Sounds cool asf, probably the way private messaging apps should be
Although, it is not really fitting my threat model, I would love to see how it develops
Sounds cool asf, probably the way private messaging apps should be
Although, it is not really fitting my threat model, I would love to see how it develops
You recognize patterns by observing long-term trends, not by overreacting to whatever most outrageous news headline you see right now
Who are you referring to as “the whole world”, specifically? People on Lemmy? Leftists? Your friends IRL?
His salute does not affect your life in any meaningful way unless you let it do so.
Stop switching to every new “cool” and “encrypted” service every time the previous one disappointed you a little bit. This is not helpful neither for your time, nor for privacy community overall. We should lean on most developed and best platforms we have right now (Proton, Signal etc.) and get everyone to switch. Unless we know we have market dominance, dispersing our efforts is futile.
And yep, answering your question, Tuta Mail is fine
deleted by creator
Do I understand correctly, what you mean is that there is an Invidious instance to which two users are connected. User A sends request to Invidious to get a video, Invidious forwards it to user B, user B downloads the video and sends it back to user A?
Sounds a lot like Tor or maybe I am missing something?