Back

The 'untouchable hacker god' behind Finland's biggest crime

176 points21 daystheguardian.com
nerdralph21 days ago

Julius Kivimäki was released pending the outcome of his appeal. https://www.bankinfosecurity.com/finnish-vastaamo-hacker-fre...

The article cites "Ryan" as one of his aliases, so the id ryanlol commenting in this thread could plausibly be Kivimäki.

mmooss21 days ago

Could plausibly be, but there are many people using the name 'Ryan'. Maybe this one saw an opportunity to troll everyone.

ceroxylon21 days ago

I find it strange to report on a hacker releasing personal information, while building the narrative of the story with all of the personal details like "she’d had three children by the time she was 25, including twins who had been born extremely prematurely in the 1980s, weighing only a few hundred grams each", "crumbling marriage", and suicidal ideations.

I thought the whole point is that they were upset that their personal life was being broadcasted to the internet.

mmooss21 days ago

Maybe they agreed to those details being published.

SG-21 days ago

probably because the secrets released were much more confidential and serious than that?

Faark21 days ago

Also consent.

Wait for the other person to do so willingly seems kinda good advice in many areas.

bitbasher21 days ago

Wasn't he the guy that used tar for the leaked folder of data, but the tar included his user folder which contained his legal name?

Hamuko21 days ago

Yes, the tar command claims another victim. Tested while inside /var/www/html/vastaamo and then stuffed it in the crontab.

  $ tar cvf /var/www/html/vastaamo/vastaamo.tar . -C /var/www/html/vastaamo --exclude vastaamo.tar
For reference:

  -C, --directory=DIR
         Change to DIR before performing any operations.  This
         option is order-sensitive, i.e. it affects all options
         that follow.
shellac21 days ago

It's in the article. Not sure it had his name, but certainly his family name since he looked for records concerning his relatives.

ryanlol21 days ago

The queries appear to have been looking for me specifically, filtering by date of birth. That wouldn't be a good way to find my relatives.

Eldt21 days ago

Damn, some other group trying to cause trouble for you?

+1
ryanlol21 days ago
bitbasher21 days ago

Ah yes-- I first heard of this via an entertaining video about it, "One Drunken Mistake Destroyed Finland's Scummiest Hacker", see below.

https://www.youtube.com/watch?v=pyCcvPfT_jU

ryanlol21 days ago

The big problem with this video is that it's basically entirely based on google translated tabloid articles.

The results are what you might expect if you decided to just use dailymail.co.uk as a source, similar to the creator of malicious trojan virus Python being arrested https://www.dailymail.co.uk/news/article-2124114/Computer-ha...

>Pearson coded trojan viruses, called Zeus, SpyEye and Python, to automatically scour the internet in search of personal details.

+1
pizzalife21 days ago
ryanlol21 days ago

No, that did not actually happen.

snet021 days ago

What did happen, then?

ryanlol20 days ago

Someone else leaked a copy of a shared throwaway VM used for hacks. Akin to https://www.thc.org/segfault/, but longer lived and potentially tens of people with access.

The leaked home folder data doesn't really tie that VM to anyone, which is natural given that it seems to have mostly been used to run headless hacking tools and inspect their output.

The idea that I'm linked to this VM comes from the ridiculous idea that lazy hackers would not share SSH key files in order to control access to groups of virtual machines. I.e. if a SSH key fingerprint is at one point tied to me, that key must also still belong to me even when used from a internet connection belonging to another person in another country with a similar track record as me.

In court we had long debates about whether or not hackers could actually be so lazy as to violate best practices by sharing private key material, the lower court rejected such an idea as incredible and found me guilty.

Agraillo21 days ago

Knowing the timeline of events and the nicknames attributed to him (ryanlol included), some interesting posts can be found. For example, in the period between the CEO starting communication (September 2020) and the clinic's public admission (October 2020) [1], ryanlol replied to a top comment (Oct 3, 2020): "If you’re a hospital or, say, a school district, 'never pay' is simply an unconscionable attitude" [2]. Isn't it a hacker raging at the management that refuses to pay?

