If you test it, can you let me know how it compares to Findroid?
If you test it, can you let me know how it compares to Findroid?
Thanks for the explanation! I’ll try BetterBird
What is especially good about Betterbird in your opinion?
To anyone still singing the “installation too hard” argument… Archinstall is so cool now… The defaults are just so friggin sane and systemd-boot with UKI as the boot setup is really cool to just be able to choose in an installer. The partitioner is also so easy to use… Most pleasant experience with a Linux installer in recent years. Yes, I’m talking about Arch.
All that said, I love Tumbleweed. They’re also working on providing systemd-boot and it was nice when I tried it. And the one thing that i haven’t seen anybody else implement in a comparable manner is Snapshots. Gotta love it.
The people you described aren’t the ones being harassed
I think it’s very hypocritical of you to assume that and then call me out for assuming something similar. And then you call this harassment? I made an assumption based on an assumption you felt free to make. But when I make a similar assumption, that’s harassment?
If you are so confident in vegans harrassing almost-vegans who try to live without animal products, please name a single instance.
I’ve personally experienced it, both in real life and on social platforms, including lemmy. I just make it a point to try and avoid interactions like that these days. I don’t go into vegan communities despite being really enthusiastic about stuff like meat substitutes because around 50% of my interactions have been terrible. And 50% is a terrible number btw. The false equivalences, the assumptions and other issues even in this post’s comments section is kind of alarming. But yeah… Play a victim if that’s what suits you i guess.
I like the concept of veganism, but your community isn’t the best to outsiders. One day that too will change hopefully.
Removed by mod
What vegan is out there calling non-vegans rapists?
I’ve been told that before. Not being vegan implies you support terrible breeding practices which makes you a rapist… apparently… Which is especially dumb considering nobody likes the terrible breeding practices to begin with
Sounds delicious
Use it but don’t rely on it. Celeste uses rclone. The rclone support was temporarily disabled from Proton’s end a while back and also, the rclone backend still has a bunch of bugs and the developer seems to have gone missing
I guarantee you, he would still have dropped it at least once in two decades of use.
I don’t think you understand how AIs work
Yep, i have the same. But yeah, other than that, damn smooth
Most of systemd stuff is decoupled well. You don’t need to use networkd to make use of resolved for example.
One key aspect that you seem to be missing is that Proton encrypts every mail, including those sent by or sent to unencrypted providers using your pgp key before storing them on the server. This isn’t a case scenario that can be handled without using a bridge. Thunderbird or any other mail client won’t know how to handle that.
What you described only solves the end-to-end encryption portion of the problem Proton is trying to solve. Not zero access.
Yes, mail headers are unencrypted. They never claim otherwise and neither did I. If it were encrypted, it wouldn’t be interoperable, which is something you want it to be as well right? I’ve always been talking about the mail content itself. Unencrypted mail headers don’t make it “not zero access”.
I feel like you’re just not the target audience for Proton. I just use Proton because I’m fine with the web UI and Proton Unlimited is mostly good value for me. I do also pay for Purelymail as i have a few domains and they’ve been wonderful too.
The bridge does the decryption using credentials you give it locally. Sorry for mentioning “auth”. I should have mentioned encryption instead.
Regarding the rest, it comes down to the zero access mailbox encryption’s implementation details. In all described scenarios, you’re not really using your master password as the “key” for your mailbox. But in proton’s and similar services’ case like Tuta, this is true. Any “zero access” service provider offering IMAP access without a bridge is simply lying to you as IMAP (the protocol itself) requires server-side decryption of the content, even if SMTP doesn’t. (Btw, SMTP is really an artificial limitation. Just not IMAP. If they give you smtp access, it wouldn’t send encrypted mails unless specifically configured to do so but would otherwise be the same.)
What you described is encryption at rest, but not zero access encryption (which is what Purelymail does btw).
Whether all this is needed and all depends on your threat model. I think most tech-savvy folks would be happy with something like Purelymail or Migadu tbh…
They can’t do traditional IMAP/SMTP simply because they always do client-side auth rather than tradition server-side auth, which inherently makes them more trustworthy than every other provider that does offer IMAP/SMTP-based provider to whom you always send your passwords in plaintext. This has the added benefit of having at least your own mailbox always be zero access encrypted.
Ooh, that’s promising. I guess I’ll try it once it matures a bit more then. Thanks for going through the trouble of reviewing it!