asap

joined 2 years ago
[–] asap 6 points 7 months ago (1 children)

They might be talking about posts like this (which I would love to have refuted, as this kind of info has so far kept me from using Docker significantly):

https://security.stackexchange.com/a/169649

[–] asap 6 points 7 months ago* (last edited 7 months ago) (2 children)

Containers are isolated from the host by default.

Are you certain about that? My understanding is that Docker containers are literally just processes running on the host (ideally rootless), but with no isolation in the way that VMs are isolated from the host.

If you have some links for further reading it would be great, as I have been extremely cautious with my Docker usage so far.

I haven't found anything to refute this, but this post from 2017 states:

In 2017 alone, 434 linux kernel exploits were found, and as you have seen in this post, kernel exploits can be devastating for containerized environments. This is because containers share the same kernel as the host, thus trusting the built-in protection mechanisms alone isn’t sufficient.

If someone exploits a kernel bug inside a container, they exploited it on the host OS. If this exploit allows for code execution, it will be executed on the host OS, not inside the container.

If this exploit allows for arbitrary memory access, the attacker can change or read any data for any other container.

[–] asap 1 points 7 months ago* (last edited 7 months ago) (2 children)

First of all, you can pay with crypto and use a burner email, but secondly, they don't link searches to your payment or sign in. (Assuming of course you take their word for it, but that's the same for every service that you do not host or compile yourself, and for which you've also read the entire source code yourself.)

I'm not saying people should use Kagi, I'm merely pointing out you can't claim it's "misleading and not private" without providing some sort of proof.

At best you can say you can't verify for yourself that they are indeed private as they claim.

[–] asap 1 points 7 months ago

So all of your internet searches are tied to one kagi account?

Kagi states in their privacy policy, "To ensure your privacy and security, we don’t monitor, log or store your queries or associate them with your account".

Of course you have to believe them, but that's the same for every service that you do not host or compile yourself, and for which you've read the entire source code yourself.

[–] asap 1 points 7 months ago (4 children)

Kagi isn’t private and it is misleading to advertise it as such.

What is your reasoning for this statement?

Going directly from Kagi's own privacy policy, "To ensure your privacy and security, we don’t monitor, log or store your queries or associate them with your account".

Of course you have to believe them, but that's the same for every service that you do not host or compile yourself, and for which you've read the entire source code yourself.

[–] asap 1 points 7 months ago* (last edited 7 months ago)

If your sender sends an unencrypted message, yes Proton can see the plain text as would be expected. (Note, sending via TLS doesn't count as an encrypted email.) However according to their many audits their process is to immediately encrypt with zero-knowledge encryption in such a way that only you can access.

If you can't trust their published open source code and their multiple audits, then sure, you should look for alternate solutions.

mental outlaw video

For anyone else, it's this video. I'm 5 minutes in and it's talking about how SMTP isn't encrypted so Proton can read unencrypted email. Yeah, no shit...

[–] asap 15 points 7 months ago

Can we create a situation where brute force is unfeasible while using 6 digits PIN?

According to this comment from GrapheneOS, the latest Pixels and iPhones are not brute forceable with a 6+ digit PIN:

Pixel 6 and later or the latest iPhones are the only devices where a random 6 digit PIN can't be brute forced in practice due to the secure element.

[–] asap 8 points 7 months ago (3 children)

In what way can Proton read any of your content?

[–] asap 11 points 7 months ago* (last edited 7 months ago)

It was for me. Been using Windows for 20 years, installed Aurora after all the MS craziness this year and haven't looked back.

In my case it's turned out to be a whole lot better - my laptop runs cooler, battery last about twice as long, and I no longer have any issues with going to sleep when I close the lid.

view more: ‹ prev next ›