[1] https://en.wikipedia.org/wiki/Vastaamo_data_breach#Backgroun...

[2] https://news.ycombinator.com/item?id=24672687

ryanlol21 days ago

>Isn't it a hacker raging at the management that refuses to pay?

Nope

Agraillo21 days ago

No more questions, Your Honor. Forgive my joyful attitude, but it was your choice to participate in this discussion. As you know from your years and thousands of posts, HN threads are often ephemeral and short-lived - and this one is no exception. Or maybe not... because of your active self-defense posting here, I assume for the first time since the arrest. Now dozens of fellow (HN) hackers are querying your nicknames on Google, Algolia, and whatever else they have at hand. I'm not sure they'll find someone who genuinely fights for a more secure world. Or prove me wrong if you wish.

NedF20 days ago

[dead]

huhkerrf21 days ago

> "Unfortunately, we have to ask you to pay to keep your personal information safe.”

I can't put my finger on why, but the faux "aw shucks, our hands are tied" makes me even more pissed off by the fact that they're leaking people's therapy notes. Just come out and say you're an amoral money seeker.

tetha21 days ago

I'm a broken record about this by now, but stories like these keep reminding me how broken the law is for ethical hackers in Germany. If an ethical hacker found something like this in Germany, it would from my knowledge not be clear if entering an empty password counts as "circumventing or breaking a security barrier". "No password barrier" has recently been clarified in courts, but "Static Password" hasn't.

And once you break a security barrier, you're breaking the law. Even GDPR doesn't help you there - that just ensures more people are breaking different laws. And this can get all your devices seized, land you in jail, end your career, cause thousands of Euros of equipment loss, because the new laptop naturally got lost in the return process after 6 - 12 months.

And thus, many people with the skill to find such problems and report them silently to get them closed do ... nothing. Until bad people find these holes and what the article describes happens. And Europe has hacker groups who could turn our cybersecurity upside down in a good way. Very frustrating topic.

formerly_proven21 days ago

Hard-coded, publicly available credentials are criminal to circumvent in germany. See https://www.heise.de/en/news/Modern-Solution-Court-of-Appeal... which is now settled, since the appeal was rejected. https://www.heise.de/en/news/Federal-Constitutional-Court-re...

> At the end of the trial, however, this had little impact on the verdict. The presiding judge stated for the record that the mere fact that the [publicly available] software had set a password for the connection meant that viewing the raw data of the [publicly available] program and subsequently connecting to the [publicly available] Modern Solution database constituted a criminal offense under the hacker paragraph.

Yes, taking publicly available data verbatim (no ROT13, nothing) and talking to a publicly available server on the internet can in fact be a criminal offense.

tetha21 days ago

Thank you for providing an example that is exactly showing how messed up this is:

> Der Vorsitzende Richter gab zu Protokoll, dass alleine die Tatsache, dass die Software ein Passwort für die Verbindung gesetzt habe, bedeute, dass ein Blick in die Rohdaten des Programms und eine anschließende Datenbankverbindung zu Modern Solution den Straftatbestand des Hackerparagrafen erfülle

> The Judge gave to protocol that just the fact that the software requires a password for the connection, implies that a look at the raw data of the program and a subsequent database connection is considered hacking.

So yes, entering an empty password can cause all of your electronic devices in all your registered residences to be seized as evidence.

Note that the decompilation is on the complexity level of "strings $binary".

deaux21 days ago

Germany is the most contradicdory country I know of, and such a huge warning flag to anywhere else. For decades, half of children's education has been spent on hammering in "Never Again". Surely there are two huge lessons to learn there: 1. Do not judge the value of people based on their biological characteristics they were born with 2. "I was just following orders" is not an excuse, and one needs to instead do what is right regardless of protocol.

