privacy

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

possiblylinux127, in *privacy not included | Our Longest Naughty List Ever: The 2023 Holiday Buyer's Guide Is Here!

How about Firefox fake review detector or google search? I didn’t see those on the list.

otter,

theverge.com/…/firefox-review-checker-fakespot-fe…

Oh cool, didn’t know about this

possiblylinux127,

Its a privacy nightmare so be careful

NightOwl, in Facebook on separate device

I wouldn’t bother with the app. Log in through the website with lite apps.

JoeKrogan, in Facebook on separate device
@JoeKrogan@lemmy.world avatar

One option is a live CD or a VM and in this case you can restore the state after each session. In both cases only your IP, timestamps, browser details and everything you interacted with on the site is stored by Facebook. But no new hardware or cookies will be stored on your device as it is wiped each time.

ChillPill, in What's an easy to use matrix messenger for family and friends?
@ChillPill@lemmy.world avatar

Element? element.io

Yawnder, in Proton Mail CEO Calls New Address Verification Feature 'Blockchain in a Very Pure Form'

Why would knowing every single email be seen as something positive? Nice way to have spam-heaven. The keys also don’t need to be public. If you need something THAT secretive, there are safe ways to do a permanent key exchange.

wahming,

It’s not like we’re controlling spam today by keeping email addresses hidden.

Yawnder,

It’s not a reason to make it worse.

OmanMkII,

The public part of it would be the RSA pubkey, likely linked with an identifier such as the SHA-256 hash of the email. You could quite easily have that ledger public and it would take millennia to crack any of the emails, much easier to use fuzzing with common words and names than trying wasting computing power for a single email. The whole point of blockchain is that it’s an immutable public ledger which would actually suit this idea quite well.

Yawnder,

It’s trying to solve a problem that we don’t have. We don’t need any of that to be immutable.

chicken,

What do you think the problem even is? It sounds like you just don’t understand why someone would want to use public key cryptography to begin with.

Yawnder,

I understand how public-private keys work, and I understand why you’d want one. I just think this implementation of a register is bad. Not from a security risk, from a use case point of view; it’s for all intent and purposes an email which if ever compromised is forever compromised and non reusable. It’s an email that’s unrecoverable so not usable in many companies.

I’m sure there are other reasons to not like the idea, but that’s what I can think off the top of my head.

chicken,

I understand why you’d want one

It’s an email that’s unrecoverable so not usable in many companies.

It doesn’t sound like you understand why someone would want to do email with public key cryptography, it sounds like rather you do not like the idea of doing email with public key cryptography. Being unrecoverable is just the tradeoff there. Again, what do you think the problem described even is? For reference,

The issue, Yen said, is ensuring that the public key actually belongs to the intended recipient. “Maybe it’s the NSA that has created a fake public key linked to you, and I’m somehow tricked into encrypting data with that public key,” he told Fortune. In the security space, the tactic is known as a “man-in-the-middle attack,” like a postal worker opening your bank statement to get your social security number and then resealing the envelope.

I think if you actually acknowledge the problem of trust for propagating public keys as a real one that is worth being solved, it would be hard to argue that blockchain is a bad fit for that problem, because it is not. Trustless, verifiable propagation of data is one of the things it actually offers unique benefits for.

I’m sure there are other reasons to not like the idea, but that’s what I can think off the top of my head.

It might be useful to start by considering the idea itself and what it is saying, instead of looking for arguments to make against it.

Yawnder,

You’re not adding anything that wasn’t argued towards before. Soon or later, you have to trust something. There are ways to transfer keys by other means which you can use to corroborate.

The tradeoffs of this idea are just not worth it for 99% of the people.

chicken,

What are the tradeoffs, assuming an email encryption scheme based on self custodied private keys and publicly published public keys? I don’t see any major disadvantages to using blockchain for this, and significant advantages. It’s a big deal if no one can selectively remove/conceal previously published info. If associating a key with an email, and someone is trying to impersonate you, you’ll know it, it’s not going to be hidden from you and specifically shown to someone else. It just makes sense to do it that way. Yes, you have to trust something at some point, but this is a way to minimize how much trust you have to give.

hernanca,

I think the main pro of this system would be that it requires no trust. The immutability would be actually a con for privacy: if you’re burned or doxxed later, there would be hard evidence of your identity in the blockchain.

Yawnder,

Except the trust of the source of the blockchain, or some certificate authority somewhere at some point, but ya, that’s kinda assumed as there is no way of making a “first handshake” that’s secure.

For me, it all looks like someone is trying to make a product rather than solve an actual issue.

stardreamer,
@stardreamer@lemmy.blahaj.zone avatar

This is solving a problem we DO have, albeit in a different way. Email is ancient, the protocol allows you to self identify as whoever you want. Let’s say I send an email from the underworld (server ip address) claiming I’m Napoleon@france (user@domain), the only reason my email is rejected is because the recipient knows Napoleon resides on the server France, not underworld. This validation is mostly done via tricky DNS hacks and a huge part of it is built on top of Google’s infrastructure. If for some reason Google decides I’m not trustworthy, then it doesn’t matter if I’m actually sending Napoleon’s mail from France, it’s gonna be recognized as spam on most servers regardless.

