This is a secondary account. My main account is listed below. The main will have a list of all the accounts that I use.
Personal website:
Important quote for readers:
Once the Guardia Civil obtained the iCloud email address, the documents show that it requested information from Apple, which in turn provided a full name, two home addresses and a linked Gmail account.
I have mixed feelings about this. This doesn’t sound to me like the actual iCloud data but rather it’s metadata for an account the police know already exists. It’s certainly not great, but it could be worse.
It is actively rolled out right now all the way back to iPhone 11 (2019) while the device is powered off. Version 16 is current, and the power “off” tracking was backported to older devices.
Android support is spottier. We’ve had powered off features one OnePlus for some time, such as the ability to trigger alarms while turned off, but more advanced features like location tracking are much more recent to Android because it usually requires specific hardware support to operate while using almost no battery. Apple has the privilege of vertical integration, so they were able to update older firmware.
I think this trend is very concerning, because with no user-servicable battery, we’re essentially forced into having our phones on to some degree at all times.
Here you go:
https://9to5mac.com/2021/06/07/ios-15-find-my-network-can-find-your-iphone-when-it-is-powered-off/
And here:
https://www.androidauthority.com/google-pixel-8-android-15-powered-off-finding-features-3425709/
And there’s a few more about offline beacons about if you want.
I’m not excusing it, but it makes sense technically because we can’t directly execute the D3D shaders, and converting it just-in-time could cause initial stuttering. It’s a kind of vendor lock-in in my view, and some translation step is needed. Steam even goes a step further and tries to ship you pre-compiled shaders, but it’s not perfect and especially games that update often can end up generating the shaders locally on a regular basis.
I’ve definitely noticed this, but it hasn’t stopped me from enjoying my games so far.
An IP address by itself isn’t going to let you dox users unless you have access to the databases that map these to the subscriber accounts. Typically, you would need to be an ISP or law enforcement to do this, but you can also purchase this information from a data broker if you know what you’re doing.
With that said, there is absolutely nothing stopping the instance operator from getting your IP address. You’re connecting to his or her computer which they own, so they can easily see where you’re connecting from.
No. There is no room for anti-malware services in the Android design.
Such software needs permissions that reach outside of the Android security model to do things like access other application data without its consent.
Imagine for a moment that you could install anti malware with some kind of super user permission that lets the software access everything it needs to do its job. If so, malware would immediately attempt to use that feature as well, either to steal more of your data or inject itself into other applications.
Play Services is special because it operates with much higher privileges than third party software can obtain.
Now, in theory you can still scan applications before they are installed, but I would argue that there’s very limited value in doing so. If you’re installing software from sources you don’t trust, you have bigger problems. You can’t rely on a signature matching engine to detect malware in the general case.
Mixed feelings about this article. In short, it presents a new way of fingerprinting devices.
While it’s an interesting fingerprinting strategy, this is just one of many ways that a device can be fingerprinted. Do your best to avoid installing applications you don’t trust to protect your privacy.
Also, the recommendations of the article don’t make much sense. Anti malware on Android? Ridiculous and ineffective.
I went to ask nicely for help from their support department and got a development build for one of their routers. Not only was it an ancient version of OpenWRT with the myriad of unpatched vulnerabilities, but it had absolutely dumb/weird configurations like the Wi-Fi password being a user account password exposed to a patched up SSH daemon with shell /bin/false. Just a whole lot of why and an obvious lack of care put into the software.
Their devices function… Most of the time. That’s about all that’s redeeming.
Please excuse me for not providing a real answer in a top level reply, however, I think your request is fundamentally flawed.
Any proxy or proxy service can examine your egress data. Necessarily, they will be able to see your connections even if perhaps they can’t decrypt all their content. Many would consider this a privacy violation already, making your request technically unsatisfiable.
However, I’m curious to see if in some sense of the word privacy others feel there are proxy services available that can provide it.
I prefer the complete lack of privacy settings because it is open and honest about the reality of what Lemmy is able to provide.
Even if you’re running your own instance, you are necessarily submitting your data to another party. I don’t have to trust the platform as much when my data isn’t private. It’s much easier to engineer a system around that assumption.
If we suppose that anything I submit to Lemmy is submitted to the public, I can’t be misled. My data cannot be leaked because I’m presenting it to the world already. Lemmy is a young social project with many problems to solve, still trying to gain traction and hold on to users and with an uncertain future. In brief: bigger fish to fry.
Maybe privacy controls could be on the list, but I don’t think it addresses the main problems or applications of the platform and creates its own set of issues. Keep it simple and stupid.
Your replay might have been saved inside the container itself. I’m not 100% sure, as I don’t play this game.
You can browse the contents of your containers at least on my installation.
.local/share/flatpak and /var/lib/flatpak are two good starting points. Also try “flatpak enter” to browse around inside the container.
Oof. Us and over one hundred of our closest friends.