delivered-To: archive-at-mrbrklyn.com Received: from www2.mrbrklyn.com (www2.mrbrklyn.com [96.57.23.82]) by mrbrklyn.com (Postfix) with ESMTP id 02D1C164089; Tue, 20 Jun 2023 21:26:51 -0400 (EDT) X-Original-To: hangout-at-www2.mrbrklyn.com Delivered-To: hangout-at-www2.mrbrklyn.com Received: by mrbrklyn.com (Postfix, from userid 1000) id 76848164089; Tue, 20 Jun 2023 21:26:45 -0400 (EDT) Resent-From: Ruben Safir Resent-Date: Tue, 20 Jun 2023 21:26:45 -0400 Resent-Message-ID: <20230621012645.GB15948-at-www2.mrbrklyn.com> Resent-To: hangout-at-mrbrklyn.com X-Original-To: ruben-at-mrbrklyn.com Delivered-To: ruben-at-mrbrklyn.com Received: from mailout0p.fsf.org (mailout0p.fsf.org [209.51.188.184]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mrbrklyn.com (Postfix) with ESMTPS id 5E2C3164074 for ; Tue, 20 Jun 2023 15:37:02 -0400 (EDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=fsf.org; s=mailout0p-fsf-org; h=Date:To:Subject:From:MIME-Version:in-reply-to: references; bh=edn6ID6vRhSLl+GUJXxOPU6NshJpDdJKS5mREGY7pKU=; b=YXwjTGRC+774kd v9PAISRhxdNk6FI0zLt//X0VxTW81Xrl+8Zqpu2ejsnN1EefOF5SYTLt8XKbjvdVF5qLCb3x6yZ2V twkkre9VgYjNUxobzOM1Xr/eiUih63jABdrRP69q6e0W4xHppgiDxjhmwxJsr9A9sC0gxC0QNZ4IG 8v9ZWbd14n3BbMggUZ+YA2g4hhCWpuTkXU/eVZNPFxwhp6SzyuEMbo/T2tN3PWEdNvZ1cN8PYbDhJ 9ggXGf6bE0V46MhmfqWbxnqy4es79O8XCkjcDCnzoXAdbrZan9gdE3yp1OlircC435Ik2u6UUHrF4 TN0TxAo91IT8HQ3zHweA==; Received: from crmserver2p.fsf.org ([2001:470:142:5::223]) by mailout0p.fsf.org with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1qBh9x-004FpW-A0 for ruben-at-mrbrklyn.com; Tue, 20 Jun 2023 15:37:01 -0400 Received: from localhost ([::1] helo=my.fsf.org) by crmserver2p.fsf.org with esmtp (Exim 4.90_1) (envelope-from ) id 1qBh9x-00041D-2V for ruben-at-mrbrklyn.com; Tue, 20 Jun 2023 15:37:01 -0400 MIME-Version: 1.0 From: "Miriam Bastian, FSF" job_id: 167004 To: Ruben Safir Precedence: bulk X-CiviMail-Bounce: crmmailer+b.167004.82615408.99c36e6762fef0b9-at-fsf.org Date: Tue, 20 Jun 2023 15:37:00 -0400 Message-Id: Subject: [Hangout - NYLXS] We have nothing to hide, only everything to protect X-BeenThere: hangout-at-nylxs.com X-Mailman-Version: 2.1.30rc1 List-Id: NYLXS Tech Talk and Politics List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: "Miriam Bastian, FSF" Content-Type: multipart/mixed; boundary="===============0934920617==" Errors-To: hangout-bounces-at-nylxs.com Sender: "Hangout"
--===============0934920617== Content-Type: multipart/alternative; boundary="=_b690386b4d70946fb95af842191dd54f"
--=_b690386b4d70946fb95af842191dd54f Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=utf-8
*Please consider adding to your address book, which will ensure that our messages reach you and not your spam box.*
*Read and share online: *
Dear Ruben Safir,
"I have nothing to hide." That's what most people say when I start a conversation about privacy. Have you ever wondered why you should use software that protects your privacy and the privacy of the people you communicate with? To understand this better, I recommend watching the first talk in our LibrePlanet 2023 [lightning talk][1] series. In her five minute talk, the speaker will convince you that you are worthy of all the privacy you want and need. For people who claim that they have nothing to hide, she has a persuasive reply: "I have nothing to hide, only everything to protect."
