Top
Best
New

Posted by ybceo 3 days ago

Privacy doesn't mean anything anymore, anonymity does(servury.com)
451 points | 290 comments
mk89 3 days ago|
At first I thought it was a blog. No, this is a company. So, their privacy page (https://servury.com/privacy/):

> Server Logs > Like all web services, our servers may log: > IP addresses of visitors > Request timestamps > User agent strings > These logs are used for security and debugging purposes and are not linked to your account.

That's already a huge breach in comparison to mullvad privacy page. (https://mullvad.net/en/help/no-logging-data-policy)

ybceo 3 days ago||
I agree 100%. I went ahead and disabled all logging in Apache just now. Will update the privacy page to reflect this within the hour.
drink_machine 3 days ago|||
Shouldn't you have spent some time to think through basic things like this before trying to write an opinion piece on anonymity? Certainly it shows a lack of depth of understanding.
everdrive 2 days ago|||
The privacy crowd seems to be incapable of grey areas. Are all these the same thing? Are they all the same severity of problem?

  - A web site logs traffic in a sort of defacto way, but no one actually reviews the traffic, and it's not sent to 3rd parties.

  - A government website uses a standard framework and that framework loads a google subdomain. In principle, Google could use this to track you but there's no evidence that this actually happens.

  - A website tracks user sessions so they can improve UI but don't sell that data to 3rd parties.

  - A website has many 3rd party domains, many of which are tracking domains.

  - Facebook knows exactly who you are and sells your information to real-time-bidding ad services.

  - Your cell phone's 3G connection must in principle triangulate you for the cell phone to function, but the resolution here is fuzzy.

  - You use Android and even when your GPS is turned "off" Google is still getting extremely high resolution of your location at all times and absolutely using that information to target you.
A LOT of the privacy folks would put all those examples in the same category, and it absolutely drives me up a wall. It's purity-seeking at the expense of any meaningful distinction, or any meaningful investigation that actually allows uses to make informed decisions about their privacy.
johnnyanmac 2 days ago|||
The issue isn't about the present but the future. You don't just assume Google one day won't try to compromise government data.

Even if they don't, it opens up more attack vectors for malicious 3rd parties who want that data. That's why you can't be careless.

TeMPOraL 2 days ago||
That is paranoia.

At any time any company could turn evil, and any free(ish) government could become totalitarian overnight. This is a fact, but also pretty useless one.

The real questions to ask are, how likely it is to happen, and if that happens, how much did all these privacy measures accomplish.

The answer to those are, "not very", and "not much".

Down here on Earth, there are more real and immediate issues to consider, and balance to be found between preventing current and future misuse of data by public and private parties of all sides, while sharing enough data to be able to have a functioning technological civilization.

Useful conversations and realistic solutions are all about those grey areas.

johnnyanmac 2 days ago|||
>At any time any company could turn evil, and any free(ish) government could become totalitarian overnight. This is a fact, but also pretty useless one.

Is it isrlsss paranoia when it's happening around us as we speak?

It's strange how we call it "preparation" to spend trillions of dollars on mobilizing a military, but "paranoia" to simply take some best practices and not have the citizen's data dangling around. Its a much cheaper aspect with huge results, like much of tech.

I live in a good neighborhood and I have left my door unlocked once or twice to no consequence. That doesn't mean it's paranoia to make a habit out of locking my doors.

That's all I assert here. Care and effort. I don't know all the subtle steps to take since I'm not in cybersecurit, but we still shouldn't excuse sloppiness.

drob518 2 days ago||||
Exactly. Just because something is possible doesn’t mean it’s probable. Everything is a risk. Everyone needs to prioritize against the set of risks that can be identified and figure out if they can be mitigated.
everdrive 2 days ago|||
This is really well-stated, and I'd add that even if you want to adopt the paranoid perspective, it still shouldn't lead someone to flatten all risks until they look the same. In real-world scenarios with real risk (military, firefighting, policing, etc.) real effort is made to measure and prioritize risks. Without that measuring and prioritizing risks the privacy crowd prevented from making real improvement.
roncesvalles 2 days ago||||
>A web site logs traffic in a sort of defacto way, but no one actually reviews the traffic, and it's not sent to 3rd parties.

If data exists, it can be subpoenaed by the government.

Personally, I don't understand people's mindless anathema about being profiled by ad companies, as if the worst thing ever in the world is... being served more relevant ads? In fact I love targeted ads, I often get recommended useful things that genuinely improve my life and save me hours in shopping research.

It's the government getting that data that's the problem. Because one day you might do something that pisses off someone in the government, and someone goes on a power trip and decides to ruin your life by misusing the absolute power of the state.

subscribed 1 hour ago|||
Adtech sells that to creeps, goverments, police, insurance, banks, creeps, criminals, lawyers, data brokers. There absolutely IS a case for defending vehemently against the ads and tracking.

And that's even before malvertising comes into picture.

ahartmetz 2 days ago||||
The private sector - banks, insurances, your e-mail provider, cloud storage provider... - can mess with you pretty well, too.
hdgvhicv 2 days ago||||
If a correlation has the data it will sell it to anyone, including the government

If a government has the data there’s a chance it will stay in the government at least

You either

1) don’t want it stored

2) are happy for government to have it but not companies

3) are happy for everyone to have it

everdrive 2 days ago|||
The government would need to know what to subpoena, and what to prioritize as well. In principle could the government subpoena my ISP, learn I'd used a VPN, subpoena the VPN, learned I visited Wikipedia, then subpoena Wikipedia to finally learn what articles I'd written. Yes, but in practice this will never happen. There's no interest in doing so, and it's unclear a judge would be convinced that useful information could be obtained from such a path.

On the other hand, if I'm making death threats on Facebook, there's a much more realistic path: view the threats from a public source --> subpoena Facebook for private data.

Treating the two risks as similar is madness.

subscribed 1 hour ago||
I wouldn't be so optimistic

- https://sls.eff.org/technologies/real-time-location-tracking - https://www.wsj.com/politics/national-security/u-s-spy-agenc... - https://www.brennancenter.org/our-work/research-reports/clos...

They don't need to subpoena anyone if they can just get it without the hassle.

dylan604 2 days ago||||
> - A web site logs traffic in a sort of defacto way, but no one actually reviews the traffic, and it's not sent to 3rd parties.

Even if this sounds innocent, these must be turned over if you are provided a warrant or subpoena (which ever would be appropriate, IANAL).

