I know there are plenty of software missing from here. This is just a fun infographic I made, no need to take it seriously :)

      • muusemuuse@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        4
        ·
        5 hours ago

        It’s also a shit product riding on marketing laurels from its past glory days, like Norton. It leaves pieces behind that can cause malware to come roaring back.

        It isn’t hard to just nuke a system or restore a backup people.

      • KiwiTB@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        5 hours ago

        Proprietary sure, but how is it privacy invasive let alone invasive on computers?

        What non-proprietary option is there? I can’t think of a single antivirus option which is actually remotely decent which is open.

        • The 8232 Project@lemmy.mlOP
          link
          fedilink
          arrow-up
          4
          arrow-down
          2
          ·
          4 hours ago

          ClamAV is an open source antivirus, but I would recommend against using an antivirus altogether due to their invasive nature. You shouldn’t need one with proper sandboxing and isolation.

          • KiwiTB@lemmy.world
            link
            fedilink
            arrow-up
            2
            ·
            4 hours ago

            ClamAV is slow to get updates and frankly not a great tool to use. AV is a must as isolation and sandboxing are only as good as the next exploit. Not too mention scams like phishing are not stopped by isolation.

  • spv.sh@lemmy.spv.sh
    link
    fedilink
    English
    arrow-up
    11
    ·
    9 hours ago

    where’s the shovel and double-ziplocs to bury your cash, silver, gold, platinum, and palladium? or the zippo to burn your prints off? get on my level, ho

      • krolden@lemmy.ml
        link
        fedilink
        arrow-up
        6
        arrow-down
        1
        ·
        edit-2
        6 hours ago

        VPN services aren’t for security they’re for getting around regional blocks. If you want privacy build your own. But even then youll still be tracked

          • muusemuuse@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            1
            ·
            5 hours ago

            Incorrect. It just means someone has to throw money at proton to get that data instead of throwing at ISPs and marketing nuts. They are subject to the same capitalistic pressures as anyone else.

            I2P needs more torrents and more people.

    • Zetta@mander.xyz
      link
      fedilink
      arrow-up
      7
      arrow-down
      1
      ·
      edit-2
      8 hours ago

      The post is about security /privacy, the non American ceos political opinions don’t impact that. Proton is still a good VPN/mail provider

      • edel@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        3 hours ago

        The Proton CEO is quite active in twitter and participates in podcasts. Well, one day he praised one action of the Trump administration on antitrust and a whole community attacked him for “praising Trump” when he did only a nomination for Attorney General for the Antitrust division. I highly doubt he is a MAGA supporter and listening to him for 30min on any of the multiple appearances he was on, will confirm you that. Several things concerns me on Proton, the CEO’s ideology ain’t one of them.

        Unrelated to this, I wish people was more forgiven of Trump voters, it is not the monolithic the Left tries to portray it is. Trump sold himself as fighting the establishment, being anti-war and pro-antitrust (many small business owners supported him). People voted for him even suspecting he most likely was lying. Many people, both in 2016 and 2024, voted for Trump because Hillary was very pro-war (for instance she say she would attack Russian military directly in Syria) and Kamala proudly said she would not change anything on Biden’s policy in the middle of Gaza’s massacres. MAGA has many racists, many! (Democrats has is share too, but usually quieter but one can notice them at the grocery stores!) But what made Trump win was desperate disfranchised Americans with no other alternatives that promised Change. Europeans should keep quiet too… in the last elections they voted as different as they could demanding change to end up with Ursula von der Leyen for another term. Democracies in both sides of the Atlantlic are heavily ill and people, in desperation, vote for whoever promises change, independently of anything else.

  • nelson@lemmy.world
    link
    fedilink
    arrow-up
    54
    arrow-down
    2
    ·
    edit-2
    9 hours ago

    Pretty sure banks have a pretty good track record of “keeping your money safe”. Why the fork would anybody trust banks to keep their money safe if they can’t keep your money safe?

    I don’t really understand why that statement is even on there?

    Unless you mean to argue some anonimity point, which I could agree with considering e.g. Monero would be more anonymous than a bank.

    But safe? I’d say the bank is quite safe to store money.

    • 小莱卡@lemmygrad.ml
      link
      fedilink
      English
      arrow-up
      3
      ·
      5 hours ago

      Banks literally seize and freeze assets from people, e.g. Julian Assange.

      Banks have also a track record of seizing countries international reserves like Russia, Venezuela, Iran, etc…

    • explodicle@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      17
      ·
      10 hours ago

      Money in the bank can be seized and frozen for all sorts of reasons. If you’re in the USA, then police can charge your money with a crime even if you haven’t broken any laws. It’s safe until it’s not.

    • The 8232 Project@lemmy.mlOP
      link
      fedilink
      arrow-up
      3
      ·
      9 hours ago

      The intention was more “Banks keep my data safe,” but I wanted to provide a clearer explanation that if your data isn’t safe, neither is your money. I didn’t have enough room to put my full thoughts.

    • TurtleTourParty@midwest.social
      link
      fedilink
      English
      arrow-up
      6
      ·
      10 hours ago

      Banks keeping your money safe depends on what country you live in and how much its government has regulated them and/or provided some sort of backup in the case of a run or the bank going out of business.

    • Allero@lemmy.today
      link
      fedilink
      arrow-up
      33
      arrow-down
      2
      ·
      16 hours ago

      Well, unlike Bitcoin, Monero is actually anonymous, and sometimes you gotta make payments online.

      You can’t do it privately with your card.

      • explodicle@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        7
        ·
        10 hours ago

        Bitcoin’s Lightning Network has onion routing for privacy, like Tor.

        When Bitcoin had a bug that allowed some guy to give himself a bazillion bitcoin, it was detected and patched before he was able to sell them. When Monero encounters a similar bug, it will only be detectable by the price going down.

    • potatopotato@sh.itjust.works
      link
      fedilink
      arrow-up
      8
      ·
      16 hours ago

      This is the correct initial reaction but given the extent to which the US monitors every single transaction everyone makes, it’s getting awful hard to manage the influx of feral hogs without having them streaming through your door.

  • Zerush@lemmy.ml
    link
    fedilink
    arrow-up
    10
    arrow-down
    3
    ·
    15 hours ago

    It’s not about what you use, but how you use it. PEBCAK Almost 100% privacy and security is offline at home, reading a book, if you bought the book with cash and not online and/or with credit card.

    • Undertaker@feddit.org
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      13 hours ago

      You can use Google, Microsoft, Apple and co however you want, the problem is, what you use

  • Ardens@lemmy.ml
    link
    fedilink
    arrow-up
    10
    arrow-down
    2
    ·
    16 hours ago

    But you do know that Tor/VPN is not really privacy, nor security? It hides your IP, but that’s about it. If you still login, and give any information, and that could just be your “fingerprint” you are not anonymous…

    • swelter_spark@reddthat.com
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      4 hours ago

      Hopefully you don’t log in or give personal info to every website you use. Hiding your IP is still more private than not hiding it.

      • Ardens@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        2 hours ago

        Do you know what your fingerprint is? And all the ways you are being tracked that is not about your IP?

        You do give personal info to every website you visit - with the exception of a very few, who respect your privacy. If you think you need to log in, to give personal info, then you are sadly misinformed.

    • The 8232 Project@lemmy.mlOP
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      9 hours ago

      Encryption is a type of security, and Tor/VPNs encrypt your traffic. Accessing .onion sites over Tor is (at least in theory) more secure than accessing clearnet sites.

