I know there are plenty of software missing from here. This is just a fun infographic I made, no need to take it seriously :)

  • Lime Buzz (fae/she)@beehaw.org
    link
    fedilink
    English
    arrow-up
    12
    ·
    1 day ago

    I’ll go further than this and say that true security is where everybody has support enough to not want to steal your shit, hack you etc.

    Yeah corporations and governments are still a problem, for now, but both of the above parties would be far more secure if they did mutual aid, supported progrms to help the impoverished etc etc.

    Basically having a collective approach to security and not such a myopic individualistic one.

      • ObjectivityIncarnate@lemmy.world
        link
        fedilink
        arrow-up
        6
        ·
        1 day ago

        Anubis is so lightweight you’ll forget it’s there until you look at your hosting bill.

        I don’t know if they realize this is implying it’s onerously expensive, lol.

        • utopiah@lemmy.ml
          link
          fedilink
          arrow-up
          1
          ·
          12 hours ago

          What’s nuts is that what made Anubis’ author go down that path was Amazon Bot (I remember precisely because they are the bot that also blew up my logs and thus forced me to take action against LLM scrappers) and… a significant share of the Web is hosted on AWS. So… Amazon is actually probably MAKING money by scrapping, no matter how inefficiently. I already hated Amazon but this is even worst than I imagined. It’s probably not by design, to be fair, but it’s also probably not something they’ll invest into “fixing” as it’s making them money. What an absolute human centipede situation.

        • EnsignWashout@startrek.website
          link
          fedilink
          arrow-up
          4
          ·
          1 day ago

          That amused me, too.

          I think it plays fine for the intended audience, though.

          For the folks looking into Anubis, that line plays well - because hosting costs are driven up by the kinds of spam bot visits that Anubis slows down.

  • commander@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 day ago

    The hardest online privacy is not operating in a way that just links all your “private” activity because you logged in around enough places to link them together and at least one place somewhere can be linked to your real identity

  • nelson@lemmy.world
    link
    fedilink
    arrow-up
    76
    arrow-down
    3
    ·
    edit-2
    2 days ago

    Pretty sure banks have a pretty good track record of “keeping your money safe”. Why the fork would anybody trust banks to keep their money safe if they can’t keep your money safe?

    I don’t really understand why that statement is even on there?

    Unless you mean to argue some anonimity point, which I could agree with considering e.g. Monero would be more anonymous than a bank.

    But safe? I’d say the bank is quite safe to store money.

    • explodicle@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      37
      ·
      2 days ago

      Money in the bank can be seized and frozen for all sorts of reasons. If you’re in the USA, then police can charge your money with a crime even if you haven’t broken any laws. It’s safe until it’s not.

      • Semester3383@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        1 day ago

        Doesn’t have to be in the bank either; if you’re traveling with your life savings in cash, then if you get pulled over cops are likely to seize that money. Just because fuck you, that’s why.

      • Universal Monk@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        13
        ·
        edit-2
        17 hours ago

        Can confirm. about 15 years ago, my bank account was frozen for 3 weeks for child-support enforcement. Only they weren’t talking about my kid or even me. Some dude in Florida with my same first and last name was a deadbeat dad. So they froze my account because apparently, he didn’t have a bank account or something.

        What’s super annoying about it is that we had different middle names, not even close to the same social security number, and not one person even contacted me before my bank account was frozen. I only found out because a check I wrote or something bounced. And I was like, WTF?

        I was finally able to talk to enough bank people to clear it up. But it took 3 weeks. I never got an apology for it either. And the fuckers did not refund my insufficient funds fee. I mean, it was only $15 bucks, and it would have cost me more than that in my time to get a refund, but still…

        So yeah, even here in the US, banks can suck.

    • jumping_redditor@sh.itjust.works
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      1 day ago

      any bank that has the capacity to close your account without you explicitly requesting it should not be considered safe.

      fucking cip errors deleted my account

      whoever invented cip errors should be defenestrated at the earliest convenience

    • 小莱卡@lemmygrad.ml
      link
      fedilink
      English
      arrow-up
      6
      ·
      2 days ago

      Banks literally seize and freeze assets from people, e.g. Julian Assange.

