Skip Navigation

User banner
The 8232 Project
The 8232 Project @ Charger8232 @lemmy.ml
Posts
75
Comments
503
Joined
1 yr. ago

  • Donating to for-profit companies isn't inherently bad. While there is more value in donating to non-profit companies, I support all causes equally and want to show my support accordingly.

  • While Lemmy is not a dedicated service for privacy protection, it has certain features that respect user privacy more than mainstream social media platforms.

  • Thanks for the info! A lot of the services on my list offer paid services that are used as a source of income, but I want to support those just the same. Mozilla has been an iffy choice to add to my donation list. They are the developers of Firefox, which has been forked to create the most private browsers (Tor, Mullvad, etc.), but on the other hand their business practices (Google as a default search engine, Firefox Pocket, etc.) are not very good. As such, I will move them to the honorable mentions section (since I don't actively use stock Firefox) until further notice.

  • Thanks, I will be sure to redirect my donations! :)

  • Here is the GitHub page! privacy.sexy is a service that lets you customize and automatically generate a script that will harden the privacy of your computer operating system. i.e. it makes a script that disables telemetry, clears cache, etc. automatically.

  • Ouch, tough break. I'll still leave them on my list in case anything changes, but that will move them down a few notches. Thanks for the info!

  • I recommend checking out Wikiless! While the link I provided here leads to one of the more broken instances, there are many more, lots of which are included in LibRedirect. Wikiless is a more private front end for Wikipedia.

  • Preface: this is written with less care than I do usually. I was writing one of my usual replies, but my phone chose to restart while the text was being written in its browser.

    No worries, we've all been there! Was the restart due to annoying OS features (e.g. Windows used to restart immediately without asking, iOS restarts if your phone is locked and it's night time, etc.)

    Was that rhetorical 😅?

    No, I'm just blind :,) I found it now

    Edit: Here it is!

    Would you mind sharing blogs/sites etc that you find exceptionally useful for finding out about these things?

    Until the Rexodus (by the way, I'm apparently the only one to call it that. Please, people, it's such a good name!), I had simply kept current with every post on r/privacy. I had occasionally read a few old posts, but it was mostly just keeping an eye on what the community was posting about and reading the discussions to learn as much as possible. I have a few old screenshots, like from this post and this one, but besides that it was just miscellaneous posts.

    Edit: I found others calling it the Rexodus! Here is one

  • GitHub: A place to host open source code!

    If you do what we want you to do

  • On multiple occasions I was given the choice to try a Quest. Never once did I.

  • I once asked a friend if he trusted the lock on his phone (brand new iPhone 15 Pro Max, latest and greatest). He told me he did. I asked him if I could use his phone while it was locked, and he told me "No, I don't trust you. You would probably hack it or something." That statement says two things:

    1. He only cares about attacks on privacy on a personal level, which is the mental flaw lots of people have.
    2. He doesn't actually trust the lock on his phone, but refuses to admit it.

    By the way, here's a few fun gimmicks you can pull on iPhone users:

    1. See if you can swipe left to view widgets on the lock screen. I was able to get someone's address this way. He told me the whole time "There's nothing you can find there." and then afterwards said "Ah, crap."
    2. If there is a lock screen mini widget (under the time) for a clock or related feature, tap on it and it will open the clock app. You can also get there if you can swipe down to access control center if the "timer" button is enabled there. You can then make it look like you unlocked their phone, and start reading off their alarm names. This one has freaked out a lot of people.
    3. If they realize how you got there and try disabling control center access on the lock screen (as they should, FaceID is fast enough people!), you can see if you can access Siri and say "View my alarms".
  • Note to self: Do not live in Nevada.

  • Do you recall the exact issue?

    No, sorry. Some Reddit/Lemmy commenter.

    Is it something fancy?

    No, although invisible ink would be somewhat cool. Have any ideas for a "password pen"?

    TIL. It’s definitely neat. Thank you for that!

    No problem! :) You can also thank whoever on privacy@lemmy.ml posted it (I wish there was a search box...)

    The exception, Qubes OS, has Fedora 37 (which has gone EOL since last december) in dom0

    Yikes, any reason for that?

    Is it what’s elaborated upon in this video? If not, would you mind elaborating?

