Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Unsolicited AI summaries on Yahoo emails
fergflute

Posted on 11/02/2025 2:59:49 PM PST by ferg flute

click here to read article


Message from Jim Robinson:

Dear FRiends,

We need your continuing support to keep FR funded. Your donations are our sole source of funding. No sugar daddies, no advertisers, no paid memberships, no commercial sales, no gimmicks, no tax subsidies. No spam, no pop-ups, no ad trackers.

If you enjoy using FR and agree it's a worthwhile endeavor, please consider making a contribution today:

Click here: to donate by Credit Card

Or here: to donate by PayPal

Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794

Thank you very much and God bless you,

Jim


Navigation: use the links below to view more comments.
first previous 1-2021-30 last
To: dayglored

(It’s not rocket surgery.)

I need to steal that. Brilliant!


21 posted on 11/02/2025 6:07:33 PM PST by sgt_lau (Islamophobic? No. I reject a 7th century death-cult that demands non-believers like me, dead.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: bigbob; Bikkuri
> Proton Mail is a decent secure and free option because they uses zero-access end-to-end encryption.

> I second Proton Mail

Yep, Proton is good.

Vendors are learning that the best way to not only protect their customers' data, but also their company from liability, is to employ "Zero-Trust" architecture. In the case of a cloud application, it means to do all encryption/decryption locally on the customer's computer, using AES-256. Nothing leaves the customer's computer that isn't encrypted. The vendor doesn't have to worry about breaches causing anybody to sue them, and the customers' data is secure.

In fact, "Zero-Trust" ASSUMES that sooner or later there will be a breach and the bad guys will get the data stored in the cloud. Since it's encrypted with a key that lives only on the customer's computer, the bad guys are out of luck.

Keeper Security Password Manager does that. Highly recommended, but it's not free.

BTW, end-to-end (E2E) encryption does not in itself guarantee that your data is encrypted at the vendor's facility (data at rest). E2E is about the transmission, with a sender and a recipient who can both read the data, and thus allows the vendor to store plaintext after decryption at their facility.

22 posted on 11/02/2025 9:23:20 PM PST by dayglored (This is the day which the LORD hath made; we will rejoice and be glad in it. Psalms 118:24)
[ Post Reply | Private Reply | To 17 | View Replies]

To: dayglored

“BTW, end-to-end (E2E) encryption does not in itself guarantee that your data is encrypted at the vendor’s facility (data at rest). E2E is about the transmission, with a sender and a recipient who can both read the data, and thus allows the vendor to store plaintext after decryption at their facility.”

The want for convenient “storage” is the whole big deal... Laziness.

All this is why I am getting off the WWW/HTTP protocols altogether. True encrypted TLS end to end P2P with no intermediate peer network node hops. Basically phone number directly to phone number with no “message service” in between. No storage at all except your local client tunneled to the end receiver’s local client. And which is fine, like a FAX machine it will just have to redial occasionally until the machine on the other end is online and available then it will send and they will get it.

This want for “convenient second party storage” is what has created all these email problems. Want to be secure? Get “FAX mind” and just keep dialing until their FAX machine (local Client inbox) picks up the phone on the other end. Then it is tunneled directly from machine to machine. But this is too much “Work” so now we have what we have now... A mess of third party intervention, control, and stewardship. There are local email clients that will automatically check for a connection every so often until the direct line becomes available to receive like a FAX machine does.

This is true end to end encryption.


23 posted on 11/03/2025 3:49:09 AM PST by Openurmind (AI - An Illusion for Aptitude Intrusion to Alter Intellect. )
[ Post Reply | Private Reply | To 22 | View Replies]

To: Openurmind
My philosophy and practice with regard to my personal data security is: I've been intensely active on the internet for over 30 years, and have yet to have my personal data compromised.

The price of internet communication is eternal vigilance.

24 posted on 11/03/2025 7:34:19 AM PST by dayglored (This is the day which the LORD hath made; we will rejoice and be glad in it. Psalms 118:24)
[ Post Reply | Private Reply | To 23 | View Replies]

To: dayglored

Your efforts are commendable—but paranoid me is convinced that NSA (and perhaps other governments) have hardware spying at the factories where the computer components are built.

That was the claim that Snowden made (long ago at this point) and I have no reason to doubt it.


25 posted on 11/03/2025 7:41:37 AM PST by cgbg ("The truth is not for all men, but only for those who seek it.")
[ Post Reply | Private Reply | To 22 | View Replies]

To: cgbg
I tend to believe you're right, with regard to our and other governments putting spyware hardware in computers at the manufacturing level. I remember when some of them were discovered on foreign-made motherboards some years ago; no reason to doubt Snowden's claim with regard to those made stateside.

In years past I built my own computers from scratch with hardware components I trusted, and open-source software. These days I can't build my own hardware. I still use as much open-source software as possible. Past that, I just have to accept the residual level of risk.

26 posted on 11/03/2025 8:03:06 AM PST by dayglored (This is the day which the LORD hath made; we will rejoice and be glad in it. Psalms 118:24)
[ Post Reply | Private Reply | To 25 | View Replies]

To: ferg flute

You might not want AI, but AI wants you and all your data.


27 posted on 11/03/2025 8:05:26 AM PST by dennisw (There is no limit to human stupidity )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ferg flute

They were already doing that. How do you think spam filtering works (poorly, but still). Plus Yahoo has that “Priority” view, which I hate because it’s always wrong (where’s that @$#% email, oh click on All). The only thing that changed is now they’re doing it in a way you notice.


28 posted on 11/03/2025 8:11:34 AM PST by discostu (like a dog being shown a card trick)
[ Post Reply | Private Reply | To 1 | View Replies]

To: butlerweave

Encrypted emails. Of course try to get companies to send to you encrypted. And teach all your friends and relatives how to do it. But, encrypted emails will block AI, and lots of other stuff.


29 posted on 11/03/2025 8:12:57 AM PST by discostu (like a dog being shown a card trick)
[ Post Reply | Private Reply | To 2 | View Replies]

To: dayglored

Good post.

They key is to avoid overconfidence that any of us has privacy.

My baseline presumption is that if .gov has any issue with you then you have zero privacy.


30 posted on 11/03/2025 8:14:39 AM PST by cgbg ("The truth is not for all men, but only for those who seek it.")
[ Post Reply | Private Reply | To 26 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-30 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson