To replace everything. Mail, calendar, drive, vpn, password manager, documents etc. What are the pros and cons relative to proton? What are the mobile apps like? What assurances do you have they won't go full proton in the future? And other questions
So the whole "we encrypt your life" thing is pretty nice. But in reality look at what you're actually doing... You have super secure encrypted email to do what? Send unencrypted emails to your friends...
It makes no sense to me... Like, you need an encrypted calendar? Why? What are you getting with encryption that you can't get with using a VPN to connect to your local network and access a self-hosted calendar. In what was is that less secure?
Drive? Sure. VPN? Sure. Password manager? Sure. Documents? Sure. I see the value in having H/A for services like this, but all of that can be self-hosted on an rPi in your basement with a rProxy and a domain.
It doesn't, though. Not even a little bit. Using encrypted services doesn't stop tracking cookies. That too has to be handled client side. So you would use a browser that lets you use host files via extensions (firefox, etc) and other tracking blocking extensions, or you can setup network wide protection via Adguard Home, etc.
For the third time now--not if the service/device you're using contains both the password and the 2FA... How is this not getting through?
If someone gets into my Bitwarden install, and gets access to both my passwords and my 2FA seeds, in what way does 2FA protect me? I kept all the family jewels in one place. That's the exact situation two factor authentication is designed to prevent by forcing you to have an additional and separate device/key/passcode/password.
Say it a fourth time if you want to continue feigning ignorance. You're assuming that the only way your credentials could be compromised is if your password manager it compromised. 2FA would not protect that specific use case if you store both authentication methods in your password manager. However, it does still protect your services from other types of compromises, which is better than no 2FA at all.