• 11 Posts
  • 102 Comments
Joined 2M ago
cake
Cake day: Feb 25, 2024

help-circle
rss

As long as you generate your passphrases properly (i.e. making sure they still have high entropy and don’t fall into the same pitfalls I listed, in case someone still decides to brute force your password as a passphrase), you can have a very secure passphrase. However, as far as sheer entropy goes, passwords have more entropy in a more compact space and are better in that respect.

P.S. Some applications have a character limit, meaning you’ll get more entropy out of a password than a passphrase. You might accidentally get weak entropy in a passphrase because of the character limit.


you dont have to type in something 10x as long, so you can get a lot more entropy in a smaller space

This is especially useful when you require a lot of entropy, having an essay as your passphrase isn’t very fun!

the mnemonic can be anything you want it to be as long as the words start in the respective letters

You can even make up your own rules, not just starting with the respective characters.


That’s a lot of supposition.

For the sake of an example.

The reality is the password guesser has a string of 29 characters.

Actually, not even that. It would be hashed as a fixed length (256 bits usually).

Again, most of what I was saying was just for the sake of an example to show that under the right circumstances the length of a password doesn’t dictate its security. Even if it’s an extreme, security is only as strong as its weakest link. I’m not denying that it can be unrealistic, and I’m not saying it’s insecure (hence the “grain of salt” section that addressed all of your points), I’m just showing how it could be possible.


Also, someone can hijack your contacts and bribe/torture all 3 people into giving them your credentials.


they don’t even know they’re trying to guess words in the first place.

That is true, but the math is still the same regardless.

Suppose you had a word list of 1,000 five letter words. Each of your passphrases is 5 words long. That means you have 1,000^5 possible combinations of passwords, which is an entropy of ~49.8 bits. Even though each passphrase is going to be 29 characters long (5 five letter words plus 4 spaces in between), the password wasn’t generated character by character.

By contrast, suppose you used all 95 characters on the (US) keyboard, an 8 character password has 95^8 combinations, which is an entropy of ~52.6 bits. Even though the passphrase has 21 more characters than the password, the password still has more entropy.

Big grain of salt here: You can get a huge word list and remember much longer passphrases easily, but the point is to show that the number of characters doesn’t dictate the security of a password. If someone were to brute force a passphrase character-by-character, it would hold up very well, but a) Not many people use passphrases and b) It’s far more common to use password dictionaries than to brute force.

Hope this helps! Here’s the Wikipedia page for password entropy

P.S. If someone found your word list, they could probabilistically brute force your passwords. For example, if 75% of your five letter words started with the letter S, they could deduce that most of the words likely start with S, and they’ve already eliminated a few characters to brute force.


So someone who got to you would have at least two of the three by default.

Both are useless without the third, and can be easily regenerated. Also, you can be tortured for your passwords.


You could technically achieve this by giving one person the password, another person the key file, and the third person the security key.


Another solution would be a recovery pool.

That is a really interesting method! Thanks for sharing, I’ve learned something new. A way to solve the stakeholders unlocking it would be to also require the admin’s own credentials plus 2 (or however many) stakeholder credentials to unlock it. However, that could cause stakeholders to target the admin.


While this may not be what you’re looking for, it’s worth mentioning that a good ol’ pencil and paper does wonders. It won’t have everything you need, but you can time how long you ran for with a stopwatch, count how many pushups you do, manually measure your pulse, etc. If you’re good with data processing you can stick the data in a spreadsheet and process it to see your progress. The bonus is you’ll learn a lot more about health through doing it yourself. Besides that, I’ve never used a smart watch or fitness tracker. I’ve just exercised until I get tired.


Or hell it could even be a hard drive in a box somewhere

That one guy: “I store my backups in a concrete box in the bottom of the ocean. It’s very secure!”

That guy when his system fails: “Hunny, I have to go scuba diving for our passwords.”

(This was meant as a joke)


Most passwords can be converted to passphrases to help you remember them. A password “8pmfvt3bww7t” could be remembered as “8 pandas might find vases that 3 bears will wash 7 times.” Obviously not all passwords will work for this, but it’s a good way to remember random strings. Passphrases are long in characters but have an entropy dependent on how long your wordlist is. For example, 3 words might be 20 characters, but it’s easy to guess 3 words since you’re not going character by character.


My method is that I have a passphrase with some special symbols that unlocks my database and it is decently long.

Where is your password stored? If it’s only by memory, what happens if you forgot it or needed someone else to unlock it in an emergency?


If you completely lose your password to your vault there is nothing you can do, simple as that. Don’t lose it.

Unfortunately, as mentioned in the post, there are some ways to lose access to your password that are out of your control. Furthermore, the more places you store your password the less secure it is. It would be a lot easier to be able to authenticate with multiple authentication methods individually, than to rely on having access to all of them at once. That’s the problem I’m trying to address here.

Cloud-based sync is incredibly easy with self-hosted cloud, as pointed out by the KeePassXC FAQ. Self-hosted cloud is effectively a local solution.

It is still subject to the issues listed in the 3-2-1 rule, however the goal of self hosting itself conflicts with that rule (since the rule dictates the use of off-site cloud storage). I will note, it does somewhat solve the issue of keeping database backups, as any device pulling from the local cloud server effectively becomes a backup of your database.