[1]: https://media.libreplanet.org/u/libreplanet/m/lightning-talks-a26f/
If you don't use free software for the sake of your own privacy, then use it to protect your loved ones; if you don't value yourself enough to make sure that information that's yours -- and only yours -- stays with you, then at least honor the privacy of the most vulnerable people in our society. History shows that even societies that are considered to be free have areas in which they struggle to exercise equal treatment and fail to guarantee human rights for everyone who lives within them. In the above-mentioned lightning talk, the speaker cites the example of the [Underground Railroad][2], a network of secret routes and safe houses that helped enslaved African Americans in the 19th century escape from slavery. The Underground Railroad would not have been possible without privacy! [2]: https://en.wikipedia.org/wiki/Underground_Railroad
At a time when ongoing legislation all over the world is threatening end-to-end encryption and developers of large language models blatantly [violate privacy laws][3] to get training data for their systems, we will be publishing a series of articles to highlight the importance of privacy. In our upcoming articles, you will be introduced to people who use privacy-protecting free software and learn what you can do to counter the dangers resulting from the ongoing legislative processes. While waiting for these articles, you can read our [previous articles on privacy][4] and strengthen end-to-end encryption by using it.
[3]: https://www.fsf.org/bulletin/2022/spring/unjust-algorithms/ [4]: https://www.fsf.org/campaigns/surveillance
## Strengthen end-to-end encryption by using it
The more people who use end-to-end encryption in their everyday lives, the stronger the protection is for all of us. Only as a community can we withstand oppressive mass surveillance. And only by using free software can we rest assured that our privacy is protected. And, if you wonder why it has to be free software, we recommend reading our blog article "[True privacy and security depend on free software][5]." To protect your privacy, we recommend using:
* [GNU Privacy Guard (GPG)][6] for encryption. The FSF's [Email Self-Defense Guide][7] will help you learn how to encrypt your emails and files;
* a secure video conferencing tool like [Jitsi Meet][8] or [GNU Jami][9]. The FSF provides a fully free [Jitsi Meet server][10] to all associate members as a member benefit;
* [GNU Jami][9], [XMPP][11], [Silence][12], [Matrix][13], or [Tox][14] when messaging your friends on your mobile phone or when writing colleagues about a patient, a client, or a student;
* a secure browser like [GNU IceCat][15]. Read our article "[Intelligent tracking prevention][16]" if you want to learn why GNU IceCat is a better choice than many other browsers when it comes to protecting your privacy as you browse the web; * the [Tor network][17] to browse privately. With a system like [Snowflake][18], you can use the Tor network to avoid being watched by Internet censors and help others bypass censorship by operating a Snowflake proxy. On your phone, you can use Tor Browser for Android to securely browse via the Tor network and [Orbot][19] to route the data from your email client, messaging, and other apps over the Tor network. Enable the [Guardian Project's repository][20] to download Orbot from F-Droid.
By using these programs, you will protect yourself as well as your loved ones. We all deserve privacy!
[5]: https://www.fsf.org/bulletin/2020/spring/privacy-encryption [6]: https://gnupg.org/ [7]: https://emailselfdefense.fsf.org/en/ [8]: https://directory.fsf.org/wiki/Jitsi-Meet [9]: https://directory.fsf.org/wiki/Jami [10]: https://www.fsf.org/associate/about-the-fsf-jitsi-meet-server [11]: https://directory.fsf.org/wiki/Category/Protocol/xmpp [12]: https://silence.im/ [13]: https://directory.fsf.org/wiki/Matrix-synapse [14]: https://directory.fsf.org/wiki/Tox [15]: https://www.gnu.org/software/gnuzilla/ [16]: https://www.fsf.org/blogs/community/intelligent-tracking-prevention-new-safari-privacy-measure-still-doesnt-measure-up-to-gnu-icecat [17]: https://directory.fsf.org/wiki/Tor [18]: https://snowflake.torproject.org/ [19]: https://support.torproject.org/glossary/orbot/ [20]: https://guardianproject.info/fdroid/
In freedom,
Miriam Bastian Program Manager
-- * Follow us on Mastodon at , GNU social at , PeerTube at , and on Twitter at -at-fsf. * Read about why we use Twitter, but only with caveats: * Subscribe to our RSS feeds: * Join us as an associate member: * Read our Privacy Policy:
Sent from the Free Software Foundation,
51 Franklin St, Fifth Floor Boston, Massachusetts 02110-1335 United States
You can unsubscribe from this mailing list by visiting
https://my.fsf.org/civicrm/mailing/unsubscribe?reset=1&jid=167004&qid=82615408&h=99c36e6762fef0b9.
