• 1 Post
  • 38 Comments
Joined 2Y ago
cake
Cake day: Jul 16, 2023

help-circle
rss

Yeah travelling with a Keepass vault of necessary accounts is starting to sound like the move


Can’t access the cloud without my passwords!

Guess I’ll be traveling with a handful of USBs with my encrypted totp keys.

Also, my phone has a duress password, anyone know if I could just get away with traveling with my phone as-is and just giving them my duress PW if need be?

Phone runs graphene os



Yep, before I switched to a password manager in college I had 3-4 passwords I would use across all accounts, and I would constantly need to recover accounts because I would forget the PW.

I actually don’t remember the last time I needed to recover an account. Having a password manager has been a massive time savings for me.


Yeah I think I’ve got 600 distinct logins in my bitwarden at this point, lol.



Huh this is news to me. Wonder why dd has been the defacto standard in guides everywhere for the past 15-20+ years


Tangentally related, FUTO put a bad taste in my mouth when they were harassing the graphene os team https://grapheneos.social/@GrapheneOS/113443396794247106



Onprem has always been cheaper. Cloud compute was the most successful marketing campaign I can think of.


Chromium based browsers are more secure but less private on android.

I get a unique fingerprint when I check EFF “cover your tracks” on cromite.


I’ve been using mullvad’s browser on my laptop. It’s basically tor without the network, and has the lowest bits of identifying information exposed via the EFF test I could find. Havent tried this out though



That’s presently what I’m using, but I have added the mull version of the arkenfox user.js via Firefox devtools.

Fennec does release updates a bit slower than mull did via DivestOS’s repo, unfortunately, and doesn’t have a build up for these CVE’s as of yet. Granted, I don’t think FF android has these updates yet, but I feel like I remember Mull’s updates making it to my device faster than FF’s even, as they didn’t need to go through external review processes.



Sure I after with that first point. But actively feeding all of your typed text to a corporate owned server isn’t the only way to so that.


I know you’re saying to use widely-used extensions, but for privacy-conscious users I wouldn’t suggest grammarly


Tracking protection on every app is best done via custom DNS. Since you successfully installed graphene OS, you can probably follow instructions well enough to set up a few DNS servers.

Personally, I have a few adguard -> unbound (unbound set as a recursive resolver) and then adguard set up with block lists at varying levels of strictness.

  1. A very lax instance for my router as to not break the internet for anyone on my WiFi.
  2. A few setup strict for my devices (phone, TV etc). Personally I keep the TV on a different instance as its super chatty and I don’t want it muddying up my stats for other devices
  3. I have a separate one that services my IoT devices

If you don’t feel like setting up adguard/unbound you could use nextdns or adguard hosted, but local control gives you the most configurability and privacy, depending on your threat model.

Edit: unsure why I’m being down voted. All duckduckgo is is an app that acts as a VPN and blocks traffic to trackers. Why use their blocker when you can use your own, and have it for all of your devices, not just your phone?


If you’re gonna put this much effort in you may as well just use tails or qubes OS


Useragent doesn’t do much as your browser navigator settings expose the real OS


Personally, I wouldn’t be interested in continuing DivestOS itself, as that is much lower level than I’m comfortale at. If I were to do this I’d focus on maintaining mull. I’ll reach out if this seems feasible for me. Will prob have a chance to deep dive on the 26th


I’ll reach out to the old maintainer early January, but I’ll try to spend some time understanding the repo before then.

If it requires a lot of maintainace, I’m afraid I won’t have the time as I already work overtime as a software dev.


Unsure how reliable this is for other attack vectors, but amnesty Intl has https://github.com/mvt-project/mvt for known Pegasus signatures

Note: this is ran on a computer and scans via adb


After a quick look at what I believe is mull’s most up to date repo https://github.com/Divested-Mobile/Mull-Fenix

It doesn’t appear to be too complex to maintain (only looked at the past 3 or so commits as I’m with fam right now)

Hoping someone continues with the project, as it was, in my opinion, probably the most privacy friendly browser for android other than Tor which has it’s usability issues.

I may try to play around with setting up an fdroid build server for the interim after the holidays.

Edit: I wonder if the old maintainer would be open to having some sort of knowledge transfer session?


Fennec is what I’ll be moving to.




I live in a relatively high tourist traffic beach town, just outside of a large city (~15 mins) and there was zero accurate POIs when I first moved here a few years back. I ended up mapping a lot of the high interest areas around here around 6 months or so back on street complete during my walks, but kinda burnt out on it.

I head about some mastodon or twitter page that post rural areas and a bunch of people mob on mapping them.

What they really should do is post towns like mine that are very very busy but are lacking up to date maps


Huh mullvad browser got me the lowest overall. 10.44 bits and a non-unique fingerprint.

Compared against:

  • Firefox with arkenfox user.js (macOS)
  • Tor (macOS and android)
  • Vanadium (android)
  • Cromite (android)
  • Mull (different than mullvad) (android)

I do a vast majority of my browsing on my phone, unfortunately. Vanadium scored the best (on mobile), but it not having extensions (dark reader is a must) and the navigation bar not being movable to the bottom of the screen keeps me on Mull.

I don’t love using mullvad for day to day browsing as I can’t whitelist specific cookies to retain. Don’t love having to re 2fa daily.


While I also use a custom domain with simple login, I feel like it does take away from the anonymity a bit. So sometimes I use my custom domain, others I use theirs.


It’ll just cache telemetry locally then send it in when you reconnect to the network


They’re storing the face pics you send to them, I assume


Forgive my ignorance, but do mobile devices even store biometric data ? I was under the impression that our biometric data would be hashed and salted and our thumb/face would unlock it, akin to how a normal password flow works…?


I can’t seem to find this on fdroid, github, etc. Mind sharing a link?


Well both of those reddit alternative frontends used the api. Piped scrapes the pages and gets the stream url, similar to teddit, which still works.



Just tried, ubfortnuately, it didn’t work.


When I was using Librewolf, it seemed to lag behind on updates, which is a non-negotiable for me.

I now run FF with arkenfox user.js, so youget updates right as they are released


I haven’t been able to use aurora reliably since a lot of their accounts got banned. Are there any alternatives?