Skip to content
  • 0 Votes
    1 Posts
    0 Views
    W
    Worth being honest: you can deploy 2FA on every service, use a vault, audit your password hygiene. All worth doing. None of it reaches the day your cousin saves you under your full name and grants a social application access to her contacts. Your name and number land in that application's database, indefinitely.Lemmy thread sums it up: "The hardest thing about maintaining ur online privacy are the people around you." Around 250 upvotes.https://lemmy.ml/post/46929780The pragmatic fix: separate phone numbers per context. Family gets one, professional services gets another, random online stuff gets a third. A leak in one stays in one.https://wiggwigg.ca/en/use-cases/privacy/#Privacy #InfoSec #ThreatModel