RatoGBM

joined 1 year ago
[–] [email protected] 5 points 2 months ago* (last edited 2 months ago)

Thanks, exactly what I wanted to know. This explains a lot.

There had to be some reasoning behind it after all.

[–] [email protected] -1 points 2 months ago

So the email and username have no cryptographic purpose, they are just there for convenience.

Thanks I guess...

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago) (3 children)

So the email and name will be plaintext in the public key/signatures?

memorable link to the public key’s owner.

Ok, just strange how the key generator insists on specifying them. Encryption usually doesn't like extra metadata.

[–] [email protected] 6 points 2 months ago* (last edited 2 months ago)

From my knowledge VPNs hide your IP from the destination, and the destination from your ISP.

Fingerprinting is mostly about the browser you use.

For VPN any VPN should do (eg. Mullvad VPN $5/month) and for Browser just have a non-big tech browser with ad-blockers and tracking protection (eg. Mullvad Browser or other Firefox/fork with good config).

Or Tor

Also, how serious is the "not getting tracked" need? It sounds like you are getting hunted by the social media site? Wouldn't that need full OPSEC mode with Tails and Whonix like the real darknet hackers?

For the VM, I can't help you much. There should be tones of cloud hosting providers out there, just a Linux VM on another guy's computer after all.

PS: I am a newbie just repeating stuff I heard before like a parrot.

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago)

Some random notes app on F-droid probably has what you need. (Notes apps because "Diary" gives mostly medical/habit trackers/loggers)

Also check IzzyOnDroid repo (select "Writing" category or just search for "Diary"), it has more "modern" apps in my impression.

You will need to scroll through quite a few to find one you like. Just don't get yourself into choice dilemma, pick one that looks decent and start using it.

-28
submitted 2 months ago* (last edited 2 months ago) by [email protected] to c/[email protected]
 

Cunningham Law (backfired terribly)

Can someone please explain why PGP is needs all of these? All explanations of public key encryption mention any email embedded emails.

And I probably don't completely understand what PGP is, so please give me a good article or video on it.

[–] [email protected] 1 points 1 year ago

I don't watch TV shows (idek what they are)