Brian_K_White 2 days ago||
But it's not malicious. It's not ideal, and it should be addressed, but it's not bad faith or intentional spying or even gross negligence or incompetence.
dylan604 2 days ago|||
When you claim you keep no logs yet find out you are keeping logs, what is that if not incompetence or negligence?
Brian_K_White 2 days ago||
Human. And what was their reaction upon having this crime brought to their attention? It was exactly all anyone could ask for.

Shitting on well-intentioned people who merely failed to be perfect is not a great way to get the most of what you ultimately want.

If you think intent doesn't matter then what happens when well-intentioned people decide it's not worth trying because no matter what they will be crucified as murderers even if all they did wrong was fail to clean the break room coffee pot. The actual baddies are still there and have no inhibitions and now not even any competition.

dylan604 1 day ago||
Calling a strike a strike does not blame the batter. It’s simply calling it for what it is. Even if the person corrects the wrong does not mean that incompetence or negligence was not the correct description. This entire being offended for the correct words used to describe things is tiresome. It’s like people being offended at being told they are ignorant. Ignorant does not mean stupid. Just because ignorant people are ignorant of the word does not make people using words correctly mean or bad or full of ill will.
godelski 1 day ago|||

  > it should be addressed, but it's not bad faith
I think this is the part that annoys me about the privacy community. There's nicer ways to deal with these issues and get them resolved rather than just leaping to the pitchforks. Raise the concern and observe the response. That is far more informative of how much one should trust. Because let's be honest, at the end of the day there is still trust. You have to trust that they have no logs. You have to trust any third party auditor. Trustless is a difficult paradigm to build, so what's critical is the little things.

But jumping to pitchforks just teaches companies to ignore the privacy crowd. Why cater to them when every action is interpreted as malicious? If you can do no right then realistically you can do no wrong either. If every action is "wrong" then none are. In this way I think the privacy community just shoots themselves in the foot, impeding us from getting what we want.

Rygian 2 days ago|||
They belong in the same category: the end user has zero agency over how their privacy is impacted, and is at the whim of the wishes/agency of whoever is serving content to them.

Whether the one serving the content is exploiting data at the present moment has very little relevance. Because the end user has no means to assert whether it is happening or not.

amarant 2 days ago||||
We all mess up and miss things, op has shown maturity enough to admit to their mistakes and improve from them.

My takeaway from this thread is an increased amount of trust in OP. Not because they made a mistake, but because of how they handled it. Well done OP!

ybceo 3 days ago||||
I disagree. Like I said earlier :

Web server logs were not tied to user credentials in any way, they were used for debugging purposes and could not have been used to identify users.

pear01 3 days ago|||
You disagree and yet you agreed 100% and made the change. I thought the point the preceding parent comment is making is that you should have thought of that beforehand. Yet you seemed to already come to a judgement about it yet then quickly agreed to reverse yourself.

Sounds like a clear "lack of a depth of understanding" to me.

procaryote 3 days ago||||
From your faq: "We maintain zero logs of your activities. We don't track IP addresses, …"

Front page says "zero logs"

Some logs, including specifically datapoints you have promised not to log, but you mean well (?) is pretty different from zero logs

ffsm8 3 days ago||
Fwiw, zero logs in that context is usually in the relation to requests through the VPN, whereas this discussion is about requests on their homepage? Or did I misunderstand something here?
organsnyder 3 days ago||||
I have a static IP address; and most connections tend to have long-lived leases anyways. It can easily be used to identify me, even if you don't explicitly tie it to my account.
drink_machine 3 days ago|||
[flagged]
ybceo 3 days ago||
I went ahead and took action on the criticism as soon as I saw the parent comment. All apache access logs are piped to /dev/null now.

I'm not here to debate, the reason I posted here is to hear what people thought and see how I could improve my platform based on the criticism.

basedrum 3 days ago|||
Look into the Apache module called mod-remove-IP, it's old and hasn't had any changes for years, but it works much better than just disabling in the logs because it will also persist those removals throughout any frameworks. Also with Apache you cannot as easily destroy your error logs which sometimes have IPS in them. Consider nginx as an alternative
reactordev 2 days ago||
Consider Caddy as an alternative. Nginx is no better. Both Apache httpd and nginx are old and don’t support newer protocols like HTTP/3. Maybe I’m wrong.

Another issue is with Apache httpd’s routing. Removing the IP messes up routing sometimes when using mod_rewrite.

yareally 2 days ago||
Sure they do:

https://nginx.org/en/docs/quic.html

https://apisix.apache.org/docs/apisix/http3/

reactordev 2 days ago||
well damn... old dog new tricks. Maybe it's my distro that's old.
navigate8310 3 days ago|||
I appreciate your opinion on anonymity, but, it's nothing more than, "trust me bro". And being a US company that further tingles the spidy sense.
joemazerino 3 days ago||
The US isn't the sole transgressor against privacy. EU has made that pretty clear in the last month.
sallveburrpi 2 days ago||
What happened in the last month? Genuine question
joemazerino 2 days ago||
Look up Chat Control.
sallveburrpi 2 days ago||
Chat Control was first proposed in 2022 and is still in parliament. Some try to push it through again and again but it gets blocked. I don’t see why it should be different this time and so far nothing has actually changed for EU citizens.
lisbbb 2 days ago|||
Privacy was a joke--every time I gave someone my data that data got breached, including the US government.
ljlolel 3 days ago||||
The whole thing is behind cloudflare!
megous 3 days ago|||
Anonymity is responsibility of a visitor in any case. If the visitor's anonymity depends on some website not storing logs, the visitor lost already.
reactordev 2 days ago||
Your browser knows more about you than you do. When accessing a website, anonymous or not, it sends a fingerprint so to speak to that site and its ad network. It’s there that your anonymity ceases and you are identified, classified, segmented, and fed more “How to stay safe online” ads. There’s no escaping it. Chromium is not to be trusted.
bossyTeacher 3 days ago|||
in 2025, can small and medium businesses afford to be exposed to the world wild web? You don't need to be a major site these days to be DDosed on the regular
encom 3 days ago|||
Baseless fear mongering. I've had webservers raw-dogging the Internet for about 25 years. Nothing of any consequence has happened. Hasn't happened to anyone I know, either. Anecdata yes, but people are making it sound like running a webserver is like connecting a Windows XP machine to the internet - instant pwnage. It isn't.

