this post was submitted on 27 Jan 2025
134 points (98.6% liked)
Privacy
33156 readers
870 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I don't know about you but if I don't know what a program that I can't inspect the code of does, I'll just assume the worst case scenario. I can't prove it but you also can't prove that it isn't doing something shady, can you? So what if I am using Private Relay? Apple will know what websites I visit or what I do with my phone as long as I use their proprietary operating system and who knows who they'll give it to. And with this, I am saying it again: Apple's operating systems are no exception to this rule.
So you actually inspect the source code of everything you use?
This whole line of reasoning really only works if you have the expertise to understand the code in the first place. Otherwise you are just shifting trust from what the company tells you to what a third party looking at the source tells you. Sometimes that works but its in no way fool proof.
There is open source malware. FOSS /= trustworthy the same as closed source /= not trustworthy.
If you don't trust Apple that fine. Some people won't ever use a Pixel because they don't trust Google. It doesn't change the fact that Google currently makes the most secure, hardware wise, consumer smart phone. The point being this shift in trust is more of a personal choice then a good privacy or security practice. Just as using something like e/os or lineage over iOS is.
No, of course I don't. I am not as paranoid as Richard Stallman, but I am also not as pronoid as the average human to just use proprietary software when there are similarly functioning open source software. With open source software, you can inspect the code and compile the code that you inspected. This is not true for something like iOS.
And of course, FOSS malware also exists (for example the recent xz data compression program). But guess what? You can find if it is really malware or not because you ultimately can inspect the code and compile the code you inspected. That is also why the malware in xz was found out. Who knows what there is in closed source software you can't inspect the code of. Do you perhaps believe in security through obscurity?
Using open source software is always an advantage. Praise for privacy software should be earned through the ability to verify them, and not granted by default.