this post was submitted on 14 Jan 2024
1025 points (98.8% liked)
Technology
60130 readers
3795 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Unless you also employ very strict sandboxing, a rogue app or script could read those emails from your running system while LUKS is unlocked. There are plenty of CVEs relating to code execution; an infected JPEG, browser exploit, or any number of other things could expose your Thunderbird email database or the running memory to an attacker, particularly if you use "secure" services like Proton because you're the kind of person who would be targeted by state actors.