To stop all email from the Free Software Foundation, including Defective by Design, and the Free Software Supporter newsletter, visit
https://my.fsf.org/civicrm/mailing/optout?reset=1&jid=167004&qid=82615408&h=99c36e6762fef0b9. --=_b690386b4d70946fb95af842191dd54f Content-Transfer-Encoding: 8bit Content-Type: text/html; charset=utf-8
|
Please consider adding info@fsf.org to your address book, which will ensure that our messages reach you and not your spam box.
Read and share online: https://www.fsf.org/blogs/community/we-have-nothing-to-hide-only-everything-to-protect
Dear Ruben Safir,
"I have nothing to hide." That's what most people say when I start a conversation about privacy. Have you ever wondered why you should use software that protects your privacy and the privacy of the people you communicate with? To understand this better, I recommend watching the first talk in our LibrePlanet 2023 lightning talk series. In her five minute talk, the speaker will convince you that you are worthy of all the privacy you want and need. For people who claim that they have nothing to hide, she has a persuasive reply: "I have nothing to hide, only everything to protect."
If you don't use free software for the sake of your own privacy, then use it to protect your loved ones; if you don't value yourself enough to make sure that information that's yours -- and only yours -- stays with you, then at least honor the privacy of the most vulnerable people in our society. History shows that even societies that are considered to be free have areas in which they struggle to exercise equal treatment and fail to guarantee human rights for everyone who lives within them. In the above-mentioned lightning talk, the speaker cites the example of the Underground Railroad, a network of secret routes and safe houses that helped enslaved African Americans in the 19th century escape from slavery. The Underground Railroad would not have been possible without privacy!
At a time when ongoing legislation all over the world is threatening end-to-end encryption and developers of large language models blatantly violate privacy laws to get training data for their systems, we will be publishing a series of articles to highlight the importance of privacy. In our upcoming articles, you will be introduced to people who use privacy-protecting free software and learn what you can do to counter the dangers resulting from the ongoing legislative processes. While waiting for these articles, you can read our previous articles on privacy and strengthen end-to-end encryption by using it.
Strengthen end-to-end encryption by using it
The more people who use end-to-end encryption in their everyday lives, the stronger the protection is for all of us. Only as a community can we withstand oppressive mass surveillance. And only by using free software can we rest assured that our privacy is protected. And, if you wonder why it has to be free software, we recommend reading our blog article "True privacy and security depend on free software." To protect your privacy, we recommend using:
GNU Privacy Guard (GPG) for encryption. The FSF's Email Self-Defense Guide will help you learn how to encrypt your emails and files;
a secure video conferencing tool like Jitsi Meet or GNU Jami. The FSF provides a fully free Jitsi Meet server to all associate members as a member benefit;
GNU Jami, XMPP, Silence, Matrix, or Tox when messaging your friends on your mobile phone or when writing colleagues about a patient, a client, or a student;
a secure browser like GNU IceCat. Read our article "Intelligent tracking prevention" if you want to learn why GNU IceCat is a better choice than many other browsers when it comes to protecting your privacy as you browse the web;
the Tor network to browse privately. With a system like Snowflake, you can use the Tor network to avoid being watched by Internet censors and help others bypass censorship by operating a Snowflake proxy. On your phone, you can use Tor Browser for Android to securely browse via the Tor network and Orbot to route the data from your email client, messaging, and other apps over the Tor network. Enable the Guardian Project's repository to download Orbot from F-Droid.
By using these programs, you will protect yourself as well as your loved ones. We all deserve privacy!
In freedom,
Miriam Bastian
Program Manager
Illustration Copyright © 2014, Johannes Landin. Licensed under Creative Commons Attribution-Share Alike 3.0 Unported International license.
|
| |
|
|
--=_b690386b4d70946fb95af842191dd54f--
--===============0934920617== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
_______________________________________________ Hangout mailing list Hangout-at-nylxs.com http://lists.mrbrklyn.com/mailman/listinfo/hangout
--===============0934920617==--
--===============0934920617== Content-Type: multipart/alternative; boundary="=_b690386b4d70946fb95af842191dd54f"
--=_b690386b4d70946fb95af842191dd54f Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=utf-8
*Please consider adding to your address book, which will ensure that our messages reach you and not your spam box.*
*Read and share online: *
Dear Ruben Safir,
"I have nothing to hide." That's what most people say when I start a conversation about privacy. Have you ever wondered why you should use software that protects your privacy and the privacy of the people you communicate with? To understand this better, I recommend watching the first talk in our LibrePlanet 2023 [lightning talk][1] series. In her five minute talk, the speaker will convince you that you are worthy of all the privacy you want and need. For people who claim that they have nothing to hide, she has a persuasive reply: "I have nothing to hide, only everything to protect."