A decentralized chain of trust could potentially replace Google + all these DNS hacks we have in place. No central authority gets to control who is legitimate or not. Of all the bs use cases of block chain I think this one doesn’t seem that bad. It’s building a decentralized chain of trust for an existing decentralized system (email), which is exactly what “block chain” was originally designed for.

Yawnder,

I’m glad there are authorities out there (like Google) that act as gatekeepers and track the worthiness of senders. Without that, there would just be no way to close the floodgates. Is Google the best company for that? It’s definitely one of the good ones for that.

No, you can’t forge emails easily as you say. Maybe DMARC isn’t perfect, but it works just fine. Attacks that bypass that are done on misconfigured systems, so human error, which can happen with any tech, the one from this post included.

Yes email is an old tech, but let’s not pretend like it hasn’t evolved. It’s not perfect, but it generally works. I don’t think you need to go fully decentralized, but some steps to have more than a single authority could be positive.

privacybro, in Trying to understand Michael Bazzell

i wish people would stop viewing this guy as someone who is a guru extreme online privacy.

Bazzell is good at one thing primarily, and that is Real Life privacy/hiding, when one’s adversaries on nongovernmental. that is his specialty and what he should be respected for.

Bazzell is not a huge expert in thwarting mass surveillance or thwarting nation-state adversaries in technology. otherwise he wouldnt be giving recommendations that involve closed sourced software or cloudflare lol.

He is a practical guy and knows enough to keep his clientele’s privacy for the types of adversaries he is accustomed to going up against (not nation state or federal gov)

Mikelius,

Agreed! I tend to see what he can offer on regards to privacy for real life stuff like home address, data broker scrubbing (his extensive lists I mean), etc. But when it comes to the technology portion of it, I go with what I prefer, albiet I still hear what he has to say in case he introduces me to something I didn’t know about before.

andruid, in ̶P̶r̶o̶t̶e̶c̶t̶ Obfuscate your content from bots and AIs

Can you create custom decryption keys? I like the idea of an easy to use encryption mechanism for non private platforms.

touzovitch,
@touzovitch@lemmy.ml avatar

What do you mean by non private platforms?

In this POC, you can only encrypt content using Redakt’s public key. That way you are guaranteed to see the content since the key is already installed in the extension.

I intend to add the option to encrypt with a custom sharable key in the v.2.

andruid,

Honestly even this platform, but any public platform without e2e and the direct choice of who to share it with.

mp3, in How can i delete my info from caller id apps ?
@mp3@lemmy.ca avatar

Sadly you need to reach out to the caller ID app developers and ask them to remove your info.

PowerCrazy, in ̶P̶r̶o̶t̶e̶c̶t̶ Obfuscate your content from bots and AIs

This is a cool proof of concept and pretty easy to adapt for almost any purpose not just text. I don’t think it’s “useful” but then again “usefulness” isn’t exactly well defined in the first place.

touzovitch, (edited )
@touzovitch@lemmy.ml avatar

Thank you 😊

I actually thought about this. Adapting the same approach with other kind of content like image, audio or video would be game breaker!!

Imagine uploading videos to Youtube that only viewers with a key would be able to understand!

But it is a challenge as it might require advanced knowledge in image and audio.

navi, in How can i delete my info from caller id apps ?

A pay to win method is using a service like Optery that you pay and they remove you from hundreds of data brokers, sometimes by hand.

noodlejetski,

and what does Optery then do with the data I provide them with while signing up?

RecallMadness, in Proton Mail CEO Calls New Address Verification Feature 'Blockchain in a Very Pure Form'

I’ll use it once they’ve sorted out CalDAV and CardDAV… it’s only been an open issue for eight fucking years.

synergy041,

Care to elaborate?

RecallMadness,

There’s no way to sync contacts and calendars between an iPhone (and other mail clients) and protonmail. The app does one way sync from the phone to protonmail, but not the other way round.

8 years ago a feature request was made to add support for CardDAV and CalDAV, but even with the release of bridge it’s not there.

So iOS users have to resort to using other calendar services, or 3rd party bridges to enable it.

backhdlp, in Most private app for Lemmy
@backhdlp@lemmy.blahaj.zone avatar

This is all opinions here, so I’m just saying that Sync is the only one I know that’s closed source.

root, in Most private app for Lemmy

I use Connect for lemmy. Doesn’t ask for any permissions.

psychhim,
@psychhim@mastodon.social avatar

@root @TrippingBalls Connect for lemmy: is it avaiable for android ?

root,
SimonSaysStuff, in Deciding between Fairphone 5 and Pixel 8

If privacy and security are your top priorities, which it sounds like they are, and you want a performance similar to OnePlus 8, go with the Google Pixel 8 with GrapheneOS. It’s more aligned with your need for strong app sandboxing and convenient Google services integration, etc.

barthol5280,

@SimonSaysStuff @nottheengineer seconded on the Pixel + GrapheneOS

pkill,

Though beware that although good in terms of performance, features and sturdiness (as long as you encase that glass back) or camera, Pixels are not flawless in terms of plain quality. Their battery life could be better and mine loses signal from time to time. Some features like 5G might not be available at every carrier in your country as well if Google has no official distribution there.

jack, in Most private app for Lemmy

Just don’t use anything proprietary like Sync or Connect

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #