Could This Be the End of F-Droid?|This Week in Privacy #21 (Oct 3, 2025)

Join us Invalid date for This Week in Privacy #21, to catch up on the latest Privacy Guides updates and to discuss trending news in the privacy space.

During the livesteam we’ll answer viewer questions. If you have a question for us, please leave a comment in this forum thread or the YouTube chat.

Members please leave your questions for us and we will try to get them answered first during the livestream :smiley:

4 Likes

Suggestion:

Since you’ll be covering other news items related to tech and privacy too, if you can also post even a semi complete list of those topics, we can ask questions about those as well and not just the titular question.

Of course I know we can still ask any question nonetheless but knowing the other topics/news items you’ll be covering would surely help and provide context for the episode in advance. Think about it. It would also let us know what’s in store for us in the episode.

Thanks!

4 Likes

Cosplaying as an audience member just for this time :stuck_out_tongue:

Anyways…

One common advice I was told to tell journalists was to NEVER enable sideloading if they have android phones. Do you think this is accurate? How would you balance “security” and “privacy” for folks who aren’t tech literate but may want to reduce their tracking on Android? Would these people locked into the Google ecosystem if they own an android phone and are targeted by state actors? Do they need to ignore corporate surveillance to protect themselves against government spyware?

We see OEMs like Novacustom and Purism introduce “anti-interdiction” methods like placing colored/glittery tape on the screws and communicating with you directly over Proton Mail as the shipping process starts. What are your thoughts on these methods? Is there a cheaper method of getting laptops that are less vulnerable to supply chain attacks? Or is this something out of the control for normal people.

Jordan, in my view, the quantum‑computers video is one of the best videos to date at Privacy Guides.

Will you all recommend the Accrescent app store in the futre after it comes out of alpha?

1 Like

Signal are looking to improve on their dependence on Intel SGX (for Secure Value Recovery) by doing threshold key recovery from several vendor enclaves (AWS, Intel, AMD) for example. See Key to Simplicity: Squeezing the hassle out of encryption key recovery | Juicebox & GitHub - signalapp/SecureValueRecovery2 for info.

You’ve maybe already considered it but what do you think about a Matrix room for This Week in Privacy Q & A? Only because it is the main real-time comms platform in the PrivacyGuides community and some may not have Google/YouTube accounts.