nostr:npub16eumpaxffppswucpeysysrya9uk39j06d5gr2tsnf6cupq3f4jdqyft6jc I wanted to get back with you and let you know what I thought about that cloaked app.

Cloaked is just meh. A very slick UI and I like that you can spin up unlimited profiles (one per account) but their privacy policy has some parts that don’t give me warm and fuzzies. The built in password manager is just ok, other existing ones are far better. Including data removal services is a good idea but not sure how robust that it is. Finally you cannot text or call from any of the VOIP numbers on WiFi or hotspot without a SIM card which is an option I want.

I really like their all in one app idea but none of them are done particularly well the execution of calling your contacts by a different number and then they have a different number for you just gets confusing. I think it would be good for some people who go to different venues and are constantly meeting new people or someone who needs infinite disposable numbers because even a compartmentalized one being compromised is too big a risk.

If you are interested in compartmentalization of your digital identity I think MySudo is a good option for most people. If you just want to try out some burner emails without phone numbers that is free. I feel constrained that you are limited to only 9 working VOIP numbers for their biggest plan but honestly that is probably fine if you’re using broad categories. One for friends and family, one for accounts tied to your identity - banking, medical, utilities, one for online accounts, another for junk, shopping, etc. And I tested it and it works just fine without a SIM card even on multiple devices.

A reminder that only MySudo to MySudo communication is encrypted, otherwise it’s just a regular call / text. I like other encrypted communication apps better but it’s not its primary purpose but could be useful if a lot of your friends and family are using it.

nostr:npub1f6ugxyxkknket3kkdgu4k0fu74vmshawermkj8d06sz6jts9t4kslazcka probably has more experience with it.

Reply to this note

Please Login to reply.

Discussion

As beekeepers I question our need for high security but also we are vulnerable even if we own pennies. Our data is worth protecting and we are trying to find the right fit. Your VPN guidance was spot-on and I trust your assessments. So much to learn on my end; I appreciate your patience/willingness to assist. Now to investigate what VOIP means and its impact on my little rinky-dink operation 😜

lol Voice-Over-Internet-Phone. It’s just a way to make phone calls that connect over the internet instead of phone lines.

Business aside just don’t give away your data (personal phone number, address, email, etc) to anyone except close friends and family.

The utility company, the online forum, the discount club at the grocery store. They are packaging up your data and selling it to advertisers, spammers, and scam artists (as well as being sources of data leaks) who use it to do anything from robo calling you all day about cruises and timeshares to stealing your identity.

Create throwaway email accounts that you can use for online shopping or app signups etc. Use a Google voice number if someone wants your number. Unless they actually need your home address because they are the water company or they are shipping you something, say no. If they insist, google an address of a hotel somewhere.

Your business will depend on your needs. At a minimum I would assume you need a separate email and phone number for it from your personal accounts.

If we ever get a chance to sit down I would be happy to give you a security audit and help you setup anything you need, pro bono of course. I’ll just add you to my resume for consulting.

I would love that, but I refuse to mooch off of your skills. We’ll work out a Sat/honey trade hopefully. We plan to run a node, but the honeybees have other plans ATM.

A node is easy enough. As well as making sure your OS is up to date, password management, 2FA setup, records have backups, etc. It sounds like a lot but it is actually pretty straightforward.

1. What assets do you have to protect?

2. What are your risks?

3. What setup gives you the protection you require while meeting your availability needs.