Thank you for your answer @Charl-Ubermensch_G3 !
I like to share opinions, especially on computing topics.
But anyway, the topic has already been made by someone else so I feel a need to reply since the tips sahred are not perfect (not anything is).
Of course, I didn’t pretend to share the most prefect tips. But I am glad to read someone sharing his ideas on the subject
In fact, even if Tutanota is more trustworthy on my point of view, they can still read your emails. Thereby, the true best option is to self-host one’s own email server.
I totally agree you. DIY things are much more trustworthy (computing speaking).
But the blackpill is: mails are not designed to be anonymous. Encrypting the body of an email is boring to encrypt and the rest can’t be by anyway protected by any form of encryption.
It depends on the use of you email server. If it is on your self purpose, I agree. But, if it is on business purpose, my cybersecurity daemon is taking control.
The fact is your business generates your incomes and it is important to protect it against outside attackers that might block, ruin or even steal your work.
The most important part of your mail is the content not the contact, subject or any other metadatas.
Therefore, depending on the way you are using email server will have an impact on the way you install it and also which one.
It’s an utter lie. Some “bad tongues” will say that VPNs totally suck but in fact:
- IP is used in legal issues and in those cases can be linked with real identity
- Tor is fucking slow and buggy
Well, according to the promises of VPN’s company, yes VPN is a lie.
(Cybersecurity daemon coming )
However, to slow down hackers, it is a way of getting your IP tough to find against hackers.
Moreover, I consider people using there IP for legal activities (of course).
Tor… The idea is cool but still let me only access to DN. For other protections, I use proxies chain and a self-made VPN.
Tor is almost utterly anonymous, however it’s slow and it breaks a lot of websites. (it’s a lot of time wasted in capcha too).
Not anymore. Let me explain for the uninitiated.
The Tor network is based on 3 points.
Entry nodes, intermediate nodes, and exit nodes.
To control the whole network, you need exit nodes. Fun fact: the US federal government (NSA among others) controls enough output nodes to know who is browsing DN. Then, to simply know if someone is doing illegal actions they have just injected malwares or have spies on illegal web sites and forums.
So, Tor is not anonymous anymore.
It’s obvious but the minimum step towards privacy is to delete one’s Instagram account, Facebook account and Whatsapp.
100% agree !
The thing that people underrate is the importance of hardware/OS. You can run Tor with a VPN and so on, but if you’re on Windows/MacOS, you’re tracked.
Never without my linux
I don’t need to develop on Apple
Apple is a successful company, but crappy products.
I haven’t talked about smarphones privacy but anyway the best tip is simply to avoid phones.
I need to test the new smartphones running on linux