You are telling me this has been going on for almost a decade now, and no one ever noticed ?
So we trust open source apps under the premise that if malicious code gets added to the code, at least one person will notice ? Here it shows that years pass before anyone notices and millions of people’s communications could have been compromised by the world’s most trusted messaging app.
I don’t know which app to trust after this, if any?
Good app.
What’s weird and frustrating with some FOSS apps like NewPIpe is that they get hung up on adding some very useful and vital features that have massively been requested for years. While adding features that are only used by a minority of users.
For instance there have been discussions on the projects github issue tracker dating back many years about the addition of search filter by date of upload. Yet this feature is yet to land in the App. For all its features this is my biggest let down with the app.
Because the uk government conceded that there is no current technology to scan communications without compromising encryption. And have relinquished forcing companies from adding backdoors “for now” without actually removing this provision for the law. Meaning they are leaving it to the regulator “ofcom” or future governments to decide when to request compromising encryption
and that’s why even Signal and WhatsApp who threatened pulling out of the UK, haven’t issued any recent statement after the adoption of this law
My experience was that when solving captchas where you select pics on the grid and other pics load and replace the selected ones within the same round. in firefox it tends to play those fade-in fade-out very slowly. while on chrome they appear instantly.
Unfortunatly I can’t expand my obveservation just based on my own anecdotal experience. have you noticed the same behaviour ?
I don’t think that Tor relies entirely on trust. it rather relies on the probability that there needs to be at least half of entry and exit nodes compromised for a attacker to be able to deanonymize users trying to access the clearnet. the hidden network is even harder to deanonymize as there are more than 6 hops in the path. and all nodes participating in the network are visible.
proton on the other hand can do what ever they please on their servers and can never get caught with it.
Never forget every email that leaves Protonmail to other email providors are not anymore secure or encrypted as using gmail or others.
Second no one can certify that incoming emails and meta-data can’t be read and recorded to a ghost mailbox before getting encrypted. you have no control on what happens on their servers
privacy shouldn’t rely on trust
These are valid concerns. But I doubt Big Tech is joyfully opening up their userbase to third parties to harvet more metadata. they would rather keep their walled gardens intact, add to that smaller players are insignificant compared the billion users these companies already serve. question mark is what other shenanigans are they going to inact once this legislation in enforced.
Oh shit. Now that I have checked, it was turned on by default on mine too.
What’s wrong with you mozilla ?? Firefox was supposed to be the alternative