privacybro
@privacybro@lemmy.ninja
- Comment on Signal details costs of keeping its private messaging service alive | TechCrunch 1 year ago:
another reason why centralization sucks and distributed/decentralized messengers should rise to the top over time.
- Comment on Google Resuming the transition to Manifest V3 - Chrome for Developers 1 year ago:
can someone refresh me on why exactly migrating to manifest v3 is bad?
- Comment on [deleted] 1 year ago:
lol, anarchist… funny
- Comment on [deleted] 1 year ago:
All of the suggestions here are good but I would not put too much stock in where you get your DNS from if your reasons are for privacy. If anything, using anything beyond your ISP’s DNS could decrease your privacy, because now you are giving info to 2 providers (DNS and ISP)
No matter what DNS server you use, your ISP can see every single IP you connect to and doing reverse lookups is extremely trivial for them of course.
My advice is to use a good VPN provider. Any reputable one will also provide its own DNS servers as well.
- Comment on Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement 1 year ago:
Really appreciate your thoughts and time, thanks.
I found out also that Tutanota is essentially the same, except that they do E2EE subject lines between tutanota users, but I am guessing that is because they don’t use PGP unlike Proton. In which case, Proton is in the right in this case because they are increasing E2EE interoperability beyond just their own users. So, my comment about honeypotting was really uncalled for I think, and I apologize for that.
The OpenPGP proposal is interesting, but I couldn’t find anything on it. All I found was this below, which explains that email headers can’t be/aren’t encrypted, and subject is one of those, so that’s why. I have no clue what Proton was talking about, or where they got that info
- Comment on Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement 1 year ago:
you’re right about the IP thing. that’s a good clarification rather than just “spy”. i suppose it’s less dire than Tutanota not encrypting incoming mails if you use tor and vpn by default.
yeah basically it more or less proves that swiss privacy is a bit stronger in this case vs Germany.
on the proton encryption, i did know about this but does that apply to proton-to-proton, proton-to-NonProton, or both? if you have details on this let me know.
either way the fact that they dont makes me feel that proton is a similar honeypot to signal and telegram, where they make a compromise with the five eyes, to give them metadata even if actual contents are safe. metadata can be much more powerful than contents often times
in general email is just the worst protocol when it comes to privacy. sadly.
- Comment on Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement 1 year ago:
False.
Proton can not be made to spy on customers most they can do is hand over info they already have
proton.me/blog/climate-activist-arrest
Proton’s encryption cannot be bypassed by legal order. Tutanota’s can.
- Comment on Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement 1 year ago:
Tutanota was (at least) compromised from the moment that they were ordered by German courts to spy on anyone that they were ordered to. Including skipping encryption upon email arrival. Why the hell they are suggested in the privacy space after that just proves how retarded most privacy bros are.
- Comment on How Google, Facebook and others use our most personal secrets against us 1 year ago:
Well said