pending anonymous user

  • 5 Posts
  • 164 Comments
Joined 1Y ago
cake
Cake day: Aug 07, 2023

help-circle
rss

Utill you’re no longer live in the US. I can’t find Ptivacy alternatives after moved out.


So use what browsers? Chrome sounds more secure (I didn’t read previous post), yet I don’t want an advertising company looking at my browsing habbits, nor supporting them dominating the browser market share and have a powerful influence on every web standards.


I never used it, but I would assume yes after reading the frontpage and the doc. At no point there is a PSK set between sender and reciever, not I see any signs for key exchange between devices.

This is not a definitive answer though as I didn’t read the source code of Nfty, nor the UnifiedPush spec.


“NAPO’s goal in the meeting was to ensure that the proposed rules protect not only officer’s private information from being sold and made public, but also safeguard law enforcement’s access to certain publicly available data that is vital to aiding victims and preventing and solving crimes,” the group said in a newsletter published last month.

Read: We want to look at your private data but not ours.

What a jackass.


It is the recent use after free vuln actively exploited found in FF, which both Fennec and Mull relies as upstream. This compounds on changes made to Android NDK and the source of FF move into the monorepo, making them harder to build. Hence, they’re still vulnerable to the attack.


Triangulation needs to know where the signal comes from (angles). Which mode’s device doesn’t have the capability of doing this. The most they can do is estimate by signal strength.


I only know you can use it via Matix with a bridge, but the setup is quite involved, not just an App on your phone. Plus the metadata is still shared with Meta, like who you talked to and when, which they can build a profile and a social graph.


Although I don’t use FUTO keyborad, I don’t think collecting typing data is a problem, as long as it is done locally. There shouldn’t be a binary choice between privacy and better user experience.


Free? No. SPN is an add on service that cost 9.99€/mo or 99€/yr. You can host a community node but seems you can’t use it directly. They say they are going to reward who host a node but it is unclear what the actual reward is.

https://wiki.safing.io/en/SPN/Nodes/Hosting


Then I will they just doing half the work. They can just get the site account walled for that goal, not a half patch work of blocking VPN users.


So what they can bot with VPN without signing in?


From SimpleX creator, it doesn’t scale well with groups >50 ppl, so it is not going to be your Telegram/Facebook/social media replacement.


That’s not vandal proof. What I mean by vandal proof is IK rated, like IK10.

Best I can find is https://www.hikvision.com/en/products/IP-Products/PTZ-Cameras/Value-Series/ds-2de2a404iw-de3-w-s6-/

You will have to set the camera pointing default to a non sensitive area, likely ground if you mount it directly above your doorbell, and only tilt up when it get some event triggers like motion (feet), audio (it does have a mic), doorbell (via home assistant), other cameras (mition alerts), or something else.


Vandal proof camera is easy to find, but with privacy mode? I don’t think such product exist yet.


Ops. Missed the actual details. Sorry. How small you want it to be? Any dimentions?


I agree mostly except the app. Don’t pretent Home Assistant doesn’t have an app.



What you think the modem can spy on by whom? Certainly not the ISP I suppose. They can already do it without the modem.




Is it really though? I would assume there would be automated systems that can do 80% of the job. It can be as simple as a USB key holding a portable executable that can run and connect to a remote system and report back the findings which the officer can just read the report in plain English. Training, of course, is expensive and rarely do so, but automation can get somewhere close relatively inexpensive.


Sorry. Data structures exists and uniformly random data is rare. Patterns still exists.

And deleted is a bad counter as deleted files won’t have a record in the file system.


That scanner is simply looking for high entropy data, and then report to its operator. It wouldn’t care if it is a drive or a volume or a file. If the entropy is high, flag it.

All random data have high entropy, same for encrypted data. The officer can see you have high entropy data then start throwing questions at you.

This community need better understanding of cryptography and how it translates to real world. Deniable encryption exists and does work on paper, but only on paper.


It is simply no hope aginst an automated scanner. No one search for files manually today.


The saving grace is it is licensed under AGPLv3 so community can take over if something happen.



The point is they don’t have to proof if a piece of random data is indeed an encrypted blob.

Imagine you passing border security and got selected for search. They found a piece of data on your device with high entropy without known headers in the wrong place. You can claim you know nothing about it, yet they can speculate the heck out of you. In more civil nations, you might got on to a watch list. In a more authoritive nations, they can just detain you.

They don’t have to prove you hiding something. The mere fact of you have that piece of high entroy data is a clue to them, and they have the power to make your life hard. Oh you said you deny them for a search? First congrats you still have a choice, and secondly that’s also a clue to them.

For more info, read cryptsetup FAQ section 5.2 paragraph 3, 5.18, and 5.21. It is written by Milan Brož who is way more experienced than me on this matter.


IMO, deniable something encryption is just not practical in real life. Authorites can make you life real hard, or just throw you straight into jail, just by suspecting you have encrypted materials.



