What I typed up in my original Reddit post:


I’m trying to use pictures and footage in a way that’s not copyright infringement. I’m trying to take a note from Hbomberguy here. But of course, that may be impossible, I’m just not sure. Maybe it’s a high bar. Do YouTubers often check or give credit in their pictures?

I’m trying make sure I don’t get into trouble and remain ethical, take the moral path, so to speak. I have sources, at least. Maybe not full citations, but I talk about my sources in my book reviews. But the pictures and slides confuse me. Is there a way to cite them or do I just take them from Google images or some stock photo and use them? What about screenshoting some?

What about using footage or footage from other YouTubers? Stock footage? Or footage from another YouTube channel, like historical footage or black-and-white footage? Or, say, you wanted to use a gaming stream footage? I’m trying to cover my bases here.

I’m just trying to not get in trouble and remain respectful.

What are the ethics here?

Sorry, dumb questions, I know, but I feel that a clear answer is needed and Reddit gives me answers better than Google searches, though I am using those.


I didn’t get as many answers as I would’ve liked. I’m also looking for resources for stock imagery or footage or music. In addition, anything else I need. Maybe a website with free images? I don’t know, but anything I might be missing.

Cheers!

I am looking through Googel and Bing on this topic so I’m still doing my own research; this is just in case I’ve missed anything.

  • CarlMarks@lemmygrad.ml
    link
    fedilink
    arrow-up
    2
    ·
    11 hours ago

    Yeah email sucks, I don’t use it for anything requiring infosec.

    GPG is an open source encryption package, you can use it to sign / encrypt your emails and allow others to verify/decode them so long as they have a certain kind of one of your keys.

    Going into a forest to talk is legit. It leaves only one source of infosec risk: the people attending not being careful afterwards. As good as it gets! Of course this is not needed for fairly safe things unless your country is at risk of a harsh crackdown.

    2FA = 2 factor authentication. Like when sites make you put in a number texted to you after you provided your password. There are key-bases options that are more secure and offer a way to not use a phone number. An authenticator app can also work, after verifying it you pit in numbers as if they were texted to you but they come from an app. A physical device like a yubikey acts basically the same way but you actually plug it into yout phone or computer and it cryptographically verifies that it is the one you registered with the website.

    VOIP = voice over IP, a service for digitally calling people on the normal phone network.

    For infosec you always want a threat model. IMO the first threat is fascists and other creeps, i.e. don’t get doxxed. Using a totally separate account for something and not sharing personal info does this. The next is corporate-government spying which can amount to the same thing at first, as in, “oops we leaked all the names of pro-Palestinian organizers reom this Google Doc”. If the state turns even more internally fascistic they might even target all socialists, in which case you want a minimized digital footprint to decrease th3 chances of getting caught in their net - which is sure to be an incompetent process on the state’s part.

    Following the strats I’ve laid out would protect you from all 3 but are a bit of work.

    And of course, once targeted by the state, they will have little trouble tracking people down digitally. The third case is just for minimizing the chance if being targeted. We should all have real escape plans if things start moving fast.