All Things Secured
All Things Secured
  • 279
  • 28 526 819
STOP Using Proton & Signal? Here’s the TRUTH
Are Proton privacy and the Signal messaging app still secure? Every year this gets called into question, yet rarely is the full story ever told. In this video, Josh explains what's really happening with these privacy and security apps as well as how it affects YOU directly.
Watch this video on the 12 privacy and security apps I use EVERY DAY: ua-cam.com/video/XNOAOQktG6U/v-deo.html
YES, I still use and recommend Proton & Signal:
▶ Try Proton Unlimited: www.allthingssecured.com/yt/proton-unlimited
▶ Get the Signal app: signal.org/
If you care about your personal security and privacy online, download my free security checklist here:
✅ Security Checklist: www.allthingssecured.com/security-checklist-pdf/
🔹🔹What to Watch Next🔹🔹
We've got a lot of great privacy- and security-related content here on the All Things Secured UA-cam channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next:
✅ Which is the most SECURE email service? ua-cam.com/video/72eG84gGR0s/v-deo.html
✅ Which is the BEST Password Manager? ua-cam.com/video/BsVkVa0n0T0/v-deo.html
✅ iPhone Mistakes the RUIN your Privacy: ua-cam.com/video/NwtEs1TGcLI/v-deo.html
🔹Support All Things Secured (Recommended Tools)🔹
If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support!
✅ Recommended Password Manager: www.allthingssecured.com/yt/1password
✅ Recommended Identity Monitoring: www.allthingssecured.com/try/identity-guard-yt
✅ Recommended 2FA Security Key: www.allthingssecured.com/yt/yubikey
✅ Recommended Secure Email: www.allthingssecured.com/try/protonmail-yt
✅ Recommended VPN: www.allthingssecured.com/try/nordvpn-yt
*********************
Video Timestamps
*********************
0:00 - Are Proton & Signal still secure?
0:36 - Cybersecurity confirmation bias
1:20 - Privacy companies & government data requests
2:15 - Encryption & data requests
3:41 - Signal accused of having encryption broken
5:12 - Understanding personal OPSEC with privacy apps
5:50 - How to Remove Proton Recovery Email address
6:23 - How to Hide IP address from Proton
6:36 - Practical privacy in the digital age
7:21 - Should you stop using Proton & Signal?
*********************
It's easy to get swept up in the news that a privacy company has handed over user data to a government intelligence agency. But what are the limitations of companies like @ProtonAG or Signal? Or perhaps more importantly, what is YOUR responsibility when using such apps, considering the fact that no single software or service can guarantee you privacy and anonymity?
#privacymatters #cybersecurity #onlineprivacy
Переглядів: 52 065

