• 0 Posts
  • 5 Comments
Joined 1Y ago
cake
Cake day: Jun 26, 2023

help-circle
rss

https://nextcloud.com/encryption/

End-to-end Encryption client-side is available from Nextcloud desktop client 3.0 and newer as a folder-level option to keep extremely sensitive data fully secure even in case of a full server breach. The server facilitates key exchange for syncing between devices and sharing but has Zero Knowledge, that is, never has access to any of the data or keys in unencrypted form.

It’s not a big deal if you self-host at home either. You can use SSL for the traffic and LUKS for the storage.


BTC, ETH, and XMR are the only ones that matter. Some stable coins (USDC, GUSD) are okay, too.

BTC (Bitcoin) is good because it’s the most widespread. If a vendor accepts crypto, odds are they accept BTC. However, the blockchain is easily traceable.

ETH (Ethereum) is good because its blockchain is far more versatile, so it can be used for other things than just crypto payments. However, it’s less widely used for payments than BTC and is also easily traceable.

XMR (Monero) is excellent. It’s extremely difficult to track an individual user. Your transactions are private. There are some possible attack vectors for the future, but they’d require that you be an actual target to be worthwhile. Someone that’s going to track you is going to find a different way than XMR to do it. XMR isn’t as widely used as the others, though, and it’s also not on as many crypto exchanges. Kraken has it.

However, crypto as an investment is not a good idea. Spend your crypto.


Depends, some loads are subsonic especially for suppressor use. I’m looking at you, 300BLK


What’s so bad about it? Is Notion a less trusted company?


If you’ve never used that phone with a SIM card, there’s no connection between the IMEI and you or your internet traffic. Assuming the phone never pings towers, network operators could only track the location of your phone location over time without you associated. I don’t think it’s accurate enough to determine where you live to identify you.

A phone without a SIM card hypothetically also shouldn’t ping cell towers, but who knows if it does. It should only connect to the cell towers when you make an emergency call.