• @dingdongitsabear@lemmy.ml
    link
    fedilink
    2313 days ago

    anyone dunking on the article, this is pretty far away from a how-to-lilst; it’s more of a “think about these things if you haven’t up until now” and as such a net positive. wrong community for it, though.

  • @surph_ninja@lemmy.world
    link
    fedilink
    2614 days ago

    Too bad private email access is essentially dead. Any service not requiring another email or phone number to sign up gets quickly shut down. A casualty in the war on whistleblowers.

        • @tekato@lemmy.world
          link
          fedilink
          1514 days ago

          They do store it and have provided it to authorities in the past. In their defense, modern laws require you to hand over any data you have or get shut down. But they already knew that, yet choose to ask for it anyways knowing that they have to give it away if asked to.

          • @hugealligator379@lemmy.ml
            link
            fedilink
            English
            114 days ago

            As far as I understand it, this is only recovery emails and I think it explicitly has some sort of warning about this when setting it. This is different than the email prompt on sign up.

            • @EngineerGaming@feddit.nl
              link
              fedilink
              113 days ago

              I wouldn’t trust them not to store the initial one as well tbh. Nothing technically stops that and it’s in their interests.

              • @_cryptagion@lemmy.dbzer0.com
                link
                fedilink
                English
                112 days ago

                They don’t ask for one on signup. I just signed up recently while using Tor on Tails, and was not required to provide an email for any reason. The only thing that happens is you get a warning in the account panel saying you won’t be able to recover your account if you lose the recovery codes.

          • @_cryptagion@lemmy.dbzer0.com
            link
            fedilink
            English
            112 days ago

            They provided it to Swiss authorities, with a notice that it happened to their customers. They do not have any requirement to share it with other governments.

          • sunzu2
            link
            fedilink
            314 days ago

            i guess corpos gonna corpo folks… even the “good” ones

            i did not realize you needed anything to create rando emails. i know google started that shit 5 years ago tho

            • @tekato@lemmy.world
              link
              fedilink
              114 days ago

              I don’t think you are required to provide a secondary email, but you get less features without it.

              • sunzu2
                link
                fedilink
                214 days ago

                i see… that is a dark pattern in of itself, why does proton need this info and why are they willing to incentiveze users sharing it.

    • @xapr@lemmy.sdf.org
      link
      fedilink
      English
      914 days ago

      You can sign up for Proton mail without providing email or phone number, as far as I recall.

            • @red@lemmy.zip
              link
              fedilink
              English
              1
              edit-2
              13 days ago

              yes I just did, not brave but tor browser and I was able to create account

              • @surph_ninja@lemmy.world
                link
                fedilink
                113 days ago

                I just loaded up a Linux vm with Brave, and tried to sign up in a tor window. It requires a verification email to sign up.

                Maybe you’re using a browser or OS that it’s tracking.

                • @_cryptagion@lemmy.dbzer0.com
                  link
                  fedilink
                  English
                  112 days ago

                  It does not, this is misinformation. Do not believe this person, I recently did it on Tails while using Tor and did not need email or phone number.

                • @red@lemmy.zip
                  link
                  fedilink
                  English
                  113 days ago

                  yeah I’m using tor browser, also don’t forget you can get fingerprinted even on tor

    • lentildrop
      link
      fedilink
      1114 days ago

      email is never private, if its that sensitive it just shouldn’t go on the internet

      • Em Adespoton
        link
        fedilink
        414 days ago

        Exactly; email is digital post cards and always has been.

        Of course, that means I can encrypt a message and use someone else’s email account to send it :)

    • Dessalines
      link
      fedilink
      3414 days ago

      I read through the whole list, and monero was the only decent privacy recomendation I could find. Everything else was US-hosted. A lot of it was just recommendations from Apple and Google on “privacy” services they offer.

      No mention of syncthing, matrix, xmpp, even with sections dedicated to those categories.

      • @pinkystew@reddthat.com
        link
        fedilink
        English
        714 days ago

        I read that monero is different from other cryptocurrencies and makes it harder to identify the individual to/from whom a transaction in is sent

        What is the difference and why do other cryptocurrencies not implement it?

        • @khannie@lemmy.world
          link
          fedilink
          English
          1014 days ago

          Monero is built as a privacy first crypto. Essentially it’s like cash in many ways. You spend it in the shop and nobody knows where the cash you’re handing over came from. When you get your change at the till you know nothing about who had the cash before you that you just got handed. It’s just money.

