- cross-posted to:
- privacy@lemmy.dbzer0.com
- cross-posted to:
- privacy@lemmy.dbzer0.com
I know there are plenty of software missing from here. This is just a fun infographic I made, no need to take it seriously :)
I don’t undurstand how Graphene can bigger than Linux on this list.
Pretty sure banks have a pretty good track record of “keeping your money safe”. Why the fuck would anybody trust banks to keep their money safe if they can’t keep your money safe?
I don’t really understand why that statement is even on there?
Unless you mean to argue some anonimity point, which I could agree with considering e.g. Monero would be more anonymous than a bank.
But safe? I’d say the bank is quite safe to store money.
Money in the bank can be seized and frozen for all sorts of reasons. If you’re in the USA, then police can charge your money with a crime even if you haven’t broken any laws. It’s safe until it’s not.
Banks keeping your money safe depends on what country you live in and how much its government has regulated them and/or provided some sort of backup in the case of a run or the bank going out of business.
What anubis has to do with privacy or security?
Nothing, op confused anti AI with anti tracking.
It stops bots from crawling your sites.
It’s not about what you use, but how you use it. PEBCAK Almost 100% privacy and security is offline at home, reading a book, if you bought the book with cash and not online and/or with credit card.
You can use Google, Microsoft, Apple and co however you want, the problem is, what you use
iOS is actually secure
Cool and who validates the code base for security vulnerability? And sends tons of packets related to tracking back to there servers?
Are you interested in a bridge?
But you do know that Tor/VPN is not really privacy, nor security? It hides your IP, but that’s about it. If you still login, and give any information, and that could just be your “fingerprint” you are not anonymous…
VPNs know who you are and what websites you visit, so no privacy nor anonymity there. With Tor… It’s complicated. That’s why we have guides like this: http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec.
crypto currency
Well, unlike Bitcoin, Monero is actually anonymous, and sometimes you gotta make payments online.
You can’t do it privately with your card.
Bitcoin’s Lightning Network has onion routing for privacy, like Tor.
When Bitcoin had a bug that allowed some guy to give himself a bazillion bitcoin, it was detected and patched before he was able to sell them. When Monero encounters a similar bug, it will only be detectable by the price going down.
This is the correct initial reaction but given the extent to which the US monitors every single transaction everyone makes, it’s getting awful hard to manage the influx of feral hogs without having them streaming through your door.
I have this bad gut feeling about Signal and Proton, I have no evidence tho.
Maybe it’s because the current administration uses signal to plan acts of war and proton’s ceo is supportive of said administration.
They don’t use Signal though. They use a clone called TeleMessage Signal which logs and archives all their messages on an Israeli server, and which a hacker was able to access before the service was suspended.
You can’t really help if someone forks and misuses software.
Some of those mentioned likely are compromised, but cannot figured out which. The thing, is to diversify our risk and the privacy minded to use different platforms (Proton VPN and Mullvad VPN for instance).
The good news, is that if an agency is compromising something, they will likely won’t use the intel gathered in court cases in order to leave it open to future prey, so that is good for vast majority of users. The very few that are relevant enough should not trust even the genuine privacy tools and resort to enhanced methods and combining methodologies.
My impression, and just impression, is that I would trust **Tuta **more than Proton (and not because Proton’s CEO that many interpreted wrong anyways) On VPN… a tad more trust on Mullvad. Signal, I would not use it for high stakes communication but OK for most people. GrapheneOS seems okay and we know for sure it does not leak info on a daily basics, but we have to be careful, it could have an obscure code dormant waiting for a trigger or could easily send data to an unsuspected server, Ironically, if I were Snoden, I would feel more comfortable using a Huawei Mate with HarmonyOS than a Pixel 9 with GrapheneOS… of course China spies too massively, but it has far less beef with Snoden than the US does, therefore not of much interest to Beijing.
Remember that overwhelming majority of FOSS goes without any audit, let alone a comprehensive one. This is what some trusted party should put AI checking ASAP all the FOSS out there!
Very interesting insights. Funnily I use all of the services you cautiously recommend, including GrapheneOS, but not HarmonyOS, hard pass on that one. As a German I am also legally required to prefer Tuta. :) I still have that OG 1€/Month contract.
Edit: Your last point is a good idea, although I think the more popular an open source app is, the less likely it is to be malicious. A lot more eyes on it and the xz backdoor was caught pretty much immediately.
“Tr0ub4dor&3 is my password for everything.”
math is always stronger than marketing
Well, usually not. Unfortunately.
Lineageos is good enough and runs on most devices.
And isn’t Nitrokey a blackbox? At least there are multiple Open Source implementations and some even sold as Open Hardware. Yubikey and so on.
Security isn’t the size of the app, it’s how you use it :)
Security isn’t the size of the app
This could have two meanings, one of which I figure I should address:
- If you mean “size of the userbase for an app,” then yes, even projects that fly under the radar are much more secure than “mainstream” options. That’s the main purpose of this infographic.
- If you mean “physical size of the app on the infographic,” the reason they’re different sizes is simply because they were hard to fit on one page, and this made it look nice ;)
I don’t think anyone thinks WhatsApp is secure
Yes, they do.
‘But it’s end to end encrypred’ 🙄
Same email for everything is fine if you use subaddressing. My email service, Port87, makes it super easy.
Any article or post of how embrace the use of some of those technologies?
Good question! There are hundreds of good resources, some of which include Privacy Guides and my friends at Punching Up Press (they have a lot of other good infographics). Naomi Brockwell TV is a YouTuber with some great beginner friendly videos to guide you step by step. Let me know if you’re interested in others!
Thank you :D I’m going to check those links this weekend.