• Dessalines@lemmy.ml
      link
      fedilink
      arrow-up
      34
      ·
      1 year ago

      I read through the whole list, and monero was the only decent privacy recomendation I could find. Everything else was US-hosted. A lot of it was just recommendations from Apple and Google on “privacy” services they offer.

      No mention of syncthing, matrix, xmpp, even with sections dedicated to those categories.

      • pinkystew@reddthat.com
        link
        fedilink
        English
        arrow-up
        7
        ·
        1 year ago

        I read that monero is different from other cryptocurrencies and makes it harder to identify the individual to/from whom a transaction in is sent

        What is the difference and why do other cryptocurrencies not implement it?

        • RvTV95XBeo@sh.itjust.works
          link
          fedilink
          arrow-up
          11
          ·
          1 year ago

          The core focus of early crypto was decentralization, not anonymity. Bitcoin is totally decentralized, but the entire premise is the blockchain contains a permanent irrefutable ledger of transactions. Basically everyone knows if Wallet A paid Wallet B. If you refill your wallet with anything remotely traceable, that means everyone knows YOU paid Wallet B, and similarly if wallet B has any ties to the real world, the lines are easy to connect.

          That’s not to say you can’t use it anonymously, but that was not the intent and thus it does anonymity poorly.

        • khannie@lemmy.world
          link
          fedilink
          English
          arrow-up
          10
          ·
          1 year ago

          Monero is built as a privacy first crypto. Essentially it’s like cash in many ways. You spend it in the shop and nobody knows where the cash you’re handing over came from. When you get your change at the till you know nothing about who had the cash before you that you just got handed. It’s just money.

          This is all handled by a bunch of very complex cryptography. If it comes to it there are ways to prove you sent the money etc but only you have that capability to decide to share.

    • stembolts@programming.dev
      link
      fedilink
      arrow-up
      8
      ·
      1 year ago

      You’re right, ha, I’m totally not… they, I mean they are totally not! You got it guy! Everyone listen to this guy! I’d go as far as to say anyone reading this article is innocent of ALL crimes!

  • surph_ninja@lemmy.worldBanned
    link
    fedilink
    arrow-up
    26
    ·
    1 year ago

    Too bad private email access is essentially dead. Any service not requiring another email or phone number to sign up gets quickly shut down. A casualty in the war on whistleblowers.

      • Mettled@reddthat.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        It is possible to get a real cell number from a big name carrier and then port the number to VoIP company to use VoIP service with an original cell number.

          • Mettled@reddthat.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            If you get a cell number with a SIM, then port that number to a VoIP, how does KYC matter since you are going.to have to give that number to people with your name, so businesses or offices can call you through VoIP service?

    • terminhell@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      14
      ·
      1 year ago

      Iirc any cell phone is still capable of dialing 911(or equivalent) even without a sim. So id imagine carrier towers and gps could still find it. You’d basically have to keep the device in a ferriday bag. Which complicates actually using it.

      • Em Adespoton@lemmy.ca
        link
        fedilink
        arrow-up
        10
        ·
        edit-2
        1 year ago

        One clarification: carrier towers can still find a phone; GPS is passive; your phone locates itself in relation to the GPS satellites.

        Most phones are also broadcasting WiFi MAC IDs and Bluetooth MACs, plus hardware and capability strings over Bluetooth. And then any apps you’ve got loaded may also be calling home with your location unless you have that disabled and rotate your ad ID regularly.

        [edit] also worth pointing out that even if you turn a smartphone “off” it still pings the local cell towers with its IMEI regularly. Surprised me the first time I witnessed that.

      • Mettled@reddthat.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        Why does a phone need to be in a ferriday bag when phone does not have a SIM card because it uses web-based VoIP service? The phone only needs an internet connection, like wi-fi, and can’t talk to cell towers. Remove SIM from phone, connect phone to wi-fi to get online to access phone service through the internet, GPS can’t function. If a phone without SIM calls 911, it will go through, but dispatch sees no number, no location, no name.

      • Mettled@reddthat.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        How can cell towers track your location if phone does not have a SIM due to using web-based VoIP service?

          • Mettled@reddthat.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            I think you’re mainly speaking from a place of percieved opinion than tech knowledge but I would suggest for you that you only use a landline for phone service. Have you ever had a job working with various network services for random customers and speak to customers to answer questions?

              • Mettled@reddthat.com
                link
                fedilink
                English
                arrow-up
                1
                ·
                1 year ago

                Any AOSP ROM would suffice.

                The queation pertains to having a sense from how someone talks if they sound like they can configure network services or if they only read about it but not having the skills/experience to work for random customers and explain the work to them.

  • relic4322@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    4 months ago

    Just saw this. Feel like the alternate title could have been “When digital privacy went mainstream”, “I was into privacy before it was cool”, or finally “No I am not wearing a tin foil hat!”