Name the best US to EU switch you have made so far
Name the best US to EU switch you have made so far
Not all EU, but all moves in the right direction i think…
Android to GrapheneOS
WhatsApp to Signal
Windows to Linux Mint
Office365 to Libre office
Chrome to Vivaldi
Google search to Ecosia
Google maps to Organic maps
GMail / Calendar to Proton + own domain. (Not .com obviously)
Google Drive to Proton Drive
MS Onedrive to Filen
Made a Raspberry Pi SFTP server also running syncthing. (Need to set it up to be a PiHole too)
Kindle to Kobo
Reddit to Lemmy
Retro gaming on handhelds
Streaming services to physical media (and self ripped digital files)
Plus boycot all the fast food chains, coca-cola etc.
That’s off the top of my head.
@GMac @JensSpahnpasta whatsApp -> #Deltachat / #Arcanechat
Why #Signal is being brought up again and again is beyond me… It is an American company, therefore bound to US law, which means NSA involvement, which means guaranteed backdoors to encryption.
The fact that it’s a non-profit or a foundation even says nothing (just look at #OpenAI ). Also US has stopped being a democracy, so every US company is now a vessel for authoritarianism.
Thus, going from WhatApp to Signal does nothing for you.
It is an American company, therefore bound to US law, which means NSA involvement, which means guaranteed backdoors to encryption.
That’s a very strong assertion and, given an open-source client and a documented protocol, one that is very easy to prove if true. So I presume you can point at what, in the Signal protocol, is a backdoor in the encryption.
@david_chisnall @GMac @JensSpahnpasta I agree with @adbenitez
In any case, the fact that Americans are very hush hush on any quantum tech advancement, leads me to believe they are already employing their qubits to crack every and all encryption. Whether it’s true or not, I don’t really care, it is however very plausible. In any case every bit and byte of my data that does *not* traverse into US controlled networks is a definite plus in my book.
@david_chisnall providing a backdoor in the app is hard to pull out, it can be done deploying a custom app via google play to specific targets, what code is there made public doesn't matter
but more likely to happen is to do the malicious activity on the server, for example, seal sender is done in a "best effort" in the app, the app could drop to non-sealed sender any time for any message without people noticing, they could also start tracking IPs etc