Secret Alt Account

  • 0 Posts
  • 10 Comments
Joined 4 months ago
cake
Cake day: June 29th, 2024

help-circle
  • i wonder if they are a honeypot too

    If you use a free tier VPN, which doesn’t allow torrenting, then connect tor to it, then connect another non-tor encrypted connection to that (such as a different VPN), if you torrent from the different VPN (an encrypted VPN stream that passes through Proton), they still detect torrenting. This suggests advanced DPI. What no log VPN needs DPI?

    They also have dark design elements including logs you have to turn off by default.

    Proton also does aggressive scanning of certain things users do and will shut down accounts based on that. The problem is what privacy focused company scans user stuff like that?

    They also log multiple browser metrics when signing up or at least access them, such as audio context fingerprints. Is that really important for the sign up process?

    It wasn’t bad they gave up info to jail an activist, it was bad they said in their marketing materials they couldnt and didnt do that.

    ProtonVPN also for many years never accepted Monero and their email didn’t as well. So they care about privacy, but won’t accept the privacy crypto? There wasn’t a rational explanation for it, unless they are a honeypot. There were third parties who could have accepted the funds. The whole thing was unusual. It was incredibly suspicious. If you care about privacy so much, why not accept Monero for your email services? This is the most damning part of this. If they are a honeypot, it makes sense, if they aren’t it’s a head scratcher.

    It could be a coincidence? Possibly? But probably it isn’t. Everyone who loves privacy loves XMR. They don’t like XMR. You know who hates XMR? Governments. And so if someone is saying “I love privacy” and has numerous complex programs released, but then says XMR is too hard to accept, it should indicate something is odd.


  • Oh my goodness, the stupidity is off the charts

    The fight is over whether Apple must officially break into their code in the normal way

    It doesn’t preclude a back door

    There could be a backdoor exploit program so people can acess the phones and see everything in them through the cellular modem in certain parts of the government.

    If other parts of the government were not privy to this, they could get into an argument in open court about breaking their “privacy” generally

    Do you think if there was a gag order the lawyer representing Apple would write “But wait, this is an irrelivant debate because there’s actually another backdoor exploit?”

    Some of these phines could have been in airplane mode also making 1 type of exploit not usable.

    You do not know what the fuck you are talking about at all.

    Do you think an attorney for Apple is going to go into a court and say “The secret court made us put a baxkdoor into this part of tge phone, so why are we even arguing about this?” Such a lawyer would be jailed. You are incredibly naive and your reasoning is mostly “but Apple said so”

    The code is closed source.



  • They don’t need to incur a benefit. If the government contacta their legal department with an order saying we need to talk to your developers in charge of iOS as part of a court order, they are required to do it and can face jail and fines if they don’t comply.

    If the government says “don’t say there’z an exploit” it’s not going to be disclosed in their policy and they will be protected for lying by omission if a court is requiring that.

    What is their motive? Avoiding contempt.

    Are you this naive about closed source code or the power of jails and fines to persuade people to lie? How would this threaten their business model? How would anyone know about the exploit given their code is closed source and law enforcement regularly use parallel construction? No one can audit the code. Do you know what closed aource code is or how a gag order works?




  • This view is incredibly naive. If a backdoor exploit was added by one group of developers who did the code for the cellular modem and network parts of the operating system, there would only be certain people aware on a need to know basis. You could have other ignorant law enforcement officers unaware of the exploit making demands in court as well as Apple’s legal department fighting requests and the exploit is still there. It is incredibly naive and frankly stupid to be believe that a lack of a leak about closed source code means probably an exploit like that doesn’t exist. Demanding proof with closed source code, gag orders, and large development teams, only some of whom could know about an exploit and gag order, is just not really being realistic.