I haven’t used any of them, but in addition to the suggestions here, there is also Infomaniak which is a Swiss provider. They seem to have better reviews on trustpilot.
I haven’t used any of them, but in addition to the suggestions here, there is also Infomaniak which is a Swiss provider. They seem to have better reviews on trustpilot.
That’s great, but was it a smart idea to register a domain name in a TLD whose root nameserver is Verisign (an American company)?
They’ve only just achieved this - something that a six year old can do - and yet there are dozens of corporations and startups claiming to already be developing humanoid robots. Yeah I don’t think the humanoid robots are going to be here soon. Imagine 300kg of steel with the intelligence of a 6 year old barrelling down the street.
JK Rowling is a transphobe, a bigot, and a fascist.
In regards to all the answers in this thread, consider: If you’re not paying for it with money, then what are you paying for it with?
The most private DNS is a recursive resolver.
Another corporate social media platform, what could go wrong?
Since nobody has mentioned it yet: Have you never wondered how dumpster fires get started?
J. K. Rowling is a fascist.
It protects you against your PC being compromised but it doesn’t protect you from someone stealing the device, assuming they have the necessary expertise to read the keys out of the device.
A regular laptop thief will have no idea what they’re looking at though, so it does have some value as a physical security (through obscurity) device.
Ultimately it depends on your threat model. If you never leave the house then it’s an upgrade from a software password manager.
Oh it’s you, the account that consistently posts beginner-level coding projects as if they are serious tools. The last time I reviewed your code there were security issues that would be obvious to anyone.
Please stop.
The author only mentions homomorphic encryption in a footnote:
Notes:
(A quick note: some will suggest that Apple should use fully-homomorphic encryption [FHE] for this calculation, so the private data can remain encrypted. This is theoretically possible, but unlikely to be practical. The best FHE schemes we have today really only work for evaluating very tiny ML models, of the sort that would be practical to run on a weak client device. While schemes will get better and hardware will too, I suspect this barrier will exist for a long time to come.)
And yet Apple claims to be using homomorphic encryption to provide their “private server” AI compute:
Combining Machine Learning and Homomorphic Encryption in the Apple Ecosystem
Presumably the author doubts Apple’s implementation but for some reason has written a whole blog post about AI and encryption and hasn’t mentioned why Apple’s homomorphic encryption system doesn’t work.
I’d be quite interested to know what exactly is the weakness in their implementation. I imagine Apple and everyone who uses their services would be interested to know too. So why not mention it at all?
how do you know they are safe? who is auditing the binaries?
This breach is worse than just a website’s database being leaked. These are info-stealer malware logs. Meaning that you had malware on one of your devices that recorded you typing your credentials into websites and then the logs of that malware were publicly leaked.
Before changing all of your passwords (and setting up a password manager if you don’t already use one) you need to identify which of your devices was compromised and wipe it.
If you change all your passwords from the compromised device then the malware will just record all of your new passwords.
I see so much astroturfing for Bluesky. They have good PR people who know what buttons to push, clearly.