I've been DDoS'ed exactly once. In 2003 I got into a pointless internet argument on IRC, and my home connection got hammered, which of course made me lose the argument by default. I activated my backup ISDN, so my Diablo 2 game was barely interrupted.

hollerith 3 days ago||
>I've had webservers

But have those webservers supported a small or medium-sized business?

trollbridge 3 days ago|||
Mine do, although I do use Cloudflare.

I've periodically removed Cloudflare because of issues with reissuing SSL certs, Cloudflare being down, and other reasons, and haven't noticed any problems.

The biggest benefit I get from Cloudflare is blocking scraper robots, which I've just been too lazy to figure out how to do myself.

sdoering 3 days ago|||
Mine did. Mine do. Never a problem. Not once.
V__ 3 days ago||||
Who gets ddosed on the regular? Spam is a regular problem, but I have never encountered a ddos on a business website.
63stack 2 days ago||||
Yes. The whole "you will be ddosd if you are exposed to the world wide web" is fud. (And/or racketeering)
immibis 3 days ago|||
Despite what Cloudflare wants you to think, yes, yes they can.

Also you can sue whoever DDoSes you and put them in jail. It's easier than it used to be, since the internet is heavily surveilled now. The malicious actors with really good anonymity aren't wasting it attacking a nobody.

sdoering 3 days ago||||
Does it matter, when CF is collecting all that already before people even reach your site?
zbentley 2 days ago|||
Does CF matter, when intermediate ISPs are collecting IP address and DNS query activity and can be subpoenaed?

The answer to both this and parent is yes: partial privacy improvements are still improvements. There are two big reasons for this and many smaller reasons as well:

First, legal actors prioritize who to take action against; some cases are “worth seeing if $law-enforcement-agency can get logs from self-hosted or colo’d servers with minimal legal trouble” but not “worth subpoenaing cloudflare/a vpn provider/ISP for logs that turned out not to be stored on the servers that received the traffic“.

Second, illegal actors are a lot more likely to break into your servers and be able to see traffic information than they are to be able to break into cloudflare/vpn/ISP infrastructure. Sure, most attackers aren’t interested in logs. But many of the kind of websites whose logs law enforcement is interested in are also interesting to blackmailers.

dylan604 2 days ago|||
If the authorities come to TFA site with demands, they can't do anything about what CF is doing. All they can do is turn over what they have, and/or prove they don't have what is being asked of them. What some 3rd party does is not germane at all.
mk89 3 days ago||||
Are you allowed to do that in US? I see the company is located in the USA, can companies disable logging just like that?

(Asking because I really don't know)

immibis 3 days ago|||
In most countries the law doesn't say you have to log everything about your users, but it does say that if you log it and the police ask for it then you have to give the data to them.
singpolyma3 3 days ago||
I think you mean if a court asks for it. And they have to ask for something you actually have
immibis 3 days ago||
That's why companies that actually care about privacy (I think there are only two - Mullvad and Signal?) make a point of not ever capturing the data to begin with, and deleting what they do capture as soon as possible.
singpolyma3 2 days ago||
Interesting that you mention those two as I'd not trust either with private data. They engage in too much magical thinking in their marketing for my liking...
reassess_blind 2 days ago||
Which privacy-oriented companies do you prefer?
SoftTalker 2 days ago||||
I don't know either, but I would guess there are no laws that says internet service operators must log anything.

But, banks and financial services now must obey "know your customer" laws so it's not beyond imagination that similar laws could be applied to websites and ISPs operating in a particular country.

drnick1 2 days ago|||
What is truly absurd is that most websites default to logging activities. It's as if they actively conspired against their users.
godelski 1 day ago|||
Just curious, why not accept cash?

Not that I use it, but one of the best privacy features of Mullvad is that you can post them cash with your account number and they will credit it. That makes the transaction virtually, and for all practical purposes, untraceable.

It seems like you have the means to do exactly that too.

afro88 3 days ago|||
> That's already a huge breach in comparison to mullvad privacy page.

And the "3 data points, that's it" of the blog post

ybceo 3 days ago||
Those data points refer to what is stored in the database and is tied to your 32 character credential.

Web server logs were not tied to user credentials in any way.

kevin_thibedeau 3 days ago||
IPs are PII. They can be tied to an identity.
organsnyder 3 days ago||
Even user agents are often specific enough to be considered PII.
willtemperley 2 days ago|||
I initially liked the sentiment but the offering doesn’t appear to add up. Unfortunately the real private cloud, if it exists, is bare metal and can’t really be sold as a subscription.
IlikeKitties 3 days ago|||
I mean technically yes but I find THAT kind of logging utterly benign.
procaryote 3 days ago||
They're good enough for fingerprinting and matching against other logs.

Also:

> // What we DON'T collect:

> - IP addresses (not logged, not stored, not tracked)

> - Usage patterns (no analytics, no telemetry, nothing)

> - Device fingerprints (your browser, your business)

so, I've read one blog from this company, and already they're lying or incompetent

tensegrist 3 days ago||
i hate to point it out, but that was written by an llm that probably wasn't prompted precisely enough to not make up comforting thoughts like that
pxc 3 days ago||
Indeed, the whole thing reads like it was written by an LLM.
givemeethekeys 1 day ago||
Do as I say, not as I do! /s
coldstartops 2 days ago||
You are liying. here: https://servury.com/datacenters/

Here on datacenters you say your are ISO27001 and SOC2 certified.

"We're ISO 27001 certified and maintain SOC 2 Type II compliance."

You do not have any certificate that I can find: https://www.iafcertsearch.org/search/certified-entities?sear...

https://www.iafcertsearch.org/search/certified-entities?sear...

Who is the company who certified you? What is the certification number?

foundry27 2 days ago||
I’m not sure if this is just an “on mobile” thing, but I can’t find any reference to ISO 27001 or SOC2 at that datacentres URL. Taking your word for it being there previously, this seems like a major red flag! Faking these certs is no joke, and silently removing references to that after being called out would be even more of a bad look.

@ybceo you seemed to represent this org based on your previous comments, is the parent commenter missing something here?

russianGuy83829 2 days ago||
Yes, the page mentioned ISO27001 which is still visible in the indexed duckduckgo result.

https://duckduckgo.com/?q=https%3A%2F%2Fservury.com%2Fdatace...

It is not visible in the live webpage.

russianGuy83829 2 days ago||
bing (use desktop mode) has both claims https://www.bing.com/search?q=https%3A%2F%2Fservury.com%2Fda...

archived versions here: http://archive.today/8LX8s http://archive.today/00mIw

ybceo 2 days ago||
You're right, we shouldn't have had those certifications listed. They've been removed. We're a new company, made a mistake, and we're fixing it. Appreciate you calling it out.
coldstartops 1 day ago|||
Sorry for continuing on this thread, but now I got more questions:

How do you monitor and enforce your uptime SLA? You state 99.9%, which is less than 9 hours downtime per year; what happens if you breach this guarantee?

Any other types of SLA's? What happens if you get breached/ your networks gets breached, or hardware failure, and my "anonymous" data is lost.

Besides that you make some claims, but are they real, or are they vaporwave?

like: "All our datacenters maintain the highest security standards with 24/7 on-site security, biometric access controls, and CCTV surveillance.

Each facility features N+1 power redundancy with UPS systems and diesel generators, ensuring your services remain online even during extended power outages."

Are you sure the above is true, because I am not.

PotatoPrime 2 days ago||||
In this instance, what mistake did you make here exactly? Are you in process for those certifications? Is there any plan to achieve them?

Or was the mistake saying you held a certification that you thought wasn't important to most people?

lenkite 1 day ago||
Mistake was using LLM generation.
coldstartops 1 day ago|||
Are you even a new company?

The only one I could find in Delaware with YBC Holdings, INC is registered in 1994 and is a brewing company

https://b.assets.dandb.com/businessdirectory/ybcholdingsinc....

bfkwlfkjf 3 days ago||
Speaking of mullvad. I recently learned about mullvad browser, which is basically tor browser minus connecting via the your network. This is interesting because the tor project has put the most effort into fingerprinting resistance. If you care about privacy and you have a customized browser, you're likely uniquely finger printable [1]. If you don't want to connect via tor, there's no excuse not to use the mullvad browser. (Doesn't require you to use mullvad VPN; comes with the mullvad plugin, disabled by default, to optionally use mullvad encrypted DNS. Last point, I wrote to the tor project and asked "is it possible to use tor browser minus tor network", and they responded "that's the mullvad browser", so this isn't just my recommendation)

[1] https://coveryourtracks.eff.org

eleveriven 3 days ago||
Most people fixate on network-level anonymity and completely underestimate how badly a "tuned" browser leaks identity
matheusmoreira 2 days ago||
People also tend to have very poor OPSEC which undermines their efforts in spite of the tools they used.

https://grugq.github.io/blog/2013/11/06/required-reading/

Unlinking one's identity from one's activity is only getting harder as surveillance gets more and more pervasive. Effective OPSEC essentially turns one's life into a living hell and it's only getting hotter with time.

basedrum 3 days ago||
Fun fact, mullvad browser is created by Tor in collaboration with them.
seb1204 2 days ago||
What is Mullvad Browser? - Frequently Asked Questions (FAQs) - Mullvad Browser — Tor https://share.google/1w4rilivJ4qMBwbIb
seb1204 2 days ago||
Sorry https://support.torproject.org/mullvad-browser/faqs/what-is-...
snakepit 3 days ago||
In many ways, we're past the point of no return. So-called ubiquitous technical surveillance is largely the norm, often encroaching by design beyond the boundaries of expected decency.

Informational terrorism, a dysphemism that describes the manner by which certain data is abused to "re-rank content" for a "personalized experience," is encoded into the DNA of certain large tech companies.

heresie-dabord 2 days ago||
> we're past the point of no return

The ideal would have been a security-first (privacy-first) industry and supply chain. The ideal never was going to happen, anymore than the early educational ideals of the television industry.

Ergo we are not past the point of no return. That point never existed. We are right where we should expect to be, with most people victimised by the industry and the supply chain, and with a small percentage of people working in security/privacy education to mitigate unsafe practices.

Seatbelts and airbags exist. Smoking is banned in many public settings. It took a senseless amount of carnage to achieve these measures.

We just haven't achieved the requisite amount of privacy carnage. Yet.

lisbbb 2 days ago|||
Yes. The only question left is when does the terror begin? And it will--it will be our own governments clamping down on all of us. The digital norm globally will be China under the CCP. That is the future for all of us unless we turn it off, but we won't because humans are stupid.
pcthrowaway 2 days ago|||
The terrorism is already occurring, it's merely exported to other people
hearsathought 2 days ago|||
[flagged]
chneu 2 days ago||
Eh, defeatist attitude. It isn't that hard to anonymize and obfuscate your data.

The issue is everyone is willing to trade convenience for security.

The point of no return is an individual choice.

hkt 2 days ago|||
> The point of no return is an individual choice.

This is largely the attitude that led to this in the first place. This is about failures of messaging, campaigning, and organising. It is a lack of democratic engagement that directly stems from the idea of individual choice being supreme over everything.

snakepit 2 days ago|||
This doesn't reflect the current reality. Tech companies acquire questionable third-party data without consent and exploit it however they see fit.
al_borland 3 days ago||
Any business that isn’t willing to be as anonymous as Mullvad, I assume has a compromised business model that I don’t really like. Assuming there aren’t obvious reasons for needing the data, like tax filing, or various regulatory requirements.

I don’t understand why any company would want the liability of holding on to any personal data if it wasn’t vital to the operations of the business, considering all the data breaches we’ve seen over the past decade or so. It also means they can avoid all the lawyers writing complicated and confusing privacy policies, or cookie approval pop-ups.

eleveriven 3 days ago||
What I'd really like to see is more honesty: "we store X because feature Y needs it, here's the risk we're accepting," instead of pretending every service needs emails, analytics, and cookies by default
teekert 2 days ago||
This is what the GDPR requires.
martin-t 3 days ago|||
> I don’t understand why any company would want the liability of holding on to any personal data if it wasn’t vital to the operations of the business, considering all the data breaches we’ve seen over the past decade or so.

They're OK with the liability exactly because of this very sentence. As you said, there's so many data breaches... so where are the company-ending fines and managers/execs going to prison?

tjpnz 3 days ago|||
Here in Japan the government cracks down on it hard. There are fines for every n users exposed and in extreme cases a company can be forced to stop trading for a period of days or weeks. Companies are so scared of this happening to them that a significant portion of orientation for new employees is spent on it. I don't have stats on how effective it is, but I do know that the public is less willing to accept it as they tend to elsewhere.
Hakkin 3 days ago|||
Is this true? KADOKAWA had a massive hack last year that leaked a large amount of sensitive user data and as far as I know has faced no legal repercussions. Obviously they took a decent financial and reputational hit, but that was just an effect of the hack itself, not any government intervention.
PacificSpecific 3 days ago|||
Wow good for them. I wish we took it that seriously in North America.
sixtyj 3 days ago|||
GDPR has fines:

Up to EUR 10,000,000 or up to 2% of the total worldwide annual turnover of the preceding financial year, whichever is higher; applies to infringements such as controller and processor obligations, security of processing, record-keeping, and breach notification duties.

Up to EUR 20,000,000 or up to 4% of the total worldwide annual turnover of the preceding financial year, whichever is higher; applies to infringements of basic principles for processing, data subjects’ rights, and unlawful transfers of personal data to third countries or international organisations.

dangus 3 days ago|||
These fines aren’t something you’re responsible for paying by merely being breached. These are imposed for misconduct in data handling.

It’s not very hard to handle customer data in a legally compliant way, that’s why you don’t see companies deciding against retaining data.

You can do everything right and still have a data breach, and in that case nobody is fining you.

tsimionescu 3 days ago|||
Sure, in principle. Have you heard of any company that suffered any significant hardship (say, stock price plummeting, personnel reductions, bankruptcy) because of one of these fines?
jamiecurle 3 days ago|||
Specific to the UK, there's a list of enforcement actions that the Information Commissioners Office (ICO) have taken:

https://ico.org.uk/action-weve-taken/enforcement/

Some went to prison, some were fined £14M and it's a mixture of small fry and big fry.

zrn900 2 days ago|||
Big companies arent suffering any of those. But small businesses and individuals are. Just see the enforcement lists. They are fining small flower shops that sent emails to 20-30 people, some of whom subscribed to it decades ago, then forgot. Or small internet startups for missing one subscription record and whatnot. Like all other corporate moat-building efforts, GDPR has been successful in destroying small businesses in favor of big ones.
Spivak 3 days ago|||
Infra engineer here. The obvious reasons for needing the data is debugging. I collect logs, metrics, traces, and errors from everywhere, including clients. All of these come with identifying information including the associated user. From the perspective of this thread this is a huge amount of data although it's pretty modest compared to the wider industry.

This data is the tool we have to identify and fix bugs. It is considered a failing on our end if a user has to report an issue to us. Mullvad is in an ideal situation to not need this data because their customers are technical, identical, and stateless.

It's not my department but I think we would get laughed out of the room if we told our users that we couldn't do password resets or support SSO let alone the whole forgetting your 'credential' means losing all your data thing.

al_borland 3 days ago||
> Mullvad is in an ideal situation to not need this data because their customers are technical, identical, and stateless.

A lot of companies could be in similar situations, but choose not to be.

All of retail, for example. Target does significant amounts of data collection to track their customers. This is a choice. They could let users simply buy things, pay for them, and store nothing. This used to be the business model. For online orders, they could purge everything after the return window passed. The order data shouldn’t be needed after that. For brick and mortar, it should be a very straightforward business. However, I’m routinely asked for my zip code or phone number when I check out at stores. Loyalty cards are also a way to incentivize customers to give up this data (https://xkcd.com/2006/).

TVs are another big one. They are all “smart” now, and collect significant amounts of data. I don’t know anyone who would be upset with a simple screen that just let you change inputs and brightness settings, and let people plug stuff into it. Nothing needs to be collected or phone home.

A lot of the logs that are collected in the name of troubleshooting and bug fixing exist because the products are over-complicated or not thoroughly tested before release. The ability to update things later lowers the bar for release and gives a pass for adding all this complexity that users don’t really want. There is a lot of complexity in the smart TV that they might want logs for, but none of it improves the user experience, it’s all in support of the real business model that’s hidden from the user.

bossyTeacher 3 days ago||
>Any business that isn’t willing to be as anonymous as Mullvad, I assume has a compromised business model that I don’t really like

Well, that's like 99% of the businesses out there. Mind listing of some of the businesses you like aside from obvious mullvad?

al_borland 3 days ago||
I wish I had a list, as you said, they are in short supply. If there is a site out there that catalogs simple straightforward business that don’t compromise a customers ability to be anonymous, I’d like it very much.

A HN user posted about a site they made for faxing documents the other day. It’s a good example of how I think most things should be setup in many cases. You pay a fee and it sends a fax, that is very simple to understand. There are no accounts and the documents are only stored long enough to fulfill the service.

https://news.ycombinator.com/item?id=46310161

You can imagine how most “modern” sites would handle faxing. Make an account, link a credit card, provide your address to validate the credit card. Then store all the faxes that were sent, claiming it’s for easy reference. Meanwhile it’s running OCR on them in the background to build a profile with a wealth of personal data. After all, people don’t tend to fax trivial things. In addition to the profits from the user, they are making a killing on selling data to advertisers… but those details are hidden away in legalese of the fine print in a policy no one actually reads.

serial_dev 3 days ago||
I know it’s a different context, but with this catchy title, I can’t resist pointing out that anonymity also doesn’t mean anything.

You can have cryptocurrencies in your wallet, (on most chains) you are anonymous but have no privacy, your transaction history can be accessed by anyone.

It’s all fine and dandy, you can enjoy your anonymity, about as long as you make your first transaction.

You might be anonymous, but basically you hand over your full transaction history and balance anytime you pay for a coffee or tshirt.

bee_rider 2 days ago||
The term pseudonymous should be more popular. A crypto id is a pseudonym, right? In the sense that it is a consistent identity you have, just, not one that is initially tied to the identity you were born with.

Social media handles are usually pseudonymous at most.

I wonder where the figure of anonymity is. With writing style analysis, correlating pseudonyms is probably pretty easy these days. Maybe we’ll all start writing our ideas into LLMs and have them do the talking…

Departed7405 1 day ago|||
That's why Bitcoin isn't anonymous. Use Monero XMR instead. Much more private. Transactions can't be tracked. (Some very advanced techniques might, but they are in the process of fixing it. Unlike BTC, they do care)
kachapopopow 3 days ago|||
you typically don't have one wallet and you (should at least attempt to) never reuse them either.
wood_spirit 3 days ago|||
Do you mean a wallet per transaction?

