| ▲ | ezfe 2 hours ago | |||||||
Wait I'm sorry do you build linux from source and review all code changes? | ||||||||
| ▲ | jcalvinowens an hour ago | parent [-] | |||||||
You missed the important part: > For this threat model We're talking about a hypothetical scenario where a state actor getting the information encrypted by the E2E encryption puts your life or freedom in danger. If that's you, yes, you absolutely shouldn't trust US corporations, and you should absolutely be auditing the source code. I seriously doubt that's you though, and it's certainly not me. The sub-title from the original forbes article (linked in the first paragraph of TFA): > But companies like Apple and Meta set up their systems so such a privacy violation isn’t possible. ...is completely utterly false. The journalist swallowed the marketing whole. | ||||||||
| ||||||||