How can you prevent KeePassXC database lockouts?
Inspired by [this post](https://lemmy.ml/post/14688671), I decided to see if I could identify any single points of failure in my own setup. # Prerequisites There are two notable systems that should be mentioned: #### [The 3-2-1 rule](https://en.wikipedia.org/wiki/Backup#Storage) The 3-2-1 rule can aid in the backup process. It states that there should be at least 3 copies of the data, stored on 2 different types of storage media, and one copy should be kept offsite, in a remote location (this can include cloud storage). 2 or more different media should be used to eliminate data loss due to similar reasons (for example, optical discs may tolerate being underwater while LTO tapes may not, and SSDs cannot fail due to head crashes or damaged spindle motors since they do not have any moving parts, unlike hard drives). An offsite copy protects against fire, theft of physical media (such as tapes or discs) and natural disasters like floods and earthquakes. Physically protected hard drives are an alternative to an offsite copy, but they have limitations like only being able to resist fire for a limited period of time, so an offsite copy still remains as the ideal choice. #### [The factors of authentication](https://en.wikipedia.org/wiki/Authentication#Authentication_factors) The ways in which someone may be authenticated fall into three categories, based on what is known as the factors of authentication: something the user knows, something the user has, and something the user is. Each authentication factor covers a range of elements used to authenticate or verify a person's identity before being granted access, approving a transaction request, signing a document or other work product, granting authority to others, and establishing a chain of authority. Security research has determined that for a positive authentication, elements from at least two, and preferably all three, factors should be verified. The three factors (classes) and some of the elements of each factor are: 1. Knowledge: Something the user knows (e.g., a password, partial password, passphrase, personal identification number (PIN), challenge–response (the user must answer a question or pattern), security question). 2. Ownership: Something the user has (e.g., wrist band, ID card, security token, implanted device, cell phone with a built-in hardware token, software token, or cell phone holding a software token). 3. Inherence: Something the user is or does (e.g., fingerprint, retinal pattern, DNA sequence (there are assorted definitions of what is sufficient), signature, face, voice, unique bio-electric signals, or other biometric identifiers). # What KeePassXC offers [KeePassXC](https://keepassxc.org/) is an open-source cross-platform password manager. It mainly stores password databases locally, but [you can simply store the file on the cloud for cloud sync](https://keepassxc.org/docs/#faq-cloudsync). However, this method is botch-y at best, and adds the additional complexity of storing the credentials for the cloud drive. The database can be protected with any of the following: **Password**: This is something the user knows. It can be a password or a passphrase. This can be written down to become something the user has physically, or stored in a file to become something the user has digitally. Storing it in a file is generally not safe due to temporary file leaks. **Key File**: This is something the user has. This is stored digitally. This file should either be kept on a separate drive, encrypted with something like LUKS or [VeraCrypt](https://veracrypt.fr/en/Home.html), or both. It is possible to convert it to readable text and print it as a physical copy, but reversing the process every time you want to unlock your database would be cumbersome. **Hardware Key**: This is something the user has. This is stored physically. You can use hardware security keys such as the [YubiKey](https://www.yubico.com/) or [OnlyKey](https://onlykey.io/) for this. **Quick Unlock**: This is something the user is. [Quick Unlock](https://keepassxc.org/docs/KeePassXC_UserGuide#_quick_unlock) is only available on Windows and macOS as a form of biometric authentication. It is only available for devices that have a built-in biometric scanner, or by using an attachable biometric scanner. There is most likely a way to achieve this on Linux, but the documentation is scarce. Any combination of these methods can be used to protect a KeePassXC database. At least one must be used. However, if you use multiple methods, all of them must be used to unlock the database (e.g. if you set up a password and a key file as the methods to unlock the database, you can't only use the password or only use the key file to unlock it, you must use both.) # The problems Each method has a single point of failure, and the fact that you can't set up multiple methods of authentication but choose one to unlock the database means that the more methods you choose to protect your database with, the likelier it will be that one method fails. **Password**: This can be forgotten, lost or stolen from a piece of paper (if it's written down), keylogged or [shoulder surfed](https://en.wikipedia.org/wiki/Shoulder_surfing_(computer_security)), leaked through temporary files or stolen (if it's stored digitally), corrupted or permanently encrypted (if it's stored digitally), have the drive physically lost or stolen (if it's stored digitally), unconsciousness (if you only stored it mentally and needed someone else to unlock it for you), or forced our of you with torture. **Key File**: This can be leaked through temporary files (if not stored properly), hacked and stolen, corrupted, permanently encrypted (if you are unable to decrypt it), or have the drive physically lost or stolen. **Hardware Key**: This can be damaged, stolen, or lost. **Quick Unlock**: This can be spoofed (if not set up properly), damaged, general failure to authenticate, damage to you (e.g. facial damage in a fire), or hacked with [zero-day vulnerabilities](https://en.wikipedia.org/wiki/Zero-day_vulnerability) (since Windows and macOS are proprietary). If any one of these fails, the database is permanently locked. # Some solutions There are some improvements that you can use to mitigate some of the single points of failure. All methods of authentication can be redone if something happens, but you need to unlock the database to do so (e.g. you can change your database password if it gets leaked, but you need to be able to unlock the database first, so it doesn't help if you lose your password). **Password**: You can store your password using something like a [password card](https://www.passwordcard.org/en). Passphrases are also easier to remember than passwords. Both passwords and passphrases can be safely written down on paper by [enciphering](https://en.wikipedia.org/wiki/Cipher) them first. However, this introduces new complexities and single points of failure if you are unable to decipher the password. **Key File**: The use of the 3-2-1 rule can help make sure the key file never gets lost, but extra care should be taken to make sure the file never gets stolen. **Hardware Key**: You can set up multiple hardware security keys in order to make sure if one gets lost you can use the other. One key should be kept with you at all times, and the other should be safely stored somewhere else (such as a safe deposit box). **Quick Unlock**: I have never used this feature, but assuming it's anything like FaceID, you should set up multiple people (such as trusted friends and loved ones) to be able to unlock with biometrics. This ensures that if something happens to you, someone else can unlock it in an emergency or other reasons you may need someone to unlock it for you. # Plugins While I may be wrong, [KeePassXC does not support plugins directly](https://keepassxc.org/docs/#faq-general-plugins). Ideally you should be able to have plugins for things such as proper cloud sync, TOTP database protection, and changing the all-or-nothing nature of unlocking the database. However, since KeePassXC is open source, someone could make a fork of KeePassXC that supports plugins (please, call it KeePlugXC). # Database syncing Besides not being able to unlock your database, your database file itself is largely subject to the same single points of failure as a key file. The difference is the database is completely encrypted, and is safe (although not ideal) if it gets leaked. You can store your database in as many places as you'd like, to make sure it never gets corrupted, but the issue is syncing the database as that would be a manual task. The solution presented is the botched cloud storage, but for those who want a local solution, that is not ideal. # Final notes and questions KeePassXC is very feature rich, so there are other things that can be used to aid the process of preventing database lockouts; but even so, it's a very difficult task. How is your KeePassXC database set up? Are there any single points of failure? How have you fixed some of the issues listed here? Is there a perfect or near-perfect system for eliminating lockouts?
fedilink


If you consider raising awareness about a brand name to be an advertisement, then it does. I do see your point, though.