There is no European country which does a worse job at both of these. Germany is easily the number one country in the world for "protocol is everything". It doesn't matter how detrimental and damaging the rules are, the rules are the rules, and they must be followed. This case is the millionth example. The rules are interpretable as it being illegal to access data with a publically available password using this password, so we're going to apply them, despite it being patently absurd. For the first point, German's reponse to Gaza (the slowest in all of the West) said everything.

tetha20 days ago

> The rules are interpretable as it being illegal to access data with a publically available password using this password, so we're going to apply them, despite it being patently absurd.

I very much agree. I do think that this kind of ethical hacking should have a legal framework around it, to protect both sides during such an access. But this should be more on the basis of responsibly minimizing access to protected data as well as minimizing foreseeable damage.

For example - running a select on a database may show you private and protected data, but if this is done to validate a problem, fine. Start digging for data on specific persons? Touch something called "Pump Controls"? This would however require technologically competent judges, and those are rare.

As I said, a frustrating topic and it will become very interesting if a hostile state starts pushing on this.

fh97321 days ago

German government and courts are as opportunistic as everywhere else. German government ignores EU laws (ex: water protection), its own courts (ex: air pollution court orders, time record keeping for teachers) and worker protection (ex: false self employment of music teachers).

bigiain21 days ago

"the patient records database was accessible via the internet; there was no firewall and, perhaps most egregiously, it was secured with a blank password, so anyone could just press enter and open it"

There _should_ be a bunch of people in jail for that. Including, but not limited to the CEO. It should also include all the people on the org chart between whoever set that database up and the CEO.

jruohonen21 days ago

Indeed, the CEO was held criminally liable, but the charges were dropped in a higher court just recently. From the article:

"In April 2023, Tapio was found guilty of criminal negligence in his handling of patient data. His conviction was overturned on appeal in December 2025. (He declined my requests to interview him.)"

More specifically, he was charged of a data protection crime (i.e., note that in Finland these GDPR-like things are also in the criminal law). However, based on local news, I suppose there was not enough evidence that it was specifically a responsibility of a CEO or that CEO-level gross negligence occurred.

justincormack21 days ago

According to this report [1] the appeal was about specific requirements like encryption, and he claimed he had delegated it. So it is clear that it is hard to actually hold people responsible.

> The appellate court rejected the prosecution's argument and dismissed all charges. In its unanimous decision, the court stated that neither the GDPR nor the applicable Finnish healthcare legislation required encryption or pseudonymisation of patient data at the time in question.

> Prosecutors alleged that Tapio knew about the March 2019 breach and failed to act. They claimed he neglected legal obligations to report and document the incident and did not take sufficient steps to protect the database. Tapio denied the claims, saying he was unaware of the breach until autumn 2020 and had delegated technical oversight to external IT professionals.

> The court found there was no clear legal requirement at the time obliging Tapio, as CEO, to take the specific security measures cited by the prosecution. These included firewall management, password policies, access controls, VPN implementation, and security updates.

> According to the ruling, the failure to adopt such measures did not, in the court’s view, constitute criminal negligence under Finnish law.

> Tapio’s conduct during and after the 2019 breach did not meet the threshold for criminal liability, the court concluded.

[1] https://www.helsinkitimes.fi/finland/finland-news/domestic/2...

blell21 days ago

No, it’s just that it’s crazy to hold the CEO liable for absolutely everything that can go wrong.

+1
louthy21 days ago
+1
nkrisc21 days ago
HighGoldstein21 days ago

Is it sane to reward them for almost absolutely everything that goes right? Because that's the status quo for this position.

butvacuum21 days ago

Privatize the gains and socialize the losses. egh?

fifilura21 days ago

The CEO is responsible for ensuring that there is a routine for security.

If that is not created -> CEO responsibility.

If that is not followed -> top level mgmt responsibility.

