[-] voxel@feddit.uk 3 points 2 weeks ago* (last edited 2 weeks ago)

I spoke to one of their team members and they said: "Regarding our SPL ("Security Patch Level"), typically our builds are made mid-to-end-of-the-month to include the newest SPL updates that trickle in from upstream (sometimes our updates are delayed to make sure they are integrated before we build). You should see the newest update made just at Christmas time includes the December SPL patches which weren't available when we made the earlier monthly builds."

[-] voxel@feddit.uk 4 points 3 weeks ago

It isn't really about detection, they just got a blocklist of domains. There is not much temp mail services can do. Using lesser known or self-hosted solutions usually helps.

[-] voxel@feddit.uk 3 points 3 weeks ago
[-] voxel@feddit.uk 3 points 3 weeks ago

Session is decentralized.

[-] voxel@feddit.uk 4 points 1 month ago

r/privacy is generally terrible from my experience.

[-] voxel@feddit.uk 4 points 1 month ago* (last edited 1 month ago)

uBlock Origin and uBlock Origin Lite (both browser extensions) have a similar feature :)

[-] voxel@feddit.uk 5 points 1 month ago

A trustworthy VPN provider is your best solution here. Mullvad, IVPN, and ProtonVPN are common recommendations in the community. I would personally recommend against Windscribe; it is privacy-friendly but has had major bugs repeatedly in the past. If you want to go experimental, check out NymVPN and Obscura (Apple platforms only).

[-] voxel@feddit.uk 5 points 1 month ago

No, that has changed since almost 3 years.

Source: https://www.waterfox.com/blog/a-new-chapter-for-waterfox/

Please verify before you accidentally spread misinformation.

[-] voxel@feddit.uk 5 points 1 month ago

What makes Chinese hardware more trustworthy?

[-] voxel@feddit.uk 4 points 1 month ago

Not all browser extensions are fingerprintable, only those that do by the website measureable differences to your browsing, which Snowflake, as far as I'm aware does not.

[-] voxel@feddit.uk 4 points 1 month ago

I think Tor with Tor Bridges (to obscure that you use Tor) is your best bet. Or using Tor over a VPN (using a VPN systemwide and then connect to Tor)

Everything else is just standard opsec, not leaking personal information and so on

Also, don't use a E-Mail address or phone number tied to your real information, like your name or IP address. Because that is how many people got caught in the past.

[-] voxel@feddit.uk 4 points 1 month ago* (last edited 1 month ago)

Your technical and legal understanding seems limited. I personally work in the IT space and am a hobbyist in legal matters, in particular data protection.

I'm pretty sure there was nothing they could've legally done to protect the payment information.

It's not a "bad look" for Proton; instead, it's just people being confronted with reality.

If you commit a crime, law enforcement will be after you, and if your operational security sucks, there will be no service that can counter that.

view more: ‹ prev next ›

voxel

joined 1 month ago