• 0 Posts
  • 25 Comments
Joined 2Y ago
cake
Cake day: Jun 30, 2023

help-circle
rss

Can confirm, it is information they already have. Below is likely the API the telco exposes to the bureau. Each data point queried returns true, false, or a confidence score.

It is intended as an anti-fraud tool. Not saying I agree with it. Something like PGP is sufficient for building out a web-of-trust without needing to share my personal information.

https://redocly.github.io/redoc/?url=https://raw.githubusercontent.com/camaraproject/KnowYourCustomer/r1.4/code/API_definitions/kyc-match.yaml&nocors#tag/Match/operation/KYC_Match


No programming knowledge required.

Graphene only supports Pixels due to the titan chip. The versions with “a” are cheaper. Check when they go end of life to find the cheapest if you care about updates. So probably the 6a or 7a if you want at least 2 years of updates.


  1. Not sure on this one.

  2. The auditor is to make sure you are installing an authentic version of graphene. That it is not a modified version that has been tampered with (e.g., backdoors).

  3. Automatically enables MAC randomization. This can help with being tracked on public networks. Fingerprinting techniques have gotten better though with deep packet inspection and even measuring radio characteristics. I’ve seen demos of two brand new and identical models of iPhones being distinctly picked out due to variances in the radios during manufacturing.

Doesn’t help with advertisers tracking behavior based on IP. VPNs help with “blending-in” by putting multiple users behind the same IP. Provider matters here. Needs to be a VPN provider that won’t just sell your data or cave to law enforcement. Mullvad is my preference. Paid with crypto. RAM only logs. That said, use Tor or I2P for anything you don’t want subpoenaed.

For additional tips:

  • Can’t remember if its on by default, but auto-reboot to put data at rest (encrypted and not in RAM). This is for a state-actor threat level, and less about advertisers.
  • I prefer pin codes to unlock my device and don’t use biometrics. Graphene has a feature to randomize the pin pad every time to protect against a recording of the pin be entered. Specifically where the numbers aren’t picked up on the video but the pattern your hand makes can be seen. Again, more of a state-actor threat level.

There is anonymity and pseudonymity.

Do you need your opsec to be resistant to state-level actors (oppressive regime, censorship, illegal activities)? Well then you need to make sure you don’t introduce anything that will deanonomize you.

Are you trying to be resistant to mass data collection efforts used for profit? Being on the pseudonymity spectrum is a good step.

Dealing with the latter is like dealing with a bully. Make it not worth their time. They just want to put you in bucket X so they can estimate the most likely way to influence you for reason Y. Pseudonymity is about having multiple aliases that get put into different buckets so their privacy invasive efforts are less effective.


The DNS is cheap. Something like a penny a day for privacy. I typically paid like $50 every 2-3 years for both renewal and DNS on a couple domains.

Was kind of a PITA to be honest as I remember their login process was a little weird. I eventually moved on when they were slow to adopt some of the newer TLDs.


The registrar owns the domain then, not you. I made a root comment about Njalla which offers this service.

edit: Well you could use fake data. Still risk losing claim to it. I tried doing this with name cheap and they figured it out somehow that the info I gave wasn’t real. Was years ago so I don’t remember what I put in. My guess is it was one of those soft credit lookups (where did you live between X and Y?). Could also be misremembering.


One of the pirate bay founders created https://njal.la/#home but with the caveat:

For instance, when you register a domain name in our system, we can register with our own data. We will be the actual registrant of the domain – it’s not an ownership by proxy as found with all other providers. However, you will still have the full control over the domain name. You can either use our information (and our nameservers) or you can go with your custom data. And you can move at any time. Simple, flexible.

I believe it is required (ICANN?) to have a real entity attached to every domain, even with a proxy for the public whois. They simply offer to be that identity to avoid giving any identifying information, but they will have all claim on it if it came to a legal dispute.


They can modify the DNS packets still. They aren’t encrypted or signed so the authenticity of a response packet cannot be verified. Parental controls from ISP relay on being able to snoop and modify your DNS (and SNI from TLS ClientHello packets).


And track this stuff in git so you don’t need to remember how you did it when you inevitably forget, lol.


I use Mullvad and Proton. I have a grandfathered Proton Ultimate Visionary plan so I use theirs when I need the port forwarding. I had just started my privacy journey with Proton and didn’t sign up anonymously. Mullvad is my daily driver paid with XMR.



I use an OnlyKey and Mooltipass interchangeably. Prefer the lower tech OnlyKey. My passwords are half memorized passphrase and half random characters on the device. Only use for disk encryption, main account, and password manager.


I pay $4.99/mo. Also have the data eSim (rarely use as its a backup). Don’t use auto-top up as I pay with XMR.

The bot has a transaction ledger. Did you inspect it?


As another poster said, the underlying tech is not private: https://jmp.chat/privacy

For backwards compatibility, what your proposing is unlikely unless driven through regulation (personal opinion).

Use something over the top (like Signal was suggested), use a non-KYC provider (like Jmp), or use a burner phone.