Where are places you see ads?
I've noticed that ads are absolutely everywhere, and wanted to post this to disillusion some of the places we see ads but don't realize. It would be harder to make a list of places you *don't* see ads. # Websites The most common place to see ads is on nearly every website you visit. It's usually the most intrusive, especially with popups. # Books The very end page of books and back cover of books will often advertise books written by the same author. # Billboards Billboards along busy streets and highways often display static or moving ads. A notable mention is its role in the book Fahrenheit 451, where it was theorized that as cars get faster ads would have to be stretched out so people can see them better at high speeds. # Operating systems Some Android operating systems, as well as Windows, show ads in a non intrusive way. # Apps Especially mobile games, ads will be displayed anywhere possible, and sometimes used as a reward system. Social media apps display ads while scrolling, and even messaging apps will have some sort of promotion like requesting donations. # Mail Deemed "junk mail", companies will collect and sell the address of residents in order to send useless advertisements to the residents. This can't usually be opted out of. In my opinion, this should be illegal. # Phone calls Especially when put on hold, businesses will interject occasional advertisements in between the low quality jazz music. Customer support will also often advertise products to you while you are being assisted. # Newspapers Newspapers have entire pages filled with ads. Some of these are promotional coupons that can be used to get overpriced products for a regular price. # Magazines Magazines are fundamentally only used to advertise products in a passive way. The chances you actually have a meaningful experience with a magazine are slim. They are often placed in waiting rooms as a form of entertainment for people who don't want to use a phone at the time. # Music Between songs in radio broadcasts, long ad breaks will be placed. Music streaming services will also inject ads between songs. Even the hosts of podcasts will have sponsorship segments. # Disk movies DVD and Blueray disks will often come with ads baked in to advertise "upcoming" movies. That is, until 10 years passes and Peter Pan becomes a funny ad to see. # Movie theaters Between movie showings, movie theaters will display long ad segments while you wait for the movie to begin. Some very long movies are even split in half, with an ad break in between for you to empty your wallet and refill your popcorn. # Bleachers In sporting events, moving ads will be displayed under bleachers. Fun fact, these ads change depending on which channel you are watching the game from. # Commercials Between live television, you will get 1-3 minutes of commercials and then watch the shortest segment of your actual show. # Baked into videos Videos such as YouTube videos will have sponsorships and self-promotion baked in, causing the drastic rise of SponsorBlock. # Torrents Some torrented files will also have text or image files attached advertising other torrenting services. # Vehicles Buses, vans, cars, and others are often plastered with ads for different services. If you're in a car wreck, call emergency services first, not an auto repair shop. # Social media Social media is one of the go-to methods of marketing. Besides the ads you see while doom scrolling, many pictures and videos uploaded will simply be ads for products. # [Gas stations](https://lemmy.ml/post/14126942) Plastered all over gas stations, and apparently displayed on some gas pump screens, ads are placed everywhere. Is that not more of a fire hazard than eight closely packed gasoline tanks? # Posters Pasted inside schools, workplaces, plastered on power poles and sides of buildings, posters are cheap to make and placed everywhere. # Instruction manuals When buying a product, besides impossibly small print, some instruction manuals will have ads pasted in certain sections. Some devices like mice, keyboards, and headphones advertise proprietary software required to get the full extent of your product. # Wearables T-Shirts, pins, bracelets, hats, and all other kinds of merch will display company names for everyone to see. Ironically, companies see these kinds of clothing as inappropriate attire on the job. # Pens Another kind of merch, nearly every free pen has the name and contact info of businesses on it. # Redirects to downloads Some websites will redirect you to ad websites before beginning your download. Lots of these websites (such as the infamous AdFly) are malicious and will encourage you to download malicious software. # Grocery stores Solicitors in store, ads during checkout, product placement all throughout the store, ads over the intercom, nearly every type of ad imaginable can be found in grocery stores. # Speakers on public transport Some subways and buses will play ads over the speakers while you travel. No napping on the bus, we want you awake to hear our ads! # Emails Spam emails are frequently sent to people, so commonly an entire folder is dedicated to housing them. Even places you legitimately gave your email to will send you spam. # Comments and chat messages People will often self promote their accounts on various platforms. This is a common place for scams to arise. # Solicitors Solicitors will come on your private property just to sell their products to you. Just when you thought ads could never come knocking on your doorstep, they did. # Lawns Lawn signs for services such as lawn care or political messages will be placed on people's property as a form of willing advertisement. Flowers look a lot better than rust and plastic. # Airplanes Some airplanes will pull long banners with ads behind them. This is usually surrounding sporting events. # Brand names Products produced by any company will have brand names on them. This makes it easy for advertising to flow through word-of-mouth. But seriously, where *did* you get that shirt from? # Search engines Almost all search engines will display ad websites before legitimate search results # This post Even this post had an advertisement in it that I bet most of you missed. I passively advertised "SponsorBlock" under "Baked into videos". If you missed it, that's ok. Advertising has become so common that people have become desensitized to it.
fedilink

I’ve been a fan of SimpleX for a while now. Privacy comes at the cost of convenience, and SimpleX is the most private messaging platform according to this spreadsheet.


Not sure which news website I should be using for the link, sorry! I'm happy to change it if anyone has a better one. > Google agreed to destroy or de-identify billions of records of web browsing data collected when users were in its private browsing “Incognito mode,” according to a proposed class action settlement filed Monday. > The proposal is valued at $5 billion, according to Monday’s court filing, calculated by determining the value of data Google has stored and would be forced to destroy and the data it would be prevented from collecting. Google would need to address data collected in private browsing mode in December 2023 and earlier. Any data that is not outright deleted must be de-identified.
fedilink

(Last I checked) From this spreadsheet, Discord is the fourth worst messaging platform in terms of privacy. Now a new row for “Has ads” will have to be added…


What are the risks of sharing DNA?
I'm concerned about the privacy implications of DNA testing services like 23andMe or AncestryDNA. What are the potential risks of sharing our genetic data with those companies, and are there any privacy-focused alternatives available?
fedilink

That is very helpful, thank you! Is there any benefit to using UDP over TCP? I know TCP is more easily detectable with a port scan, and TCP uses ACK to make sure the data gets sent (and for that reason UDP is usually faster but lossy). How does that fit in with the context of DNS queries?


Graphene is not an OS but an AOSP fork.

GrapheneOS is a standalone mobile operating system based on the AOSP. Android’s kernel is based on the Linux kernel. If GrapheneOS is not an OS, then you are saying Android isn’t one either. Would you mind elaborating on why you believe GrapheneOS is not an OS?


SomeOrdinaryGamers has a Deep Web series for the “fun”.

Thank you, I’ll check it out!

I can attest to that, being my MO as well. Smartphones have made us isolated, anti social and dumber.

The same effects were seen with the introduction of the first commercially available computers.

Either use these terms or just leave them out.

There is nothing wrong with what I said.

