A throwback to remind ourselves that apple is terrible for privacy

  • xedrak@kbin.social
    link
    fedilink
    arrow-up
    11
    arrow-down
    2
    ·
    1 year ago

    I’m not going to touch your other points, but you clearly have no idea how encryption works if you claim that any proprietary program using end-to-end encryption is insecure.

    • thann@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      15
      ·
      1 year ago

      if you trust everything a sales person says, I have a bridge to sell you.

      there is no reason to believe any proprietary program does what is says, and even if you decompile it and convince yourself its not sending your keys home, they could update it at any moment.

      IDK where you get all of this trust from

      • steakmeout@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        So in your view because anything could change everything will? How do you cross a road or drive or eat food or well anything at all?

        You must be super paranoid and fearful.

        • thann@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          2
          ·
          edit-2
          1 year ago

          no, its just an additional attack vector, having the code to inspect makes validating updates much easier and more secure.

          I’m evaluating the security of the software I’m using? what are you doing casually excusing a massive security flaw? you must not look either way before crossing the street

          • xedrak@kbin.social
            link
            fedilink
            arrow-up
            4
            ·
            1 year ago

            Oh really? You read the entire codebase of a project before downloading it, and every time you update it, you go over every single change like you’re the Greek God of code review? Because if you’re not, by your own standards, you’re opening yourself up to “additional attack vectors”

          • steakmeout@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            You’re talking cross-purposes. By your reasoning Lemmy or any client you use could be an attack vector - are you diving deep on the servers, their clusters, the network, their content relays, the source code to all of the software from servers to client? See, I doubt you do any of that.

            I think all you do is play angels and demons and decide that what you don’t know isn’t important, what you think you know is.

            You’re the attack vector.

            • thann@lemmy.worldOP
              link
              fedilink
              English
              arrow-up
              0
              arrow-down
              3
              ·
              edit-2
              1 year ago

              yeah, I’ve considered the security model of lemmy, havent you?

              EDIT: Is your argument that nobody should care about security and just be happy with whatever apple sells us?

      • xedrak@kbin.social
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        What you’re describing is possible in certain circumstances , but it would expose the companies to an insane amount of liability. Also, open source software can introduce vulnerabilities that could be exploited to do the same exact thing. Open source software is not inherently more secure. Remember that time malware was introduced to the Linux kernel directly as a research project?