And so on, further down the chain.

wolvoleo21 days ago

Well this is why they get paid so much isn't it? Because they carry the responsibility.

IshKebab21 days ago

It's normally the company directors that are personally liable.

bn-l21 days ago

So who?

raverbashing21 days ago

Funny whenever people complain about the GDPR here they're thinking they would be slapped with a €20Mi fine and that EU team 6 is going to parachute in their office and arrest everyone

So they're saying this is not the case?

alibarber21 days ago

Well, not for public bodies at least: “ Administrative fines cannot be imposed on public organisations, such as the government or state-owned companies, municipalities and parishes” [1]

But luckily this sort of thing never happens in the public sector. Except for when it does: https://yle.fi/a/74-20094950

[1] https://tietosuoja.fi/en/corrective-powers

+1
raverbashing21 days ago
jimmaswell21 days ago

The law is written such that they could do all that to a small family business that forgot to delete their Apache logs, which isn't good and leaves room for abuse even if they pinkie swear it's only meant for big violations.

interactivecode21 days ago

Only after informing you, giving you the opportunity to fix things and many many other steps. The harshness is directly related to the size of the company and the companies willingness to fix any issues. They want companies to comply.

raverbashing21 days ago

Reading the words and interpreting the law in its wider legal context are two different things

jruohonen21 days ago

> So they're saying this is not the case?

Yes it was. The company was fined 20M EUR on standard GDPR-basis and went bankrupt (but unlikely due to the fine alone). Please re-read the above discussion.

+1
Stagnant21 days ago
reactordev21 days ago

Exactly, was it a burglary when your front door is open, lights on, spotlights on your wall safe, with the keys still inserted?

The CEO should be in prison.

bryanrasmussen21 days ago

>Exactly, was it a burglary when your front door is open

Legally speaking, yes in every place I've ever lived if all those things are the case it's still a burglary, although the cops may call the victim an idiot.

expedition3220 days ago

Also the insurance company doesn't pay out if they can prove you did not lock the doors.

quietbritishjim21 days ago

In the UK, there is no crime "burglary".

"Breaking and entering" it's a criminal offence, and walking through an unlocked front door back door doesn't count. If you are on someone's land but didn't have to break in then that's trespass, which is just a civil offense.

Theft is a crime in any case (indeed even if you're not on their land e.g. snatching a phone off the street).

+1
9JollyOtter21 days ago
wulfstan21 days ago
+1
bryanrasmussen21 days ago
pxc21 days ago

> The CEO should be in prison.

Yes.

> Exactly, was it a burglary when your front door is open, lights on, spotlights on your wall safe, with the keys still inserted?

The thing isn't just the discovery of the "open door", though. Thousands of people were extorted in a pretty heinous way. Even if we say breaking in took little sophistication or effort, what was done with the data also matters.

9JollyOtter21 days ago

Yes. Similarly, If I leave my car unlocked with the keys in the ignition, and someone takes it is still a crime. It might be unwise to do that (depending on where you are), but nonetheless it is still crime.

prhn21 days ago

Technically, yes it is still burglary.

It's an odd position to take, that a crime was not committed or the offense isn't as bad if the difficulties of committing the crime have been removed or reduced.

kryogen1c21 days ago

> odd position [...] offense isn't as bad if the difficulties of committing the crime have been removed or reduced

Not really, intent is a part of the crime. If the barrier for crime is extremely small, the crime itself is less egregious.

Planning a robbery is not the same as picking up a wallet on the sidewalk. This is a feature, not a bug.

reactordev21 days ago

This. 1000x this.

Yes, it’s still wrong to take things but the guy should get like community service teaching white hat techniques or something. The CEO should be charged with gross negligence, fraud, and any HIPPA/Medical records laws he violated - per capita. Meaning he should face 1M+ counts of …

prhn21 days ago

What does "the crime is less egregious" even mean?

Morally, you burglarized a home.

