Leaving Big Tech and switching to European services

Status
Not open for further replies.
You had best explain why encryption is unsufficient
really?
Explain how encryption protects against fake QR code for one :)
Recently one of the threads was about ProtonMail. To get to arrest someone the police just analyzed metadata. This led them to the specific email address.
There is so many examples showing why encryption is not enough that if you believe otherwise I am really surprised. This would be very, very limited understanding of information protection.
Encryption is important part of data protection but someone must be at least 10yrs behind current state of affairs to think that encryption protects privacy in a sufficient way.

The extreme example is recent breaking into air gapped network.
 


here is so many examples showing why encryption is not enough that if you believe otherwise I am really surprised. This would be very, very limited understanding of information protection.
Encryption is important part of data protection but someone must be at least 10yrs behind current state of affairs to think that encryption protects privacy in a sufficient way.
Being rude/condescending, may well be your usual approach, but it fails to cut the mustard, here.

The protection offered by the likes of proton etc etc is used worldwide.

Are we to believe that all the tens of thousands/millions of users are being deceived?

I have seen some of the articles describing what you have said......and in most if not all cases, the publishers of those articles are the minority usually regarded as "shonky'
 
Being rude/condescending, may well be your usual approach, but it fails to cut the mustard, here.

The protection offered by the likes of proton etc etc is used worldwide.

Are we to believe that all the tens of thousands/millions of users are being deceived?

I have seen some of the articles describing what you have said......and in most if not all cases, the publishers of those articles are the minority usually regarded as "shonky'
shonky?

..or you just never really been interested. Fake QR code is a serious problem for few months now. You should now this if you are interested in the topic. Signal fake QR code is just one of many exploits (issue is fixed by now in Signal). But calling this shonky is just ...


There is only ONE action that safeguards your info....and that is encryption.....and even then, BOTH sender and receiver of emails MUST be BOTH using encryption.
This is not even funny. It is more or less saying that if you wear seat belt you are safe hitting the wall at maximum speed.
 
So, there has been switch from proton & encryption etc etc to fake qr code.

Proton & encryption


The core of the controversy stems from Proton Mail providing the Spanish police with the recovery email address associated with the Proton Mail account of an individual using the pseudonym ‘Xuxo Rondinaire.’ This individual is suspected of being a member of the Mossos d’Esquadra (Catalonia’s police force) and of using their internal knowledge to assist the Democratic Tsunami movement.


Proton Mail’s compliance with these requests is bound by Swiss law, which mandates cooperation with international legal demands that are formalized through proper channels (Swiss court


Last year, when we noted that Proton Mail complied with nearly 6,000 data requests in 2022, Proton provided us with an explanation that inbox contents remain secure.


Please note that in all cases email content, attachments, files etc are always encrypted and cannot be read.Proton statement.

Proton Mail logs






For users concerned about privacy, particularly those involved in sensitive or political activities, OPSEC should be a top concern when using privacy tools. It’s advisable to:


  • Avoid linking recovery emails or phone numbers that can directly tie back to personal identities or primary business activities.
  • Consider using secondary, disposable emails or virtual phone numbers that offer an additional layer of anonymity.
  • Use a good VPN service to hide your IP address whenever possible. (Failure to do this is what compromised a Proton Mail user in France who was arrested after after police obtained IP logs.)
  • Consider purchasing services using an anonymous payment method.
  • Stay informed about the legal obligations and policies of communication service providers, especially regarding their compliance with international law enforcement requests.

While Proton Mail and similar services offer substantial protections and end-to-end encryption on their email platform, they are not immune to legal and governmental pressures. Users must navigate these waters carefully, balancing the need for security with the potential legal obligations of their service providers.


There is only ONE action that safeguards your info....and that is encryption.....and even then, BOTH sender and receiver of emails MUST be BOTH using encryption.
This is not even funny. It is more or less saying that if you wear seat belt you are safe hitting the wall at maximum speed.

""User-to-user email encryption is RSA 2048-bit; AES 256-bit for user-to-non-user emails. It uses OpenPGP. That is an industry-standard for email encryption that suffers many shortcomings

Really ?..... You don't read the material you post about?

Enough. Not worthy of my time.

==========================================
 
Regrets to the OP @xenixt who at least complied, and edited his first Post.

I'm locking this thread - take the arguments somewhere they might be appreciated, eg Reddit?

Avagudweegend

Wizard
 
Status
Not open for further replies.


Members online


Latest posts

Top