social media isn’t social. go out and meet people like a normal human being like we have done for thousands of years. get a jmp.chat number dedicated for randoms.
sounds like you want to use social media but dont want the guilt, so you made this post.
if you’re willing to go advanced for a bit of extra convenience, then install a mobile browser that has proxy support and proxify that web browser then dedicate the browser to the web version of whatever service you want to use.
More often than not, the best way to hide is to simply blend in with the crowds – this also encompasses one’s choice for a username. It is relatively simple to make a single throwaway account – just come up with a username, and off you go – however, if one makes throwaway accounts often, the task of thinking of a unique,...
According to Ortis, briefed him about a “storefront” that was being created to attract criminal targets to an online encryption service. A storefront, said Ortis, is a fake business or entity, either online or bricks-and-mortar, set up by police or intelligence agencies....
Tutanota was (at least) compromised from the moment that they were ordered by German courts to spy on anyone that they were ordered to. Including skipping encryption upon email arrival. Why the hell they are suggested in the privacy space after that just proves how retarded most privacy bros are.
you’re right about the IP thing. that’s a good clarification rather than just “spy”. i suppose it’s less dire than Tutanota not encrypting incoming mails if you use tor and vpn by default.
yeah basically it more or less proves that swiss privacy is a bit stronger in this case vs Germany.
on the proton encryption, i did know about this but does that apply to proton-to-proton, proton-to-NonProton, or both? if you have details on this let me know.
either way the fact that they dont makes me feel that proton is a similar honeypot to signal and telegram, where they make a compromise with the five eyes, to give them metadata even if actual contents are safe. metadata can be much more powerful than contents often times
in general email is just the worst protocol when it comes to privacy. sadly.
deleted_by_author
(Android) Sandboxed Apps with own VPN and Firewall? [solved]
Hi lemmy,...
What should be used for anonymous usernames?
More often than not, the best way to hide is to simply blend in with the crowds – this also encompasses one’s choice for a username. It is relatively simple to make a single throwaway account – just come up with a username, and off you go – however, if one makes throwaway accounts often, the task of thinking of a unique,...
Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement (www.cbc.ca)
According to Ortis, briefed him about a “storefront” that was being created to attract criminal targets to an online encryption service. A storefront, said Ortis, is a fake business or entity, either online or bricks-and-mortar, set up by police or intelligence agencies....
What custom uBO filter lists do you use? (kbin.social)
Title says it all. Do you use custom filter lists in uBO? If yes: Which ones?...
How Google, Facebook and others use our most personal secrets against us
technology@lemmy.world