And if you simply have multiple wallets and try and maintain the appearance of being disconnected, can you move funds between them without establishing a connection that unmasks you?

kachapopopow 2 days ago||
well the idea is to obscure it to someone looking from the outside, give enough information it can still be traced - but that's usually only possible by infosec agencies which is typically what they have access to already with normal banks.

to clarify: it can be hard to prove that two crypto addresses are the same people

kube-system 2 days ago||
There's a whole industry of commercially available products that analyze blockchains transactions for the purpose of tracing them. Anyone can simply buy these services. It is functionally accurate enough to find and prosecute criminals.
dragonwriter 2 days ago||
> It is functionally accurate enough to find and prosecute criminals.

Is that a high bar? I mean, you could have said that about forensic fiber analysis—and then it was revealed that the entire history of the field was just expert witnesses lying their asses off for whatever conclusion law enforcement wanted. It turns out that to prosecute criminals, being complex enough that expert witnesses can provide a smoke screen to rationalize law enforcement targeting that is actually based on prejudice and not concrete facts can be sufficient.

kube-system 2 days ago||
Nobody is being prosecuted on the basis of blockchain analysis data alone -- what I mean is that the data is good enough that that it provides information valuable enough to find the criminal in meatspace with the related physical evidence.

e.g. police look for online drug dealer with blockchain data, get warrant, bust down door, find big pile of drugs.

The point being, the data might not be "proof" on its own but it absolutely illustrates that there is no privacy on public ledgers.

kachapopopow 2 days ago||
depends on the wallets you use and what you do with them, being able to identify criminals is honestly a plus and if you really wanted to you could make their job *really* hard if you wanted to truly hide from an abusive government. Not being able to hide huge transactions in the millions / billions is honestly a good thing. Imagine the transparency we could get if all governments used crypto currencies instead of the walled garden that is SWIFT.
serial_dev 3 days ago|||
Let’s say you need three transactions a week, that’s 150 a year. How do you get the right amount of funds into these wallets? How will you get your money out? How will they not be able to track you anyway? As far as I know, you just make the identifiable wallets one hop away.

Again, I’m assuming traditional “old school” non-privacy cryptocurrencies.

gunalx 3 days ago|||
There are tumbling services, where you for a fee can mix upp your transaction with lots of other users transactions to make it less obvious you where the one that transfered the credit to your burner wallet.

Kepp in mind, tumblers have also been found to keep logs that ended upp in law enforcement.

kachapopopow 2 days ago|||
Well by design you receive crypto currency in different wallets to begin with and what funds to use, well that's simple - whatever wallet has enough cryptocurrency to cover the transaction.
DesiLurker 2 days ago||
not if you use Zcash with shielded addresses. zcash is based on zeroknowledge proofs ground up so anonymous by default not with some mixer addon.
theturtletalks 3 days ago||
What scares me is that the more privacy oriented you are, the easier you are to fingerprint. At what point does privacy mean blending in with the crowd and not sticking out?
ybceo 3 days ago||
You're thinking about browser fingerprinting (client-side), but my post is about service-level anonymity (server-side).

Browser fingerprinting: "Your unique combination of extensions/settings makes you identifiable among other users."

Service anonymity: "There are no other users to compare you against because we don't collect identifying data."

When you sign up with just a random 32-char string, there's nothing to fingerprint. No email to correlate. No IP logs to analyze. No usage patterns to build a profile from.

Fingerprinting matters when services collect behavioral data. We architected our way out of having that data to begin with.

integralid 3 days ago||
>When you sign up with just a random 32-char string...

There's STILL a browser fingerprint, IP logs to analyze, usage patterns to build a profile from. You may claim you don't collect it, but users need to take your word for it. This is just pseudonymity, which (as many BTC users found out) only gets you halfway there. Real anonymity is way harder, often impossible.

Don't get me wrong, it's good to see organisations that care about privacy and in fact this blog post encouraged me to consider your services in the future. We have some use cases for that at work.

Though by using cloudflare you're NOT putting your money where your mouth is.

ybceo 3 days ago||
I was going to say making the platform open source might solve this problem, but then users would have to trust that we are actually running the open source version and not some fork with logging and tracking. This would be an interesting problem / paradox to try to crack.

But you are 100% right, I will look into alternatives for Cloudflare, which we are using because it seems like the cloud hosting industry LOVES to DDoS new players.

integralid 2 days ago|||
TBH most of those problems are solved by using tor browser. Depending on how much you care: 1. make it possible to use your service with Tor browser, 2. create an .onion site 3. delete your clearnet presence and use only tor.

Without (1), people who really care about anonymity won't even care about you (tor is table stakes). (3) is a really strong vote for anonymity, but don't expect many customers that way.

dns_snek 3 days ago||||
With open source software + reproducible system image builds + TPM + secure boot + remote attestation you could technically achieve some level of certainty that the server is running the software that you expect, but that's not enough.

The operator can passively log the network traffic which allows for de-anonymization and you would need to design your application-layer such that the operator couldn't selectively route your traffic to a non-compliant server.

mazone 3 days ago||||
I wonder if it would be possible to allow people to ssh into the edge servers with enough access to verify no access logs are stored but not enough to cause any problems. Admit i have not thought it through but would be cool having people verify the live environment while running.
dns_snek 3 days ago||
You can't really verify anything in this way. SSH is just a protocol, you're trusting the SSH server to give you a shell inside the real production environment instead of giving you a shell inside some elaborate simulation of a production environment. It's about as trustworthy as a policy page saying "we don't keep logs".
mazone 2 days ago||
You are correct. Would need something like distributed ledger to fully prove things.

It might not be possible to verify 100% but the more transparency the better i guess. Seeing the 3 way handshake and connection information, the timings, location of the server. Would need to be quite elaborate to fake. Just thought was a fun idea. Have the customer allowed in to production. A lot more difficult then publish privacy page, source code, fake audit reports.

o999 3 days ago|||
There are self-hostable solutions for DDoS protection, try Anubis for example.
matheusmoreira 2 days ago|||
> At what point does privacy mean blending in with the crowd and not sticking out?

It's basically rule number one. Tor is all about making all users look like the same user. The so called anonymity set. They all look the same, so you can't tell them apart from each other.

It's also part of the rules of proper OPSEC.

https://en.wikipedia.org/wiki/The_Moscow_rules

> Do not look back; you are never completely alone.

> Go with the flow, blend in.