    More backstory time! I have never used a cellular carrier, and only watched that video about a month ago (because it didn't exist prior). The first part of my life was spent electronicless (because kids really shouldn't have phones... look at me now mom, I'm talking to strangers on the internet by routing through a global censorship circumvention network!). The next part was spent somewhat disconnected, only had access to a non mainstream social media (it has since been merged with another one made by the same company, and became paid. Capitalism.) through WiFi + never went out much. I then finally had unrestricted access, but still never went out much. Then I started to go out much more, and the places I went to didn't have WiFi. That, in turn, led me to take up network hacking as a hobby. I never managed to hack the network in question (WPA2-E). Finally, I got my first job around the same time I learned about privacy. That meant I had the money to get a cell plan, but I had the knowledge to know why that was a bad idea.

    It's funny, my mother recently called me because she was stressing about trying to find me a carrier (apparently?) and started saying "Your sister offered to add you to her plan if-" and I told her "I don't want a carrier, but thank you!" and she said "Oh... Well that solves that problem." and looked very relieved.

    Edit: I guess your question is asking ultimately why I don't want a carrier, and it is due to the points that were also brought up in that video, yes.

  • There is a typo: Three O's in "Outlook". Also, please add a row for services that include padded encrypted messages. Love this project!

    Edit before I get shot down: I am aware the repo says "If you see errors or would like something added, please submit an issue here.", but Github is not private and therefor I will not create an account. Apologies for the inconvenience.

  • it’s worth reviewing what Privacy Guides has to say on this.

    Interesting! Considering my threat model includes my ISP as an enemy, it would make sense for me to use a VPN behind Tor: However my threat model doesn't care if my ISP knows I am using Tor, as it would only be collecting data uncorrelated with my activities. Although it could cause legal trouble if a presidential threat (for example) over Tor happened at the same time as my usage of Tor. The change I will make is this: I will resume my current usage until I am able to use a paid VPN plan to speed it up.

    but please consider to review Proton VPN on port forwarding

    See above, no paid plan yet ;)

    Unfortunately, at least for torrents, you’re no longer able to rely on Mullvad VPN.

    Bleh, and I was really beginning to like them for allowing cash payments!

    Easiest (and also one of the best options) is probably the use of a VM 😅.

    Fair, although didn't GNOME Boxes have some sandboxing issues?

    there is merit in forsaking Anonaddy for SimpleLogin if decreasing the amount of trusted parties is desired. However, this comes at the cost at moving more into the the direction of putting all your eggs in one basket.

    I am using Anonaddy for that reason specifically, plus the severe lack of features in SimpleLogin's free version.

    I hope an offline password manager is involved to some capacity.

    As mentioned, I will switch to KeePass soon. Some of my passwords are stored completely offline, however. Pen and paper never fails, I even dedicated a specific pen for it! On a related note, take a look at this

    Do you happen to know how they currently fare against each other in security/privacy features (beyond what’s found on the linked spreadsheet)?

    Once I get an Android phone, I will try out Briar (because I am obsessed with the idea). I personally reached out to SimpleX regarding the spreadsheet, and the response I received back outlined that SimpleX pads the encrypted messages both during transit and in cold storage, which they said a lot of other messengers don't do. A comment on the original post for the spreadsheet mentions that the spreadsheet doesn't outline which services route through Tor (which Briar does, of course). The spreadsheet is very thorough, and SimpleX is still a relatively young project, so I don't have much I can say. I've tried using it on iOS, and my friend and I both agree it's terrible to use sometimes due to lag and choppiness. I currently testflight the app, but still no change. Either way, if you want, you can use SimpleX's built-in support chat if you want to reach out to the team yourself. They are very friendly and don't talk like a CEO, but there can be delayed response.

    Ah, we’ve found the password manager, KeePass (be it DX/XC) is indeed excellent.

    Yep! One related note, KeePass on Tails is outdated for some reason. Have any idea why?

    I also planned to add this to my original message: I have never once had a cellular provider, which to me has been the biggest privacy boost since burning Windows at the stake.

  • Noted, thank you!

  • Thank you very much for your detailed response! I'm comfortable pushing the boundaries of a normal operating system (I kind of have to, I'm a programmer, after all!) but I wouldn't consider myself a power user.

  • I will keep looking into it, thanks!