• 8 Posts
  • 333 Comments
Joined 2 years ago
cake
Cake day: June 15th, 2023

help-circle
  • I think there are a few things to clear up…

    a VPN and an ISP are two different types of services. VPNs are not an internet service provider. They are held to two different standards.

    Good VPNs don’t log your information. Depending on what country they are based in they are obligated to hand over information if they have it but since they keep no logs there is nothing to hand over. Even if a court wanted to force a VPN to cut off service to a user there would be no way to know who that user is.

    VPNs are beholden to the laws of the country they are based in, not the laws of their users. Its very hard for a US court to force a Swiss based VPN to do anything. That’s why it’s important to have a VPN that’s based in a privacy friendly country. Sure a US court could sieze their server if one is located there but if there are no logs, it doesn’t provide much.

    I think there is this misconception that your VPN provider will break the law for you. Its not the case. Your VPN is going to hand over any info it’s legally obligated to if it has that info



  • So you actually inspect the source code of everything you use?

    This whole line of reasoning really only works if you have the expertise to understand the code in the first place. Otherwise you are just shifting trust from what the company tells you to what a third party looking at the source tells you. Sometimes that works but its in no way fool proof.

    There is open source malware. FOSS /= trustworthy the same as closed source /= not trustworthy.

    If you don’t trust Apple that fine. Some people won’t ever use a Pixel because they don’t trust Google. It doesn’t change the fact that Google currently makes the most secure, hardware wise, consumer smart phone. The point being this shift in trust is more of a personal choice then a good privacy or security practice. Just as using something like e/os or lineage over iOS is.




  • Not necessarily, there are tons of things that are very secure but not at all private.

    But… having a massive attack surface and known security issues and thinking your data is somehow private because you use a FOSS application is silly.

    EDIT to answer your edit: partly. I mean regular timely security updates seems to be a struggle for most of these android OS but also because it provides a bunch of privacy by default options that these other android ROMs don’t such as a private relay, default RCS messaging, and makes them easy for users.



  • I’m not saying its easy or convenient but users here love to complain about issues while being complicit. I just find that annoying.

    My main bank is sunsetting allowing users to have a hardware token (they only offer it to users without a smart phone now) and is forcing users to either use a proprietary token app or SMS. Did I just accept that? No. I made my voice heard and got an exception made and now I use a hardware token as my 2FA.

    People need to realize, privacy requires some personal responsibility. Complaining on Lemmy isn’t enough.










  • Personally I think if you look at what privacy features CalyxOS actually offers or read reviews from someone like kuketz you realize its pretty lacking in both privacy and security.

    What Calyx does offer is a decently degoogled experience for people who don’t have the budget, access, or want for a Pixel with GOS.

    I understand your issues with Apple, that’s fair. OTOH I think their offerings, such as private relay, RCS messaging by default, properly implemented sandboxing are objectively better privacy features then what most android operating systems can offer. They also are much more reliable in terms of security updates.

    I also have had issues with Calyx using pretty obvious lies to market themselves such as saying the OS can’t be tampered without your knowledge. Not that Apple doesn’t have its fair share of blemishes.



  • Something’s are just more secure and private then others. That’s just a fact. For example, as of now GrapheneOS is the most secure and private consumer mobile OS. There is no gray area.

    Now whether your threat model requires it, can be much less black and white.

    But users here tend to gamify privacy and think they should get whatever the “best” one is. They tend to do whatever the most upvoted github list tells them to do.

    Rarely do I see someone like yourself, who considers threat model.