West Asia - Communist - international politics - anti-imperialism - software development - Math, science, chemistry, history, sociology, and a lot more.
Its best to use a protocol that doesn’t allow unencrypted messages
This is an implementation thing and not a protocol thing. What protocol doesn’t allow unencrypted messages? I am sure signal’s protocol would still allow it, it’s just that the implementation doesn’t.
And same for XMPP. Just go with the implementation that doesn’t.
I’m aware of tails, but I am not confident it qualifies. With Tails, I still connect through my own Internet connection, presumably. I know using tor obfuscates this, but is it to the degree of, say, Monero?
Moreover, I am still at the mercy of the platform I use. Most of them require email or phone verification, and creating an account with lots of data sent over from the clients.
Tails is a necessary component, but the platform is also important.
I checked the logs by running bottles from terminal (is that what you meant?)
I didn’t see anything out or the ordinary.
I mentioned gentoo but I think it shouldn’t matter as I installed bottles using flatpak, so I assume it should have everything it needs. But gentoo does install a very minimal base OS.
The code is not open source, so it’s hard to verify how good the encryption is or if it has backdoors.
I’m not an expert in cryptography, but from my limited knowledge, the cryptographic keys used are very important. If Meta or the government can somehow know the decryption key to your messages or predict it, then they can see your messages.
But they most likely don’t need to decrypt it in transit. One of the vulnerabilities in this system is Google firebase, which delivers notifications to your phone when WhatsApp messages arrive. Ever noticed how those notifications include the message content and the sender? Google has access to this information, despite the encryption.
That’s just an example. Google has access to a lot on your phone.
Another thing to consider is message metadata. The content of your message is encrypted, but what about information like the destination of your message, its recipients, time sent and received, and frequency? I’d even argue this is more important than content in many situations. Sometimes, linking person A to person B tells me a lot about person A.
My issue with lutris is that when I used it before and something didn’t work, or used to work but broke, I was completely at a loss, because I did not understand what all it is doing exactly. It just felt that what lutris is doing is a bit too obfuscated or unclear to me.
Is bottles any better on that front?
a long history of human rights abuses, persecution of minorities and espionage
Hmm, I wonder which countries this applies to… It’s crazy how you missed the irony of this
And your data will become a weapon in the event of a world war 3.
Dude… You’re living in some video game fantasy world. Your activity browsing social media and watching over-confident youtubers will not give China an edge in world war 3. I guarantee you.
On Calyx, most android apps require Google services. How do you address this? Calyx’s solution for this is providing microG, a stripped down Google services. Still, they’re Google services…
“the enemy you know” to be in the same geography as you and be capable to use the data against you, yes.
With the other enemy, you know your data in their hands is a much less of a threat to you. They’re so far away and do not have authority on your country.
And btw, Google is never gone for good. Not even with Calyx
I asked you to check the web to double check me, you still chose to embarrass yourself.
Here’s proof that Samsung supports devices for 5 years. Do you want me to spoon feed you the rest?
Again, android is cheap and worse
I just explained to you why that is false. Please do not restate your debunked statement prepended with “Again,” itdoes not make it any less wrong.
As for updates, phones from Google, oneplus, Samsung all get 5 years of official updates. Even oppo will give 4 years. You can double check me by searching the web on this.
Do new torrents bypass this somehow, or is it just by sheer volume and popularity ?