Imprint9816

joined 2 years ago
[–] [email protected] 4 points 51 minutes ago* (last edited 44 minutes ago)

I think there are a few things to clear up...

a VPN and an ISP are two different types of services. VPNs are not an internet service provider. They are held to two different standards.

Good VPNs don't log your information. Depending on what country they are based in they are obligated to hand over information if they have it but since they keep no logs there is nothing to hand over. Even if a court wanted to force a VPN to cut off service to a user there would be no way to know who that user is.

VPNs are beholden to the laws of the country they are based in, not the laws of their users. Its very hard for a US court to force a Swiss based VPN to do anything. That's why it's important to have a VPN that's based in a privacy friendly country. Sure a US court could sieze their server if one is located there but if there are no logs, it doesn't provide much.

I think there is this misconception that your VPN provider will break the law for you. Its not the case. Your VPN is going to hand over any info it's legally obligated to if it has that info

[–] [email protected] 1 points 17 hours ago

Threat modelling would be good here. You can spend a bunch of money on crap they don't need.

Broadly speaking...

a heavy built-in / fire resistant, safe is a great thing to have.

As much wired internet throughout the house as possible along with a decent firewall solution.

[–] [email protected] 1 points 23 hours ago* (last edited 23 hours ago) (1 children)

So you actually inspect the source code of everything you use?

This whole line of reasoning really only works if you have the expertise to understand the code in the first place. Otherwise you are just shifting trust from what the company tells you to what a third party looking at the source tells you. Sometimes that works but its in no way fool proof.

There is open source malware. FOSS /= trustworthy the same as closed source /= not trustworthy.

If you don't trust Apple that fine. Some people won't ever use a Pixel because they don't trust Google. It doesn't change the fact that Google currently makes the most secure, hardware wise, consumer smart phone. The point being this shift in trust is more of a personal choice then a good privacy or security practice. Just as using something like e/os or lineage over iOS is.

[–] [email protected] 1 points 1 day ago* (last edited 1 day ago) (3 children)

I didn't like my tone in my last response so I apologize.

Something being propriety isn't evidence of anything nefarious nor is something being from a large company. That's not evidence at all.

I'm not trusting Apples word, the privacy feature examples I've mentioned are proven working methods. Unless you have some source showing that RCS or their private relay don't work in someway.

[–] [email protected] 1 points 1 day ago* (last edited 1 day ago) (7 children)

Not necessarily, there are tons of things that are very secure but not at all private.

But.. having a massive attack surface and known security issues and thinking your data is somehow private because you use a FOSS application is silly.

EDIT to answer your edit: partly. I mean regular timely security updates seems to be a struggle for most of these android OS but also because it provides a bunch of privacy by default options that these other android ROMs don't such as a private relay, default RCS messaging, and makes them easy for users.

[–] [email protected] 3 points 1 day ago* (last edited 1 day ago)

I know a lot of people like the LTSC version but just a warning, they are slightly different then the regular home and professional versions in terms of policy settings.

This can make it more difficult to use things such as https://github.com/HotCakeX/Harden-Windows-Security

If you are someone interested in trying to harden your windows device but are not familiar enough to change all these policy settings yourself.

[–] [email protected] -1 points 2 days ago
 

Was hoping to get help finding a guide with more detail on setting up something like rdt-client for people who don't use docker.

It appears like its very much possible but it seems like pretty much all guides assume the user is setting it up in docker.

Currently have zurg and plex debrid setup with RD which works great but i find plex debrid a little lacking in being able to find what im looking for compares to using the *arr programs.

 

Initially saw this article from Brian Krebs mastodon account.

https://infosec.exchange/@briankrebs/111608035574860035

16
Kuketz Custom ROM Review: /e/ (www-kuketz--blog-de.translate.goog)
 

Confirmation in linked github discussion.

 

"We can disclose only now that we had a server in Toronto seized in 2015, initially without our knowledge. Maybe a court order was served to the datacenter. For about 10 days we did not understand what happened to the server, which did not respond, while the datacenter did not provide information. After 10 days Italian police (and not any magistrate) contacted us. They informed us that Toronto police and FBI (*) asked for our help because they could not find any log in the server. Unfortunately their help request came after the server had been already seized. They did not even make a copy, they took it physically, therefore the server went offline, probably alerting the alleged criminals. It was obvious that forensic analysis could not find any log, simply because there were none. Our VPN servers did not even store the client certificates, go figure (now they also run in RAM disks, but in 2015 they did not). The whole matter was led by informing us without any document from any court or magistrate, but only through official and informal police communications, and only to ask for help after forensic analysis obviously failed completely.

We were not asked to keep confidentiality on the matter, but just to stay on the safe side and support the investigation on what it appeared as a serious crime (a whole database with personal information of a commercial service was cracked, stolen and published in public when the web site owners did not pay a "ransom"; while our server was apparently not used for the crack, it was used to upload elsewhere the database) we decided not to disclose the whole matter for at least 7 years. It's one of those cases confirming that our servers do not store log, data or metadata of clients' traffic.

(*) We may speculate that FBI was involved in a Canadian matter because the stolen database contained US citizens' personal data"

 

Thought this might be helpful to others who use Mullvad Browser.

Got to the advanced preferences and set webextensions.storage.sync.enabled to true.

 

I have been switching from Brave to Mullvad Browser and one odd issue I am running into is that I am not able to use my yubikey to login to sites such as simplelogin or protonmail anymore.

My guess is its something with noscript as the other addons I used on Brave but, even if I mark an entire site as trusted the yubikey prompt still seems to be blocked.

view more: next ›