• 2 Posts
  • 70 Comments
Joined 1 year ago
cake
Cake day: May 31st, 2023

help-circle


  • 7heo@lemmy.mltoPrivacy@lemmy.mlYoutube is now unusable without a frontend
    link
    fedilink
    arrow-up
    2
    arrow-down
    3
    ·
    edit-2
    3 months ago

    This is the way. And I might add, Unix desktop. Let’s not start bikeshedding between FOSS Unix distributions out of dogmatic reasons (I’m sure you didn’t mean to specifically single out “Linux” here, but I wish we would stop opposing “Linux” and other Unixes like BSD, Illumos, etc).

    The point is, voting with your data for software that is defending your interests, and respecting your rights.

    Edit: Dang, I didn’t expect to get so much slack for “Unix as opposed to Unix-Like”. I absolutely meant “Unix-Like”, but my point is that it shouldn’t matter. Most software is trying to be compatible, these days, and Linux isn’t (in spite of all that marketing material) an OS. It is a kernel. So semantics for semantics, can it even be compared to something it is not? I merely tried to be inclusive.





  • https://simplex.chat/blog/20240314-simplex-chat-v5-6-quantum-resistance-signal-double-ratchet-algorithm.html

    messenger-comparison

    ¹ Repudiation in SimpleX Chat will include client-server protocol from v5.7 or v5.8. Currently it is implemented but not enabled yet, as its support requires releasing the relay protocol that breaks backward compatibility.

    ² Post-quantum cryptography is available in beta version, as opt-in only for direct conversations. See below how it will be rolled-out further.

    Some columns are marked with a yellow checkmark:

    • when messages are padded, but not to a fixed size.
    • when repudiation does not include client-server connection. In case of Cwtch it appears that the presence of cryptographic signatures compromises repudiation (deniability), but it needs to be clarified.
    • when 2-factor key exchange is optional (via security code verification).
    • when post-quantum cryptography is only added to the initial key agreement and does not protect break-in recovery.



  • This really is the best way. Once there’s a REASON for extra security, people understand and want to learn more.

    No one cares. Nobody around you understands the security, the need for it, and the requirements. They will pretend, to see your kid. And then immediately and completely stop caring. It works for making people adopt your favourite messenger, yes. But nothing else.


  • 7heo@lemmy.mltoPrivacy@lemmy.mlGetting People Onto a Good Messaging App
    link
    fedilink
    arrow-up
    111
    arrow-down
    4
    ·
    edit-2
    3 months ago

    I have two kids. I asked people to use signal to send and receive the photos. Asking people to follow your requirements only works for the direct immediate communication. The photos of my kids were sent by the recipients I sent them to (over signal) to other members of the family, over gmail (unencrypted), WhatsApp, Instagram, etc. I learned that years after.

    This was in direct violation of my express requests. When I confronted them, they played dumb.

    So, not to be a buzzkill here OP, but if you did this to get more people to use your messenger of choice, good job, it worked. If you did this so the pics of your kids stayed on safe apps, don’t fool yourself. They didn’t.





  • I found it here.

    Here is the (IMHO) relevant part (emphasis mine):

    If you use the App with an account hosted on a third-party server, then there are only a few cases where FUTO may learn any information at all about your use of the App.

    • If you have the App configured to use Google push notifications, then FUTO’s push notification gateway will be involved in delivering push notifications from Google to your device. Push notifications include information on the Matrix event that generated the push, including: the human-readable name and Matrix user identifier for the user who sent the event and the Matrix room identifier for the room containing the event. Users who desire a greater level of privacy can configure the App to use UnifiedPush instead of Google Cloud Messaging. When a user on a third-party server receives a UnifiedPush notification through their third-party push server, FUTO does not see the notification or learn anything about it.

    • If you obtained the App from the Google Play Store, and the App crashes, then we will receive a Firebase crash report.

    • If you sign up for our mailing list in the app, then we learn your email address.

    The notification should be UnifiedPush by default, and crash debug reports should be opt-in, not automatically sent out to the dev via Google… (I don’t think it is even possible to opt out)





  • That isn’t real. It wouldn’t pass peer review. Here is the actual code:

    function GetCookieValue(x) {
      return JSON.stringify(x);
    }
    
    user.cookies.agreed = Boolean(GetCookieValue(true));
    
    if(!DarkPatternPopup()) {
      // Make sure we respect the user choice
      user.cookies.agreed = Boolean(GetCookieValue(false));
    }
    
    if(user.cookies.agreed) CollectData(user);