• 18 Posts
  • 82 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle

  • ono@lemmy.catoPrivacy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    9 months ago

    Whether to use encryption is a per-room setting, not per-server. It’s controlled by the person who creates the room, not the server admin. It’s on by default, and cannot be switched off later.

    Rooms can be created without it because that makes sense for large public rooms, like those migrating from IRC, where privacy would defeat the purpose.





  • Correcting some misconceptions…

    Element for Android doesn’t support searching in encrypted channels

    That’s true of regular Element for Android, but it’s being replaced with Element X (which is built with Rust). I would expect search to be added there if it isn’t already.

    and I think you can’t use E2EE in the browser at all(?)

    I have done it in Firefox, so that’s false. Perhaps you had trouble with a specific browser?

    plus basically every other client has even more drawbacks when it comes to E2EE.

    Nheko handles E2EE just fine, so that would seem to be false as well.

    Since you’re looking for recommendations, it would help if you said which clients you tried and what problems you had with them.

    In case you haven’t seen it, you can set a Features: E2EE filter on this list:
    https://matrix.org/ecosystem/clients/


  • Not really an answer to your question, but just to make you aware of some options:

    Have you considered using subkeys for each of your machines, signing things with those, and keeping their master key someplace safe? That would limit your exposure if one of those machines is compromised, since you could revoke only that machine’s key while the others remain useful (and the signatures they have issued remain valid).

    Are you setting expiration dates on your keys? That can bring some peace of mind when you lose your key/revocation data.













  • Your current approach of talking raw SMTP is likely to be more hassle than is worthwhile, and since the days of permissive SMTP servers are long gone, might not work at all.

    Since you appear to be using an Debian-based Linux distro, I suggest this approach:

    • If you don’t specifically need exim, consider replacing it with the lightweight dma package (DragonFly Mail Agent): apt install dma
    • Configure dma (or exim) to use your ISP’s SMTP server as a smart host. (Or the Gmail SMTP server if your ISP doesn’t provide one.)
    • Use the /usr/sbin/sendmail command (which comes with dma or exim) to send messages from your scripting language of choice.

    If you prefer to receive messages as SMS, note that most major mobile carriers maintain an email-to-sms gateway for this purpose. Some web searches will probably lead you to the one for your carrier. They usually accept email at an address like 123456789@sms-gateway.example.com




  • ono@lemmy.catoPrivacy@lemmy.mlProton domains blocked as disposable in disposable filter
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    5
    ·
    edit-2
    11 months ago

    but you have no direct connection from this resource to harm you claim it causes?

    The connection is very clear, because you can see what domains are on the list.

    So you’re lumping this resource into a bucket with other resources that were malicious

    You’re saying a dev using this list […] needs to convert their FOSS use-case to yours?

    […] the argument I feel you’re making.

    Please stop putting words in my mouth. As you seem to be arguing in bad faith, I’m done with this conversation.


  • ono@lemmy.catoPrivacy@lemmy.mlProton domains blocked as disposable in disposable filter
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    4
    ·
    edit-2
    11 months ago

    You’re getting into very sketchy territory by saying a dev who is using a public GitHub repo to solve their problems needs to take it down

    No, I don’t believe I said any such thing. Since you mention it, though, I think taking this list down and removing the false positives before bringing it back up would be the responsible thing to do.

    In the interest of specifics, can you point to where this specific list has done harm?

    I know from personal experience and investigation (both as a user and on the admin side) that there are now many cases of privacy-focused email addresses being rejected, or even worse, accepted and then silently black-holed, due to the domains being inappropriately added to lists like this one. I don’t know of a place where people report such cases so they can be documented in aggregate, but if I find one, I’ll be sure to bookmark it in case your question comes up again in the future.