umami_wasabi
pending anonymous user
- 17 Posts
- 332 Comments
umami_wasabi@lemmy.mlto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?
71·8 months agoAudit trails
umami_wasabi@lemmy.mlto
Technology@lemmy.ml•China will enforce clear flagging of all AI generated content starting from September
1·9 months agodeleted by creator
Posteo’s lack of custom domain support can be augemented by using Addy.io or other similar email proxy/forward services.
umami_wasabi@lemmy.mlto
Privacy@lemmy.ml•Recommendation for a privacy respecting Wifi mesh system?
3·9 months agoIf you can handle steep learning curve with less proven stability, Mikrotik.
umami_wasabi@lemmy.mlto
Technology@beehaw.org•Apple will soon support encrypted RCS messaging with Android users
17·9 months agoWill UK netizens able to use it?
Congrats on finding a suitable program. It looks promising.
I don’t think such things exists. You would need to do some coding work to gule a few tools together. I would do “FFmpeg -> OpenCV -> Tesseract OCR -> tanslator”.
This is a reality of any software. Those requirements exists by themselves or in some combinations, but once you want them all, the difficulty grows exponentially.
The Sunbird model works. Their model isn’t that hard to replicate, and have the steps laidout for you to copy. However, it doesn’t offer some perks you want with limitations. For example, you can only have 5 devices linked to 1 Signal account. There is no 2FA, fine grained access control, nor audit log. The search functionality is not particularly good.
There are ways to overcome those limitations but you will need some tech savvy dude with proper security backgroud/training to design, implement, and manage that. It steps into semi-custom developement and integration, and be warned, it is hard to done right, especially anything with security.
Say your organization is doing something like Amnesty International (at least sounds awlful lot similar to me), you want a solution that
- encryption
- shared inbox between trusted members
- minimal meta-data leak to providers (service providers and network node operators)
- hide who is sending/receiving
- easy to search/indexed
- fine grained access control
- audit log of who responed to who
- multi-device
- single stable address/contact point (how “stable” you need it to be?)
- 2fa?
- easy to use
Am I correct? To be honest, it is quite a tall order. I can’t really think of a solution right now. Email is definitely out of the question because you can’t hide who is sending and receiving the email.
umami_wasabi@lemmy.mlto
Privacy@lemmy.ml•A privacy dilemma from a developer: user freedom, or individual privacy?
7·9 months agoALPR already exist. The situation won’t get better or worst, no matter what license you release under.
I don’t understand why you need encryption. It seems you are concerned about access control and metadata on the security side. If that’s the case, it is more advisable to host your own email server. However, be aware that once the email is sent, your recipient email system may be hosted by other email providers that you might not desire. You can reduce the metadata leaks by using encryption, but as you are aware, not everybody kin to use it. And to be effective, it must be used by both sides.
I played with something in Zoho before. Forgot what it actually named. In essence, you create a group, then you add members to that group. The group would have an email address. Anyone can send email into the address and everybody in the group will be notified (like forwarded). I believe members can also use the group address to reply.
umami_wasabi@lemmy.mlOPto
Privacy@lemmy.ml•Will using non-gmail hurt my chance of getting hired?
1·10 months agoI think I had every thing setup correctly. SPF, DKIM, and DMARC are all green in Proton. Still, mysteriously end up in spam folder when I test with friends.
umami_wasabi@lemmy.mlOPto
Privacy@lemmy.ml•Will using non-gmail hurt my chance of getting hired?
2·10 months agoHey, I still got one.
umami_wasabi@lemmy.mlOPto
Privacy@lemmy.ml•Will using non-gmail hurt my chance of getting hired?
2·10 months agoI tried, and failed hard. When I bought my domain 10 years ago, I didn’t put efforts in reseaching domain reputation and got a .xyz tld. Now that tld smmes to be abused by spammer and also affecting my mail which go straight into spam folder.
umami_wasabi@lemmy.mlOPto
Privacy@lemmy.ml•Will using non-gmail hurt my chance of getting hired?
3·10 months agoI thought Google Workspace mailboxes aren’t scanned?
umami_wasabi@lemmy.mlto
Privacy@lemmy.ml•What do you think about Session as a potential replacement for Signal?
4·10 months agoUse separate profile for different devices. Make a group when you chat with others.
Being privacy consious and the act of requesting to had your info removed is just put you on their radar as “normies” doesn’t care.
umami_wasabi@lemmy.mlto
Privacy@lemmy.ml•How can I discourage my dad to install Telegram?
1·10 months agoit can. I’m not saying it does, but it absolutely can
WhatsApp? It can by piggybacking the content on the client itself. It can’t read on the server if it’s as advertised as following the Signal Protocol.
But that kind of functionality either need targeted deployment, or have that built-in to the client in public channel. It doesn’t matter if they does it or if they can do it, the logic of that functionality still have to exist somewhere. I would believe some nerds would pickup some indicators and had that reversed engineered long ago.
Without a solid proof, I would on the err side and refrain from claiming such.









That’s for publishers, not users.