      • Ardens@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        2 hours ago

        In theory - but it’s still primarily your IP you are hiding. And very few people only visits -onion pages…

      • Ardens@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        2 hours ago

        Only a few take their privacy serious. They, sadly, believe in the ethics of the Tech giants…

      • muusemuuse@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 hours ago

        I2P is king here but it has a limitation that makes it stronger but less practical. I2P doesn’t generally do outproxies. A few exist but they typically aren’t trusted or used. Instead, I2P tries to keep private by only routing around traffic the originated within its own network rather than piping things from clearnet from one place to another. An issue with arrives that do that is you can see traffic from a honey pot going into a black box and with enough monitoring where it ends up leaving that black box. It’s very difficult to track traffic flow within the network but once it jumps back into clear net you can find it again.

        Now while you can argue that it doesn’t come out on clearnet, just originates from there, I counter that with Microsoft Windows telemetry, it might as well be clearnet. Windows is the dominant player at the moment so it’s most likely the traffic ends up on a windows machine. There are really benefits behind the telemetry date but they also means there’s a single point an authoritarian regime can apply pressure to to monitor whatever they want. With advances in AI, chewing through tons of collected data is much easier to do, so the idea of “they can’t stop all of us” is ridiculous. They will just pick off the undesirables in smaller chunks.

        Ultimately nothing is completely safe but if you really value privacy, make yourself such an enormous pain in the ass that monitoring you becomes a chore.

    • hansolo@lemmy.today
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      1 hour ago

      Ah, I believe this is what’s called “a conspiracy theory” if you had more details.

    • Gaja0@lemmy.zip
      link
      fedilink
      arrow-up
      26
      arrow-down
      4
      ·
      19 hours ago

      Maybe it’s because the current administration uses signal to plan acts of war and proton’s ceo is supportive of said administration.

      • 4am@lemmy.zip
        link
        fedilink
        arrow-up
        50
        ·
        19 hours ago

        They don’t use Signal though. They use a clone called TeleMessage Signal which logs and archives all their messages on an Israeli server, and which a hacker was able to access before the service was suspended.

        You can’t really help if someone forks and misuses software.

    • edel@lemmy.ml
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      2
      ·
      18 hours ago

      Some of those mentioned likely are compromised, but cannot figured out which. The thing, is to diversify our risk and the privacy minded to use different platforms (Proton VPN and Mullvad VPN for instance).

      The good news, is that if an agency is compromising something, they will likely won’t use the intel gathered in court cases in order to leave it open to future prey, so that is good for vast majority of users. The very few that are relevant enough should not trust even the genuine privacy tools and resort to enhanced methods and combining methodologies.

      My impression, and just impression, is that I would trust **Tuta **more than Proton (and not because Proton’s CEO that many interpreted wrong anyways) On VPN… a tad more trust on Mullvad. Signal, I would not use it for high stakes communication but OK for most people. GrapheneOS seems okay and we know for sure it does not leak info on a daily basics, but we have to be careful, it could have an obscure code dormant waiting for a trigger or could easily send data to an unsuspected server, Ironically, if I were Snoden, I would feel more comfortable using a Huawei Mate with HarmonyOS than a Pixel 9 with GrapheneOS… of course China spies too massively, but it has far less beef with Snoden than the US does, therefore not of much interest to Beijing.

      Remember that overwhelming majority of FOSS goes without any audit, let alone a comprehensive one. This is what some trusted party should put AI checking ASAP all the FOSS out there!

      • nebulaone@lemmy.world
        link
        fedilink
        arrow-up
        8
        ·
        edit-2
        18 hours ago

        Very interesting insights. Funnily I use all of the services you cautiously recommend, including GrapheneOS, but not HarmonyOS, hard pass on that one. As a German I am also legally required to prefer Tuta. :) I still have that OG 1€/Month contract.

        Edit: Your last point is a good idea, although I think the more popular an open source app is, the less likely it is to be malicious. A lot more eyes on it and the xz backdoor was caught pretty much immediately.

