The Privacy Iceberg

This is original content. AI was not used anywhere except for the bottom right image, simply because I could not find one similar enough to what I needed. This took around 6 hours to make.

Transcription (for the visually impaired)

(I tried my best)

The background is an iceberg with 6 levels, denoting 6 different levels of privacy.

The tip of the iceberg is titled “The Brainwashed” with a quote beside it that says “I have nothing to hide”. The logos depicted in this section are:

The surface section of the iceberg is titled “As seen on TV” with a quote beside it that says “This video is sponsored by…”. The logos depicted in this section are:

An underwater section of the iceberg is titled “The Beginner” with a quote beside it that says “I don’t like hackers and spying”. The logos depicted in this section are:

A lower section of the iceberg is titled “The Privacy Enthusiast” with a quote beside it that says “I have nothing I want to show”. The logos depicted in this section are:

An even lower section of the iceberg is titled “The Privacy Activist” with a quote beside it that says “Privacy is a human right”. The logos depicted in this section are:

The lowest portion of the iceberg is titled “The Ghost”. There is a quote beside it that has been intentionally redacted. The images depicted in this section are:

  • A cancel sign over a mobile phone, symbolizing “no electronics”
  • An illustration of a log cabin, symbolizing “living in a log cabin in the woods”
  • A picture of gold bars, symbolizing “paying only in gold”
  • A picture of a death certificate, symbolizing “faking your own death”
  • An AI generated picture of a person wearing a black hoodie, a baseball cap, a face mask, and reflective sunglasses, symbolizing “hiding ones identity in public”

End of transcription.

  • Bazoogle@lemmy.world
    link
    fedilink
    arrow-up
    7
    ·
    2 days ago
    1. A password managed is basically like a physical vault. If someone gets into a physical vault, they’ve gained access to all your valuable items, but the vault is extremely difficult to get into.
    2. Random websites do not prioritize security like they should. So when there is inevitably a breach in one of those 50 sites and you end up on haveibeenpwned.com, that does not allow them access to the other 49 sites. Often when logins are breached, the people getting that information do not care about the actual site that was breached. Rather, they know a password you use and your email, and can now try to login to actually useful sites where people often use the same login.
    3. There should be multiple layers of security to your password manager. Password and Authenticator app should be basic (No SMS or Email 2FA, not secure enough). Ideally, we move towards passwordless logins altogether so there is no secret that can be compromised on the server side.