• 1 Post
  • 115 Comments
Joined 3 years ago
cake
Cake day: June 15th, 2023

help-circle





  • With dumbphones, you’re usually limited to regular phone calls or SMS/MMS messaging.

    That’s kind of the point.

    Sure, you can’t do much with them, but by that very fact you also won’t have nearly as much data to be spied on.

    Likewise, you can do much more with a smartphone, but that comes with a much higher surface of attack, and you also have to work a lot harder to keep all the data away from spying.







  • Apple Maps -OSMandMaps. Seems like a good option, but it’s not ready out the box. I need to do more tweaking with it. -Magic Earth. Haven’t tested it yet, seems good. But I’m looking for free options first before I dabble with paid stuff.

    If you like OSM but want a more user-friendly interface (disclaimer: I’m an Android user so I have no idea what OSMandMaps looks like), check out CoMaps! It was forked from Organic Maps due to heavy transparency concerns surrounding the former and uses downloadable OSM maps as a backend! It’s available for iOS too!

    https://www.comaps.app/download/

    Google Docs -OnlyOffice. Seems like it does everything I want.

    I’ve heard OnlyOffice is great, but if you don’t need or want any AI stuff, don’t mind a slightly less-modern UI, and collaboration isn’t a requirement, then LibreOffice is pretty awesome too. Just giving you another option. ;)

    https://www.libreoffice.org/





  • Okay, so, originally, I was going to look it up to prove you wrong, but after looking it up across multiple sources, it seems that you’re right and I’m wrong.....mostly.

    How-To Geek, Proton, and CloudFlare all mirror what you say.

    However, the Wikipedia page section “Definitions” does back me up somewhat. It says:

    The term “end-to-end encryption” originally only meant that the communication is never decrypted during its transport from the sender to the receiver.[23] For example, around 2003, E2EE was proposed as an additional layer of encryption for GSM[24] or TETRA,[25] ... This has been standardized by SFPG for TETRA.[26] Note that in TETRA, the keys are generated by a Key Management Centre (KMC) or a Key Management Facility (KMF), not by the communicating users.[27]

    Later, around 2014, the meaning of “end-to-end encryption” started to evolve when WhatsApp encrypted a portion of its network,[28] requiring that not only the communication stays encrypted during transport,[29] but also that the provider of the communication service is not able to decrypt the communications ... This new meaning is now the widely accepted one.[30]

    (Relevent text is embolded.)

    So, I’m not misunderstanding, just misinformed that the definition changed.

    Make no mistake, of course: I do appreciate you correcting me as I hadn’t realized the definition had changed. Lol.