        • edel@lemmy.ml
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          7 hours ago

          Of course… for us normies… GrapheneOS is the way to go. Very high targeted individuals in the West should however consider HarmonyOS. Of Course the Chinese government has eyes on that one but not specifically targeting you… unless they use it to trade intel on someone of high interest for China but no much collaboration between West and China intelligence agencies today…

          True, popularity increases the chances someone auditing. But, to a point. Ideally audit should be performed with every single update and on the servers, and there the premise of more eyes does not hold true no more. Then it comes trust. In a company like Tuta, the people behind showed their faces from day one, the same people are there, is a tight team so harder for a bad apple to do something. Considering both Tuta and Proton were good from inception (and I believe it may be the case), it would probably would be easier for an intelligence agency to penetrate Proton than Tuta, just for the structure that appears they have from outside. Now, Tuta made a horrible mistake once! In the Russian invasion of Ukraine, independently of one’s take on it, Tuta made the “Standing with Ukraine” (March 2022); that was a mistake, it may many doubt if privacy still their paramount over any other ideology. Maybe they have change since since no statements on Gaza… or maybe they agree with what is happening… who knows… that is why they should not make any statements at all, or clarify that while they have their ideologies in no case, ever will compromise their stands on privacy. To be fair, Proton did the same… nothing on Ukraine but on Gaza “We unequivocally condemn the terrorist attacks by Hamas against Israeli civilians […] We also condemn violence against civilians in Gaza”; so I guess both are comparable here! My trust for both is slim, as a company, and even their individuals.

    • The 8232 Project@lemmy.mlOP
      link
      fedilink
      arrow-up
      21
      arrow-down
      1
      ·
      edit-2
      24 hours ago

      Security isn’t the size of the app

      This could have two meanings, one of which I figure I should address:

      1. If you mean “size of the userbase for an app,” then yes, even projects that fly under the radar are much more secure than “mainstream” options. That’s the main purpose of this infographic.
      2. If you mean “physical size of the app on the infographic,” the reason they’re different sizes is simply because they were hard to fit on one page, and this made it look nice ;)
  • kaidezee@lemmy.ml
    link
    fedilink
    arrow-up
    4
    arrow-down
    4
    ·
    edit-2
    11 hours ago

    I don’t undurstand how Graphene can bigger than Linux on this list.

    • muusemuuse@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 hours ago

      Yes and no. It’s certainly better than stock android. You won’t find anyone who says otherwise. But it creates unnecessary dependancies on apple’s ecosystem and Apple can’t be trusted. Nothing with shareholders can be trusted. Apple might be an ally today but they are a US based-company operating within the confines of what the US will let it do.

      All their cloud services are pretty poorly protected too. Every year or so me and my friends will find Chinese gibberish entries in our calendars that link to phishing sites. These get cleaned up eventually but it proves that Apple is lying about not being able to access your shit.

      I’m planning my exodus from the Apple ecosystem and looking at grapheneOS but I’m still in the skeptic stage. I have lots of cloud decoupling to do and my self hosting ambitions are big so at the moment my iPhone isnt the biggest priority to change out.

      But I absolutely do not trust it.

    • Steamymoomilk@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      13
      arrow-down
      1
      ·
      10 hours ago

      Cool and who validates the code base for security vulnerability? And sends tons of packets related to tracking back to there servers?

      • spv.sh@lemmy.spv.sh
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        4
        ·
        6 hours ago

        the codebase itself? besides XNU, nobody… but, given the immense amount of scrutiny placed on the software, if there was some magic backdoor (an intentional one, anyway, not talking about like NSO group RCEs 'n shit), don’t you think we’d know?

        the average person doesn’t even know what grapheneos is. if they’re either going to buy an iphone, or some generic android phone running a vendor kernel that hasn’t been patched this administration, i’d want them to buy the iphone.

          • spv.sh@lemmy.spv.sh
            link
            fedilink
            English
            arrow-up
            3
            ·
            5 hours ago

            moi: “not talking about like NSO group RCEs 'n shit”

            tu: “how do you think pegasus works”

            you could have at least picked a different cyberwarfare company…

            by that logic, every OS under the sun has massive backdoors. bugs exist, man. my point was that for the average person, a fully-patched ithing is going to be among the more secure options.