Відео

iPhone Mistakes That RUIN Your Privacy
Переглядів 14 тис.21 годину тому
Just because Apple markets the iPhone as "Private" doesn't mean you get privacy by default. These are the most common mistakes iPhone users make and step-by-step instructions on how to fix it. Be sure to encrypt your cloud storage with Internxt! Get 80% off using code "ATS" here: www.allthingssecured.com/internxt Resources and videos mentioned: ▶ How to turn on Advanced Data Protection: ua-cam....
How to PROTECT your photos (4 simple steps)
Переглядів 16 тис.14 днів тому
We keep thousands of photos on our mobile phones and share them in many different ways...but how often do you think about the privacy implications of these pictures? Also, be sure to erase your data on the internet using DeleteMe (20% off): www.joindeleteme.com/allthingssecured Learn more about how DeleteMe works here: ua-cam.com/video/PpcZ6VIEVVs/v-deo.html Other resources mentioned: ▶ Try Enc...
I Visit Yubico's HQ to investigate the security of 2FA keys
Переглядів 13 тис.Місяць тому
Can we trust the security companies that help us lock down our online accounts? Josh visits the headquarters of one such company in Stockholm, Sweden to expose how they operate and why we should - or shouldn't - use their products for online security. This video is NOT sponsored ▶ Watch the full interview with the CEO here: ua-cam.com/video/8AMsd9fiiSU/v-deo.html ▶ Get your own YubiKey security...
12 Privacy & Security Tools I Use EVERY DAY
Переглядів 51 тис.Місяць тому
I'm a privacy and security nut. Discover the tools I use on a daily basis to secure my accounts and cloak my private information. You're welcome to copy what I do or find what works for you. *NOTE: This video is not sponsored nor did any company pay to have their product listed. These are what I actually use for my personal and business use.* 🔹My Privacy & Security Stack🔹 ▶ Password Manager (1P...
Testing 5 Secure Email Services | BEST Gmail alternative
Переглядів 54 тис.2 місяці тому
Testing 5 Secure Email Services | BEST Gmail alternative
The Privacy Community is MAD...here's why (+ my recommendations)
Переглядів 43 тис.3 місяці тому
The Privacy Community is MAD...here's why ( my recommendations)
NEW Email Requirements from Google & Yahoo (Feb 2024)
Переглядів 35 тис.3 місяці тому
NEW Email Requirements from Google & Yahoo (Feb 2024)
4 CRITICAL Places to Use a YubiKey (beyond an email account)
Переглядів 63 тис.4 місяці тому
4 CRITICAL Places to Use a YubiKey (beyond an email account)
Proton CEO explains DANGERS of giving Google your IDENTITY
Переглядів 25 тис.4 місяці тому
Proton CEO explains DANGERS of giving Google your IDENTITY
My FULL Account Security Strategy Explained (you can copy)
Переглядів 32 тис.4 місяці тому
My FULL Account Security Strategy Explained (you can copy)
I Tested 7 Password Managers: the BEST of 2024 is…
Переглядів 124 тис.4 місяці тому
I Tested 7 Password Managers: the BEST of 2024 is…
NEW Way to Install VPN on Apple TV in 2024
Переглядів 12 тис.4 місяці тому
NEW Way to Install VPN on Apple TV in 2024
Privacy is DEAD (+ 7 Privacy Predictions on AI, Quantum & more)
Переглядів 8 тис.5 місяців тому
Privacy is DEAD ( 7 Privacy Predictions on AI, Quantum & more)
STOP Using DNA Test Kits! (here's why)
Переглядів 17 тис.5 місяців тому
STOP Using DNA Test Kits! (here's why)
Proton CEO answers “What is Blockchain Good For?”
Переглядів 5 тис.5 місяців тому
Proton CEO answers “What is Blockchain Good For?”
Testing the World’s “Most Secure Phone” | Efani SIM
Переглядів 19 тис.5 місяців тому
Testing the World’s “Most Secure Phone” | Efani SIM
I Clicked a Phishing Link...NOW WHAT?! (3 simple steps)
Переглядів 24 тис.5 місяців тому
I Clicked a Phishing Link...NOW WHAT?! (3 simple steps)
The Crazy Story Behind Proton Privacy (w/ CEO Andy Yen)
Переглядів 16 тис.6 місяців тому
The Crazy Story Behind Proton Privacy (w/ CEO Andy Yen)
NordVPN Explains Why They Think You Should TRUST Them
Переглядів 8 тис.6 місяців тому
NordVPN Explains Why They Think You Should TRUST Them
Ultimate Travel Security Tips MOST People Don't Do
Переглядів 20 тис.7 місяців тому
Ultimate Travel Security Tips MOST People Don't Do
Are "ADVANCED" Security Programs WORTH IT??
Переглядів 15 тис.8 місяців тому
Are "ADVANCED" Security Programs WORTH IT??
How to Build Online Pseudonyms: Privacy 101
Переглядів 22 тис.8 місяців тому
How to Build Online Pseudonyms: Privacy 101
a BETTER way to protect your phone number?
Переглядів 49 тис.9 місяців тому
a BETTER way to protect your phone number?
Data Protection 101: What you SHOULD be doing (or not)
Переглядів 20 тис.9 місяців тому
Data Protection 101: What you SHOULD be doing (or not)
iOS 17: Are Security & Privacy Features Any Good?
Переглядів 18 тис.9 місяців тому
iOS 17: Are Security & Privacy Features Any Good?
6 hacks to secure ANY password manager you use!
Переглядів 26 тис.9 місяців тому
6 hacks to secure ANY password manager you use!
Should You Use Proton Pass Password Manager?
Переглядів 71 тис.10 місяців тому
Should You Use Proton Pass Password Manager?
If you own a domain URL...watch this NOW!
Переглядів 12 тис.10 місяців тому
If you own a domain URL...watch this NOW!
NEW Google Authenticator w/ Backup (should you use it?)
Переглядів 224 тис.Рік тому
NEW Google Authenticator w/ Backup (should you use it?)

КОМЕНТАРІ

  • @MarcoFlores-um7cj
    @MarcoFlores-um7cj 6 хвилин тому

    Rob uses FEAR TO PROMOTE HIS PRODUCTS and he doesn't care about educating people in privacy

  • @SB-qm5wg
    @SB-qm5wg 58 хвилин тому

    Proton did pretty good.

  • @iAPX432
    @iAPX432 Годину тому

    Pi VPN w/ Pi Hole. Keeping things under my control (and responsibility).

  • @ettoreatalan8303
    @ettoreatalan8303 2 години тому

    The Russian developer of Telegram, after allegedly talking to some “important” people, claims that Signal is exploited by courts from the evil USA. If you're not surprised by Russians blaming the US, you have to give this post a thumbs up.

  • @IIIIIIIIIIIIIIIIIIIIIIIIIII258
    @IIIIIIIIIIIIIIIIIIIIIIIIIII258 2 години тому

    Proton and Signal are, imho, the leading defenders of standing firm on privacy. They make space for smaller privacy entities to exist. If they aren’t supported, Then it falls to the good will of US corporations, which we know can’t stand nearly as long against legal intrusions. Proton and Signal are the tip of the spear, and are doing it right while not giving any reason to get shut down.

  • @Opaque691
    @Opaque691 2 години тому

    Well done! Thank you!

  • @jonathanmgoodman
    @jonathanmgoodman 3 години тому

    Being open source doesn’t mean anything without a guarantee that the code submitted by signal or protonmail to the Apple App Store or Google Play Store is the same exact code that they show the sources code for.

  • @jamessanborn
    @jamessanborn 3 години тому

    I’ve used DDG for years, however, I am now looking for an alternative company. I found a private search I did through DDG, on an institution that helps people with various mental health issues, for someone close to me, somehow wound up in my Facebook META history. It had nothing to do with FB in any way, yet, there it was. Disturbing to say the least. 😣

  • @AyameKaily
    @AyameKaily 4 години тому

    Please can you teach us how to protect our photos from AI manipulation? Some pleople are using others people's photos and manipulating using AI to do whatever they want to. Is there any way we can protect our photos from this type of thing before posting?

  • @TheJensss
    @TheJensss 5 годин тому

    If you want something 99% secure, host it yourself. If you want it 98% which is good enough for most privacy focused people Proton and Signal are great.

  • @iAPX432
    @iAPX432 6 годин тому

    There are 2 majors problem, the error 18 aka between keyboard and chair, and the platform used to access websites or run applications. And in case of anything related to messaging, the same problems on the other counterparts of these exchanges. Put differently one might be the problem, no end-to-end encryption tools.

  • @hagbard72
    @hagbard72 7 годин тому

    4:30 Thought end to end encryption is only good if used at both ends? I don't think my bank or lawyer uses Proton so not much use. No wasting my money on some alias service btw, just set up different email accounts, free.

  • @matt79de
    @matt79de 9 годин тому

    A frustratingly number of times people miss the fact that someone ... nefarious, shall we say, may not *need* to have the encryption key if the endpoint is compromised.

  • @VJ-lf9kx
    @VJ-lf9kx 10 годин тому

    where to save bitwarden's password?

  • @moetocafe
    @moetocafe 10 годин тому

    Signal is definitely broken - you want a proof? Tucker Carlson is the proof. The alphabet agencies understood from his Signal, that he was planning for interview with Putin and it was not about the one you know about, but some years ago, maybe 2016, the one that didn't happen exactly because of these agencies, who figured out and made sure it does not take place. I have my reasons to suspect that Telegram is also broken. So, if you ask me is there a messenger app, that isn't broken - I cannot tell you. I think they all are. That doesn't mean you can't use it for casual conversation with friends and family, but do not consider it a secure and private channel of communication.

  • @4pilon11
    @4pilon11 10 годин тому

    Only Proton CLIENTS are open-source. I think that is a very important distinction to make.

  • @tuurblaffe
    @tuurblaffe 11 годин тому

    I came in here about to debunk the "clickbait" title, but i am glad you actually told what actually happened! <3, You also need to keep in mind that the Eu is spreading alot of misinformation and fake news, either to cover up the bad stuff they've done, and make them look better than they actually are cuz of elections coming up.. Proton provides more privacy, not anonymity.... Signal has shown up in multiple court cases with the order to bring everybody that they have on a certain user... which isn't more than an a4 that states when the acc is created, when it is last seen,.... The Eu is also putting alot of effort in implementing chatcontrol and clientside scanning... GREAT VIDEO! <3

  • @SaigneurGuerrier
    @SaigneurGuerrier 13 годин тому

    So if I get this right, the 5 series is basically the key to access OTPs in your phone instead of having a password like on Aegis or no restricted access like FreeOTP+. Sounds useful if I understand correctly.

  • @vbostrom
    @vbostrom 13 годин тому

    How do I verify that the Signal application that I downloaded from the apple app store was built from the open source code that is published?

  • @Canuck-1976
    @Canuck-1976 16 годин тому

    In this case. If the user always used a VPN when signing into Proton and created an account with no identifying "records", as recovery email and name etc. The Proton email account name would exist but if you call it "Gibberish@ proton.. Then nothing would come of it. The IP would just lead to some VPN server. The data is encrypted and Proton say they cannot decrypt it. So it would be Gibberish. This coupled with Proton only as to abide by Swiss government that has good privacy laws. Then there is not much to worry about.

  • @all3w1s58
    @all3w1s58 17 годин тому

    In the video, you brought up the point about being careful of what recovery email you specify. If the recovery email is from iCloud or Microsoft or Google, then I understand the point that the authorities will have to hand any email id to the authorities. What if it was another Proton email account itself?

  • @Packhorse-bh8qn
    @Packhorse-bh8qn 18 годин тому

    News flash - a government subpoena trumps your privacy. Proton had no choice. And what did they get? What info did Proton give them? Stop throwing a tantrum about Proton complying with a legal demand (it's not a "request".) Think about what they actually gave the Swiss government.

  • @Repossessionn
    @Repossessionn 20 годин тому

    Not the terrible clickbait thumbnail and title smh

  • @vitalis
    @vitalis 20 годин тому

    Huge downside. It just saved me over 100euros. I’ll just stick with software 2FA.

  • @knotox
    @knotox 21 годину тому

    100% of SIM swap attacks are the result of someone other than the owner of the account modifying the account without the owner's approval. A company called Cloaked Wireless has solved this by only letting the subscriber modify the account (their staff can't modify accounts). Basically, it solved the whole SIM swap problem.

  • @sebastien79a
    @sebastien79a 21 годину тому

    You could do a one way encryption or hash on a recovery e-mail address and then only 'check' when supplied rather than have the recovery e-mail in plain text. Could be enumerated obviously so a bit more complex but can be fixed if someone wanted to.

  • @nahhh5007
    @nahhh5007 22 години тому

    This video is misleading if you have read the actual articles regarding it. The proton address had a recovery email address, which was Apple.

  • @jamesredfield555
    @jamesredfield555 22 години тому

    so how do you prove the open source code is the code that is actually being implemented

  • @nextforward
    @nextforward 22 години тому

    You should use Nokia old phone to be in privacy!

  • @Kirk-oj6qm
    @Kirk-oj6qm 23 години тому

    The reality is this: If you are online, there is no way to be completely secure from online threats. Proton and Signal give you better tools to safeguard your privacy than others, by a significant margin. They are still however online. It took a multi-national government order with proof of terrorism to just get the recovery email address. If that isn't secure, then what is? Well created video, thanks for sharing.

