Just a shiny male toy…
I see a lot of good discussion here. I’ve been on proton for years now, using my own domain. While true that Andy is one of 5 board members, and it’s a nonprofit etc, these statements are raising hairs on my neck, personally.
Does anyone have a good guide on problems associated with self-hosting email?
So I’ve heard and read. Fwiw, I was reading into the state of the art many years ago when fingerprinting was more nascent, I expect it’s matured and gotten yet more advanced in the time since (unfortunately).
Guess I gotta pause working on interesting, net-positive work for a little bit to see where things are, and how to properly combat it, lest I give out poor advice again.
There are online tests for it to determine whether you become more or less unique. The defaults in the extension are carefully set to minimize uniqueness, based on my research and per the docs. You’ll note it ones or fakes more than just the canvas API.
I was using this before ff added it’s own noise system or of necessity.
Ah yeah, I’d forgotten about that.
I’m certain the engineering team considered it, but I wonder why they didn’t pursue having accounts that haven’t signed in for a while issue a notice to the sender, or even have the account deactivate itself.
Make an opt-out default, you could disable that behaviour if your threat model needed to account for that 🤷
Functional apps is the important bit, use of microG allows apps to provide push messaging etc without knowing Google services aren’t installed. There’s still some communication with Google as a result, but it’s fully sanitized.
I invite you to try installing common apps like Strava or Pokemon go without any Google services at all.
If you drive a Toyota and the infotainment system has a “DCM” icon in the corner, your driving habits and location are being recorded to their servers.
E: this is happening via their own cellular modem built into the vehicle, with its own separate SIM or eSIM. Getting at the module seems to require access behind the dash, almost purposely making it difficult. Pulling the fuse will kill the front passenger-side speaker, though there are YouTube vids on how to reactivate the speaker while keeping the DCM module dead.
Sorry, “google blobs”? A lot of work went into MicroG, and I think it’s a shame that you’d minimize so much good work to reimplement the lynchpin of Google’s control on your devices.
At this point I’ll presume you’re just misinformed, as no proprietary google code operates within microG unless you decide to run with device attestation, and there it’s running as a sandboxed service. At any other time, you are able to run open source code which spoofs your device details to Google, and spoofs google to all these other closed source apps in a reliable and readable, much smaller codebase.
Honestly, the irony of running blobs, when one is completely closed source vs the other which is fully open. Hahaha.
All your points are true, yet still depend on Google in sandboxed form. That negates everything else for me, who wants a reasonably secure device that works out of the box and also respects my privacy.
If a nation-state wants into my phone, it’s delusional to believe even graphene can hold them off, you need real opsec for that, and unfortunately all I’ve seen thus far from graphene guys is cosplaying that the NSA wants your porn selfies.
Graphene and micro g? Cool. Sandboxed Google? Nope.
There’s also CalyxOS, low drama and very reliable. Https://www.calyxos.org
I need the ROMs to play with hardware in ways manufacturers and Google don’t intend. I don’t ask the manufacturer for permission, nor do I need to as source code and bootloaders are available.
I’m not willing to be a data point for profit, I don’t give a fuck whether it’s the shithead ccp or fuckbox google, my data stays on my phone unless I decide otherwise.
Can’t do that? Again, proud of your weakest element. How strange. Enjoy your inferior phone.
Cry about it and reflect on it, bitch.