Well, for one, they openly harass and witch hunt people (Micay instructed mods in his Matrix chat), and Micay went on to call almost everyone complicit in his claimed swatting attempt in April 2023, for which there is no evidence provided or in media. He also abuses “autism” label to avoid public accountability for his lies and crybullying behaviour.

Linus Torvalds himself has called these security cultists “masturbating monkeys” for the annoying things they do. People like Brad Spengler have been an annoyance to Linux community. And many people dislike the disregard for open source culture, privacy, anonymity and performance in the name of security, since most of them love advocating for corporate closed source security.

All of this is irrelevant to the GrapheneOS project itself. What the creators did had no effect on the focus and implementation of GrapheneOS.

When I get pissed off, I try steering people in a better direction.

That does not excuse your actions. There are kind, constructive ways of helping people in the right direction, what you did was neither of those.

If you use it, use it, but iOS in no measure stands above Android for privacy, security and anonymity purposes.

I never claimed it did. In fact, I implied the opposite.

Non-root smartphone guide: https://lemmy.ml/post/128667

Linux/Windows computing guide: https://lemmy.ml/post/511377

Threat model guide: https://lemmy.ml/post/34223

Guide for protestors: https://lemmy.ml/post/34220

Have you considered publishing a proper article on a place other than social media?

People often leverage powers to ban or silence debating just to not “lose”.

Another way of trying to win a debate would be to blatantly ignore and refuse to acknowledge points brought up by the opposing side. Here are the ones you missed:

If my post has been perceived as a guide, I apologize. It was not my intention. I’m not exactly sure if you were referring to a privacy guide, or a guide on how to format answers (which many people have followed). I don’t see any parts that encourage people to use the same services that I use (as a privacy guide would), but I could be wrong. Would you mind elaborating with specific examples?

I agree that, in some sense, it is an oxymoron: considering that iOS cannot be fully hardened due to multiple factors. The reasons I chose to use that terminology are explained below.

I tried my best to refrain from using terms that beginner privacy enthusiasts would not understand, which led to certain creative solutions to be used, such as “hardened” as an adjective to describe a more locked-down service. If you have any suggestions on alternatives, I am happy to hear them!

I do not have the finances to switch to a device capable of running Android yet. I am doing the best with what I can. Thank you for understanding my situation!

Mocking any content created with detail and care is not a kind thing to do, and goes against c/privacy’s 6th rule “Be nice :)”, which I am sure you are well aware of, considering you are a moderator in that community.

It is interesting for you to compare hardened Android (which you have stated is preferable) to iOS (which you have stated is not private). Would you mind elaborating on why GrapheneOS is not regarded as highly in comparison to other hardened Android ROMs, in your own opinion? Also, disregarding how privacy invasive Apple devices are, do you believe that Apple’s Lockdown Mode (at least) delivers on security features?

It seems you ignored over half of my message.

I look forward to hearing the responses you missed!


Looking for a DNS resolver
Hello! My knowledge about DNS resolvers is somewhat limited. So, in an effort to expand my knowledge and find a DNS resolver that works for me, I've come for help here. Here is a list of terminology that I either know too little about, don't know anything about, or want to make sure my understanding is correct about: **Cleartext** (What does this mean in the context of protocols? Is it inherently bad?) **DoH** (I somewhat understand this, but is it less secure than DoT?) **DoH/3** (How is this different from DoH?) **DoT** (Is this more private than DoH?) **DoQ** (I don't know enough about this, how does it compare to DoH and DoT?) **DNSCrypt** (I'm not sure what this is.) **Do53** (I'm not sure what this is. Is it a replacement for DoH/DoT/DoQ, or does it work alongside it?) **DNSSEC** (I don't know what this is.) **EDNS padding** (I'm pretty sure I know what this is, it just pads DNS queries. What happens if "Cleartext" is used, does it still pad it?) As for what I'm looking for in a DNS resolver: I don't plan to self host it, I would like support for iOS, Linux, and Android, I would like it to be free, I would like EDNS padding, DoH is preferred (although I don't quite understand the alternatives). I am aware that the DNS resolver will usually be the same as my VPN. Note: I'm not looking for a beginner DNS resolver, I've been using NextDNS for a while now, I'm looking for one with strict privacy and security. I've tried looking at [Privacy Guides](https://www.privacyguides.org/en/dns/#recommended-providers) and [Wikipedia](https://en.wikipedia.org/wiki/Public_recursive_name_server), but I don't know enough to make an educated decision. Any suggestions? Thank you all!
fedilink

Update: I finally got it working! The UI is a bit weird, but it works. Thank you!


I’ve tried it a few times, but couldn’t get it to work for reasons I don’t remember. I will try it one more time and give my feedback.


Reading this, my only thought was “This setup is eerily similar to the one I aspire to have.” Good job! I may reply with questions if I feel up for it.


Thank you for your openness to a rational discussion! For transparency’s sake (since I have a firm belief that correspondence with higher powers should be publicized), I am willing to address your points one by one publicly.

TailsOS is not for “fun” purposes.

While you are correct that Tails is not designed for entertainment purposes, because I have a passion in technology and privacy alike, I find it an enjoyable experience to use Tails, learn about some of its features, and overall have a peace of mind that none of my “shenanigans” will affect my daily operating system.

I use a Faraday bag to store my device when I’m in public

Nobody uses their phone like this. When you stop using the communicator as a communicator, you have made the phone essentially a glass brick you lug around for no purpose.

I hardly use my phone for communication purposes, as phones have been designed to be used for a multitude of different tasks. Some of these are: gaming, photography, a calculator, note-taking, music streaming, and many more. Phones today are essentially used as portable pocket computers. While I do use my phone for communication, I am not constantly in contact with people in my social circle. It’s a healthier way to use a digital device, because it means when you are at work or with friends, you aren’t constantly distracted using your phone. This helps me to live the moment, and be present. The Faraday bag adds extra security while doing so. I am by no means telling you how to use your phone, but that is how I use mine. After all, it’s my phone, not yours.

“NSA style” zomg cool blonde hair tech whiz kid?

This was a poke at this comment: “If you want paranoid levels of security, consider following the NSA’s Rule of Two, which means two completely independent layers of encryption.”

I am not blonde, by the way. Nor a minor.

iOS is a privacy nightmare. https://gist.github.com/iosecure/357e724811fe04167332ef54e736670d And its security has been worse than that of Android for years now. https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/

Thank you for providing helpful links! While I am well aware of the privacy invasive nature of iOS, I currently don’t have the funds to switch to my preferred alternative, GrapheneOS. This is my personal preference, and YMMV.

