“To facilitate this vetting, all applicants for F, M and J non-immigrant visas will be asked to adjust the privacy settings on all their social media profiles to ‘public’”, the official said. “The enhanced social media vetting will ensure we are properly screening every single person attempting to visit our country.”

  • FauxLiving@lemmy.world
    link
    fedilink
    arrow-up
    11
    ·
    1 day ago

    How are they gonna trace that to you?

    The modern Internet is essentially about spying on you as much as possible and then selling the data to whoever wants to buy it. Linking identities with devices/browsers is worth a lot of money and so most every website/app has a way of linking you to the devices and software that you use.

    Unless the user took some pretty extreme measures to create the account, they’ve likely logged in from a phone/ip/browser that has been linked to their real identity at some point in its lifetime. That link will be sold to data brokers and used to tie the random handle to you, the person. Then the State Department just buys that information.

    Alternatively, you should be assuming that sovereign entities with the means are reading all public network data. There’s a lot of information that you can learn from that as well. Like, over time, the posts from the ‘random’ account could be strongly correlated to the times that you were accessing the site even if all of the data was encrypted with HTTPS.

    Alternatively, alternatively. There is a threat known as Store Now Decrypt Later (SNDL). The idea is basically: Quantum Computers are coming and they can break some cryptographic primitives. If someone saves all of the encrypted traffic that they would want to read, in a few years they will have the means to read that data. We won’t know when this moment occurs, because it’ll likely be a secret, but we do know that it will happen and so you should additionally assume that anything that isn’t using post-quantum encryption, which transited a public network, will be read and used to link you to your identities.

    This is, essentially, the core thing that the Privacy community is attempting to mitigate.

    • Photuris@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      1 day ago

      I’m not a privacy expert.

      And I know that, sadly, they probably have a lot more data on me than I’d like. Even though I don’t have traditional social media anymore, and I use VPNs to access Lemmy, that’s just normie precaution stuff. Anyway I do have a Google, Apple, accounts and the like.

      My question is this: what do you / y’all think about the prospect of “poisoning the well”?

      Meaning: you set up multiple traditional social media accounts, generate fake profile photos for them, give them the same real name as you and part of the country as you live in, and have AI chatbots fill ‘em up with generated posts matching a particular “personality profile”?

      Would that be an effective countermeasure against this sort of data collection? Increase the noise-to-signal ratio?

      Just thinking out loud here.

      • FauxLiving@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        7 hours ago

        The problem with trying to increase the signal to noise ratio is that you don’t know all of the datapoints that are being collected and some of those datapoints could be used to filter the real from the fake.

        Like, in your example, if you made all of these account from the same browser then they could be linked together. If they were made on the same IP, they could be linked together. If you were using the same phone, they could be linked together. Those are just the datapoints that we know to try to protect, it’s the datapoints that you don’t know that get you.

        Like, maybe your phone or desktop is screenshotting itself every 5 seconds (“for AI purposes”) or maybe the app that you’re trying to fool also secretly sends your GPS location during account creation or maybe the adversary has malware running on your PC which is keylogging you.

        IF you knew all of the ways that they were collecting data on you, then you could take countermeasures. Since you don’t, you have to assume that any of your identities can be linked to your person unless you take unusual measures such, not using Microsoft/Google/Meta/Amazon/etc products at a minimum. Depending on your security needs this could also mean things like using burner hardware, non-commercial VPNs, physically disabling sensors/radios/ports, traffic/network monitoring, etc.