[1]: https://media.libreplanet.org/u/libreplanet/m/lightning-talks-a26f/
If you don't use free software for the sake of your own privacy, then use it to protect your loved ones; if you don't value yourself enough to make sure that information that's yours -- and only yours -- stays with you, then at least honor the privacy of the most vulnerable people in our society. History shows that even societies that are considered to be free have areas in which they struggle to exercise equal treatment and fail to guarantee human rights for everyone who lives within them. In the above-mentioned lightning talk, the speaker cites the example of the [Underground Railroad][2], a network of secret routes and safe houses that helped enslaved African Americans in the 19th century escape from slavery. The Underground Railroad would not have been possible without privacy! [2]: https://en.wikipedia.org/wiki/Underground_Railroad
At a time when ongoing legislation all over the world is threatening end-to-end encryption and developers of large language models blatantly [violate privacy laws][3] to get training data for their systems, we will be publishing a series of articles to highlight the importance of privacy. In our upcoming articles, you will be introduced to people who use privacy-protecting free software and learn what you can do to counter the dangers resulting from the ongoing legislative processes. While waiting for these articles, you can read our [previous articles on privacy][4] and strengthen end-to-end encryption by using it.
[3]: https://www.fsf.org/bulletin/2022/spring/unjust-algorithms/ [4]: https://www.fsf.org/campaigns/surveillance
## Strengthen end-to-end encryption by using it
The more people who use end-to-end encryption in their everyday lives, the stronger the protection is for all of us. Only as a community can we withstand oppressive mass surveillance. And only by using free software can we rest assured that our privacy is protected. And, if you wonder why it has to be free software, we recommend reading our blog article "[True privacy and security depend on free software][5]." To protect your privacy, we recommend using:
* [GNU Privacy Guard (GPG)][6] for encryption. The FSF's [Email Self-Defense Guide][7] will help you learn how to encrypt your emails and files;
* a secure video conferencing tool like [Jitsi Meet][8] or [GNU Jami][9]. The FSF provides a fully free [Jitsi Meet server][10] to all associate members as a member benefit;
* [GNU Jami][9], [XMPP][11], [Silence][12], [Matrix][13], or [Tox][14] when messaging your friends on your mobile phone or when writing colleagues about a patient, a client, or a student;
* a secure browser like [GNU IceCat][15]. Read our article "[Intelligent tracking prevention][16]" if you want to learn why GNU IceCat is a better choice than many other browsers when it comes to protecting your privacy as you browse the web; * the [Tor network][17] to browse privately. With a system like [Snowflake][18], you can use the Tor network to avoid being watched by Internet censors and help others bypass censorship by operating a Snowflake proxy. On your phone, you can use Tor Browser for Android to securely browse via the Tor network and [Orbot][19] to route the data from your email client, messaging, and other apps over the Tor network. Enable the [Guardian Project's repository][20] to download Orbot from F-Droid.
By using these programs, you will protect yourself as well as your loved ones. We all deserve privacy!
[5]: https://www.fsf.org/bulletin/2020/spring/privacy-encryption [6]: https://gnupg.org/ [7]: https://emailselfdefense.fsf.org/en/ [8]: https://directory.fsf.org/wiki/Jitsi-Meet [9]: https://directory.fsf.org/wiki/Jami [10]: https://www.fsf.org/associate/about-the-fsf-jitsi-meet-server [11]: https://directory.fsf.org/wiki/Category/Protocol/xmpp [12]: https://silence.im/ [13]: https://directory.fsf.org/wiki/Matrix-synapse [14]: https://directory.fsf.org/wiki/Tox [15]: https://www.gnu.org/software/gnuzilla/ [16]: https://www.fsf.org/blogs/community/intelligent-tracking-prevention-new-safari-privacy-measure-still-doesnt-measure-up-to-gnu-icecat [17]: https://directory.fsf.org/wiki/Tor [18]: https://snowflake.torproject.org/ [19]: https://support.torproject.org/glossary/orbot/ [20]: https://guardianproject.info/fdroid/
In freedom,
Miriam Bastian Program Manager
-- * Follow us on Mastodon at , GNU social at , PeerTube at , and on Twitter at -at-fsf. * Read about why we use Twitter, but only with caveats: * Subscribe to our RSS feeds: * Join us as an associate member: * Read our Privacy Policy:
Sent from the Free Software Foundation,
51 Franklin St, Fifth Floor Boston, Massachusetts 02110-1335 United States
You can unsubscribe from this mailing list by visiting
https://my.fsf.org/civicrm/mailing/unsubscribe?reset=1&jid=167004&qid=82615408&h=99c36e6762fef0b9.
