• 0 Posts
  • 130 Comments
Joined 1 year ago
cake
Cake day: July 23rd, 2023

help-circle
  • They do have e2e for emails. Any emails between Proton Mail users are always e2e encrypted, as are any emails others send you which they’ve encrypted with their own maio client. If someone sends you an email unecrypted (most email is), then Proton will encrypt it for you and put it in your inbox. They can’t read it after that, but there is some trust required that they don’t store/look at the unecrypted email before then.


  • I did pick the DBrand Kill Switch case (including. skin and screen protector) for both me and my partner. It was on the pricer side, but I’m pretty happy with it. Feels quite good to hold and certainly rugged enough to protect it. The skins also stop us from getting each others decks mixed up.

    As for a dock, I picked up the Anker one and it’s alright. Would have preferred the official one, but everywhere was charging a hefty price for importing it.

    I already had a hefty battery pack for travelling. Haven’t needed it much myself, but my partner recently made good use of it for an international flight.



  • The UnifiedPush server is intended to be a single source your phone can keep a persistent connection open to, rather than needing a connection per service/app (this is how Google’s Firebase notifications work too).

    As Signal doesn’t support UnifiedPush, MollySocket keeps a permanent connection open to Signal’s servers to listen for new activity and forward them to your UnifiedPush server. This saves your phone keeping a permanent connection open to Signal’s servers and draining your mobile battery more.



  • For Signal/Molly, it’s less that the notification is encrypted as I understand it. It’s more the notification content is just “Hey! Stuff happened” for Signal. The app then reaches out directly to the Signal servers to see what’s new. So the message content is never sent via the push notification service (UnifiedPush or Google’s service).





  • dracstoPrivacy@lemmy.mlUse ofSecurity' key from Yubico?
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 month ago

    The issue isn’t a big deal for the average user. The vulnerability required them to first get your username and password, physically steal your Yubikey, spend half a day using $10-15k worth of electronics equipment to repeatedly authenticate over and over, they then could potentially make a clone of the key.









  • When I migrated emails last time, I setup my old email to automatically forward to the new email. Then on my new email, I setup an automatic label for any email that was addressed to the old address. Every week or two I’d review what was sent to it and either update the email address used or unsubscribe. Eventually it got to a level where I wasn’t getting much at the old email anymore and finally deleted it.