ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Switching to the Nylas N1 Email Client

    IT Discussion
    nylas nylas n1 email client email
    9
    66
    18.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • dafyreD
      dafyre
      last edited by

      I guess my biggest concern with an app like this is that they have access to my email... I guess I'm not comfortable with yet another company potentially having access to my email.

      1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller
        last edited by

        I can see where people would not like people having access to their email, but one we accept that tons of companies we don't trust (ISP, NSA) do have access to it and have no accountability that having companies we do trust (Microsoft, Nylas) have access when they do have accountability doesn't really seem to matter.

        Do I like people having access to my email? Not really. Do I care? Not much. It's so much better than what is already happening to my email that I don't see it as worth really thinking about.

        A 1 Reply Last reply Reply Quote 1
        • A
          Alex Sage @scottalanmiller
          last edited by

          @scottalanmiller So your saying that SSL is broken?

          scottalanmillerS 1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @Alex Sage
            last edited by

            @anonymous said:

            @scottalanmiller So your saying that SSL is broken?

            I think we can be pretty sure of that. It's one of the best tools that we have, and companies like Lenovo work really hard to bypass it for their own purposes because it isn't trivial to break, but it is pretty safe to assume that one way or another, people have access to your data.

            dafyreD 1 Reply Last reply Reply Quote 0
            • dafyreD
              dafyre @scottalanmiller
              last edited by

              @scottalanmiller said:

              @anonymous said:

              @scottalanmiller So your saying that SSL is broken?

              I think we can be pretty sure of that. It's one of the best tools that we have, and companies like Lenovo work really hard to bypass it for their own purposes because it isn't trivial to break, but it is pretty safe to assume that one way or another, people have access to your data.

              This is why it's important to send sensitive data in some encrypted from that your average hacker won't have access to easily hack. [tinfoilhat] Although, arguably, one still has to wonder if the NSA has included back doors into these encryption algorythms so they can get to your data anyway [/tinfoilhat]

              DashrenderD 1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @dafyre
                last edited by

                @dafyre said:

                @scottalanmiller said:

                @anonymous said:

                @scottalanmiller So your saying that SSL is broken?

                I think we can be pretty sure of that. It's one of the best tools that we have, and companies like Lenovo work really hard to bypass it for their own purposes because it isn't trivial to break, but it is pretty safe to assume that one way or another, people have access to your data.

                This is why it's important to send sensitive data in some encrypted from that your average hacker won't have access to easily hack. [tinfoilhat] Although, arguably, one still has to wonder if the NSA has included back doors into these encryption algorithms so they can get to your data anyway [/tinfoilhat]

                Clearly they have tried. The NSA got RSA to use a Random Number Generator that the NSA was behind and it was discovered a few years ago that it was rather vulnerable to decryption attack. RSA got a black eye over it, but not enough that anyone really cared.

                Luckily we do have a fair amount of white hat hackers out there looking over the commonly used encryption protocols that I don't believe that they themselves have been compromised. Instead the NSA, FBI, HS, local police, etc all use viruii to infect endpoints that they want to surveil

                scottalanmillerS 2 Replies Last reply Reply Quote 1
                • scottalanmillerS
                  scottalanmiller @Dashrender
                  last edited by

                  @Dashrender said:

                  Clearly they have tried. The NSA got RSA to use a Random Number Generator that the NSA was behind and it was discovered a few years ago that it was rather vulnerable to decryption attack. RSA got a black eye over it, but not enough that anyone really cared.

                  Well... enough that a lot of people don't associated RSA with serious security. RSA is regularly mocked as are people paying their prices. RSA used to stand for security, I don't know anyone who feels that way today. That you even remember this as a non-security researcher shows just how deeply that memory goes.

                  DashrenderD 1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @Dashrender
                    last edited by

                    @Dashrender said:

                    Luckily we do have a fair amount of white hat hackers out there looking over the commonly used encryption protocols that I don't believe that they themselves have been compromised. Instead the NSA, FBI, HS, local police, etc all use viruii to infect endpoints that they want to surveil

                    As long as the implementations are open source. Open source is the only real protection against the government.

                    DashrenderD dafyreD 2 Replies Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender @scottalanmiller
                      last edited by

                      @scottalanmiller said:

                      @Dashrender said:

                      Luckily we do have a fair amount of white hat hackers out there looking over the commonly used encryption protocols that I don't believe that they themselves have been compromised. Instead the NSA, FBI, HS, local police, etc all use viruii to infect endpoints that they want to surveil

                      As long as the implementations are open source. Open source is the only real protection against the government.

                      Oh, absolutely!

                      1 Reply Last reply Reply Quote 0
                      • DashrenderD
                        Dashrender @scottalanmiller
                        last edited by

                        @scottalanmiller said:

                        @Dashrender said:

                        Clearly they have tried. The NSA got RSA to use a Random Number Generator that the NSA was behind and it was discovered a few years ago that it was rather vulnerable to decryption attack. RSA got a black eye over it, but not enough that anyone really cared.

