RatoGBM

joined 1 year ago
[–] RatoGBM@lemmy.world 5 points 3 months ago* (last edited 3 months ago)

Thanks, exactly what I wanted to know. This explains a lot.

There had to be some reasoning behind it after all.

[–] RatoGBM@lemmy.world -1 points 3 months ago

So the email and username have no cryptographic purpose, they are just there for convenience.

Thanks I guess...

[–] RatoGBM@lemmy.world 2 points 3 months ago* (last edited 3 months ago) (3 children)

So the email and name will be plaintext in the public key/signatures?

memorable link to the public key’s owner.

Ok, just strange how the key generator insists on specifying them. Encryption usually doesn't like extra metadata.

[–] RatoGBM@lemmy.world 5 points 3 months ago* (last edited 3 months ago)

From my knowledge VPNs hide your IP from the destination, and the destination from your ISP.

Fingerprinting is mostly about the browser you use.

For VPN any VPN should do (eg. Mullvad VPN $5/month) and for Browser just have a non-big tech browser with ad-blockers and tracking protection (eg. Mullvad Browser or other Firefox/fork with good config).

Or Tor

Also, how serious is the "not getting tracked" need? It sounds like you are getting hunted by the social media site? Wouldn't that need full OPSEC mode with Tails and Whonix like the real darknet hackers?

For the VM, I can't help you much. There should be tones of cloud hosting providers out there, just a Linux VM on another guy's computer after all.

PS: I am a newbie just repeating stuff I heard before like a parrot.

[–] RatoGBM@lemmy.world 2 points 3 months ago* (last edited 3 months ago)

Some random notes app on F-droid probably has what you need. (Notes apps because "Diary" gives mostly medical/habit trackers/loggers)

Also check IzzyOnDroid repo (select "Writing" category or just search for "Diary"), it has more "modern" apps in my impression.

You will need to scroll through quite a few to find one you like. Just don't get yourself into choice dilemma, pick one that looks decent and start using it.

-27
submitted 3 months ago* (last edited 3 months ago) by RatoGBM@lemmy.world to c/privacy@lemmy.ml
 

Cunningham Law (backfired terribly)

Can someone please explain why PGP is needs all of these? All explanations of public key encryption mention any email embedded emails.

And I probably don't completely understand what PGP is, so please give me a good article or video on it.

[–] RatoGBM@lemmy.world 17 points 10 months ago (5 children)

I lived in Russia, and in History class I was taught that Stalin singlehandedly showed up to save those poor helpless Europeans from bloody nazis, because it was the right thing to do.

When I loved in Europe, it were the Jewish partisans who won WW2 through brain drain on Germany, and the stupid Nazis killed themselves.

In the US I found out that the thing in Europe was typical Medieval European Kingdoms in a fight, and the real high-tech stuff was in the Pacific.

Now as a programmer, I know who truly won WW2: it was our legendary bro Alan all along.

 

If the south had problems with lack of infrastructure, why didn't they just use the underground railroad?

[–] RatoGBM@lemmy.world 4 points 1 year ago

Where is the Xign out button?