![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
iMessage is encrypted in transit by default when talking to other iPhone users, and 95% of my contacts use iPhones. That is the ONLY reason I use an iPhone.
iMessage is encrypted in transit by default when talking to other iPhone users, and 95% of my contacts use iPhones. That is the ONLY reason I use an iPhone.
Only when they leak or get thrown out. If they’re still working they’re not leaking, but maybe drawing more power than needed.
I second Matrix, though I’ve been waiting for e2ee direct p2p (the Dendrite project) do be worked on for a while. Having something like that, that’s truly decentralized while secure and hiding metadata where possible, would be a dream.
To help with this in the future, you can also create several fake results sharing your real name. Stuff like a blogger with one post not in your writing style, etc… This will dilute searches with disinformation. Removal of real data is important, but you can also confuse anyone looking.
Password Entropy = length * log2(possible_chars). So this would actually add 7*log2(10) => 23 bits of entropy, assuming the attacker knew that this section was numeric, or ~45 bits if they didn’t.
For anyone curious: Current best practice is a minimum of 100 bits, or 16 characters assuming only letters, numbers, and special characters. The recommended minimum bits increases every year with computing power.
Oh yeah that’ll do it.