https://molly.im/ Especially the FOSS version. Need to manually add the repository though.
https://molly.im/ Especially the FOSS version. Need to manually add the repository though.
Yeah… I kinda think that’s an experience every omnivore should have. Raise something with your own hands, then kill and eat it. If you can’t do that, at least you now know your hypocrisy.
I’m a hypocrite, too.
The bulls, yeah, that’s a planned pick-up to a meat farm or to the slaughterhouse, easy to distance yourself from mentally AFAIK. Not the heifers you’ve named and intended to keep.
Some of my relatives have a dairy farm. One time they had to put down a young cow and had it cut for beef/veal for themselves, since it was so sudden and unplanned. They told the cow’s name, what had happened to it, what its temperament had been like. That was enough to make the eating experience weird and a bit offputting.
They’ll keep bringing this up again and again and again until it passes, huh.
Next Council deliberations and vote in October-December.
Depends a lot on your peer group, but I have even fewer contacts that use PGP than ones that use either service. :/ Just tried to keep it simple.
What all do you consider “synchronizing” to include? I mean, the calendars won’t, but using Etar+NextCloud for calendar, and Tuta for email, has worked fine for me. Of course it means that my calendar isn’t encrypted.
I just tested sending an ICS event to both. The Tuta app offered to open it on Etar, and Etar offered the default calendar with dropdown for others, just like normal. (Strangely it didn’t even offer to open on Tuta’s own calendar, which is in the same app; maybe because I’ve added no calendars there?) Proton’s app (which may be out of date, the mail app isn’t on F-droid, either publicly or in an official repository, and I’m a lazy updater) wanted to open it on Proton Calendar only when I don’t even have it installed.
Proton’s bridge OTOH worked really well for me for syncing to Thunderbird, probably works as well for Office too.
First thing you need to understand is that the smooth end-to-end encryption works only tuta-to-tuta or proton-to-proton, so in rare cases. Encryption at rest, which is what tuta-to-proton, gmail-to-tuta etc. can do, is something that a lot of other email providers do too.
I’m currently in the process of moving from Proton to Tuta, because despite several years of promises, the Android client for Proton still doesn’t do non-google push notifications. Also because if you just need email with your own domain, Tuta is much more price-friendly. (The tier also includes unlimited calendars and event invites, which I haven’t tried.) If you also want VPN and encrypted storage, the balance tips.
I don’t use the calendar from either, so can’t talk for their properties. I prefer seamless calendar integration for wrist gadget integration and such, so using NextCloud Calendar + DavX. For smooth integration with encryption, could also look into Etesync. I think you’ll be able to share an ics attachment from either of those through your normal calendar.
Germany is a 14-eyes-country, but since I’m just privacy conscious and my threat model doesn’t include international-coordination-level actors (barely state level, am in the EU but not German, so eh, far enough), it doesn’t matter that much to me. Proton also has to obey court rulings.
Of the companies listed on the screenshot or mentioned in the article, at least LinkedIn, Twitter, Deezer, Dropbox, Zynga and MyFitnessPal have been hacked before. Probably just a collection of old data?
Edit: Yeah, aggregated data
Years ago the predecessor to Oscar didn’t support BMC devices, and doesn’t look like it’s changed. Yuwell isn’t listed either. Otherwise would be great. Maybe just don’t connect one of the more established ones?
https://www.apneaboard.com/wiki/index.php/OSCAR_supported_machines
I thought it was data out only too, but at my sleep apnea orientation was told (and I double checked that they really meant it) that they could also tweak settings remotely. ResMed. Always possible that they had misunderstood something too, of course.
I don’t know how the Play Store version does push notifications, but Molly, and I think the apk from their site, work just fine on degoogled phones without Google services.
I don’t remember what name it has, but missing it breaks push notifications on most “normal” apps. Many FLOSS ones are coded to have their own methods that don’t transmit data to Google, and it appears at least some versions of Signal do too.
My threat model doesn’t include state level actors taking an active interest in me, so for my purposes Signal would be secure enough, if only I got people to adopt even it.