Posted on 11/02/2025 2:59:49 PM PST by ferg flute
Dear FRiends,
We need your continuing support to keep FR funded. Your donations are our sole source of funding. No sugar daddies, no advertisers, no paid memberships, no commercial sales, no gimmicks, no tax subsidies. No spam, no pop-ups, no ad trackers.
If you enjoy using FR and agree it's a worthwhile endeavor, please consider making a contribution today:
Click here: to donate by Credit Card
Or here: to donate by PayPal
Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794
Thank you very much and God bless you,
Jim
(It’s not rocket surgery.)
I need to steal that. Brilliant!
> I second Proton Mail
Yep, Proton is good.
Vendors are learning that the best way to not only protect their customers' data, but also their company from liability, is to employ "Zero-Trust" architecture. In the case of a cloud application, it means to do all encryption/decryption locally on the customer's computer, using AES-256. Nothing leaves the customer's computer that isn't encrypted. The vendor doesn't have to worry about breaches causing anybody to sue them, and the customers' data is secure.
In fact, "Zero-Trust" ASSUMES that sooner or later there will be a breach and the bad guys will get the data stored in the cloud. Since it's encrypted with a key that lives only on the customer's computer, the bad guys are out of luck.
Keeper Security Password Manager does that. Highly recommended, but it's not free.
BTW, end-to-end (E2E) encryption does not in itself guarantee that your data is encrypted at the vendor's facility (data at rest). E2E is about the transmission, with a sender and a recipient who can both read the data, and thus allows the vendor to store plaintext after decryption at their facility.
“BTW, end-to-end (E2E) encryption does not in itself guarantee that your data is encrypted at the vendor’s facility (data at rest). E2E is about the transmission, with a sender and a recipient who can both read the data, and thus allows the vendor to store plaintext after decryption at their facility.”
The want for convenient “storage” is the whole big deal... Laziness.
All this is why I am getting off the WWW/HTTP protocols altogether. True encrypted TLS end to end P2P with no intermediate peer network node hops. Basically phone number directly to phone number with no “message service” in between. No storage at all except your local client tunneled to the end receiver’s local client. And which is fine, like a FAX machine it will just have to redial occasionally until the machine on the other end is online and available then it will send and they will get it.
This want for “convenient second party storage” is what has created all these email problems. Want to be secure? Get “FAX mind” and just keep dialing until their FAX machine (local Client inbox) picks up the phone on the other end. Then it is tunneled directly from machine to machine. But this is too much “Work” so now we have what we have now... A mess of third party intervention, control, and stewardship. There are local email clients that will automatically check for a connection every so often until the direct line becomes available to receive like a FAX machine does.
This is true end to end encryption.
The price of internet communication is eternal vigilance.
Your efforts are commendable—but paranoid me is convinced that NSA (and perhaps other governments) have hardware spying at the factories where the computer components are built.
That was the claim that Snowden made (long ago at this point) and I have no reason to doubt it.
In years past I built my own computers from scratch with hardware components I trusted, and open-source software. These days I can't build my own hardware. I still use as much open-source software as possible. Past that, I just have to accept the residual level of risk.
You might not want AI, but AI wants you and all your data.
They were already doing that. How do you think spam filtering works (poorly, but still). Plus Yahoo has that “Priority” view, which I hate because it’s always wrong (where’s that @$#% email, oh click on All). The only thing that changed is now they’re doing it in a way you notice.
Encrypted emails. Of course try to get companies to send to you encrypted. And teach all your friends and relatives how to do it. But, encrypted emails will block AI, and lots of other stuff.
Good post.
They key is to avoid overconfidence that any of us has privacy.
My baseline presumption is that if .gov has any issue with you then you have zero privacy.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.