We don’t have on the market device which would sell witthout Google services by default just with aosp like linage .I wanna just phone with easy unlockable bootloader with aosp no google services(or If I wanna them install it in 3 clicks how it was implemented in the past for meizu phones and same way with 1 click install root ) and would not cost a lot (fairphone) I looked on aliexpress even there no such options they make phones but without opened bootloader
If they like use so much sms convince them to use silence so it would give SMS encryption to messages https://f-droid.org/packages/org.smssecure.smssecure/
The I2P netDB isn’t a single dumpable list like you’re suggesting. It’s a Kademlia DHT stored across rotating floodfill routers. Floodfills aren’t static — routers get promoted/demoted based on bandwidth, uptime, and capacity — so the view of the network is constantly shifting. A normal router only ever queries small slices of that DHT, meaning you never get the “whole picture” from one vantage point. That’s a deliberate design choice to make enumeration hard. On the traffic side, I2P isn’t just onion-style routing. It uses garlic routing, where multiple encrypted “cloves” (messages) are bundled together into one garlic message. This kills the simple “one in → one out” traffic correlation trick. Add to that the transports: NTCP2 is indistinguishable from normal TLS over TCP, and SSU2 is UDP with full encryption, padding, and replay protection. From a DPI standpoint, it looks like generic encrypted noise — there’s no clean handshake to match on like with old Tor circuits. As for blocking, I2P is decentralized. There are no directory authorities to censor, no fixed bridges to burn. Floodfills are chosen dynamically and constantly refreshed, and peers discover new ones automatically. The bigger the network gets, the harder it is to enumerate and blacklist enough routers to make a dent. Censors can try whack-a-mole, but the distribution effect scales against them: more peers in more ASNs across more countries means higher cost to block. So yes, you can suspect I2P traffic if you really try, but fingerprinting and wholesale blocking don’t scale — the protocol was designed specifically to make both correlation and censorship exponentially harder as adoption grows Details: https://www.youtube.com/watch?v=95hSAMEwrlM
I guess nobody here knowing about “lilygo t watch” which u can buy on aliexpress it based on esp and entire firmware can be recompiled modified from source code in github https://github.com/sharandac/My-TTGO-Watch It can integrate in gadget bridge too
It works in a container under the hood. You can separate two profiles: one personal, and the other for everything else. When you install apps from Google Play, they are also installed in this container with Google services.
A cool thing is that Google services run in user space, like regular apps, and don’t have the elevated permissions they usually have on standard Android, where they operate almost as root with hundreds of permissions. This means you can delete them anytime, just like any other app.
The best what u can do,it’s run in the browser with https://addons.mozilla.org/en-US/firefox/addon/zoom-redirector/
You don’t need a doorbell camera, get a regular camera instead.
You need an app which will receive events from a doorbell via a server to receive data to interface with the app. Both of those things need to be owned and operated by someone to be approved for use on the app store. That’s why a custom open source of doorbell as you envision it doesn’t exist and never will.
It’s cool p2p protocol but nowdays no good clients, most of them unmaintained and qtox have so shit code.Feels like developer didn’t learn anything about writing safe c++ code.On android there trifa app but it’s works… pretty weird,there also atox but it’s doesn’t implemented feature about video/voice calls.
If u are curious more about cloudflare here to read.https://0xacab.org/dCF/deCloudflare/-/blob/master/readme/en.md
In my opinion there attack surface about cache of browser which can lead to privacy leak https://portswigger.net/web-security/web-cache-poisoning
Generally no then yes,Depends from region and cpu ,nine circle of hell ;) https://github.com/melontini/bootloader-unlock-wall-of-shame/tree/main/brands/xiaomi