Legally, at least in CA, the charge and sentencing are equivalent.

If someone also commits a murder while burglarizing you could argue the crime is more severe, but my response would be that they've committed two crimes, and the severity of the burglary in isolation is equivalent.

reactordev21 days ago

Now, how do we apply that to today’s current events?

Is it still a crime if the roadblocks to commit the crime are removed? Even applauded by some? What happens when the chief of police is telling you to go out and commit said crimes?

Law and order is dictated by the ruling party. What was a crime yesterday may not be a crime today.

So if all you did was turn a key and now you’re a burglar going to prison, when the CEO of the house spent months setting up the perfect crime scene, shouldn’t the CEO at least get an accomplice charge? Insurance fraud starts the same way…

djohnston21 days ago

It's a common attitude with people from low-trust societies. "I'm not a scammer - I'm clever. If you don't want us to scam your system why do you make it so easy?"

+1
kyboren21 days ago
+1
reactordev21 days ago
rzmmm21 days ago

Someone presented a hypothetical scenario: What if a hacker would write a virus, which breached a totally unprotected database after the hacker has passed away. It's clear that the therapy provider is at least partially responsible.

reactordev21 days ago

Posthumous crime is the ultimate because the legal system is all about punishing the living until they are dead.

+1
divan21 days ago
NoboruWataya21 days ago

Is it still assault if the guy is just standing there, within punching distance, without even wearing a helmet?

reactordev21 days ago

Does he have a flag?

lifetimerubyist21 days ago

Yes it absolutely is still a burglary. Classic victim blaming.

reactordev21 days ago

Who’s the victim? The CEO? I think the patients are the victims here.

+1
lifetimerubyist21 days ago
aitchnyu21 days ago

Yup, I heard of an ERP full of microservices and many endpoints dont check authorization at all and the auth mechanism doesnt check valid user credentials. Seems like they are very common.

tclancy21 days ago

Still reading the story but just hit that line and came here to snarkily post, “another MongoDB success story”. I should probably talk to my therapist about this desire to be seen as funny.

tclancy21 days ago

Having now read it, the CEO did get convicted.

yencabulator19 days ago

FYI: Finnish "social security numbers" (really, personal identification number) are not in any way secret. They are not used like U.S. social security numbers.

Finnish personal identification number is your date of birth, a sequence number, and a checksum.

imalerba21 days ago

There's a nice episode from darknetdiaries about it https://darknetdiaries.com/episode/159/

ryanlol21 days ago

Unfortunately that relies on Joe Tidy as the source.

I tend to refrain from being overly critical of journalists who write about me, but Joe Tidy is a special kind of idiot who wrote an entire book about me based mostly around interviews of people who aren't actually the people they claim to be.

snet021 days ago

Is there a perspective or analysis that you've read that does a good job, in your opinion?

ryanlol20 days ago

I doubt such a thing exists, it's a difficult world for outsiders to penetrate.

I don't think we'll ever get to see it, these stories get less and less relevant as time passes.

abigail9521 days ago

Do we really only catch the laziest hackers? The opsec is shocking.

ryanlol21 days ago

>The opsec is shocking

If you choose to blindly believe what the prosecution claims, sure.

itintheory21 days ago

You're the guy in the article? Could you elaborate and share more of your side of the story?

ryanlol21 days ago

I am indeed the guy in the article. My side of the story is fairly boring, didn't do crime but got blamed for it anyway by desperate cops. The whole investigation has been bizarre, for example, no-one has ever searched my homes, or even attempted to seize my personal devices.

Should find out within the next couple of months if the appeals court decides to acquit.

iberator21 days ago

Wow. That's why I love HN. :)

+1
itsameputin20 days ago
abigail9520 days ago

This is worse than the SBF denial, do better, post a full on substack about how they didn't link you to a bitcoin address.

ryanlol20 days ago

A LLM chatbot trained to deliver and debate the denials might be more on trend?

