• 1 Post
  • 22 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle







  • If you’ve never worked before, this can be considered practice runs for the when you do.

    Like one of the other commentors said, assume everything is accessible by Google and/or your university (and later, your boss, company, organization, …).

    And not just you, but the people who interact with you through it. So that means you may be able to put up defenses, but if they don’t (and they most likely do not), the data that you interact with them would likely be accessible as well.

    So here are some potential suggestions to minimize private-data access by Google/university while still being able to work with others (adjust things depending on your threat model of course):

    • use Google Workspace services only for collaboration and for official business communication
    • don’t link things that may be personal, such as Google Map, Youtube, Search history, Browser, …
    • if more sensitive things need to be shared with other people, use more private/encrypted solutions that you like or the university suggests. You should use the latter if it’s still “business”-related, e.g. communicate about medical research data with PII
    • if there are communications that need sensitive information (eg HR documents, tax documents), ask them (a) if you can bring the sensitive documents to them, (b) or if the university has an encrypted solution, or © if you can use your own encrypted solution (eg put files on protondrive and you give them the appropriate folder password in person)
    • go through all Google privacy and security settings every 6 months or so, and turn off what you don’t need (there are usually a bunch of guides for that). Note: every 6 months because there may be new stuff that they add
    • turn off all the AI integrated features (sometimes called smart features) in Google services like Mail, GDoc, …
    • avoid using GDrive for storage of personal files - if you need to, try to encrypt them before uploading
    • you may find there are other people like you; and if you work with them, try to ask whether they are comfortable with alternatives or if they have anything suggestions. However, this is usually rare in most fields, so keep your expectations low for this
    • use the multi-account containers in Firefox to containerize all stuff related to university account in one container. Don’t use Google Chrome; if you must you Chromium, there are other “forks?” that you can try
    • use UBlock Origin and block unnecessary Google services (you’ll have to play around with this a lot)
    • avoid clicking on links in emails if possible, but instead copy them by selecting them (or the right click, copy). This is an unfounded suspicion, Google may track what links you click on






  • As much as I despise snap, this instance bring some questions into how other popular cross-linux platform app stores like flathub and nix-channels/packages provide guardrails against malwares.

    I’m aware flathub has a “verified” checks for packages from the same maintainers/developers, but I’m unsure about nix-channels. Even then, flathub packages are not reviewed by anyone, are they?



  • Others have mentioned using interactive tools like zoxide to easily get to frequently visited directories.

    In addition, I also use nnn (https://github.com/jarun/nnn), which is a terminal file manager that you can navigate through. You can create shortcuts, snippets and bookmarks with this. I use this and zoxide + fzf regularly on CLI to navigate.

    Some here also mention ranger, which is another terminal file manager. In my limited experience with ranger, I feel like the start up time is much slower than nnn; but I haven’t tried much. Tho with ranger + graphic-accelerated terminals like kitty, I believe you can preview images and files, which seems to be a great feature. So it depends on your need.