I have realized that outside my nerd filter bubble, there is surprisingly little knowledge about this important topic. Unfortunately, it's no longer possible today without a bit of basic knowledge, otherwise you will too quickly become a data cow on the server farm of the big tech companies.
Here are the most important topics you should consider when communicating securely and privately on the Internet:
1) End-to-end encryption (e2e) is important so that the encryption is really tap-proof. However, this also means that the encryption only exists from one point to another and not that the messages are forwarded to the tablet or computer. Please also make sure that the messages do not end up unencrypted in the log file, otherwise they could compromise you later.
2) Good encryption makes you tap-proof but not anonymous. To achieve this, the metadata must be kept to a minimum and hi
... mehr anzeigen
I have realized that outside my nerd filter bubble, there is surprisingly little knowledge about this important topic. Unfortunately, it's no longer possible today without a bit of basic knowledge, otherwise you will too quickly become a data cow on the server farm of the big tech companies.
Here are the most important topics you should consider when communicating securely and privately on the Internet:
1) End-to-end encryption (e2e) is important so that the encryption is really tap-proof. However, this also means that the encryption only exists from one point to another and not that the messages are forwarded to the tablet or computer. Please also make sure that the messages do not end up unencrypted in the log file, otherwise they could compromise you later.
2) Good encryption makes you tap-proof but not anonymous. To achieve this, the metadata must be kept to a minimum and hidden and the data exchange must be routed via the TOR network, for example.
3) Open source (FOSS/FLOSS) does not make the software fundamentally more secure, but it is a prerequisite for secure software. Real security can only be achieved if the source code can be viewed and is constantly checked for vulnerabilities. So pay attention not only to free software but also to how quickly security vulnerabilities are corrected and whether there are independent code reviews.
#messenger #communication #surveillance #security #cybersecurity #internet #faq #basics #knowledge #e2e #tor #anonymous #software #opensource #foss #floss #metadata