A non-KYC provider I wouldn’t trust to be private personally, especially as a secondary SIM. Maybe slightly above average (the company can’t sell the number attached to my name), but I’m sure enough information leaks that a state-level actor could correlate the device to me. The IMEI the tower gets is probably enough to run to Google to figure out who bought the phone.

Even burners may trace back to you through GPS or triangulation depending on how private you really want to be.


It is. I run a virtual camera for blurred backgrounds that logs when clients connect and noticed one of my web conferencing type apps like to take a photo ever second. Haven’t taken time to investigate which (likely candidates: slack, zoom, webex, discord).


This is common for scraping even on desktop.

Dark mode, screen resolution, window size, and installed fonts are all tracking points plus hundreds more.

As I understand it, randomizing can make you stand out more as an outlier. Its better to blend with the herd. VPNs help by putting a bunch of clients behind the same IP, but if you stand out based on activity, an advanced enough algorithm may pick you out by what’s static and by what’s always changing.


I’ve been getting in the habit of using per service emails and rotating them like my passwords (if the service allows). MS allows this (assuming the account is not for your email). I’ve changed it 5-6 times. Except for Skype which I don’t use. Can’t seem to change that one myself.

Others mentioned YubiKey. Another alternative I use is both an OnlyPass and Mooltipass, interchangeably. They act as keyboards and work with any device I’ve tried that supports USB keyboards without some agent always running. With it I’ll add an extra 56 random characters on top of my memorized passphrase for critical systems (disk encryption, system login, password manager).


A few notes as I’ve been doing some PQ research for my own projects:

  • NIST PQ encryption algorithms are typically for encrypting small amounts of data due to poor performance (like an AES symmetric key)
  • NIST PQ encryption algorithms use public key cryptography to securely exchange keys between two parties (usually to establish a AES symmetric key… aka Key Encapsulation Mechanism, or KEM, with a Key Derivation Function, or KDF, which frequently uses Hash-based Message Authentication Code, or HMAC)
  • Hybrid-PQ, as you mentioned, should be used since there are not years of testing on the new PQ algorithms
  • AES256 is PQ with good performance, but lacks a way to securely exchange the shared key, so typically public key cryptography is used to bootstrap

With that said, I’d want to know where and how the encryption is going to be applied.

An ideal solution for me:

  • Data is stored using AES on device and remote
  • I have soul access to the AES key (can be derived, see last note)
  • App generates and index of meta searchable fields and thumbnails also AES encrypted, but is decrypted when opening the app to make it usable.
  • I can choose my backup (checkout rclone)
  • All over the top features like OSM are done client side (or self-hosted backend)
  • PQ would really only come into play to seal the AES key on my device. Instead of unlocking my photos with my AES key directly, its sealed behind a passphrase, pin code, hardware token, or other type of key. Pretty much what LUKs and Bitwarden do. Option for multiple keys would be great. A new device might take a passphrase and hardware key, but then might be sealed by a pincode.

I suppose you could use a PQ TLS, but if the payload is already AES encrypted, I see little value. You could use PQ to sign each object I suppose in case your AES key is broken, but that would mostly detect tampering of the data.


Been using jmp.chat. I didn’t have to give any personal info. It uses XMMP/Jabber to handle text/calls instead of wrapping your existing number. Their in-house client is pretty nice as it integrates with the dialer.

They straight up tell you its not private. That’s not what I use it for. I use it to make my online activity less linkable when companies try to KYC me by requiring a TN.

https://jmp.chat/privacy

The phone network itself does not encrypt metadata or content.  Therefore, if your concern is a state-level actor, exploit of a service provider, or rogue employee, you should consider all the metadata and content of your phone calls and text and picture messages to be not private.


Some third party tools you might find useful.

I do use rclone but I’m pretty happy with b2 storage. I did a small test with proton and it seemed to work.

https://rclone.org/protondrive/

VPN in docker with port forwarding. Didn’t have any luck routing host traffic through it but I didn’t dig too deep. Might be useful for a web based torrent docker container.

https://github.com/qdm12/gluetun-wiki/blob/main/setup/providers/protonvpn.md


Proton Pass is useful for aliases that don’t count against your total addresses. Passwords go into BitWarden though.

I am annoyed it requires an app or browser extension though. No native web interface I could find.


New ones are too young and not battle tested with time. Hybrid PQ is the norm until more data is available.



Yeah, its super annoying.

Port forwarding with the VPN on Linux was an adventure because all the docs are outdated and I had to scour github issues for how to do it.

Android mail app becomes super slower over time. No snooze. Wish it could do POP3/IMAP for send/receive from other accounts like my school one. Can’t delete aliases I made before proton pass aliases came out.

No contact syncing as a bi-directional provider with Android.

Someone recently added Proton Drive to rclone if you want to sync in Linux. Worked for my small test but I’ve since moved to Backblaze for my backend storage while waiting for a solution and it works really well for less than a $1 a month.


I get denied enough it is noticeable when I’m on a VPN with Mull. Sometimes it let’s me do a captcha, sometimes its just a straight up block. Usually dropping my VPN fixes.