> Vary your pattern and stay within your cover.

theturtletalks 2 days ago||
I read here that most of the Tor exit nodes are operated by governments and governments are using parallel construction to keep that information out of legal documents.
matheusmoreira 2 days ago||
Well, yes. They control ISPs and exit nodes, therefore they can correlate entries into and exits out of the Tor network, narrowing down candidate lists until only one user remains. Essentially a nation scale version of the Harvard bomb threat correlation:

https://buttondown.com/grugq/archive/bad-opsec-considered-ha...

As noted in the article, it wasn't the failure of Tor that led to arrest, it was poor OPSEC. Failure to cover, failure to conceal and failure to compartment.

anal_reactor 3 days ago|||
Reminds me of this guy who used Tor to send a fake bomb threat to his school but he was the only person on the whole campus connecting to Tor.
immibis 3 days ago|||
There were 4 people, but he confessed when questioned.

I guess the lesson there is that if you don't want to be convicted of a crime, don't confess to a crime? They won't give you a lighter sentence for confessing.

lo_zamoyski 3 days ago||
> I guess the lesson there is that if you don't want to be convicted of a crime, don't confess to a crime? They won't give you a lighter sentence for confessing.

Ever hear of moral integrity?

Unless the penalty is unjust (say, execution for a minor crime), a just man will confess and accept his punishment as right as just. He himself will want justice to be done and will want to pay for his crime.

A remorseful murderer knows he deserves death. He might ask for mercy, but failing that, he will accept the penalty with dignity and grace.

DangitBobby 3 days ago|||
This is the kind of value a population can collectively hold until they look around and see the culture doesn't value it anymore. Moral integrity stopped being a cultural value that mattered here before I was even born, if it ever really did matter for anyone except the "common" man.
lo_zamoyski 1 hour ago|||
Then you do not understand integrity, and you have relativized morality (albeit in an inconsistent way; that the culture is one way or another should somehow determine morality is itself a moral judgement).

Morality is not a social convention. Morality concerns what you or I or any individual person should do as that individual. Because we are all human beings with a shared nature, the same general moral principles hold for all of us. Morality is about being a good person. Not a nice person. Not "good" in the opinion of others. Not a "goody two-shoes" or a suck-up. Good in the sense that you choose and do what you ought. The good life is the moral life, and it is absurd to say otherwise.

It is not good for you or me or anyone to lack integrity with the objective good. This is what too many people fail to understand. They think morality is just some set of external rules someone made up that have nothing to do with one's own flourishing as a human being. No, immoral acts corrupt the person choosing to perform them. They corrupt him from the inside. They cripple a person and rot him out. They stunt development and derail him, pushing him onto self-destructive trajectories. They produce misery. You will not find an immoral person who is joyful. Maniacal, maybe, but not joyful.

Of course, the concrete and particular choices we ought to make and acts we ought to choose in a given situation requires prudence, a quality we can only develop with experience. But prudence does not override moral principles. Lying, stealing, murdering do not become licit by circumstance.

bigstrat2003 2 days ago|||
Honestly, I don't care about what the culture does. I act with integrity because of my values and who I want to be, not because I'm under any illusions about how many of my peers will do the same. It is, in my opinion, the only way to live well.
DangitBobby 2 days ago||
You should care what your culture does.
anal_reactor 3 days ago|||
Whatever you smoke, share it.
hilbert42 3 days ago|||
"...the only person on the whole campus connecting to Tor."

Talk about doubly stupid, first sending the threat, second using Tor on campus. I often wonder what goes (or doesn't go) through the mind of such people.

bauruine 3 days ago|||
Blending in with the crowd doesn't work. If you use Chrome on Windows you're part of a very large group and "don't stick out". But it's also very easy to fingerprint so you're also part of the "theturtletalks" group with the size of one.
bfkwlfkjf 3 days ago|||
Not necessarily

https://news.ycombinator.com/item?id=46334951

eleveriven 3 days ago||
There's a point where "privacy" flips into distinctiveness
jrm4 3 days ago||
Thank you, op, for bringing sanity to this whole thing.

Relatedly, this is why I think every "new" social media service that isn't Mastodon is barking up the most wrong tree with "take everything with you," you're essentially helping to build an even harder to erase social history.

Mastodon's individual server model, like email's, is better PRECISELY because each node is a point of "failure." That makes erasure easier. Which is good.

immibis 3 days ago||
That's not true. Mastodon replicates all your posts to a bunch of other servers you don't control by design, which makes them harder to erase.

It's no worse than normal internet publishing, but it doesn't magically solve the erasure question.

shark_laser 2 days ago||
Yep. And you still de-anonymise yourself with Mastodon when you buy hosting and a domain. If you use an existing provider, then you're back at square one and living in hope that the provider doesn't keep logs etc, or just decide they don't like you.

Nostr fixes both of these. So whilst you're at the mercy of relays storing your data, you can at least be anonymous.

chneu 2 days ago||
No one owning your data isn't any better than everyone owning your data.
AnthonyMouse 3 days ago||
This seems like the wrong end of the system to fix the problem. Someone saying "we don't log your IP address" isn't something you can easily verify, so the promise doesn't mean much because if they suck they're just going to lie about it.

What you need instead is to make it easy and common for people to use browsers that resist fingerprinting, VPNs/Tor, custom email addresses per-account, etc. Because then instead of claiming to not log your information, they simply do not have it.

The biggest thing we need is a better way to pay someone over the internet without them knowing who you are.

hilbert42 3 days ago||
"The biggest thing we need is a better way to pay someone over the internet without them knowing who you are."

I've been saying that for years. Buy a prepaid card for cash at say the supermarket with xyz value on it and a unique email address included (an anonymous debit card with email). That is every new card you buy would have a different disposable email address that would expire when the card is empty.

Such a scheme could also be used to donate micro payments to opensource projects, ad-free Youtubers, etc. and do so anonymously. Moreover, it would make payments easier thus overcome the "requires effort to do" resistance when it comes to donating. Making donating super easy would I reckon greatly increase the income for all those on the receiving end.

However I can't see it happening, governments would outlaw it claiming it'd be used to transfer money for nefarious purposes, money laundering etc.

The major reason I don't donate to good/charitable causes is that I cannot do so anonymously.

Shame really.

AnthonyMouse 2 days ago|||
> However I can't see it happening, governments would outlaw it claiming it'd be used to transfer money for nefarious purposes, money laundering etc.