          This is all handled by a bunch of very complex cryptography. If it comes to it there are ways to prove you sent the money etc but only you have that capability to decide to share.

        • @RvTV95XBeo@sh.itjust.works
          link
          fedilink
          1114 days ago

          The core focus of early crypto was decentralization, not anonymity. Bitcoin is totally decentralized, but the entire premise is the blockchain contains a permanent irrefutable ledger of transactions. Basically everyone knows if Wallet A paid Wallet B. If you refill your wallet with anything remotely traceable, that means everyone knows YOU paid Wallet B, and similarly if wallet B has any ties to the real world, the lines are easy to connect.

          That’s not to say you can’t use it anonymously, but that was not the intent and thus it does anonymity poorly.

    • @stembolts@programming.dev
      link
      fedilink
      814 days ago

      You’re right, ha, I’m totally not… they, I mean they are totally not! You got it guy! Everyone listen to this guy! I’d go as far as to say anyone reading this article is innocent of ALL crimes!

    • @terminhell@lemmy.dbzer0.com
      link
      fedilink
      1414 days ago

      Iirc any cell phone is still capable of dialing 911(or equivalent) even without a sim. So id imagine carrier towers and gps could still find it. You’d basically have to keep the device in a ferriday bag. Which complicates actually using it.

      • @Mettled@reddthat.com
        link
        fedilink
        English
        114 days ago

        Why does a phone need to be in a ferriday bag when phone does not have a SIM card because it uses web-based VoIP service? The phone only needs an internet connection, like wi-fi, and can’t talk to cell towers. Remove SIM from phone, connect phone to wi-fi to get online to access phone service through the internet, GPS can’t function. If a phone without SIM calls 911, it will go through, but dispatch sees no number, no location, no name.

      • Em Adespoton
        link
        fedilink
        10
        edit-2
        14 days ago

        One clarification: carrier towers can still find a phone; GPS is passive; your phone locates itself in relation to the GPS satellites.

        Most phones are also broadcasting WiFi MAC IDs and Bluetooth MACs, plus hardware and capability strings over Bluetooth. And then any apps you’ve got loaded may also be calling home with your location unless you have that disabled and rotate your ad ID regularly.

        [edit] also worth pointing out that even if you turn a smartphone “off” it still pings the local cell towers with its IMEI regularly. Surprised me the first time I witnessed that.

    • @EngineerGaming@feddit.nl
      link
      fedilink
      714 days ago

      You’re just shifting trust though - may be good in some cases, but not universal. Aldo does nothing about the cell tower connections tracking the location.

      • @Mettled@reddthat.com
        link
        fedilink
        English
        114 days ago

        How can cell towers track your location if phone does not have a SIM due to using web-based VoIP service?

          • @Mettled@reddthat.com
            link
            fedilink
            English
            113 days ago

            I think you’re mainly speaking from a place of percieved opinion than tech knowledge but I would suggest for you that you only use a landline for phone service. Have you ever had a job working with various network services for random customers and speak to customers to answer questions?

            • @EngineerGaming@feddit.nl
              link
              fedilink
              213 days ago

              From the context of your previous comments, it seemed like you were talking not about not having a mobile phone in general, but rather a SIMless phone. Using it over Wi-Fi only is indeed doable - but you’d need an Airplane Mode on an OS you can trust, just having no SIM would not be enough.

              Also no, I did not have such a job - I don’t understand how this question relates to the conversation.

              • @Mettled@reddthat.com
                link
                fedilink
                English
                113 days ago

                Any AOSP ROM would suffice.

                The queation pertains to having a sense from how someone talks if they sound like they can configure network services or if they only read about it but not having the skills/experience to work for random customers and explain the work to them.

      • @Mettled@reddthat.com
        link
        fedilink
        English
        414 days ago

        It is possible to get a real cell number from a big name carrier and then port the number to VoIP company to use VoIP service with an original cell number.

          • @Mettled@reddthat.com
            link
            fedilink
            English
            114 days ago

            If you get a cell number with a SIM, then port that number to a VoIP, how does KYC matter since you are going.to have to give that number to people with your name, so businesses or offices can call you through VoIP service?