XMPP isn’t any better in terms of metadata. OMEMO is an afterthought that slaps on to XMPP. Many metadata are still attached to the message. The threat model only protects the content and doesn’t guard aginst metadata and traffic analysis. Even OMEMO extension is still in experimental status. Not to mention, users still need to signup an account using their email.

Honestly, I think SimpleX is better in everyway. No account required, minimal metadata (at least from the technical whitepaper and other sources I read), fully open source (AGPLv3), an ok mobile and desktop client, and audited. The register friction is almost non existance. You just need to install, set a name, and off you go. The only worry I have with them is they took VC funds.

ADD: XMPP is still better for company internal communication, especially when compliances require conversation archiving.



I think crypto can achieve stability, not by pegged to a fiat currency but commodity backed. There are also mechanisms and algorithms that can confirm transactions without using excessive energy, be fast, and private all in the same time. I still think crypto have a future. Yet I don’t know how far that future is, but for now I will stay away from it as far as I can.


No as it’s not point to point. It involves an intermediate party to broker the transaction. Think that like a bank. You need to apply for one, which most likely involves KYC. Taler is designed such that the recipient is known, for tax purposes they claim.

In contrast, AFAIK crypto can be P2P, only involving the blockchain and miner/validator that don’t know you. That’s what not Taler try to do.

EDIT: Add correction to crypto description.


They can still ask you to trun on and have it unlocked. Refuse and you being an international traveller? They probably will deny your entry.


That can be your friends’ friend/family doing the search. The social graph is never being 1 degree only.


Oh for sure. They will appeal, apply for “stay of execution” to suspend the judgement claiming this will degrade its operation capability and contray to public interest, and drag this into a legal battle until they win.


tl;dr: only applies to NY Eastern District, and likely only US citizen can enjoy
fedilink

Or connect to a VPN all the time so you appears “not in the same netowork.” Still, being an app menas it can just collect the WiFi name and cell tower ID to map our your social connections.


Probably because your friends search about it when they are not having things separated and based on the social graph that IG thinks you’re interested in it too?


Really? Maybe I got too used to it.


Privacy.com alternative for the UK & EU region
Recently I just hit by stolen card detail and makes me searching a virtual card service. Anyone knows any works in the UK and EU region? Apparently Privacy.com needs SSN to work now. Thanks.
fedilink
50
Privacy.com alternative for the UK & EU region


Alternatives to PGP/GPG?
We all know PGP is old and got a myriad of problems, like key management. Thus, I'm looking for a **generic encryption and signing tool** that also available on mobile devices, both Android and iOS. I know age+minisign is the preferred choice but unfortunately there ain't an mobile app for them. I know Magic Wormhole is great for P2P data transfer but it's slow and not reliable. I often have corrupted files even the size is small. I would much rather encrypt locally, upload to GDrive, and share it. I know Signal, WhatsApp and other messaging apps now offers E2EE to exchange many data forms but the political sphere is shifting and given the current trend, they might forced to backdoor the protocol, drop E2EE entirely, or cease operation. Something independent from messaging tool is needed. I'm not seeking perfect forward secrecy as that wasn't achievable for non conversations use case unless parties manually negotiate a session key. I don't care the web of trust either. Putting PII on a key server for public viewing doesn't fit today's privacy trend. Nor anonymity. I'm talking to my family members and friends and I don't find a reason to hide that. The only thing matters is the content. While it will be great to follow some kind of widely used standards, it is not a requirement. Thanks for the input. **EDIT:** Added GPG to the title
fedilink

How to persuade people around me switch to Matrix/Element?
Hello fellow c/privacy members. I'm not new to privacy related things but I had a hard time persuading my family members and friends to switch to Matrix/Element. It is a reponse to UK's Online Security Bill and Investigative Powers Act that may soon in effect. While it is just a preperation and planning in case those actually became law, I already face resistance from them. When I ask them would they switch, their first reaction is "Why one more app?" then follows with "That's cumbersome." or "I don't want to learn a new app." and suggest something more popular like Line, Telegram or Discord. Sometimes they would "Install WhatsApp because X is on there and he/she won't install one more app just for you." What can I do to persuade them to use a new platform? Thanks in advance. **EDIT**: I think I should elebroate more of what Online Security Bill and Investigative Powers Act does[1]. As far as I understand, OSB will break E2EE by require scanning data on client device, like CSAM but much more generic. IPA requires companies to submit security funcition to the government for approval before releasing, and disable such feature upon request. Apple[2], Single[3] and WhatsApp made the announancment of exiting the UK market totally or partically if two were signed into law. [1] https://web.archive.org/web/thenextweb.com/news/uk-investigatory-powers-act-default-surveillance-devices-privacy [2] https://web.archive.org/web/www.forbes.com/sites/emmawoollacott/2023/07/21/apple-threatens-to-pull-facetime-and-imessage-from-the-uk [3] https://web.archive.org/web/20230809125823/https://www.bbc.co.uk/news/technology-65301510#2023-08-09T12:57:48+00:00
fedilink