In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.
You can subscribe to this community from any Kbin or Lemmy instance:
Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!
Want to get involved? The website is open-source on GitHub, and your help would be appreciated!
This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.
Moderation Rules:
Additional Resources:
Whilst I agree with your sentiment, this isn’t how end-to-end encrypted chats work. Otherwise, it would be impossible to know the messages you’re receiving are coming from the person you think they are.
I suppose you’re right, but forging that kind of thing would be difficult, also considering the PKI already in place. If someone has their own email server and they sign/encrypt their email, and host their public key on a key server somewhere, it’s highly unlikely that all three would be compromised. and even if that fails, you could just meet up with them and exchange flash drives with keys.