                        Well... enough that a lot of people don't associated RSA with serious security. RSA is regularly mocked as are people paying their prices. RSA used to stand for security, I don't know anyone who feels that way today. That you even remember this as a non-security researcher shows just how deeply that memory goes.

                        I only do because of the podcasts I listen to.

                        1 Reply Last reply Reply Quote 0
                        • dafyreD
                          dafyre @scottalanmiller
                          last edited by

                          @scottalanmiller said:

                          @Dashrender said:

                          Luckily we do have a fair amount of white hat hackers out there looking over the commonly used encryption protocols that I don't believe that they themselves have been compromised. Instead the NSA, FBI, HS, local police, etc all use viruii to infect endpoints that they want to surveil

                          As long as the implementations are open source. Open source is the only real protection against the government.

                          But then you have to trust the compiler that you are using to not insert a back door into your product... (Didn't we have a topic about this a while back?)

                          scottalanmillerS DashrenderD 2 Replies Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @dafyre
                            last edited by

                            @dafyre said:

                            @scottalanmiller said:

                            @Dashrender said:

                            Luckily we do have a fair amount of white hat hackers out there looking over the commonly used encryption protocols that I don't believe that they themselves have been compromised. Instead the NSA, FBI, HS, local police, etc all use viruii to infect endpoints that they want to surveil

                            As long as the implementations are open source. Open source is the only real protection against the government.

                            But then you have to trust the compiler that you are using to not insert a back door into your product... (Didn't we have a topic about this a while back?)

                            We did. And we can, thanks to... open source compilers! 🙂

                            dafyreD 1 Reply Last reply Reply Quote 0
                            • DashrenderD
                              Dashrender @dafyre
                              last edited by

                              @dafyre said:

                              @scottalanmiller said:

                              @Dashrender said:

                              Luckily we do have a fair amount of white hat hackers out there looking over the commonly used encryption protocols that I don't believe that they themselves have been compromised. Instead the NSA, FBI, HS, local police, etc all use viruii to infect endpoints that they want to surveil

                              As long as the implementations are open source. Open source is the only real protection against the government.

                              But then you have to trust the compiler that you are using to not insert a back door into your product... (Didn't we have a topic about this a while back?)

                              Yeah, it was an iOS compiler in China. People were downloading a bootleg version of the compiler instead of paying Apple huge money for it.

                              Man, at the point Apple should have made the compiler free. They should focus on making money from selling apps in the store, not the compiler.

                              1 Reply Last reply Reply Quote 0
                              • dafyreD
                                dafyre @scottalanmiller
                                last edited by

                                @scottalanmiller said:

                                @dafyre said:

                                @scottalanmiller said:

                                @Dashrender said:

                                Luckily we do have a fair amount of white hat hackers out there looking over the commonly used encryption protocols that I don't believe that they themselves have been compromised. Instead the NSA, FBI, HS, local police, etc all use viruii to infect endpoints that they want to surveil

                                As long as the implementations are open source. Open source is the only real protection against the government.

                                But then you have to trust the compiler that you are using to not insert a back door into your product... (Didn't we have a topic about this a while back?)

                                We did. And we can, thanks to... open source compilers! 🙂

                                But you still have to compile the compiler... but the software that compiles the compiler must be first compiled by a trusted compiler.... and so on to infinity.

                                1 Reply Last reply Reply Quote 0
                                • dafyreD
                                  dafyre
                                  last edited by

                                  Slightly un-derailing this thread -- Are you still enjoying the Email Client? lol.

                                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                                  • mlnewsM
                                    mlnews
                                    last edited by

                                    http://img-9gag-fun.9cache.com/photo/aGxDz10_460s.jpg

                                    1 Reply Last reply Reply Quote 2
                                    • scottalanmillerS
                                      scottalanmiller @dafyre
                                      last edited by

                                      @dafyre said:

                                      Slightly un-derailing this thread -- Are you still enjoying the Email Client? lol.

                                      So far, so good.

                                      dafyreD 1 Reply Last reply Reply Quote 0
                                      • dafyreD
                                        dafyre @scottalanmiller
                                        last edited by

                                        @scottalanmiller said:

                                        @dafyre said:

                                        Slightly un-derailing this thread -- Are you still enjoying the Email Client? lol.

                                        So far, so good.

                                        How does it stack up with say... Evolution?

                                        1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller
                                          last edited by

                                          Haven't used Evolution in forever, but last I knew Evolution was a pain to connect to Office 365. This was as easy as signing into Office 365, which I have to do every day or so. This is great.

                                          1 Reply Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller
                                            last edited by

                                            No calendar yet, though. I really hope to see that soon.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 2 / 4
                                            • First post
                                              Last post