GrapheneOS is complete snake oil. Read more here to know about “security” cultists in FOSS/privacy community.

https://old.reddit.com/r/privatelife/comments/ug9qnc/writeup_criticism_of_rprivacyguides_grapheneos/

https://old.reddit.com/r/privatelife/comments/13teoo9/grapheneos_corporate_foss_loving_witch_hunting/

It’s not very appropriate to discriminate against a group of people, even if their views do not align with yours. They are still people, after all. While I don’t share your views about GrapheneOS, I do appreciate providing sources to back up your claims. Kudos to you for using old.reddit.

This post is a massive joke.

This is not nice and does not contribute to the post at all, and is therefore unnecessary. If you have negative opinions regarding a post, consider simply downvoting and potentially having a conversation with the creator (me) about it.

This person made a rough guide, and not merely shared their own setup.

If my post has been perceived as a guide, I apologize. It was not my intention. I’m not exactly sure if you were referring to a privacy guide, or a guide on how to format answers (which many people have followed). I don’t see any parts that encourage people to use the same services that I use (as a privacy guide would), but I could be wrong. Would you mind elaborating with specific examples?

And if someone is going to suggest their setup, let alone a guide, there will be people who pick it apart. Most will be trolls, some will be constructive.

This is the sole reason I placed the rules directly in the post, to discourage that behavior. Obviously it’s not foolproof, but it has significantly helped prevent it.

“Hardened iOS” is an oxymoron at some level, for example.

I agree that, in some sense, it is an oxymoron: considering that iOS cannot be fully hardened due to multiple factors. The reasons I chose to use that terminology are explained below.

If you use iOS, stop trying to conform to “cool” privacy notions, and be okay with it.

I tried my best to refrain from using terms that beginner privacy enthusiasts would not understand, which led to certain creative solutions to be used, such as “hardened” as an adjective to describe a more locked-down service. If you have any suggestions on alternatives, I am happy to hear them!

Switch to Android and harden it when comfortable.

I do not have the finances to switch to a device capable of running Android yet. I am doing the best with what I can. Thank you for understanding my situation!

Yes I mocked the post, but I did not berate the user, and I consider it fair enough.

Mocking any content created with detail and care is not a kind thing to do, and goes against c/privacy’s 6th rule “Be nice :)”, which I am sure you are well aware of, considering you are a moderator in that community.

I come with a lot of privacy/anonymity experience so I suggest things in a more hardline manner, while being able to see through if someone is okay with a more basic threat model. I am not a snobby elitist. I make guides for threat modelling, smartphones and computing.

Interesting! Would you mind linking to a few of your guides? I am very interested in reading them.

“Hardened iOS” and “GrapheneOS” often crosses my tolerance limit.

It is interesting for you to compare hardened Android (which you have stated is preferable) to iOS (which you have stated is not private). Would you mind elaborating on why GrapheneOS is not regarded as highly in comparison to other hardened Android ROMs, in your own opinion? Also, disregarding how privacy invasive Apple devices are, do you believe that Apple’s Lockdown Mode (at least) delivers on security features?

It sounds to me from experience that the person is no longer “reachable” in a reasonable manner, unless drums are loudly beaten.

I am happy to hear that I was able to exceed your expectations, with quiet instruments.

One thing I am known for is not abusing mod powers, and giving people plenty leeway. But even then, being the mod, you probably view it as an imbalance

Would you mind elaborating on why I may see your messages as an imbalance, as a result of your status as a professional moderator of this community?

If it is a simple debate in public, I welcome it as well.

I am glad you are open to a clean, transparent discussion. I look forward to hearing from you.

I cannot promise an immediate debate unless I am free, given my life circumstances, but we can try.

That’s alright, we all have hardships in the real world. Take your time.

I will admit one mistake, I did not know and assumed Secureblue is a misspelled Silverblue

It is a good quality to be able to admit your own mistakes, and I commend you for that. Until recently, I, too, was unaware as to what Secureblue is.

Nice pick. I use Debian Stable and am extremely picky with what I install, even minimising Flatpak installs and network connected programs.

Thank you! It was actually the community you moderate (c/privacy) that helped me pick it out. I, too, am somewhat picky about my installs. I am currently sticking to strictly Flatpaks.

I am eager to hear your responses! Please, get back to me when you can.

Cheers!


Thanks! I’ll check that out


Thanks for these recommendations!

but why not go all the way in?

I’ve tried Qubes in the past, and I’m not ready to tackle the learning curve yet. I want Secureblue to be the bridge to learning Qubes first.

I’ve switched Proton for Mullvad VPN, because I really like the idea they are going for

I’ve considered using it from a fingerprinting perspective, but I don’t have the finances to switch yet.

I think that in general I’d recommend just getting a cheap laptop/NAS and run your own Jellyfin, and slowly start building your own music collection.

Oh?


I am currently in the process of researching Libreboot. Have you had any concerns or problems when using it? Thanks!


Simply edit the URL

Thanks for this! It’s a trick I learned a long while back but have since forgotten. Good reminder!


Pleasure to finally meet you, albeit under less than ideal circumstances. I’ve been anonymously surfing this community for the better part of a year now, and only made an account in the past month. Your name has shown up a lot in most of the notable comments I’ve read. You’ve grown quite the reputation, even spreading to friends I know from other communities. Again, nice to meet you. Would you like to have a constructive and calm discussion regarding your concerns?


Thanks for elaborating! I’m curious about two things

  1. How are DNS queries handled over cellular?

  2. Is traffic E2EE between the phone and the cell tower, or could anyone with a laptop sniff packets of phone calls OTA with Wireshark?


doesn’t seem to understand encryption in general

I have some degree of knowledge in how encryption works, not so much how cellular carriers work (on a low level).


Why would they put in the effort when anyone who cares about secure communication just uses an encrypted messaging app?

Because not all traffic sent through cellular is messaging. People visit websites and whatnot when they’re out-and-about. Not to mention that not everyone uses secure messaging apps.

P.S. I am very aware of Signal, thanks!


This was very helpful, thank you! While I’m well aware of encrypted messaging apps, it seems more beneficial to encrypt all traffic, since not all traffic is just messaging and not everyone uses encrypted messaging apps.


