Laitinlok
@Laitinlok@discuss.tchncs.de
- Comment on The FCC is expected to propose the return of Net Neutrality protections Oct 19th - Let’s hope they get it right 1 year ago:
Good
- Comment on Musk may have violated FTC privacy order, new court filing shows 1 year ago:
Jeez not wiping the server
- Comment on How an Encrypted Hard-drive Works 1 year ago:
One thing it should note that most Linux distros does not encrypt the boot volume
- Comment on What are the recommend changes to make iPhone more private? 1 year ago:
I suppose it’s easier to access the cloud storage than the phone given how secure the iPhone is and with lockdown mode, it’s even harder.
- Comment on What are the recommend changes to make iPhone more private? 1 year ago:
You know some people like to hack real people’s phone for fun
- Comment on What are the recommend changes to make iPhone more private? 1 year ago:
Ok
- Comment on What are the recommend changes to make iPhone more private? 1 year ago:
Yes Apple has their iCloud key, if you live in China, the key is controlled by the Ccp, potentially dangerous for abuse from lea, highly recommend not to use Apple devices if you live there.
- Comment on Threads' New Terms and Conditions Affects the Fediverse 1 year ago:
The thing they could do is block the servers of Meta or route to tor for anything sent to meta.
- Comment on Do eSIMs have any downsides from a privacy standpoint? 1 year ago:
The only thing it improves is data security which can in some extent resist against identity theft, financial fraud, etc. Does having an eSIM card improve my data security?
Yes, there are significant security benefits. An eSIM card cannot be stolen without stealing the phone, whereas removable SIM cards are sometimes stolen, and used in port out scams. That’s when identity thieves fraudulently swap stolen SIM cards into different phones to gain access to the victim’s calls and text messages. The thieves may then try to reset credentials and gain access to the victim’s financial and social media accounts.
For more information about SIM swapping, port out scams, cell phone cloning and subscriber fraud, see our consumer guide on cell phone fraud. www.fcc.gov/consumers/guides/esim-cards-faq
- Comment on What are the best zoom alternatives? 1 year ago:
Tutanota first use the user password to generate an AES key using BCrypt, that AES key is then used to encrypt the private key. The encrypted private key and hashed AES key is then sent to the server, hence the server does not store and know the private key and the hashed AES key is used to authenticate the user. It uses SHA256 for hashing, it’s safe because the hashing algorithm is one way only and not reversible, meaning you can convert the hash to the password but only the other way around the password can generate the hash, so even the server is compromised it doesn’t contain your password.
- Comment on What are the best zoom alternatives? 1 year ago:
Proton Mail uses PGP which depends on which cipher both recipient and sender, sharing PGP keys are also problematic. PGP doesn’t encrypt subject line but Tutanota does. Tutanota uses AES-128 and RSA-2048 for their encryption and uses AES-128 for external encrypted email which Tutanota and Proton Mail also supports.
- Comment on What are the best zoom alternatives? 1 year ago:
Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted for Proton Mail.
- Comment on Tutanota vs Proton Mail for daily use 1 year ago:
I use Tutanota instead of Proton Mail.
- Comment on Not so private room: Zoom’s AI privacy fiasco exposes how vulnerable we are to Big Tech's whims 1 year ago:
Zoom has e2ee but needs to be enabled
- Comment on My ISP has taken total control of my network 1 year ago:
Not worth the hassle, replace the stupid router with an openwrt one
- Comment on Privacy is a collective concern 1 year ago:
The DNA of a close cousin can in fact identify and hence DNA information is not just yours but your closest families.
- Comment on Are there „lawfirms“ that specialize on antitrust? 1 year ago:
Yeah
- Comment on Are there „lawfirms“ that specialize on antitrust? 1 year ago:
Well to those who thinks VPN helps with privacy may buy a VPN but a VPN alone cannot protect your privacy.