• 2 Posts
  • 37 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle
  • Honestly i found that whole excerpt to be pretty nonsensical.

    Don’t see how that relates to what i said and then you quoted but reworded (why?). Plus it all just circles back into “its bad cause the UX is slightly more inconvenient”.

    If the author had any substance to his argument it wouldn’t require laying out a ridiculous scenario just to get the reader to understand what in hell he is trying to say.

    He basically tldrs the whole article a few sentences later with " I want it to be easy to use." The author never seriously considers if that’s worth the cost.


  • Author seems to ignore that FOSS projects tend to be much smaller teams without budget to create the user experience that private VC funded projects can.

    Ths whole accountability argument seems to be pretty disingenuous, allowing anyone who wants to evaluate the source code is about as accountable as it gets.

    The not-so-subtle “you will be lazy about what your doing if someone is not paying you not to be” vibe throughout this article is off putting to say the least.

    I also find prioritizing user experience over the sharing of source code to be misguided. Allowing folks to gate keep knowledge and hide what they are doing is a big price just for a better user experience.

    The real issue with FOSS is the same as with P2P networks. Most people are leechers whose only contribution is lip service.









  • “Basically then it degrades to a very strong password that can’t easily be phished.”

    I’m disagreeing with this, in that you are still (hopefully) using 2FA with your vault. Therefore whatever your accessing in that vault whether its a TOTP token or a password is still protected by MFA and not just a “very strong password”.

    Putting a TOTP token inside a vault protected by a strong password and another form of authentication is no less secure then having it be separate from the vault.










  • Not every concern is but ones where concern is based solely on fear and hypotheticals are. This all eggs in one basket line of reasoning is FUD and has no real bearing in reality.

    Even this email issue, it really has nothing to do with if you should trust proton in terms of OPs post. If you really believe Proton is going to sell you out, you wouldn’t use them anyway and Proton following the laws is something every legit business is going to do, not something specific to Proton. If you have the threat model of an activist you need to careful about your opsec as i explained in a previous comment.