Why haven’t private carriers emerged yet?
All questions are in bold for ease of use. The major carriers in the United States participate in NSA surveillance (except for T-Mobile apparently, because it's based outside of the US. Except they bought Sprint, which participates.) and that, along with other major privacy issues, means that the market for private carriers is incredibly slim. When I found out that some carriers, such as Mint Mobile, piggyback off of Verizon, I wondered: **What's stopping a carrier from simply E2EE everything from Verizon, and then using Verizon to transfer the data?** Obviously, **the encrypted data could still be collected and sold, but it wouldn't matter if the encryption was setup properly, right?** I'm looking to better understand how this works, and, if a solution exists, potentially be the first to make it happen. The reason I'm not suggesting creating a carrier without piggybacking is due to the sheer cost and lack of support it would have, which would lead to poor adoption. Also, **if carriers simply don't support E2EE, couldn't carrier locked phones install the software (since most install software anyways) required to make E2EE work?**
fedilink

Alright, so:

When you visit a website without using a VPN/Proxy/Tor, the website can see your public IP address. That public IP address is unique (with exceptions I’ll get to in a moment) to your home router. NAT means that each device connected to your router (Wi-Fi) has a local IP address, hidden to the website, but your routers IP is still unique to the website. That means that, even if you switch devices, if you visit a website using your home network the website knows that it is your Wi-Fi and not somebody else’s. That means that you can get tracked across websites just by correlating public IP addresses. Ads can see this IP address too. The public IP address by itself is enough to narrow down your location to the exact city, in most cases. So, when you visit a website, the website knows

  1. The city you live in
  2. Can correlate your public IP address (ad networks usually do this, not the website itself) to all the other websites you’ve ever visited

If your ISP uses dynamic IP addresses, that means your public IP address changes every month or so, so that #2 only has a history of about a month. CGNAT (Carrier-Grade NAT) means that multiple routers share the same public IP address, which removes #2 altogether. This still lets websites know the city you live in, but it reduces mass internet surveilling.

I may have gotten a few minute details a bit off, but that’s a basic shake down of how it works. TL;DR: Your IP can uniquely identify each of your devices if you don’t have NAT, your router if you do have NAT but not CGNAT, and the city you live in. Find an ISP that uses IPv6, dynamic IP addresses, and CGNAT, and use a elite proxy, free VPN, and Tor with a private DNS for maximum privacy.



Here are some helpful links from the EFF (Electronic Frontier Foundation) on the topic:

https://www.eff.org/wp/defending-privacy-us-border-guide-travelers-carrying-digital-devices

https://www.eff.org/files/2017/03/10/digital-privacy-border-2017-guide3.10.17.pdf

https://www.eff.org/files/2018/01/11/border-pocket-guide-2.pdf

https://www.eff.org/issues/border-searches

I’m sure there’s more that I haven’t put here, feel free to sift through the search page

Having lived in the U.S. my whole life, (and this doesn’t speak for everyone), it’s not the dystopia people make it out to be all the time. In fact, people will likely judge you for wearing a face mask. If you care about hiding your face, sunglasses and a cap is enough. Remember to be reasonable with your threat model!


I remember I tried out Spotube on my computer but the code wouldn’t work.

It’s buggy, but it works good enough with some effort.

How does Graphene differ from Lineage, in any way that it is preferable?

This table compares Android ROMs based on a lot of metrics. Basically, Lineage isn’t as private as people think, but Graphene does it proper. Let me know if you have specific questions :)


I am looking into buying a Samsung S9/S10 to install LineageOS on.

If you have the money, check out GrapheneOS!

Part of me wants to download my music from Spotify and store it somewhere, but iPhone Drive isn’t the greatest when it comes to that. Maybe somebody has (free/FOSS) suggestions?

Spotube does this really well


Running on Lockdown Mode now, and it’s actually not that bad!

I have only had issues with it twice, been using it for a year

  1. Images on a website wouldn’t load (for security reasons)

  2. Some apps break, but you can disable it per-app



Improve Your Privacy Setup
Hello, Lemmy! It may be difficult to spend time actively improving some of the services you use to have a more privacy conscious presence, and so this thread is dedicated to help people learn and grow in their privacy journeys! Start by stating which services you currently use, and which ones you may be looking for/want to improve. This thread is entirely optional to participate in, because a lot of people understandably feel uncomfortable listing which services they use. Writing those out can be a lot of work, but the payoff is huge! # Remember these rules: - **Be respectful!** Some people are early on in their privacy journey, or have a lax threat model. Just because it doesn't align with yours, or uses some anti-privacy software, doesn't mean you can downvote them! Help them improve by giving suggestions on alternatives. - **Don't promote proprietary software!** Proprietary software, no matter how good it may seem, is against the community rules, and generally frowned upon. If you aren't sure, you can always ask! This is a place to learn. Don't downvote people just because they don't know! - **Don't focus solely on me!** Since this happened in [another one of my posts](https://lemmy.ml/post/12711033), I want to mention that this thread is **not** designed to pick apart only my setup. The point is to contribute your own and help others. That doesn't mean you can't still give suggestions for mine, but don't prioritize mine over another. - **Be polite!** This falls under "Be respectful", but be kind to everyone! Say please, thank you, and sorry. Lemmy is really good about this, but there will always be someone. # Here is my setup: **Web browsing** * I use Tor for using online accounts (such as Lemmy, etc.) * I use Mullvad Browser for general browsing * I use Librewolf for functionality that Mullvad Browser doesn't have (security keys, etc.) * I use Firefox + uBlock Origin for streaming videos that break on Librewolf and Mullvad Browser. * I always use a SearXNG instance for web searches. I always use ProtonVPN (free tier). I use a private DNS resolver. **Desktop** * I use Secureblue (yes, I'm that guy from a post a couple weeks ago) * I sit behind a firewall. * I only use FOSS Flatpaks with Flatseal. * My BIOS is password locked but proprietary (due to compatibility issues). * I occasionally use Tails because I think it's fun. * I use full disk encryption, multiple disks, and a second layer of encryption for specific important files (NSA style) **Mobile** * I currently use hardened iOS until I can scrape together some money for a Pixel to use GrapheneOS * Again, I constantly use ProtonVPN (free tier) * I use a private DNS when ProtonVPN is turned off * I use AdGuard, but I browse the internet with the DuckDuckGo app (I can't sideload) * I use a very strong passcode * Airplane mode is constantly enabled, I don't have a SIM * I use a Faraday bag to store my device when I'm in public * I use a privacy screen protector **Messenger** * I mainly use Signal with a borrowed phone number, because SimpleX is still buggy on iOS, and Signal is the easiest to switch friends to. I rarely use iMessage, but there are times when I have to. **Online accounts** * Passwords are stored in Bitwarden for mobile accounts, and KeePassXC for desktop accounts. * Yubikey is placed on any account I can, otherwise 2FAS is used * I keep public accounts (Lemmy, etc.) as locked down as I can. **Video streaming** * I use the native YouTube app on iOS, simply because any of the others I've tried either don't actually work or require a Mac to install. I don't have a Mac, obviously. * I use FreeTube on desktop, but as I was writing this I was informed that FreeTube has a few issues I may want to look into (Electron). **AI** * I would love to know if there are any Flatpaks that run local LLMs well, but I currently use GPT4All (since that's what I used a year ago). * On mobile, I use an app made by a friend that gives access to GPT-4 and Gemini. Because it's running off of his own money, I'm not going to share the project until he has a stable source of income. **Social Media** * I don't use any social media besides Lemmy. **Email** * I use ProtonMail * I have addy.io as an alias service **Shopping/Finance** * I currently either proxy my online purchases through someone else (have them buy it for me and I pay them back), or use a gift card * For physical purchases I use cash * I only use my bank account for subscriptions (Spotify, etc.) * I am working on using Monero and privacy.com **Music streaming** * I use Spotify on my phone * I use Spotube or locally downloaded files on my computer * I have multiple AM/FM receivers with some yard long antennas and direct metal connectors **TV shows** * I stream from ethical services for some movies * I go to a theater or buy a DVD for other movies. I am the proud owner of a USB DVD player. * I also have an antenna hooked up to my TV * There are certain IPTV services I have used in the past * I do not use a smart TV. **Gaming** * I download local games, plain and simple. Or I code my own game. **Programming** * I code in Python using PyCharm. I'm looking for alternatives. * I will use GitLab when I decide to publish some of my work. **Productivity** * LibreOffice, although the UI is iffy **Misc** * I don't use any location services * All my clocks are set to UTC * I don't have a smart watch * I don't have a smart car * I use Bluetooth earbuds * I cover my webcams with paper and tape. Reason: It's worth taking a couple seconds to peel tape off when you use the webcam than to risk a massive breach. Thanks for reading! Note here: I found out the other day that a Google Streetview car passed by my house, and my blinds being shut were the only thing keeping my room away from prying eyes. Is there an easy way to blur/censor my house without giving up my soul? # Special thanks Lots of people kindly contributed their personal setups in the comments, and some even made [their own posts!](https://lemmy.ml/post/13306687) I'm really glad I could spark inspiration and start a way for people to learn and grow in their privacy journeys. To think, just this morning, I was stressing on if people would even enjoy the post at all! Thank you all again, and please go forward to inspire others. I am not the person who made this happen, all of you are!
fedilink

