from Hacker News

Ask HN: Where do you go for good privacy tools?

by istingray on 9/6/21, 7:57 PM with 5 comments

In light of Apple and ProtonMail, I've been making changes to my tools to find better vendors. What are others out there finding? Any good meta sources or communities?
  • by Comevius on 9/6/21, 9:05 PM

    There are tools like the Tor browser, age and such, but it is challenging to hide your online identity because of fingerprinting, and to hide your online data because of the metadata, and also the data.

    For example online services today use data in transit encryption against man-in-the-middle adversaries, and data at rest encryption against snapshot adversaries, but without protecting the metadata created when the data is searched or accessed. Even data in use encryption would not protect the metadata. The data is also exposed to persistent adversaries when you don't control the encryption key.

    I'm working on a cloud database that uses searchable encryption, the first of it's kind and it's a monumental challenge. Encryption is the easy part, hiding the metadata is what's hard, the way encrypted data is accessed and searched paints a picture about the data. And the server can't be trusted, so the client or trusted third party must never share the encryption key with it, it also have to be able to verify the authenticity, soundness, completeness and freshness of the data.

    In other words, don't expect much privacy. Privacy is very hard, and it's not a lucrative business to get into it. From companies to governments everyone wants to feed your data to their statistical machines to predict you. Don't try to hide, you will stick out like a sore thumb, try to blend in, use fake data, make it look real.

  • by ev1 on 9/6/21, 7:59 PM

    The first thing is you will have to plan out your threat model. What are you doing? What are you wanting to do? Who is going to be bad for you?

    If you are an "activist" vs a "person that just doesn't want their email scanned for ads" there are very different vendor pools.