+1
abigail9519 days ago
sammy225521 days ago

Yes

cedws21 days ago

He’s done less than seven years of time, shows no remorse and even denies doing it in the first place. You dropped the ball on this Finland, don’t be surprised when he does it again. What a disgusting human being.

TrackerFF21 days ago

I'd bet good money that this dude has some sort of antisocial personality disorder, and really can't be "cured", so to speak.

Something tells me he'll try to sneak out of Finland (which is easy due to Schengen), purchase a new passport, and leave Europe.

I guess a silver lining here is the possibility that he'll commit crimes in countries with far harsher penalties than Finland.

I've lived in Finland myself, and currently live in Norway. Lax punishments for the sake of rehabilitation is the standard, and I'm fine with that. But some people, like this one, simply can't be rehabilitated.

ryanlol21 days ago

>I'd bet good money that this dude has some sort of antisocial personality disorder, and really can't be "cured", so to speak.

I'm happy to take you up on this, but I feel like the stakes will need to be pretty high to justify all the effort involved.

>Something tells me he'll try to sneak out of Finland (which is easy due to Schengen), purchase a new passport, and leave Europe.

Why would I do that? I hold a valid Finnish passport, haven't had any trouble entering or exciting Schengen zone lately.

expedition3221 days ago

Harsh punishment doesn't change anything. Criminals are just stupid, mentally ill or in the most sad cases kids.

In my country they actually do put away people for life and yet we still have crime.

nephihaha21 days ago

Some criminals are neither stupid nor mentally ill. I suspect this man is neither although he could be a psychopath.

+1
cluckindan21 days ago
expedition3220 days ago

Being a psychopath is a mental illness. And yes everyone who is a criminal is stupid- career criminals all spend years of their lives in jail and many of them get shot.

I will never forget that story about a big drug dealer who retired and was assassinated in Thailand by a few kids on a motorped.

raverbashing21 days ago

Yeah they shouldn't be surprised if someone solves this outside the legal system

nephihaha21 days ago

Well, we keep hearing that the Nordic Countries are the happiest on Earth. (Which I don't buy even if they do get some things right.)

cindyllm21 days ago

[dead]

ryanlol21 days ago

So, would it be better if I feigned remorse for a crime I didn't even commit in the first place?

bilegeek21 days ago

> he had not only accidentally uploaded all of the therapy notes, but also his entire home folder

Lol. At least it's a good reminder about bad opsec.

throwalol32121 days ago

Is this the same ryanlol that hacked Linode and had beef with them over some bitcoins that Linode stole from him?

MonkeyClub21 days ago
jvdvegt21 days ago
p1anecrazy21 days ago

The Guardian doesn’t have a paywall

mkl21 days ago

In some circumstances it has a registration wall. I recently ran into it on one of my computers, and it prevented me from reading some articles until I removed the modals with browser devtools. Stupid and pointless, and just pushes people away or towards workarounds like archive.is. I've given The Guardian money in the past but I don't have or want an account.

pixelpoet21 days ago

Just because you immediately clicked "yeah sure sell all my data so I don't have to pay" doesn't mean it's not paywalled, please be a little more discerning.

rpdillon21 days ago

There's no button that says that.

jvdvegt21 days ago

It does. I pay with money (eg I'm forced to pay for a subscription) or ads (I'm forced to pay with resources)

maqp21 days ago

As per (AFAIK) this hacker's rant on some Tor-based image board, he gloated the login credentials to the Vastaamo's systems were admin:admin. So much for 'hacker god'. This is a Hackers (1995) tier vulnerability. Also, it's sickening that YOLOing security to this extent is even possible in 2020s.

thunderfork21 days ago

Wild that the CEO got acquitted on appeal.

TrackerFF21 days ago

I've said it before, but these types of malicious hackers should face draconian punishment. Decades behind bars.

nephihaha21 days ago

I have seen therapists in the past, but never over video calls, and the notes have been kept on paper. Sometimes in person is much better.

