Yep, before I switched to a password manager in college I had 3-4 passwords I would use across all accounts, and I would constantly need to recover accounts because I would forget the PW.
I actually don’t remember the last time I needed to recover an account. Having a password manager has been a massive time savings for me.
Tangentally related, FUTO put a bad taste in my mouth when they were harassing the graphene os team https://grapheneos.social/@GrapheneOS/113443396794247106
I’m not rooted, but I used this guide with mulls user.js
That’s presently what I’m using, but I have added the mull version of the arkenfox user.js via Firefox devtools.
Fennec does release updates a bit slower than mull did via DivestOS’s repo, unfortunately, and doesn’t have a build up for these CVE’s as of yet. Granted, I don’t think FF android has these updates yet, but I feel like I remember Mull’s updates making it to my device faster than FF’s even, as they didn’t need to go through external review processes.
Tracking protection on every app is best done via custom DNS. Since you successfully installed graphene OS, you can probably follow instructions well enough to set up a few DNS servers.
Personally, I have a few adguard -> unbound (unbound set as a recursive resolver) and then adguard set up with block lists at varying levels of strictness.
If you don’t feel like setting up adguard/unbound you could use nextdns or adguard hosted, but local control gives you the most configurability and privacy, depending on your threat model.
Edit: unsure why I’m being down voted. All duckduckgo is is an app that acts as a VPN and blocks traffic to trackers. Why use their blocker when you can use your own, and have it for all of your devices, not just your phone?
Unsure how reliable this is for other attack vectors, but amnesty Intl has https://github.com/mvt-project/mvt for known Pegasus signatures
Note: this is ran on a computer and scans via adb
After a quick look at what I believe is mull’s most up to date repo https://github.com/Divested-Mobile/Mull-Fenix
It doesn’t appear to be too complex to maintain (only looked at the past 3 or so commits as I’m with fam right now)
Hoping someone continues with the project, as it was, in my opinion, probably the most privacy friendly browser for android other than Tor which has it’s usability issues.
I may try to play around with setting up an fdroid build server for the interim after the holidays.
Edit: I wonder if the old maintainer would be open to having some sort of knowledge transfer session?
I live in a relatively high tourist traffic beach town, just outside of a large city (~15 mins) and there was zero accurate POIs when I first moved here a few years back. I ended up mapping a lot of the high interest areas around here around 6 months or so back on street complete during my walks, but kinda burnt out on it.
I head about some mastodon or twitter page that post rural areas and a bunch of people mob on mapping them.
What they really should do is post towns like mine that are very very busy but are lacking up to date maps
Huh mullvad browser got me the lowest overall. 10.44 bits and a non-unique fingerprint.
Compared against:
I do a vast majority of my browsing on my phone, unfortunately. Vanadium scored the best (on mobile), but it not having extensions (dark reader is a must) and the navigation bar not being movable to the bottom of the screen keeps me on Mull.
I don’t love using mullvad for day to day browsing as I can’t whitelist specific cookies to retain. Don’t love having to re 2fa daily.
Yeah travelling with a Keepass vault of necessary accounts is starting to sound like the move