Tails 6.0 Released
Evidently Tails 6.0 released over a week ago, and my version never prompted me for an upgrade ~~(maybe because it's a major upgrade, I don't know.)~~ In any case, I wanted to first of all spread the word about Tails, and second of all mention this: My one problem with Tails is that it had some outdated software (such as KeePass being a few versions behind), but with the introduction of Tails 6.0, that seems to be resolved. Tails also has dark mode now. I love dark mode. Edit: "Automatic upgrades are only available from Tails 6.0~rc1 to 6.0. All other users have to do a manual upgrade."
fedilink

Which privacy services would you donate to?
Due to financial problems, throughout my privacy journey I have only used free tools to enhance my privacy. I was recently thinking about the question: If I had the money to give back to the services I've used, which ones would I donate to? Here is my personal list, which is still a WIP: **I will definitely donate to (13):** - [Aegis Authenticator](https://getaegis.app/) | [Donation Link](https://www.buymeacoffee.com/beemdevelopment) - [GrapheneOS](https://grapheneos.org/) | [Donation Link](https://grapheneos.org/donate) - [KeePassXC](https://keepassxc.org/) | [Donation Link](https://keepassxc.org/donate/) - [The Linux Foundation](https://www.linuxfoundation.org/) | [Donation Link](https://www.linuxfoundation.org/about/donate) - [LUKS](https://gitlab.com/cryptsetup/cryptsetup/blob/master/README.md) | Donation Link *(Help me find!)* - [Mullvad](https://mullvad.net/en) | Donation Link *(Help me find!)* - [The Qubes OS Project](https://www.qubes-os.org/) | [Donation Link](https://www.qubes-os.org/donate/) - [SimpleX](https://simplex.chat/) | [Donation Link](https://github.com/simplex-chat/simplex-chat#help-us-with-donations) - [SearXNG](https://docs.searxng.org/) | Donation Link *(Help me find!)* - [Tails](https://tails.net/) | [Donation Link](https://tails.net/donate/) - [Tor Project](https://www.torproject.org/) | [Donation Link](https://donate.torproject.org/) - [uBlock Origin](https://github.com/gorhill/uBlock/) | [See here](https://github.com/gorhill/uBlock/?tab=readme-ov-file#about) - [Whonix](https://www.whonix.org/) | [Donation Link](https://www.whonix.org/wiki/Donate) **I am very likely to donate to (14):** - [Briar](https://briarproject.org/) | [Donation Link](https://liberapay.com/Briar/donate) - [coreboot](https://coreboot.org/) | [Donation Link](https://coreboot.org/donate.html) - [Electronic Frontier Foundation](https://www.eff.org/) | [Donation Link](https://supporters.eff.org/donate/join-eff-today) - [F-Droid](https://f-droid.org/) | [Donation Link](https://liberapay.com/F-Droid-Data/donate) - [FreeTube](https://freetubeapp.io/) | [Donation Link](https://liberapay.com/FreeTube) - [The Gnu Privacy Guard](https://gnupg.org/) | [See here](https://gnupg.org/donate/index.html) - [LibreOffice](https://www.libreoffice.org/) | [Donation Link](https://www.libreoffice.org/donate/) - [NewPipe](https://newpipe.net/) | [Donation Link](https://newpipe.net/donate/) - [OpenStreetMap](https://www.openstreetmap.org/about) | [Donation Link](https://supporting.openstreetmap.org/) - [OpenPGP](https://www.openpgp.org/) | Donation Link *(Help me find!)* - [OpenVPN](https://openvpn.net/) | Donation Link *(Help me find!)* - [Orbot](https://orbot.app/en/) | [Donation Link](https://orbot.app/en/donate/) - [WireGuard](https://www.wireguard.com/) | [Donation Link](https://www.wireguard.com/donations/) **I will most likely donate to (7):** - [AnonAddy/addy.io](https://addy.io/) | [Donation Link](https://addy.io/donate/) - [GtkHash](https://gtkhash.org/) | Donation Link *(Help me find!)* - [Joplin](https://joplinapp.org/) | [Donation Link](https://joplinapp.org/donate/) - [Lemmy](https://join-lemmy.org/) | [Donation Link](https://join-lemmy.org/donate) - [LibreWolf](https://librewolf.net/) | [See here](https://librewolf.net/docs/faq/#why-dont-you-accept-donations) - [Monero](https://www.getmonero.org/) | Donation Link *(Help me find!)* - [Nitrokey](https://www.nitrokey.com/) | Donation Link *(Help me find!)* **I may donate to (12):** - [DuckDuckGo](https://duckduckgo.com/) | [See here](https://duckduckgo.com/duckduckgo-help-pages/company/donations/) - [Fedora](https://fedoraproject.org/) | [See here](https://fedoraproject.org/wiki/Donations) - [GitLab](https://about.gitlab.com/) | donations@gitlab.com - [GNOME](https://www.gnome.org/) | [Donation Link](https://www.gnome.org/donate/) - [Molly](https://molly.im/) | [Donation Link](https://opencollective.com/mollyim#category-CONTRIBUTE) - [AdGuard](https://adguard.com/en/welcome.html) | Donation Link *(Help me find!)* - [Organic Maps](https://organicmaps.app/) | [Donation Link](https://organicmaps.app/donate/) - [privacy.sexy](https://privacy.sexy/) | [Donation Link](https://github.com/undergroundwires/privacy.sexy?tab=readme-ov-file#support) - [Proton](https://proton.me/) | Donation Link *(Help me find!)* - [Signal](https://www.signal.org/) | [Donation Link](https://www.signal.org/donate/) - [Standard Notes](https://standardnotes.com/) | Donation Link *(Help me find!)