Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile
Sooraj Sathyanarayanan

@ianonymous3000

Security & Privacy Researcher | Advocate for Open Source, Privacy, & Digital Freedom | priv/acc 🚀 (Privacy Accelerationist)

ID: 1397773033

linkhttps://profincognito.me calendar_today02-05-2013 17:47:49

11,11K Tweet

7,7K Takipçi

1,1K Takip Edilen

Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

Before you post that pic or video - remove the metadata. EXIF data can include: 📍 Your exact location 📆 When it was taken 📷 What device/app you used Especially risky if you’re sharing in real-time or posting about kids. Here’s how to clean it without losing quality: 1.

Before you post that pic or video - remove the metadata.

EXIF data can include:
📍 Your exact location
📆 When it was taken
📷 What device/app you used

Especially risky if you’re sharing in real-time or posting about kids.

Here’s how to clean it without losing quality:

1.
Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

This is the kind of role that gets us genuinely excited. Proton is hiring a Senior Rust Engineer for the Inbox team. If you care about privacy, and want to build software that protects millions from surveillance and censorship, this might be one of the most meaningful

This is the kind of role that gets us genuinely excited.

<a href="/ProtonPrivacy/">Proton</a> is hiring a Senior Rust Engineer for the Inbox team.

If you care about privacy, and want to build software that protects millions from surveillance and censorship, this might be one of the most meaningful
Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

THEY SEE YOUR PHOTOS. You see a happy memory. They see relationships, emotions, age, gender, brands, and possible location - all from a single photo. Ente ran an experiment using the Google Vision API to analyze everyday pictures. No metadata. Just pixels. Here’s what the

THEY SEE YOUR PHOTOS.

You see a happy memory.
They see relationships, emotions, age, gender, brands, and possible location - all from a single photo.

<a href="/enteio/">Ente</a> ran an experiment using the Google Vision API to analyze everyday pictures. No metadata. Just pixels.

Here’s what the
Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

You’re at a cafe. You see this QR code. It says “WiFi” - Free internet. Convenient. But here’s the problem: Anyone can print a QR code and leave it on the table. The moment you scan it, your phone might: - connect to a rogue network - leak your credentials - install malware -

You’re at a cafe. You see this QR code.

It says “WiFi” - Free internet. Convenient.

But here’s the problem:
Anyone can print a QR code and leave it on the table.

The moment you scan it, your phone might:
- connect to a rogue network
- leak your credentials
- install malware
-
Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

The U.S. has NO real federal privacy law. The strongest we have? CCPA - for California only. Meanwhile: - 3,200+ data compromises in 2023-2024. - Billions of records exposed. - Health, location, biometrics data sold. We need real federal privacy law: ✅Collect only what’s

The U.S. has NO real federal privacy law.

The strongest we have? CCPA - for California only.

Meanwhile:
- 3,200+ data compromises in 2023-2024.
- Billions of records exposed.
- Health, location, biometrics data sold.

We need real federal privacy law:
✅Collect only what’s
Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

95% of teens are online daily. The internet wasn’t built for kids. Every time your child goes online, they face: - Predators & grooming - Cyberbullying - Addictive algorithms - Inappropriate content - Privacy risks & data harvesting - Financial fraud Most parental controls miss

95% of teens are online daily.
The internet wasn’t built for kids.

Every time your child goes online, they face:
- Predators &amp; grooming
- Cyberbullying
- Addictive algorithms
- Inappropriate content
- Privacy risks &amp; data harvesting
- Financial fraud

Most parental controls miss
Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

OpSec isn’t just tech. It’s behavioral. It’s physical. It’s social. Some basic reminders (especially if you’re in a high-risk role): -> Don’t get intoxicated in risky places - your judgment is your last line of defense. -> Never take open drinks. Yes, roofies are still a thing.

Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

Signal Hardening Guide (2025) You’re using Signal. That’s a good start. But if you haven’t hardened your setup, you probably need to! 1. Use the Right Number ✅ Signal won’t sell your number - but if you want to stay off the radar, use a VoIP or burner number: →

Signal Hardening Guide (2025)

You’re using <a href="/signalapp/">Signal</a>. That’s a good start.
But if you haven’t hardened your setup, you probably need to!

1. Use the Right Number
✅ Signal won’t sell your number - but if you want to stay off the radar, use a VoIP or burner number:
→
Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

Every Chromium-based browser failed the fingerprinting resistance tests on privacytests.org - except one: @Brave. It’s the only Chromium browser that blocks all fingerprinting vectors by default. And here’s the kicker: Chromium-based browsers already offer the strongest security

Every Chromium-based browser failed the fingerprinting resistance tests on <a href="/privacytests/">privacytests.org</a> - except one: @Brave.

It’s the only Chromium browser that blocks all fingerprinting vectors by default.

And here’s the kicker:
Chromium-based browsers already offer the strongest security
Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

“By uploading to YouTube, you grant us a worldwide, royalty-free license to create derivative works and use your content in connection with our business (and our affiliates).” That’s straight from YouTube’s terms of service. We’ve handed Google the keys to do whatever they want