      Banks have also a track record of seizing countries international reserves like Russia, Venezuela, Iran, etc…

    • TurtleTourParty@midwest.social
      link
      fedilink
      English
      arrow-up
      10
      ·
      2 days ago

      Banks keeping your money safe depends on what country you live in and how much its government has regulated them and/or provided some sort of backup in the case of a run or the bank going out of business.

    • The 8232 Project@lemmy.mlOP
      link
      fedilink
      arrow-up
      4
      ·
      2 days ago

      The intention was more “Banks keep my data safe,” but I wanted to provide a clearer explanation that if your data isn’t safe, neither is your money. I didn’t have enough room to put my full thoughts.

  • spv.sh@lemmy.spv.sh
    link
    fedilink
    English
    arrow-up
    24
    ·
    2 days ago

    where’s the shovel and double-ziplocs to bury your cash, silver, gold, platinum, and palladium? or the zippo to burn your prints off? get on my level, ho

    • Allero@lemmy.today
      link
      fedilink
      arrow-up
      43
      arrow-down
      3
      ·
      3 days ago

      Well, unlike Bitcoin, Monero is actually anonymous, and sometimes you gotta make payments online.

      You can’t do it privately with your card.

      • explodicle@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        15
        ·
        2 days ago

        Bitcoin’s Lightning Network has onion routing for privacy, like Tor.

        When Bitcoin had a bug that allowed some guy to give himself a bazillion bitcoin, it was detected and patched before he was able to sell them. When Monero encounters a similar bug, it will only be detectable by the price going down.

        • Allero@lemmy.today
          link
          fedilink
          arrow-up
          4
          ·
          edit-2
          1 day ago

          I’m not super knowledgeable on how anonymous such routing us, hence I avoid it.

          Don’t know why people bombarded you so much - the other side of total anonymity is that you really never know if anything got broken and someone earned off it.

          My suggestion, however, is to use Monero for payments, and not as a store of value.

    • potatopotato@sh.itjust.works
      link
      fedilink
      arrow-up
      8
      ·
      3 days ago

      This is the correct initial reaction but given the extent to which the US monitors every single transaction everyone makes, it’s getting awful hard to manage the influx of feral hogs without having them streaming through your door.

        • kadu@lemmy.world
          link
          fedilink
          arrow-up
          9
          arrow-down
          1
          ·
          1 day ago

          Any compliant commercial service will share user data with authorities - you don’t get to operate a company and skip local laws. That’s a non argument.

          What’s important is what “user details” they had on hand to share. If I create my service in such a way that I have zero data about you except some random useless string, I can “hand over all user data” to authorities and it would mean absolutely nothing for your privacy.

          • pyre@lemmy.world
            link
            fedilink
            arrow-up
            1
            arrow-down
            2
            ·
            edit-2
            1 day ago

            except they shared the IP address of an account even though they state “No personal information is required to create your secure email account. By default, we do not keep any IP logs which can be linked to your anonymous email account. Your privacy comes first.” on their homepage

            • andronicus@lemmy.world
              link
              fedilink
              arrow-up
              4
              arrow-down
              1
              ·
              24 hours ago

              It’s right there in your copy-paste my dude, “BY DEFAULT”.

              The jackass(es) who actually was at risk went the extra step to enable IP address logging, which means that when Proton had to comply with a lawful court order, they actually had data to give.

              Proton is a company like any other that has to comply with laws in the country they operate in, but unlike a lot of other companies, they don’t log data UNLESS YOU ASK THEM TO.

              Moral of the story is, like has oft been repeated, know your threat model and plan appropriately.

            • UltraMasculine@sopuli.xyz
              link
              fedilink
              English
              arrow-up
              1
              ·
              23 hours ago

              If I understood correctly from Proton’s privacy policy, VPN does not log IP addresses but at least in some circumstances Mail does. This is from their privacy policy:

              Due to limitations of the SMTP protocol, we have access to the following email metadata: sender and recipient email addresses, the IP address incoming messages originated from, attachment name, message subject, and message sent and received times.

              One thing must be remembered: Even Proton must follow the law and rules.

              • kadu@lemmy.world
                link
                fedilink
                arrow-up
                1
                ·
                22 hours ago

                And those are the limitations created by the fact that email was never meant to be truly secure, not in the way we define and expect security and privacy nowadays at least.

    • archchan@lemmy.ml
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      edit-2
      2 days ago

      For starters, it’s open source. And I’m not too into the details, but the creator of Anubis even mentioned that they were interested in creating a non-javascript version for privacy.

      Google’s reCaptcha, to which Anubis is being compared to by OP, is obviously far less private. It’s just another mechanism of control and data harvesting for Google. One of the ways that they determine if you’re malicious/human or not is to check if you have a Google cookie in your browser and are signed in. Not to mention fingerprinting (hardware and software info), browsing data, AI training ironically enough (the fucking streetlights), etc etc.

      Anubis is relevant here because it is more private, among other things.

    • The 8232 Project@lemmy.mlOP
      link
      fedilink
      arrow-up
      22
      arrow-down
      1
      ·
      edit-2
      3 days ago

      Security isn’t the size of the app

      This could have two meanings, one of which I figure I should address:

      1. If you mean “size of the userbase for an app,” then yes, even projects that fly under the radar are much more secure than “mainstream” options. That’s the main purpose of this infographic.
      2. If you mean “physical size of the app on the infographic,” the reason they’re different sizes is simply because they were hard to fit on one page, and this made it look nice ;)
      • muusemuuse@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        12
        ·
        2 days ago

        It’s also a shit product riding on marketing laurels from its past glory days, like Norton. It leaves pieces behind that can cause malware to come roaring back.

        It isn’t hard to just nuke a system or restore a backup people.

      • KiwiTB@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        2 days ago

        Proprietary sure, but how is it privacy invasive let alone invasive on computers?

        What non-proprietary option is there? I can’t think of a single antivirus option which is actually remotely decent which is open.

        • The 8232 Project@lemmy.mlOP
          link
          fedilink
          arrow-up
          8
          arrow-down
          3
          ·
          2 days ago

          ClamAV is an open source antivirus, but I would recommend against using an antivirus altogether due to their invasive nature. You shouldn’t need one with proper sandboxing and isolation.

          • KiwiTB@lemmy.world
            link
            fedilink
            arrow-up
            5
            arrow-down
            1
            ·
            2 days ago

            ClamAV is slow to get updates and frankly not a great tool to use. AV is a must as isolation and sandboxing are only as good as the next exploit. Not too mention scams like phishing are not stopped by isolation.

    • pyre@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      1 day ago

      proton has already shared user data with authorities; you don’t have to go by your gut

    • Gaja0@lemmy.zip
      link
      fedilink
      arrow-up
      28
      arrow-down
      6
      ·
      3 days ago

      Maybe it’s because the current administration uses signal to plan acts of war and proton’s ceo is supportive of said administration.

      • 4am@lemmy.zip
        link
        fedilink
        arrow-up
        59
        ·
        3 days ago

        They don’t use Signal though. They use a clone called TeleMessage Signal which logs and archives all their messages on an Israeli server, and which a hacker was able to access before the service was suspended.

        You can’t really help if someone forks and misuses software.

    • hansolo@lemmy.today
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      2 days ago

      Ah, I believe this is what’s called “a conspiracy theory” if you had more details.

      • nebulaone@lemmy.world
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        2 days ago

        For Proton it is the “tech bro”-y feeling and for Signal it is wondering about financing. Also, if you are paying for your own audits there is an obvious conflict of interest.

        • hansolo@lemmy.today
          link
          fedilink
          arrow-up
          4
          ·
          2 days ago

          I’m sorry - paying for an audit is somehow a conflict of interest? How exactly is that?

          As someone who had to contract auditing firms every year, and personally sign off in their report as part of our compliance, I would love to hear how I should have …what? Won the audit lottery? Applied for some sort of government assistance? Prayed to an audit fairy godmother?

          Who the F else is paying for our audit? I want free audits! I bet everyone does.

          • OrteilGenou@lemmy.world
            link
            fedilink
            arrow-up
            2
            ·
            1 day ago

            My guess is they think that since you’re paying for the audit the auditors won’t bust you for fraud, which is cute, since the auditors are asked to audit specific things that the company asks them to audit. They’re not released on the company like witch hunters, with wide open access to everything, cutting a swathe through fraud and criminality while people are furiously burning documents in the basement. So there is no conflict of interest, since the auditors are looking at what the people using them are asking them to look at.

            • hansolo@lemmy.today
              link
              fedilink
              arrow-up
              2
              ·
              23 hours ago

              I know, it’s just kind of laughably shouting they don’t know what either an audit or conflict of interest actually are.

              The hardest part some times is finding an audit firm that isn’t stupid expensive, but also won’t do a shit job and give you a report that looks like some knock-off free LLM didn’t write it to maximize their own payday. I love a good audit report with findings, it means I didn’t waste money. But my shit is (well, was, at another place years back) locked down tight, so we didn’t ever expect anything terrible.

              • OrteilGenou@lemmy.world
                link
                fedilink
                arrow-up
                2
                ·
                19 hours ago

                Same here, everyone was so stressed about “the audit” but we had written common sense processes and executed them as needed, with mechanisms in place to flag potential areas for improvement if we found gaps.

                The audit was fine.

    • edel@lemmy.ml
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      2
      ·
      3 days ago

      Some of those mentioned likely are compromised, but cannot figured out which. The thing, is to diversify our risk and the privacy minded to use different platforms (Proton VPN and Mullvad VPN for instance).

      The good news, is that if an agency is compromising something, they will likely won’t use the intel gathered in court cases in order to leave it open to future prey, so that is good for vast majority of users. The very few that are relevant enough should not trust even the genuine privacy tools and resort to enhanced methods and combining methodologies.

      My impression, and just impression, is that I would trust **Tuta **more than Proton (and not because Proton’s CEO that many interpreted wrong anyways) On VPN… a tad more trust on Mullvad. Signal, I would not use it for high stakes communication but OK for most people. GrapheneOS seems okay and we know for sure it does not leak info on a daily basics, but we have to be careful, it could have an obscure code dormant waiting for a trigger or could easily send data to an unsuspected server, Ironically, if I were Snoden, I would feel more comfortable using a Huawei Mate with HarmonyOS than a Pixel 9 with GrapheneOS… of course China spies too massively, but it has far less beef with Snoden than the US does, therefore not of much interest to Beijing.

      Remember that overwhelming majority of FOSS goes without any audit, let alone a comprehensive one. This is what some trusted party should put AI checking ASAP all the FOSS out there!

      • nebulaone@lemmy.world
        link
        fedilink
        arrow-up
        8
        ·
        edit-2
        3 days ago

        Very interesting insights. Funnily I use all of the services you cautiously recommend, including GrapheneOS, but not HarmonyOS, hard pass on that one. As a German I am also legally required to prefer Tuta. :) I still have that OG 1€/Month contract.

        Edit: Your last point is a good idea, although I think the more popular an open source app is, the less likely it is to be malicious. A lot more eyes on it and the xz backdoor was caught pretty much immediately.

