• 0 Posts
  • 104 Comments
Joined 1 year ago
cake
Cake day: March 30th, 2024

help-circle
  • As somebody who has in recent years changed habits like this, I agree with you. But its a harsh change at first.

    Turning off most notifications is a key step. It changes your mentality from reaction to your device to a proactive action at a chosen time. It’s a huge shift and well worth it.

    Then I started turning my services off at times. No, I don’t need to take a call while driving or check messages in the store. That stuff can wait.

    My overall logic is that I don’t need to make myself available to any and everyone at any and every time.

    Sure, sometimes it bites me in the butt as far as convenience, however my quality of life has improved overall. I am very protective of my time and mental attention now, and I wouldn’t have it any other way.

    I highly recommend taking small measures to test the waters. Then increase as you acclimate to it.



  • I’ve had the same thing happen for my own personal domain that I run through Addy. Its frustrating because people can’t tell what a “good” domain is, so how can you have any rules about it? And if you do, then have a verification system with your customer service team.

    But I’ve always said to myself, if this service won’t take my email then I don’t really want to be their customer. What else are they going to screw up when I give them my data?



  • Absolutely. Companies have every right to control what tools are authorized to use on their hardware, and what touches their data or users data. It could be as complex as security or as simple as don’t use a competing service, but it all makes sense. Don’t tell me how use my stuff and I won’t tell you how to use yours.

    If it’s BYOD then that’s another multiple layers of cans of worms not worth getting into.



  • I would probably argue they are the same in terms of security and privacy. Privacy communities tend to disfavor Proton because its all eggs in one basket, and also for political reasons. Both of those are subjective to your personal threat/privacy profile.

    Its true that a single point of failure is more risk than separate services, but that fact doesn’t undermine their security on a technical level, and has nothing to do with privacy. As for the political, yes it’s something to watch but nothing wrong has been done. They are set up as a non profit with checks and measures in place to prevent corruption from happening. I’m OK with different points of view and having different points of view on a board is a good thing.



  • I’m no ghost, not even close. Be careful though, “what’s the point?” Is essentially the question everybody asks at every phase of that iceberg diagram.

    A possible answer to your question though, is that even if the state doesn’t know or care about him today that might change tomorrow.

    That’s not my threat profile but it’s a valid one.


  • Moving to GrapheneOS doesn’t have to be full bore. While it obviously wouldn’t be as private, you could run google services sandboxed. That restricts google quite a bit rather than giving it full rights to everything on your phone. Other features you can take advantage of are granular permissions per app and the ability to easily turn things on and off (such as mic, camera, location), restrictions to contacts, restriction to files/folders, etc… Youd be amazed how much you can clean up your exposure even with google services running. But yes, you’d need to give up using google apps like calendar for any of it to do any good.







  • Just as a tip, set up and use a spare machine if you have one to make the transition easier. I’ve been running Mint now for a few months.

    I have a test machine that I am learning and getting familiar with, setting up a virtual machine to learn that (I have some windows apps I will not escape from so running in a VM is my solution), etc… And all of this is with the freedom that if I break something I can wipe it and not care. I have since set up a media center and a gaming machine as well.

    That experience is getting me feeling better about he whole thing. Honestly learning little idiosyncrasies like folder permissions not being inherited (I say as I set up my media center) are the things you juat need to learn through practice. Just my two cents as I am only a step ahead of you in a similar journey.


  • This just happened to me. I purchased shoes and they shipped via Amazon even though I didn’t buy them there.

    I think that’s part of what people don’t understand. Amazon isn’t a website that sells stuff, they are a dozen infrastructure based industries.

    Shut down their website and they still have the logistics to fulfill for the sites you shop on and their servers are probably hosting them too.



  • I don’t actually agree that your analogy applies, because it ignores my point.

    Neither “side” (as if there were only a binary choice but that’s how they want you to think) wants you to have privacy. Be united with those who want to fight for those rights instead of divided on other policies which are political smokescreens.

    Maybe a better analogy is that we are drowning in water that is not cold, maybe it’s tepid and maybe its boiling. But arguing over which is worse really doesn’t matter because we’ll be dead in a minute anyway.