byte1000

joined 2 years ago
[–] [email protected] 3 points 2 years ago* (last edited 2 years ago)

Additionally, if you share your account with other people and haven’t enabled two-factor authentication, you may not want to join the Sentinel program, as it will increase your chance of being challenged during logins.

I wonder, so why not just force Sentinel program users to enable 2FA?

[–] [email protected] 10 points 2 years ago (6 children)

If an app on one device connects to an app on another via Veilid, it shouldn't be possible for either client to know the other's IP address or location from that connectivity, which is good for privacy, for instance. The app makers can't get that info, either.

Is that considered a new thing? I don't think I've ever encountered a P2P service/protocol that also masks IP addresses.

[–] [email protected] 2 points 2 years ago (1 children)

When you hide read posts, are my own posts hidden? Is there a distinction between read posts on my feed versus read posts on a specific community page? Or maybe it just hides everything?

[–] [email protected] 2 points 2 years ago

No, at least not on Android.

[–] [email protected] 1 points 2 years ago* (last edited 2 years ago)

I understand what you said. I'm saying that most of the time, what happens is actually the opposite of what you said.

and it keeps on asking me to update proton mail to 3.0.16, and this version is not on the play store.

Version 3.0.16 has been on the Play Store for quite some time, I've got it updated through Aurora Store. Since July 25th to be precise. So it took them about 17 days to publish it to GitHub, after pushing it to Play Store.

The Play Store doesn't always push an update at the same time to all users. So instead, they have a Staged Rollout. Here's an example from this article, it's not related specifically to Proton.

[–] [email protected] 1 points 2 years ago (2 children)

I think they're pushing the update to the Play Store before they publish it to GitHub.

That's so annoying, as an F-Droid user, to almost always be one version behind. It also might have security implications that I'm not aware of.

[–] [email protected] 6 points 2 years ago

Relatively high number of RCE vulnerabilities.

[–] [email protected] 2 points 2 years ago

Well, you use Linux, maybe Win11 is screwing me in that case.

[–] [email protected] 4 points 2 years ago

IMHO that's a highly requested feature.

[–] [email protected] 2 points 2 years ago* (last edited 2 years ago) (4 children)

I did that, several times. I tried it natively on Tor Browser for Windows 11. I also tried it in a virtual machine on Tor browser for TailsOS.

On Tails, only resetting the VM did manage to prevent fingerprint(dot)com from tracking the browser, just closing and opening the browser up did not.

[–] [email protected] 2 points 2 years ago (6 children)

What if the site was even able to fingerprint my Tor browser?

I didn't change anything in the browser settings menu. Only thing I did after loading the site for the first time was to click "block canvas fingerprinting".

I'm on Windows 11 BTW.

view more: ‹ prev next ›