        • edel@lemmy.ml
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          2 days ago

          Of course… for us normies… GrapheneOS is the way to go. Very high targeted individuals in the West should however consider HarmonyOS. Of Course the Chinese government has eyes on that one but not specifically targeting you… unless they use it to trade intel on someone of high interest for China but no much collaboration between West and China intelligence agencies today…

          True, popularity increases the chances someone auditing. But, to a point. Ideally audit should be performed with every single update and on the servers, and there the premise of more eyes does not hold true no more. Then it comes trust. In a company like Tuta, the people behind showed their faces from day one, the same people are there, is a tight team so harder for a bad apple to do something. Considering both Tuta and Proton were good from inception (and I believe it may be the case), it would probably would be easier for an intelligence agency to penetrate Proton than Tuta, just for the structure that appears they have from outside. Now, Tuta made a horrible mistake once! In the Russian invasion of Ukraine, independently of one’s take on it, Tuta made the “Standing with Ukraine” (March 2022); that was a mistake, it may many doubt if privacy still their paramount over any other ideology. Maybe they have change since since no statements on Gaza… or maybe they agree with what is happening… who knows… that is why they should not make any statements at all, or clarify that while they have their ideologies in no case, ever will compromise their stands on privacy. To be fair, Proton did the same… nothing on Ukraine but on Gaza “We unequivocally condemn the terrorist attacks by Hamas against Israeli civilians […] We also condemn violence against civilians in Gaza”; so I guess both are comparable here! My trust for both is slim, as a company, and even their individuals.

  • Ardens@lemmy.ml
    link
    fedilink
    arrow-up
    16
    arrow-down
    2
    ·
    3 days ago

    But you do know that Tor/VPN is not really privacy, nor security? It hides your IP, but that’s about it. If you still login, and give any information, and that could just be your “fingerprint” you are not anonymous…

      • Ardens@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        2 days ago

        Only a few take their privacy serious. They, sadly, believe in the ethics of the Tech giants…

      • muusemuuse@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 days ago

        I2P is king here but it has a limitation that makes it stronger but less practical. I2P doesn’t generally do outproxies. A few exist but they typically aren’t trusted or used. Instead, I2P tries to keep private by only routing around traffic the originated within its own network rather than piping things from clearnet from one place to another. An issue with arrives that do that is you can see traffic from a honey pot going into a black box and with enough monitoring where it ends up leaving that black box. It’s very difficult to track traffic flow within the network but once it jumps back into clear net you can find it again.

        Now while you can argue that it doesn’t come out on clearnet, just originates from there, I counter that with Microsoft Windows telemetry, it might as well be clearnet. Windows is the dominant player at the moment so it’s most likely the traffic ends up on a windows machine. There are really benefits behind the telemetry date but they also means there’s a single point an authoritarian regime can apply pressure to to monitor whatever they want. With advances in AI, chewing through tons of collected data is much easier to do, so the idea of “they can’t stop all of us” is ridiculous. They will just pick off the undesirables in smaller chunks.

        Ultimately nothing is completely safe but if you really value privacy, make yourself such an enormous pain in the ass that monitoring you becomes a chore.

    • swelter_spark@reddthat.com
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      2 days ago

      Hopefully you don’t log in or give personal info to every website you use. Hiding your IP is still more private than not hiding it.

      • Ardens@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        2 days ago

        Do you know what your fingerprint is? And all the ways you are being tracked that is not about your IP?

        You do give personal info to every website you visit - with the exception of a very few, who respect your privacy. If you think you need to log in, to give personal info, then you are sadly misinformed.

    • The 8232 Project@lemmy.mlOP
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      2 days ago

      Encryption is a type of security, and Tor/VPNs encrypt your traffic. Accessing .onion sites over Tor is (at least in theory) more secure than accessing clearnet sites.

      • Ardens@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        2 days ago

        In theory - but it’s still primarily your IP you are hiding. And very few people only visits -onion pages…

  • Zerush@lemmy.ml
    link
    fedilink
    arrow-up
    11
    arrow-down
    3
    ·
    3 days ago

    It’s not about what you use, but how you use it. PEBCAK Almost 100% privacy and security is offline at home, reading a book, if you bought the book with cash and not online and/or with credit card.

    • Undertaker@feddit.org
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      2 days ago

      You can use Google, Microsoft, Apple and co however you want, the problem is, what you use