To stop all email from the Free Software Foundation, including Defective by Design, and the Free Software Supporter newsletter, visit
https://my.fsf.org/civicrm/mailing/optout?reset=1&jid=167004&qid=82615408&h=99c36e6762fef0b9. --=_b690386b4d70946fb95af842191dd54f Content-Transfer-Encoding: 8bit Content-Type: text/html; charset=utf-8
|
Please consider adding info@fsf.org to your address book, which will ensure that our messages reach you and not your spam box.
Read and share online: https://www.fsf.org/blogs/community/we-have-nothing-to-hide-only-everything-to-protect
Dear Ruben Safir,
"I have nothing to hide." That's what most people say when I start a conversation about privacy. Have you ever wondered why you should use software that protects your privacy and the privacy of the people you communicate with? To understand this better, I recommend watching the first talk in our LibrePlanet 2023 lightning talk series. In her five minute talk, the speaker will convince you that you are worthy of all the privacy you want and need. For people who claim that they have nothing to hide, she has a persuasive reply: "I have nothing to hide, only everything to protect."
If you don't use free software for the sake of your own privacy, then use it to protect your loved ones; if you don't value yourself enough to make sure that information that's yours -- and only yours -- stays with you, then at least honor the privacy of the most vulnerable people in our society. History shows that even societies that are considered to be free have areas in which they struggle to exercise equal treatment and fail to guarantee human rights for everyone who lives within them. In the above-mentioned lightning talk, the speaker cites the example of the Underground Railroad, a network of secret routes and safe houses that helped enslaved African Americans in the 19th century escape from slavery. The Underground Railroad would not have been possible without privacy!
At a time when ongoing legislation all over the world is threatening end-to-end encryption and developers of large language models blatantly violate privacy laws to get training data for their systems, we will be publishing a series of articles to highlight the importance of privacy. In our upcoming articles, you will be introduced to people who use privacy-protecting free software and learn what you can do to counter the dangers resulting from the ongoing legislative processes. While waiting for these articles, you can read our previous articles on privacy and strengthen end-to-end encryption by using it.
Strengthen end-to-end encryption by using it
The more people who use end-to-end encryption in their everyday lives, the stronger the protection is for all of us. Only as a community can we withstand oppressive mass surveillance. And only by using free software can we rest assured that our privacy is protected. And, if you wonder why it has to be free software, we recommend reading our blog article "True privacy and security depend on free software." To protect your privacy, we recommend using:
GNU Privacy Guard (GPG) for encryption. The FSF's Email Self-Defense Guide will help you learn how to encrypt your emails and files;
a secure video conferencing tool like Jitsi Meet or GNU Jami. The FSF provides a fully free Jitsi Meet server to all associate members as a member benefit;
GNU Jami, XMPP, Silence, Matrix, or Tox when messaging your friends on your mobile phone or when writing colleagues about a patient, a client, or a student;
a secure browser like GNU IceCat. Read our article "Intelligent tracking prevention" if you want to learn why GNU IceCat is a better choice than many other browsers when it comes to protecting your privacy as you browse the web;
the Tor network to browse privately. With a system like Snowflake, you can use the Tor network to avoid being watched by Internet censors and help others bypass censorship by operating a Snowflake proxy. On your phone, you can use Tor Browser for Android to securely browse via the Tor network and Orbot to route the data from your email client, messaging, and other apps over the Tor network. Enable the Guardian Project's repository to download Orbot from F-Droid.
By using these programs, you will protect yourself as well as your loved ones. We all deserve privacy!
In freedom,
Miriam Bastian
Program Manager
Illustration Copyright © 2014, Johannes Landin. Licensed under Creative Commons Attribution-Share Alike 3.0 Unported International license.
|
| |
|
|
--=_b690386b4d70946fb95af842191dd54f--
--===============0934920617== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
_______________________________________________ Hangout mailing list Hangout-at-nylxs.com http://lists.mrbrklyn.com/mailman/listinfo/hangout
--===============0934920617==--
|
|