* I may add more as I think of them. Please leave your ideas! Note: I'm trying my best to avoid turning this into just a list of privacy tools, but that may end up being what it becomes. **Honorable Mentions (9):** There are some services that I support but either don't use or have not matured enough to donate to. - [2FAS](https://2fas.com/) | [Donation Link](https://2fas.com/donate/) - [Free Software Foundation](https://www.fsf.org/) | [Donation Link](https://my.fsf.org/donate) - [Mozilla (Firefox)](https://www.mozilla.org/en-US/firefox/) | [Donation Link](https://foundation.mozilla.org/en/?form=donate) - [GNU Image Manipulation Program](https://www.gimp.org/) | [Donation Link](https://www.gimp.org/donating/) - [Invidious](https://invidious.io/) | [Donation Link](https://invidious.io/donate/) - [OsmAnd](https://osmand.net/) | Donation Link *(Help me find!)* - [Piped](https://github.com/TeamPiped/Piped) | [Donation Link](https://github.com/TeamPiped/Piped#donations) - [Spotube](https://spotube.krtirtho.dev/) | [Donation Link](https://opencollective.com/spotube/donate) - [Wine](https://www.winehq.org/) | [Donation Link](https://www.winehq.org/donate) **Some math** I realized I never actually specified any amounts that I would donate to each service, so here is most likely how I will spread my money: For the services I will definitely donate to, I will donate $50 to each services. For the services I am very likely to donate to, I will donate $40 to each service. For the services I will most likely donate to, I will donate $30 to each service, for the ones I decide to donate to. For the services I may donate to, I will donate $20 to each service, for the ones I decide to donate to. For the honorable mentions, if they ever become part of my official donation list, I will start with a $10 donation and increase it from there. For those thinking those are small donations, note that if I were to donate those amounts to every service it would be a total donation of over $1,700. That is at least a start, and once I am able to donate I will likely donate the same amount every year. By no means am I doing this for publicity or congratulations, I am just making my thoughts public and hopefully sparking others to donate to some privacy services. Lots of these services run off of donations, so please try not to take them for granted! # A note from me There seems to be a misunderstanding about the purpose of this post. I am not posting this to receive criticism for my choices, although I am happy to learn about potential misconceptions I had about certain services ([Organic Maps](https://lemmy.ml/comment/8912365), [Mozilla](https://lemmy.ml/comment/8916394), etc.) This list contains __my__ choices, and your choices may be different. Nor am I posting this to gain attention, media traction, congratulations, or publicity. The purpose of this post is to encourage you to make your own list based on your own criteria, and to potentially share it here. Very few people have actually commented with services that they would/do donate to. I have decided to include my choices as well as links to better help others find what they would donate to. For example, many people may forget to donate to services like GNOME that they use every day without thinking twice about the developers who have worked hard to create it. I'm aware that some of these services are for-profit, have poor business practices, or are based in privacy disrespecting countries, but in my opinion (and again, you should make your own list based on your own opinion) those services deserve my support. I thank everyone who has helped me better formulate my list, but this post isn't meant to be about me. I encourage you to take your time to make your own list of services you really would consider donating to. The draft for this list has taken me over a month. Thank you all for taking the time to read through this, and it is unlikely I will be interacting with this post for a while.
fedilink

Searching for a Linux distro
I first used Linux about 5 years ago (Ubuntu). Since then, I have tried quite a few distros: **Kali Linux** (Use as a secondary) **Linux Mint** (Used for a while) **Arch Linux** (Could not install) **Tails** (Use this often) **Qubes OS** (Tried it twice, not ready yet) **Fedora** (Current main) For me, it has been incredibly difficult to find a properly privacy oriented Linux distro that also has ease of use. I really enjoy the GNOME desktop environment, and I am most familiar with Debian. My issue with Fedora is the lack of proper sandboxing, and it seems as though Qubes is the only one that really takes care in sandboxing apps. Apologies if this is the wrong community for this question, I would be happy to move this post somewhere else. I've been anonymously viewing this community after the Rexodus, but this is my first time actually creating a post. Thank you! # **UPDATE:** Thank you all so much for your feedback! The top recommended distro by far was SecureBlue, an atomic distro, so I will be trying that one. If that doesn't work, I may try other atomic distros such as Fedora Atomic or Fedora Silverblue (I may have made an error in my understanding of those two, please correct my if I did!). EndeavourOS was also highly recommended, so if I'm not a fan of atomic distros I will be using that. To [@leraje@lemmy.blahaj.zone](https://lemmy.blahaj.zone/u/leraje), your suggestion for Linux Mint Debian Edition with GNOME sounds like a dream, so I may use it as a secondary for my laptop. Thank you all again for your help and support, and I hope this helps someone else too!
fedilink