  • @Darkk6969
    @Darkk6969 23 години тому

    I am not concerned about it as they only have the IP. My e-mail contents are still encrypted with password, mfa and mailbox password. However, keep in mind this is ONLY protecting the content on your proton mail account. They can intercept and sniff any SMTP e-mails on the internet that don't utilize TLS between servers which is fairly small. Just treat your e-mails as if you sent a postcard.

  • @Botanifiles
    @Botanifiles 23 години тому

    Fyi, there is now a proton calendar app

  • @YuiMitsuki
    @YuiMitsuki День тому

    Using a VPN to login Proton, then the VPN leaks your ISP IP address. Haha.

  • @relaxingmind4084
    @relaxingmind4084 День тому

    does this effect your score?

  • @luxa_creative
    @luxa_creative День тому

    Me still waiting for Google to make an good messaging app 😢

  • @nejiross
    @nejiross День тому

    WOW you really hit the nail on this. Things I overlooked myself, especially with legal stuff. Hey, great video sir!

  • @cave_0
    @cave_0 День тому

    Much alarm, everythings a psyop,

  • @MuhirwaFrancis
    @MuhirwaFrancis День тому

    Cvv please

  • @MidianNiles
    @MidianNiles День тому

    Thank you for making this video. The message here isn't letting these vendors off the hook; it's a reality check for the digital frontier as a whole. More specifically "due process". It's the only 'real' sense of security we need to focus on, "did an agency use due process?" But also (and more importantly) are software vendors 'only' providing information under circumstances of due process? As a systems administrator, I applaud the message of User responsibilities and as a personal privacy advocate, I salute the message of due process. Fear mongering and baseless accusations run rampant over social media outlets as it is. Thank you for providing a voice of reason and a means of laying a basic framework of the legal challenges.

  • @MNIU_
    @MNIU_ День тому

    This wouldn’t be helpful for OTP though bc you have to save them first to assign that number to them . Unless you can save them after you receive the text . The biggest reason I like the other apps is bc when it works with a number within the app you can do the OTP verification which you need for monetization on social media

  • @jairunet
    @jairunet День тому

    You should take a look at the NOSTR protocol 😇

  • @pastorpatriciaphifer5227
    @pastorpatriciaphifer5227 День тому

    Talking to fast had to keep starting over

  • @rjain1993
    @rjain1993 День тому

    👍🏻

  • @majesticoverland
    @majesticoverland День тому

    You do not have to send clear text in Signal, what you send can be encrypted by you before even sending that message. Even the images can be imbedded with encrypted messages. Same goes for emails.

  • @ArmandoCalderon
    @ArmandoCalderon День тому

    Tuckerson tht the NSA brak signal.

    • @IdkG7
      @IdkG7 День тому

      Tucker Carlsons phone itself was likely hacked, Signal can’t really do much to protect against that

  • @blackpurple9163
    @blackpurple9163 День тому

    Pavel criticising Signal is pretty ironic when he's turning his own platform into a Facebook-like nightmare

  • @jdortonjanice
    @jdortonjanice День тому

    Point of fact: FBI/CIA/Secret Service all were spying on Tucker Carlson's Signal account reading all his encrypted messages, right before and during his visit to Russia. He even confirmed it with several sources in those organizations

    • @IdkG7
      @IdkG7 День тому

      It’s not a fact, there’s zero evidence from Tucker or anyone. Tucker Carlsons device was likely compromised

  • @TheHagamanstube
    @TheHagamanstube День тому

    Searching for privacy while using third-party networks, devices, or operating systems is essentially wishful thinking. Consider three neighbors living side by side. The first and third neighbors want to have a conversation in their backyards. As they start talking from their respective gardens, the second neighbor, situated in the middle, can always hear their conversation. This analogy illustrates the basic principle: you can build a temporary communication channel (like a pipe) for the neighbors to talk privately, but this pipe must be entirely your own construction, not provided by services like NordVPN or OpenVPN. Once people grasp this concept, the issue becomes clearer. As long as you rely on third-party systems, true privacy is unattainable, which is the case for 99% of users. Genuine privacy is nearly impossible in these scenarios. If you truly desire privacy, consider having face-to-face conversations, perhaps during a walk in nature or while swimming.