[-] dngray@lemmy.one 4 points 5 months ago

Seems like a step up from "Covenant Eyes" with weirdo politicians sharing their porn habits with their children.

[-] dngray@lemmy.one 12 points 1 year ago

It's probably also media's fault for this. They only publish when a bad person does a bad thing on the internet with it, not all the millions of users who don't do bad things. That would be boring.

[-] dngray@lemmy.one 4 points 1 year ago* (last edited 1 year ago)

I know with standard setttings my isp see everything, but if i will use some encrypted dns what they will see exactly

Basically the same thing.

Encrypted DNS is not for privacy, it is for stopping someone from altering your queries basically, because normal DNS is not encrypted. Domains are exposed through other various methods we explain. Please see our website where we've gone to the effort to explain this https://www.privacyguides.org/en/advanced/dns-overview/ we have a flow chart that characterizes the above methods of obtaining the domains you're requesting.

[-] dngray@lemmy.one 5 points 1 year ago

Related thread here https://discuss.privacyguides.net/t/cromite-bromite-fork/13274 The main thing we find is Vanadium is not lagging behind upstream and it has hardening patches that a lot of other WebView implementations do not have. Whether you like a to "contribute to chromium based market share" you'll have a WebView implementation on your Android device used by apps you use. It's also worth noting that per site isolation doesn't seem to be a thing on Android for non-chromium browsers.

[-] dngray@lemmy.one 5 points 1 year ago

I am sure that Tutanota does not use any custom encryption algorithm. It is clearly stated in the FAQ that they use RSA (with PFS) and AES to encrypt emails exchanged between Tutanota users. https://tutanota.com/encryption

These are only primitive algorithms, the actual implementation is custom and specific to Tutanota, which mean it will only work with Tutanota as nothing else will implement it.

There is no way to do key distribution outside of Tutanota's service.

[-] dngray@lemmy.one 35 points 1 year ago* (last edited 1 year ago)

Probably another point is that the encryption for Matrix/Element has undergone multiple audits, one in 2016 and another one of their newer rust library. Whereas telegram just has not. There was this also a not too long ago. MTProto is also used nowhere else, whereas a lot of encryption has been influenced by the Double Ratchet which is well understood.

The other thing worth noting is that Matrix is the foundation for other products which many governments use for secure communications.

[-] dngray@lemmy.one 11 points 1 year ago* (last edited 1 year ago)

I certainly think so.

Even Windows or Chrome OS, provides quite a bit of "control" it's just that a lot of it is "opt out". Google does, for example record what YouTube videos you look at against a logged in account by default. Windows does have targeted advertising enabled by default.

I think privacy is really more about what you do on such platforms. If you use products (sites) that clearly have bad policies in regard to privacy then no OS is going to provide really all that much improvement.

[-] dngray@lemmy.one 5 points 1 year ago

keep in mind that uses the same method as adb pm uninstall which doesn't actually remove it from the system image, just the current user profile.

[-] dngray@lemmy.one 12 points 1 year ago

Just a reminder, we specifically recommend against Garuda due to their unsafe usage of Chaotic-AUR.

[-] dngray@lemmy.one 43 points 1 year ago

VPNs are still worth it for that purpose, particularly torrenting.. Not sure who is saying this but they are wrong.

[-] dngray@lemmy.one 7 points 1 year ago

Proton still has it with NAT-PMP which requires the use of py-natpmp on Linux.

There are other providers but these generally don't meet our requirements as they don't have open source clients or have no audits or are generally not as trustworthy.

WIndscribe also has ephemeral port forwarding and we are looking at adding that some time. Audits have now been completed and they are refactoring some iOS code, then it will be good to go.

[-] dngray@lemmy.one 4 points 1 year ago

They still disable CRLSets and have binaries built by "contributors" not in an automated fashion by the developer themselves.

1
view more: next ›

dngray

joined 1 year ago
MODERATOR OF