I feel like it's too common for people to say "we can't have nice things because the government is run by a clutter of lummoxes" when they should be saying "we should improve society somewhat".

goopypoop 2 days ago||||
why not stuff wads of hundreds into collection boxes?
DesiLurker 2 days ago|||
check if they accept zcash
_el1s7 2 days ago|||
> The biggest thing we need is a better way to pay someone over the internet without them knowing who you are.

What's the reason you don't want sellers to know who you are?

That would be like buying things in real life while wearing a ski mask and paying with cash.

orbital-decay 2 days ago||
What's the reason for the seller to know who I am?

Any normal pre-total-surveillance store would've had zero issues selling me something for cash if I walked in wearing a ski mask.

bigstrat2003 2 days ago||
That is not remotely true, dude. Probably some stores would've been ok with it. But for the past 40 years or more, wearing a ski mask around has had the connotation of "this person is up to no good". A lot of stores would've had a problem with your hypothetical purchase for quite some time now.
AnthonyMouse 2 days ago||
Let's never mind the ski mask. For thousands of years, a stranger could walk into a store and buy something for cash. The store didn't know their name, didn't have surveillance cameras or computers because they didn't exist and generally wouldn't even be able to remember that the purchase had happened if asked about it six months later.
HelloUsername 3 days ago||
> The biggest thing we need is a better way to pay someone over the internet without them knowing who you are.

Cryptocurrency?

wseqyrku 3 days ago|||
That's what I thought. I think an open source crypto payment gateway that "just works" could probably make it more prevalent. (Is there any?)
__MatrixMan__ 3 days ago||
Isn't that pretty much table stakes for being a cryptocurrency? Run a node (they're all open source), publish your address, and you're all set up to receive payments in that currency.

Every one I've tried "just works". The trick is getting people to join you.

wseqyrku 2 days ago||
> Every one I've tried "just works". The trick is getting people to join you.

As the other comment pointed out, if it's easy enough, that problem will take care of itself. I would also add "lightweight", cloning the entire block is not something everyone would do.

__MatrixMan__ 2 days ago|||
OK so its not trivial, but I really don't think it's a UX problem. Your grocer and your landlord don't accept crypto not because they can't figure it out, but because so far it hasn't shown itself to be an improvement.

It's got superior privacy properties, sure, but for most people that's not enough. Its gotta be better on other merits too. Until then it wont matter how easy it is to use because you'll still have to turn it back into fiat to use it and now you've just reinvented the problem you were trying to solve with crypto in the first place.

wseqyrku 2 days ago||
> Your grocer and your landlord don't accept crypto

I don't mind using fiat for groceries. I'm talking only about digital currencies for digital services. That's it, at least for starters.

> Its gotta be better on other merits too.

There, a market niche deliberately being overlooked. You can totally reverse benchmark this whole thing if you can actually see its current flaws that prevents it to become mainstream.

> and now you've just reinvented the problem you were trying to solve

One intractable problem at a time my friend. I feel like those are the excuses we've been telling ourselves to not even try. The fact of the matter is that it's going to take time even after you have the infrastructure in place. You can read endless HN comments complaining about, let's call it the situation, on the side but I believe if anything at all it's going to be a grassroots movement and it has to start somewhere. It's actually pretty straightforward, take something that is hard, that you're an expert in, and make it stupidly easy. That's the formula I use anyways but crypto is not my strong suit.

__MatrixMan__ 2 days ago||
I guess it comes down to how small of an economy is big enough. At my last job I ran across a situation where my company paid google for compute, and also they paid us for use of our product. So that's a 2-cycle, and if the amounts were the same we could in theory cut the payment gateways out of the loop and instead pay each other in crypto. But at that point, why pay each other at all?

And then there's the other extreme where everybody uses crypto instead of fiat. We have the status quo as evidence that that works to at least some degree. I don't know how many cycles you'll find in the fiat economy, bit its a large number.

For some middle ground situation to work, you don't need everybody to consume exactly as much digital services as they produce, but you need some kind of balance: something like for everyone who consumes twice as much as average somebody else consumes half as much as average. Then you could have this digital-services-only sub-economy.

The more asymmetry you have, the closer you are to having a single producer and millions of consumers, the more quickly you're going to need exchanges involved to restore balance. Else the tech workers run out of fiat to spent on groceries and the grocers run out of crypto to spend on their VPNs and... bored apes gifs?

We can get there by:

1. making the tech easy to use and hope it happens on its own.

2. create artificial demand for digital services via artificial scarcity schemes (this is why modern crypto looks like a casino: tokens as assets).

3. solve a larger share of real problems in ways that make sense to solve digitally (efforts like these are where you get utility tokens from).

More of 1 couldn't hurt. I think we've seen enough of the road that 2 is paving to not want anymore of it. But I think 3 is the bottleneck.

We're in agreement that things could be improved through grassroots change that involves using different payment protocols. But progress in that direction is stalled not because the payments system is hard to use, but because the products themselves aren't diverse enough to sustain their own sub-economy.

__MatrixMan__ 1 day ago||
More fertile ground for kickstarting this kind of grassroots change would be somewhere with a lower barrier of entry. Imagine homebrewers buying and selling from each other without ever involving fiat.

If you got better beer out of that arrangement than you can get at the liquor store... That would be and indicator that such dedicated sub-economies can work without an external hype cycle driving them.

Then you could try something more ambitious like VPN service, that way your employees can at least buy beer with that portion of their paychecks (and the brewers can similarly buy VPN serice to avoid interference from the local government, which they might expect if they're "selling" alcohol).

AnthonyMouse 3 days ago|||
If it was made easy and common for ordinary people to use.
abc123abc123 3 days ago||
True. For 99% of the people mining it yourself of demanding getting paid in crypto is not viable. That means you go to an exchange, and all you do is then logged at this government regulated exchange.

I suppose you could engage in some cloak and dagger exchange at night, but again, the 99% won't do that. The ones who do, are most likely capable of setting up their own services, anonymously, so they don't need to have a commercial, for-profit as their middleman.

made3 3 days ago|
"Please unblock challenges.cloudflare.com to proceed."

talk about anonymity but uses cloudflare. you threw away your tls and allow cloudflare to sit in the middle of the user and your web page. you're a hypocrite.

uoaei 3 days ago|
Hypocrisy is a moral failing but also a somewhat pedantic one -- has this person condemned these activities or merely lamented them?
More comments...