• 4 Posts
  • 838 Comments
Joined 10 months ago
cake
Cake day: June 8th, 2025

help-circle




  • Halfway through you shifted to encrypted local backups

    I never shifted anything. I was talking about encrypted backups on a server. These can be encrypted locally before being synced to a server.

    you first called ‘single-party encryption’

    Nope, you literally just made that up. I didn’t say that and I don’t even know what that means.

    I said it wasn’t realistic in the context of the selfhosted backends we were discussing.

    …but it is.

    And yes, lots of apps do encrypted backups because they are backup apps. Colota isn’t.

    My suggestion was that it could be

    The existing export is for tools like QGIS or selfhosted backends and encrypting that data would break that use case entirely.

    You already have local backups that could be encrypted and then synced to a general storage server.

    Encrypted import/export for backup is a separate feature that doesn’t exist yet, so there’s nothing here that’s badly implemented.

    I said literally nothing about your implementation. You’re imagining things. Please read more attentively.







  • If a server gets hacked where a user sent data from Colota there is nothing the app can do about it or to prevent it

    It can’t prevent the hack, it absolutely can protect the data, and make it useless. That’s the entire purpose of encryption.

    I don’t think it’s the job of an Android app to protect a server from government hacking attacks.

    Again, it’s not supposed to.

    Also the app is offline-first. There is no server needed unless the user specifically configures that.

    The server is needed for the same reason a server is needed for anything: to back up the data.

    If you don’t want to implement it, that’s fine, I respect your decision, but there’s no reason to come here pretending not to understand its purpose.


  • There’s no third party to encrypt against.

    Encryption does not exist for third parties. It exists to protect sensitive data from malicious or state actors who might hack your server and steal the information for various purposes. Here in the US law enforcement is free to hack and steal and demand whatever they want.

    All these backends would have to support the same decryption which Colota offers, which is not realistic.

    I would prefer single-party encryption vs. integration, personally. Could make it optional.

    I appreciate your contributions but for me personally this is a dealbreaker.



  • This marks the day they lost me as a long-term customer. Perhaps ought to have happened earlier, but for me, it happened today. I encourage others to consider the same.

    I mean I’ve never been an Apple customer. At least not since the OG iPods. But what company are you going to move to that wouldn’t do the exact same thing in that situation?

    Apple is uniquely shitty in having endless contempt for their own customers, which is why I’ve always avoided them. But this just seems like kind of a weird “last straw”. But hey, anyone boycotting Apple has my support.