This rush to put everything online will destroy everyone's privacy even though privacy is the thing we all need.

PlatoIsADisease21 days ago

This isn't a great solution, but it has helped me forgive myself, maybe it can be a trend in the future: You didn't pick your DNA, you didn't pick your environment. (Determinism in a nutshell)

The bad things that happened to you, and the bad thing you did, should be seen as somewhat outside our control.

I think of my worst google searches (nsfw stuff) and think: "Well, I'm just a chemical reaction."

But then again, I read the book A Billion Wicked Thoughts and found I'm pretty vanilla, we just don't talk about these things out loud.

Maybe my life is tame, but even when I hear from other people, everything seems pretty reasonable.

I know this is an 'after the fact' fix, but its a tool for our toolbox. We could look at people who criticize us as people who are ignorant of Determinism. (But we still need mechanisms to deter bad behavior)

cindyllm21 days ago

[dead]

cindyllm21 days ago

[dead]

777733221521 days ago

This is why you should not go to a therapist who uses electronic records. This will happen to you at some point.

snet021 days ago

Or: this is why you strictly regulate the storage of confidential/private/sensitive information.

There were multiple failures here, but a single step could've prevented the entire hack: industry-standard encryption of the sensitive information.

777733221520 days ago

If someone can access it remotely, a sophisticated bad actor can too.

Nextgrid21 days ago

You could use a fake name/address? That would make it hard to trace back the records to you should they leak.

ddtaylor21 days ago

I think most people are not seeking therapy and even fewer are seeking therapy under hostile conditions.

nephihaha21 days ago

Basically the whole model of Better Help.

777733221521 days ago

Any insurance covered therapy in the US. And assume any private practice that does not explicitly state they do not electronically store session notes.

Apart from therapy, I expect a lot of sensitive and private information to be hacked and released in the next 10 years. Most importantly, all non securely encrypted text based communications.

nephihaha21 days ago

Which begs the question why this all has to be put in electronic form.

Using your face or fingerprint to unlock things, which anyone can steal. Many people even have their retinal scans stored in their opticians' databases which won't be secure either as biometric ID.

immibis21 days ago

I thought the model of Better Help was hiring people who are completely unqualified to be therapists and then selling them as therapists.

nephihaha21 days ago

Well, there's that too.

laweijfmvo21 days ago

i guess you should never use banks that use “electronics” either, right? just cash and paper records?

777733221520 days ago

Your bank transactions reveal a lot less than your inner thoughts that you told someone in confidence.

Hoodedcrow19 days ago

to be fair - kind of yeah. I do have a bank card, but minimize its usage for privacy reasons, mainly using cash. As for electronics - I do keep most of my data local and use OSes that don't upload them on their own.

And yeah, as the previous commenter said - those are not quite comparable.

u1hcw9nx21 days ago

[dead]

Revolution112018 days ago

[dead]

NooneAtAll321 days ago

[flagged]

adaml_62321 days ago

Ethically speaking it seems like you should not be accessing commercial news sites if you're not willing to pay in some way for the work of the people writing the articles.

What do you propose they do?

nottorp21 days ago

Source some ethical advertising.

1313ed0121 days ago

Show context-based ads instead of spying on people would be a good start. That should be the only form of legal advertising. It is for sure the only form of potentially ethical advertising.

I also pay to get past paywalls when a site has content I want to read, rather than try to sneak past using some dodgy mirror.

billy99k21 days ago

Like most hacktivists, he is selfish asshole that cares more about self gratification than the consequencesbof their actions.

AAAAaccountAAAA21 days ago

He's not a hacktivist at all, just a common extortionist.

sublinear21 days ago

"Jazz police are looking through my folders. Jazz police are talking to my niece. Jazz police have got their final orders. Jazzer, drop your axe, it's jazz police!"