Depends. I've found that it was able to explain to me (about Spanish) why, when and how to use this form or the other. But it won't come up with a plan of lessons. And the level of support will depend on the amount of resources available for the language you want to learn
If you sign up for a service using real information that can be traced to you (as in this case: home address, personal email) and then do illegal* things with the account, don’t.
The * here is that what the alleged protester allegedly did or said is irrelevant. And the article is pretty clickbaity, unless the author was unaware of how online accounts work.
Revolut was mentioned before, but let me elaborate on it.
They are essentially a bank but you can open an account through their app with the needed IDs.
You load money onto your account via a card payment from a conventional bank account, so no transfer fees apply in that sense.
They have one time use virtual cards and free persistent virtual cards. You can order physical ones if you want. You can set limits and recurring transactions per card. It even recognizes subscripition services and lets you know in advance if you need to top up the account before a payment is due.
Caveat: ads for their own services to buy crypto, gold, stocks and crap. I personally wouldn't keep huge sums on my account, but know people who use it extensively. Even after years of usage, they werent burnt yet.
I have no experience with customer service, as I only use it for what you are looking for. According to the internet, their CS can be abysmal.
Why would you ever be buying a sim card seprate from the carrier servicing it...?
Honestly asking, that's incredibly unusual to me. Where I live, the mobile carrier always provides the sim card. Usually free with a monthly phone plan, or as a part of a pre-paid plan. (pre-paid you can usually buy from a corner store like seven eleven. monthly you'll actually have to visit their store/mall booth)
In the US the permanent resident card is green, and its often called the green card. Sometimes americans use the term for equivalent documents in other countries.
"helped" is very misleading. Companies can't refuse to provide information they have when served a search warrant / court order. These companies DID NOT choose to provide the info on their own.
“helped” is very misleading. Companies can’t refuse to provide information they have when served a search warrant / court order. These companies DID NOT choose to provide the info on their own.
You are suggesting all these companies are completely helpless against legal requests. That is not correct. A company should first make clear that the legal request is actually completely legitimate and correct. After that they can look at whether they should provide the information or not.
As someone who has worked fraud and online investigations, and both written and served search warrants; it is not an option. A probable cause affidavit is presented to a judge and if the judge agrees there is sufficient probable cause, a search warrant is issued. This is an order by the judge and not optional. The judge can hold the company in contempt if they refuse to obey his/her order.
Read the blog by the guy behind cock.li , he refused multiple illegitimate warrants so far.
What matters is the jurisdiction of the service, not the one of the warrant author, otherwise china would have already warranted all data of all other world citizens lol
That is true. But I wasn't debating about this specific case, but rather the generalized statement.
The comment I replied to implies "If there is a warrant, it is always legitimate and you have to follow it, because a lawyer said so". That is not true and if it were the world would quickly go to shit, which I pointed out.
There is a great talk from the Lavabit CEO who discusses what happened to him and his company when they found out Snowden had an email at his company. I won't link it since it's YouTube but it's an hour long but he talks about his experience with the FBI and the courts. You can search for M3AAWG 2014 Keynote, I highly recommend it.
Yep, which I think is why it's more important to see what data is being collected and stored, rather than giving up data based on how trustworthy an entity seems
If the tool doesn't collect or log the data to begin with, then there's nothing that can be stolen/taken/demanded
The solution in this case might be for Proton (and the other companies) to list out risks and data collection information along the way.
We need X in order to do Y. Read more on how Y works. Now here are some risks, and how to avoid them:
(Assuming Android)
IIRC a sim is a full microcontroller. I'm not sure about the protocols and actual vulnerabilities, but I can say no phone has a trusted or completely documented kernel space or modem. The entire operating system the user sees is like an application that runs in a somewhat separate space. The kernels are all orphans with the manufacturer's proprietary binary modules added as binaries to the kernel at the last possible minute. This is the depreciation mechanism that forces you to buy new devices despite most of the software being open source. No one can update the kernel dependencies unless they have the source code to rebuild the kernel modules needed for the hardware.
In your instance this information is relevant because the sim card is present in the hardware space outside of your user space. I'm not sure what the SELinux security context is, which is very important in Android. I imagine there are many hacks advanced hackers could do in theory, and Israel is on the bleeding edge of such capabilities. I don't think it is likely such a thing would be targeting the individual though. As far as I am aware there is no real way to know what connections a cellular modem is making in an absolute sense because the hardware is undocumented, the same is true of the processor. I'm probably not much help, but that is just what I know about the hardware environment in the periphery.
Yea I'm looking in do network monitoring when first connecting the phone. Will need root it seems. But since I will install GOS and reset it afterwards it would probably be my best bet for verifying no bad connections . Long time since I used wireshark but should be possible.
You would need a well designed Faraday box and a lot more of a test setup to verify that all possible communications are indeed reported by the device. No interface on the device itself can be trusted.
I think it's not the services fault that people aren't aware of the limits of encrypted services. They are not going to shut everythin' down just for a few people, if you need smth anonymous Proton is not for you.
Also, it's your task to have good opsec. If you give your iCloud email to Proton which has personal information sticked to it, you fault.
I do not blame Proton for complying with a request - it is a completely expected action from a company. However, I would blame them for advertising that makes them seem safer than they are for people who don't know better.
Oh it is for you, but you have to be careful. Proton won't try to find out info you didn't give them, but they can't pretend that they don't have info that they actually have. They run an onion service, and account recovery is made possible without a recovery contact.
I mean, there are better options, but you can also use Proton anonymously. Just have to use it appropriately. If you use it to send your name to the FBI, there ain't nothin Proton can do about that. Same if you link a recovery email linked to a personal account.
Proton and Wire didn't share any decrypted ciphertexts, Wire shared a ProtonMail address and Proton an iCloud Address that they had set as a recovery method.
Personal info like where they live came from Apple.
Privacy
Hot
This magazine is not receiving updates (last activity 54 day(s) ago).