From literally the same thread: https://lemm.ee/comment/14867214
Generally Ventoy is better than both. Choose a dedicated flash storage, flash Ventoy to it, then click and drag as many ISO’s as can fit on your drive and you can boot from any one of them at any time.
Much better than Etcher or Rufus, IMO.
This doesn’t change the situation at all. Each mail server has their own whitelists and blacklists. Some mailservers have explicit whitelists and will throw into the spam folder anything not on the whitelist. You could have a perfectly configured mail server and be doing everything right, but because your TLD isn’t on the whitelist its throw into spam regardless. It entirely depends on the configuration of the mail server to whom you’re sending mail.
Mail is super hard.
Generally custom domains don’t pass spam filters very well. Your email server will have to be immaculate and even then, you could be sent to spam simply because you’re not on the TLD whitelist of a mail server…
Generally, I don’t recommend people roll their own mail server, and even less so when you don’t use typical TLD. You can always test it out, though, if you already have the domain: https://www.mailgenius.com/
Most Android versions have this now. Became popular as soon as SCOTUS ruled that police can compel you to unlock your device via biometrics. Enable it. If you think you may be arrested, simply restart your phone and now they need a court order to unlock your phone which means they have to convince a judge with probable cause.
Practically speaking, there’s a huge difference.
RCS/iMessage are great. They’re a huge upgrade over SMS, however, the E2E statements they make aren’t really verifiable to the degree necessary to call them secure. They also require hardware compatibility, software compatibility, environment compatibility (root breaks RCS) as well as network compatibility so the pool of devices that work both ways with RCS is still pretty small. It’s frankly a mess. Default settings for most RCS/iMessage applications will attempt to send via E2E protocols and if it fails, it defaults back to sending SMS. So now your super secret content was just sent basically over cleartext if the protocol send fails. lol
Realistically speaking, he’s right. There’s no difference. People don’t casually message information which is important enough to require perfect forward secrecy. So at the end of the day choose which works best for you and if you do dumb shit like sending credit card and social security numbers over clearnet, then prepare to have your anus widened.
I personally prefer running an MTProto proxy on top of Telegram. I control the proxy, so I can view where the network traffic is going in transit for the most part. Is MTProto perfect? No. But it’s vastly improved since previous independent audits and it’s “good enough.”
If critically sensitive information has to touch a device with internet access then you need a mature security protocol like PGP or some other shared key cryptography so you can verifiably ensure you’re talking to whom you’re supposed to be talking to. If that’s something you’re interested in, give Keybase a try. It’s a really great platform built around a really great technology (PGP). The mobile application comes with a chat option that uses your PGP key to symmetrically encrypt your chat messages using Scrypt (with PBKDF2) making it significantly more secure than any other option mentioned here.
Light + TIF https://sky.rethinkdns.com/1:AAkACAQA
Normal + TIF https://sky.rethinkdns.com/1:AAkACAgA
Pro + TIF https://sky.rethinkdns.com/1:AAoACBAA
Pro plus + TIF https://sky.rethinkdns.com/1:AAoACAgA
Ultimate + TIF https://sky.rethinkdns.com/1:gAgACABA
Light + TIF https://dns.dnswarden.com/00000000000000000000048
Normal + TIF https://dns.dnswarden.com/00000000000000000000028
Pro + TIF https://dns.dnswarden.com/00000000000000000000018
Pro plus + TIF https://dns.dnswarden.com/0000000000000000000000o
Ultimate + TIF https://dns.dnswarden.com/0000000000000000000000804
Light https://freedns.controld.com/x-hagezi-light
Normal https://freedns.controld.com/x-hagezi-normal
Pro https://freedns.controld.com/x-hagezi-pro
Pro plus https://freedns.controld.com/x-hagezi-proplus
Ultimate https://freedns.controld.com/x-hagezi-ultimate
TIF https://freedns.controld.com/x-hagezi-tif
DNS based adblocking with Hegezi blocklist and TIF (threat intelligence feeds). Works with any device on your network in one way or another (QUIC, DoH/3, DoT, etc) and doesn’t require installing anything. Just changing dns settings.
This is a great list. Blocks about 95% of all advertisements. About 4% are unblockable due to one reason or another, and the remaining 1% get added very quickly. I highly recommend this solution. Sure, you can setup a PiHole and do it all yourself, but in the end that requires time and attention. It’s the same list, but if you roll PiHole yourself you don’t get access to TIF, which are amazing for protecting you from different kinds of threats.
Light + TIF https://sky.rethinkdns.com/1:AAkACAQA
Normal + TIF https://sky.rethinkdns.com/1:AAkACAgA
Pro + TIF https://sky.rethinkdns.com/1:AAoACBAA
Pro plus + TIF https://sky.rethinkdns.com/1:AAoACAgA
Ultimate + TIF https://sky.rethinkdns.com/1:gAgACABA
Light + TIF https://dns.dnswarden.com/00000000000000000000048
Normal + TIF https://dns.dnswarden.com/00000000000000000000028
Pro + TIF https://dns.dnswarden.com/00000000000000000000018
Pro plus + TIF https://dns.dnswarden.com/0000000000000000000000o
Ultimate + TIF https://dns.dnswarden.com/0000000000000000000000804
Light https://freedns.controld.com/x-hagezi-light
Normal https://freedns.controld.com/x-hagezi-normal
Pro https://freedns.controld.com/x-hagezi-pro
Pro plus https://freedns.controld.com/x-hagezi-proplus
Ultimate https://freedns.controld.com/x-hagezi-ultimate
TIF https://freedns.controld.com/x-hagezi-tif
Rethink DNS, DNS Warden, and ControlD with Hagezi blocklists via DoH/3. I highly recommend the ‘+ TIF’ as they are threat intelligence feeds which are up to date lists of bad actors/malware.
Yes, but you won’t have access to most of its features other than just typing. Since you’re using Graphene and Google Play/Google Play Services are sandboxed cutting network permissions from Gboard should be enough to completely disable its phone to home.