• 0 Posts
  • 42 Comments
Joined 8 months ago
cake
Cake day: June 10th, 2025

help-circle
  • Proton Mail is a good idea for the zero-knowledge encryption, but it’s a whole lot of vendor lock in as you can’t use standard clients (IMAP/STMP/CalDAV/CardDAV) for mail/calendar/contacts. Tuta isn’t any better in this regard. If you’re looking for ability to use standard open clients, probably mailbox.org would be a good option to check out.

    They have really dragged out making a Linux Drive client. The protocol isn’t documented for 3rd party implementations, but they’re Windows/Mac desktop clients are open source so it’s conceivable to reverse engineer the protocol from those, but nobody has done it.

    They’ve delivered a bunch of new apps to their suite like a crypto wallet and an AI agent, rather than addressing popular feature requests for existing software.











  • The problem with your comparison is that you’re physically sending your kids off with other people, and there are physical limitations on participation. Of course it’s encumbent on the organization employing those people to make sure they’re trustworthy (same for the adults who are volunteering to be responsible for the children). In the same way, Discord is responsible for making sure that their own employees aren’t abusing and preying on the users. They are expected to investigate any reports of abuse by either their employees, scouts, or adults volunteering. Just as Discord is expected to investigate any such reports, too. There are absolutely things to hold digital platforms accountable for to make things safer. But face scans and uploading government ID doesn’t accomplish that. We hold platforms to account by auditing their response to abuse reports and any failures in their privacy and security controls and if they can’t manage that then they should be dissolved.

    Even just since I posted my comment, there’s now this new link making my front page on piefed

    https://www.404media.co/free-tool-says-it-can-bypass-discords-age-verification-check-with-a-3d-model/

    Residential IPs aren’t static. VPNs exist. Residential ISP proxy services exist. Cloud providers exist from every inhabited continent. Tor exists. Determined predators and bad actors will get on the platforms and can get verified at whatever age group they want.

    If we pretend otherwise instead of educating the children on how to recognize predatory behavior then we haven’t protected them at all.


  • When Roblox rolled this out kids were using AI tools to perform the face scan. Kids have easy access to sneak their parents’ ID to upload in secret. Predators can use the same tactics. So we haven’t gained any security, but some people will be caught up with having their real data made vulnerable.

    The only real solution is for the parents/guardians to be engaged and involved in their childrens’ lives. That means I have to occasionally invade their privacy and look at their communications, but more importantly it means I have to tell my children about the predators and what kinds of things predators will say to them. It’s impossible to child-proof the world around us, we have to world-proof the children themselves.