Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So basically you don't keep data an erase every single document you create/receive. You keep your imap email box totally empty as well as the mails locally fetched on your mta. You have an always empty instant messaging app except for the messages pending view. You burn the contracts you signed immediately, you don't keep any photo either on your computer, phone, fridge or an album in a bookshelf. You don't use a password manager because every account created is destroyed immediately after use. You create a new hackernews account for every single message you post.

Right?



Don't be so intentionally obtuse.

Are all of those things you said, and do, readily available in one easy to siphon up database? Easily searchable and reportable to nation state entities? Can I or LEOs read your Hacker News posts and comments, and easily determine exactly who you are and that your previously open tabs where porn and anarchy related websites?

No. RECALL is a damn privacy and security nightmare. Don't act like it's saving the world, it's intent is to close the walls in around you.


> Can I or LEOs read your Hacker News posts and comments, and easily determine exactly who you are and that your previously open tabs where porn and anarchy related websites?

Not directly but in combination to other information it could.

The fact is, these kind of recording tools are not meant to publish your information to everyone.

> Don't act like it's saving the world,

I am not acting like that. I have no plan to use RECALL (I don't even use a single windows computer) nor any similar software.

However I find it funny that in any news about RECALL you see so many "privacy nightmare, will someone think of the children" comments while similar open source or proprietary projects for MacOs and Linux, or browser extensions predating RECALL were unanimously praised for their usefulness.

As any tool, you have to balance the risk of a leak in case your systems (or those that host your data) are compromised but it isn't in any way different than any other data you have online or locally on your computer.

You have as much if not much more to lose if your primary email account is compromised and you kept received email in the mailbox.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: