this post was submitted on 30 Dec 2025
554 points (98.9% liked)

Political Memes

10139 readers
1218 users here now

Welcome to politcal memes!

These are our rules:

Be civilJokes are okay, but don’t intentionally harass or disturb any member of our community. Sexism, racism and bigotry are not allowed. Good faith argumentation only. No posts discouraging people to vote or shaming people for voting.

No misinformationDon’t post any intentional misinformation. When asked by mods, provide sources for any claims you make.

Posts should be memesRandom pictures do not qualify as memes. Relevance to politics is required.

No bots, spam or self-promotionFollow instance rules, ask for your bot to be allowed on this community.

No AI generated content.Content posted must not be created by AI with the intent to mimic the style of existing images

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] cheesybuddha@lemmy.world 7 points 18 hours ago* (last edited 14 hours ago) (1 children)

One security/privacy feature touted by some companies is that they keep no logs and no records. Some even claim that their entire system runs in volatile memory so there is no possibility of data being recorded. Of course, you are trusting that they are both telling the truth and competently executing the system.

[–] 14th_cylon@lemmy.zip 5 points 17 hours ago (2 children)

Of course, you are trusting that they are both telling the truth and competently executing the system.

that is the thing, you have to trust them. unless they are intentionally malicious actor and if the law of country where they resides allows it, then not keeping the logs is quite hassle-free and actually cheaper than otherwise, so there is a reason to trust them, but you never know.

[–] cheesybuddha@lemmy.world 2 points 1 hour ago

They don't have to be malicious if they are incompetent.

They could say they don't use logs and not realize that their tech stack is actually keeping some sort of metadata or maybe using swap or something. Probably not as likely as the other scenarios, but I wouldn't count it out completely.

[–] Trainguyrom@reddthat.com 2 points 8 hours ago (1 children)

That's the thing with anything cybersecurity is trust. Unless you wrote all of the firmware and software and websites and webservers yourself you are ultimately placing trust in another entity.

VPNs are just a technical means of shifting trust. Corporations use VPNs for remote work because the VPN connects the employee to the corporate network which they already trust, rather than trusting whatever wifi the employee happens to connect to. For a consumer using a commercial VPN the only thing you're doing is shifting your trust from the network provider to the VPN provider. You're not even really hiding anything from websites thanks to modern browser fingerprint techniques, they just see "user #64742258 but from a known VPN endpoint instead of the usual Spectrum residential network in Maryland, 86% match"

[–] 14th_cylon@lemmy.zip 2 points 6 hours ago

That’s the thing with anything cybersecurity is trust.

luckily not everything, but i think about this every time i am using android keepass implementation written by god knows who 😆