Note: If the link isn’t working for you or if you can’t find the app, update the default F-Droid repository in your F-Droid client.
i deleted the crossposts of this post from /c/[email protected] and /c/[email protected] (because protonmail is a faux-opensource snakeoil privacy product) and flagged the posts in other communities as spam.
I find your response discouraging, and your actions appear excessive. While Proton may not be flawless, it does offer superior privacy protection when compared to commonly used options like Google and Microsoft.
I volunteered my time and effort to craft the post, including citations, offering more background information, and incorporating reliable links to official resources. However, you made claims without substantiation, deleted the crossposts of my post from /c/[email protected] and /c/[email protected], and flagged the posts in other communities as spam. Your decision seems to be unsupported by members of the four communities I had shared my post to.
It's disheartening to see such actions taken without proper consideration, thereby causing harm to the privacy community at large. Avoiding hasty decisions that may stifle valuable contributions within the privacy community should be paramount. Consequently, I respectfully ask you to reconsider your initial reaction, abstaining from premature removals rooted in personal opinions devoid of solid backing.
By embracing a balanced stance that values both freedom of expression and responsible fact-checking, we contribute positively towards nurturing healthy debates and maintaining transparent communication channels. In light of this, I hope you will take the necessary steps to reinstate the removed posts, allowing for continued conversation on their merits.
Edit: You have now banned me from both of those communities.
Edit: You have deleted another post of mine from c/[email protected] that was titled "Chat Control May Finally Be Dead: European Court Rules That Weakening Encryption Is Illegal", with your reason being that it is "snakeoil spam" even though the community members do not think so (the post has more than 750 upvotes)
The nonprofit software house argues that users, without coercion, manipulation, or deception, should be able to: download and install any alternative, legitimate browser; set that browser as their default; and use their chosen browser on an ongoing basis.
The report defines various manipulative interface patterns like "Confirmshaming", "Forced Action", "Visual Interference", and "Disguised Ads."
Android's Messages, Dialer apps quietly sent text, call info to Google
Google's Messages and Dialer apps for Android devices have been collecting and sending data to Google without specific notice and consent, and without offering the opportunity to opt-out, potentially in violation of Europe's data protection law.
According to a research paper, "What Data Do The Google Dialer and Messages Apps On Android Send to Google?" [PDF], by Trinity College Dublin computer science professor Douglas Leith, Google Messages (for text messaging) and Google Dialer (for phone calls) have been sending data about user communications to the Google Play Services Clearcut logger service and to Google's Firebase Analytics service.
"The data sent by Google Messages includes a hash of the message text, allowing linking of sender and receiver in a message exchange," the paper says. "The data sent by Google Dialer includes the call time and duration, again allowing linking of the two handsets engaged in a phone call. Phone numbers are also sent to Google."
The timing and duration of other user interactions with these apps has also been transmitted to Google. And Google offers no way to opt-out of this data collection.
One option is QKSMS
Another is Connect You
Fossify Messages (fork of Simple SMS Messenger) should be released on F-Droid sometime soon.
IzzyOnDroid releases do not follow the same privacy and security standards as F-Droid does, so I wouldn't be recommending them.
It hasn't been released on F-Droid.
I’m not the writer of the article, but here’s an answer you can find on running a quick search.
According to this article from the Electronic Frontier Foundation (EFF):
What is 2G and why is it vulnerable?
2G is the second generation of mobile communications, created in 1991. It’s an old technology that at the time did not consider certain risk scenarios to protect its users. As years have gone, many vulnerabilities have been discovered in 2G and it’s companion SS7.
The primary problem with 2G stems from two facts. First, it uses weak encryption between the tower and device that can be cracked in real time by an attacker to intercept calls or text messages. In fact, the attacker can do this passively without ever transmitting a single packet. The second problem with 2G is that there is no authentication of the tower to the phone, which means that anyone can seamlessly impersonate a real 2G tower and your phone will never be the wiser.
Cell-site simulators sometimes work this way. They can exploit security flaws in 2G in order to intercept your communications. Even though many of the security flaws in 2G have been fixed in 4G, more advanced cell-site simulators can take advantage of remaining flaws to downgrade your connection to 2G, making your phone susceptible to the above attacks. This makes every user vulnerable—from journalists and activists to medical professionals, government officials, and law enforcement.