Show more

@bash Proton based only on trust and that they seem to have actual money to develop the platform. Secure email is mostly dead, but ProtonMail puts some rather pretty shades of lipstick on the pig.

@ataraxia937 Put in a safe deposit box, I guess. Or use something like Veeam (free for backing up 10 devices or else) that can encrypt. I’d put encrypted contents in Deep Glacier or something too for a failsafe if it’s that important.

@ataraxia937 Uh... what is your threat model here? Are you really worried about people breaking into your house and raiding your safe to get at your backups?

@Outernaut It’s more a bit abuse prevention tool than a stalking tool. The tracking part of it tries to make it so less people have to click the silly puzzles. If you use a VPN and private mode, they can’t really track you so they have to make you solve the puzzle.

@russell Pretty sure he is talking about the chans, though no doubt this will be added to the pile on the need to backdoor end to end encryption. What’s funny is that the chans are a big chunk of the reason he was elected in the first place.

@strypey Do you mean literally? Why would you want to call a device and not a person?

@Liberty4Masses I’ll take things you’ll find in an 8chan thread for a hundred, Alex

Cool let me know how well it renders 4K video in Premiere

@FluhartyML If you want privacy, use Apple to manage the home. Your AppleTV will do this. They’re the only company I’d trust. For security, make sure your firewall/ router does not have uPnP turned on, and do NOT forward any ports to any IoT things. Consider making an entirely separate subnet and firewalling it off for the IoT devices. Or if you don’t have advanced networking in your house, use the three dumb routers solution:
pcper.com/2016/08/steve-gibson .

@rainhawk I’d say keep them disconnected from the network and you’ll be OK but believe it or not Samsung will ignore you and connect to anything it can find:
google.com/amp/s/amp.reddit.co

@Outernaut Yeah, but in their defense a disproportionate amount of abuse comes from VPNs, so the Capatcha is kinda understandable. You do want to pick good VPN providers (such as PIA or ProtonVPN) who are unlikely to spy on you themselves. Don’t use free VPNs, ever.

@darylsun There are some safe ways to do cloud things though. Veracrypt container inside Dropbox is one example, or hosting files for yourself in keybase.io. Using ProtonMail or similar for email. Chatting with Signal, etc. You may not be able to trust all providers, but you can trust some more than others and you always trust the math behind good crypto in audited environments.

@darylsun Realistically, you are unlikely to ever do better than the insane security structure/teams behind the big boys like Google, Amazon, Microsoft, Apple, etc. If your threat model is nation states, then okay, having your data in the cloud can be scary. It for most people, it’s far better than trying to self-host. And if your threat model is nation states you kinda need your own nation-state’s OPSEC support team or you’re already boned.

Show more
Mastodon šŸ” privacytools.io

Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance.

Website: privacytools.io
Matrix Chat: chat.privacytools.io
Support us on OpenCollective, many contributions are tax deductible!