Most people will tell you that it’s been made obsolete now since (1) it doesn’t use behavioural analysis to detect trackers anymore, it just uses a pre-defined list of trackers to block (2) browsers (especially firefox) now have built-in tracker blocking (3) ublock origin blocks trackers by default anyway.
I don’t think it hurts to still use it, just as a belt and braces approach, but I suppose it’s possible it makes your browser fingerprint more unique.
Joined 5 hours ago
Who are you? Even a known and respected cryptographer would not release a tool with such confidence. First you need to request testing and code review before you announce to people that it is a “secure, anonymous file-sharing platform.”
This is not a community for sharing your personal programming projects for feedback. If you post here, there will be non-technical users who don’t know how to evaluate the security of tools and won’t understand they are taking a huge risk by using your unknown alpha release project.
They front a huge percentage of the internet, so you can pretty much guarantee that all of the three-letter agencies have their fingers in Cloudflare’s infrastructure, whether they cooperate willingly or not.
If you care about your privacy you should avoid these kind of infrastructure monopolies, since they are such a juicy target.
I once had an issue logging in to Google where they wanted to verify me some way that I couldn’t complete. I eventually got around it by going through the “Forgot Password” workflow instead of logging in normally. I have no idea if this still works or whether it will make things worse for you, but if all else fails it might be worth a try.
You need to put yourself in the shoes of a non-technical person who doesn’t know how to evaluate the relative security of all the tools that are out there available to them. If you are posting your pre-alpha untested software with a title like “Anti-forensic and secure messenger” then there are many people who will read that and think that it’s on an equal footing as the other tools they have heard of. The vast majority of people are not software engineers, and even fewer are cryptographers.
this project is still in heavy development so without it getting professional security audit i wouldn’t recommend using it for sensitive stuff.
You’ve got to lead with this.
Well a professional security audit would be at the top of the requirements for an established product that has a userbase and some kind of funding, but as a solo developer the least you can do before releasing your software to the world is to have at least one other person who has some experience in security look it over - that’s what I was asking.
If you can tell people that your software is secure and “anti-forensic” (!) then you must be pretty confident in your understanding of security systems to release that without even a single code review by a peer.
Signal explicitly doesn’t allow its files to be uploaded to iCloud. You practically will be fine using it on iOS. Unless you are in China which has its own iCloud/Apple servers, or the UK where Apple disabled advanced data protection.
What difference does ADP make if your Signal chats are never stored in iCloud? Are they stored in cloud backups?
If you can reproduce it that reliably, I would be interested in hearing the results of an experiment where you have a clean phone and install just one of your apps at a time to see exactly which apps are spying on you. We all have our suspicions about which are definitely doing this, but it’s hard to know for sure without a proper controlled test.
The author only mentions homomorphic encryption in a footnote:
Notes:
(A quick note: some will suggest that Apple should use fully-homomorphic encryption [FHE] for this calculation, so the private data can remain encrypted. This is theoretically possible, but unlikely to be practical. The best FHE schemes we have today really only work for evaluating very tiny ML models, of the sort that would be practical to run on a weak client device. While schemes will get better and hardware will too, I suspect this barrier will exist for a long time to come.)
And yet Apple claims to be using homomorphic encryption to provide their “private server” AI compute:
Combining Machine Learning and Homomorphic Encryption in the Apple Ecosystem
Presumably the author doubts Apple’s implementation but for some reason has written a whole blog post about AI and encryption and hasn’t mentioned why Apple’s homomorphic encryption system doesn’t work.
I’d be quite interested to know what exactly is the weakness in their implementation. I imagine Apple and everyone who uses their services would be interested to know too. So why not mention it at all?
This breach is worse than just a website’s database being leaked. These are info-stealer malware logs. Meaning that you had malware on one of your devices that recorded you typing your credentials into websites and then the logs of that malware were publicly leaked.
Before changing all of your passwords (and setting up a password manager if you don’t already use one) you need to identify which of your devices was compromised and wipe it.
If you change all your passwords from the compromised device then the malware will just record all of your new passwords.
blog post of the guy getting fucked by people polling his bucket due to an open source project typo
Was it this one?: https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1
Why not post your blogs to a fediverse platform? Do they need to be on a separate hosted system? You’ll probably get more people reading and engaging with your posts if you are just posting to a Mastodon instance rather than hosting on a separate web platform and hoping that people stumble across it.
the folder Music>Pictures (the regular Pictures folder… for some reason that’s where it is) is open in explorer.
This sounds like the kind of thing that might happen if you have some kind of automatic sync set up, like when you plug your phone in and it automatically copies photos, or perhaps a cloud service that’s syncing photos?
Top comment on this video is the following:
Upon further reading and listening, I blame the source article and not Louis Rossmann.
These people had :
Returned from partisan fighting with the Kurds against ISIS
Had stuff to make explosives
Firearms and ammo
Were reportedly seen by surveillance to be practicing making explosives
And this article makes it seem like they were arrested for using encryption. They are turning a footnote into a title.
This is not a internet privacy scandal, this is a anti-far-left law enforcement overreaction scandal
Where my nerds at!?