citytree

joined 1 year ago
[–] citytree@lemmy.ml 4 points 7 months ago

Does this mean that the Eclipse Public License is allowed (unless GPL is listed as a "Secondary License") but the Mozilla Public License is not allowed (unless "Incompatible With Secondary Licenses")?

 

Examples of passive defenses against surveillance:

But why not actively combat surveillance instead of passively defending against it? Examples of active combat:

We must poison the data of those who are violating our privacy. Let us waste their time, increase their data storage costs, and waste their processing power. Let them drown in an ocean of data. Let them search for tiny needles in huge haystacks, with no way to distinguish between needles and hay.

Some ideas:

  • Sending fake data to Google Analytics (How does Google Analytics prevent fake data attacks against an entity's traffic?)
  • Create fake contacts lists to mislead those who are building social network graphs.
  • Encrypt lots of worthless data, store them in the cloud or send them by email. If the encrypted data is intercepted by any nosy entity, they will have to waste storage space while waiting to be able to break the encryption.

What are some other possible methods?

Let us turn the tables on those who have been violating our privacy. Why do we have to be on the defense? Let us waste their resources in the same way that they are wasting ours!

[–] citytree@lemmy.ml 7 points 9 months ago

Source for your claim? Otherwise it’s fud

I am not making any definite claims. I am just wondering whether or not the reasoning in the question makes sense. If it does not, please tell me why the reasoning is wrong. Thank you.

 

I am using Firefox ESR on Linux. Does it make any sense to disable hardware acceleration for security reasons?

Whereas Firefox is open source, many hardware drivers, and most computer hardware are not. Enabling hardware acceleration in Firefox means using these non-open-source components, which could be a security risk. My impression is that bugs in drivers and hardware are able to cause far more damage than ones in userland software. Does this reasoning make sense?

 

For those who have installed Signal Desktop in Linux, do you use an AppArmor profile to harden the program? If so, can you share your AppArmor profile for Signal Desktop?

[–] citytree@lemmy.ml 16 points 10 months ago* (last edited 10 months ago) (3 children)

When ZipoApps adds advertisements and telemetry to a future version of the Simple Mobile Tools apps, will my Google-Play-installed apps be automatically updated to the newer version with ads and telemetry? I don't want ZipoApps to get any of my data.

 

I have a "Digipass GO 6" hardware token generator that is issued by my bank. Is there a way to import the token generator into an open source authenticator app such as Aegis Authenticator?

I suspect that Digipass uses a proprietary TOTP algorithm, but I am hoping that there is an open source software solution.

[–] citytree@lemmy.ml 6 points 1 year ago* (last edited 1 year ago) (2 children)

People like giving recommendations like Super Tux Kart that haven’t aged well and don’t play well.

What's the issue with SuperTuxKart? I thought that it was great fun when I played it.

[–] citytree@lemmy.ml 13 points 1 year ago* (last edited 1 year ago) (4 children)

LocalSend is not exactly an alternative to AirDrop. In LocalSend, two devices must be connected to the same LAN to share files with each other. In AirDrop, no LAN connection is necessary. Files are transferred directly between devices, similar to Bluetooth file sharing between devices.

 

My mother uses a prepaid phone plan where mobile data usage is charged by the megabyte. It is currently not cost-effective to switch to a monthly fixed-cost subscription plan.

  • When she is at home, she should:
    • Switch off mobile data.
    • Switch on WiFi (because her home WiFi has a fixed monthly cost).
  • When she is outside home, she should:
    • Switch on mobile data (so that others can contact her using messaging apps such as Signal and WhatsApp).
    • Switch off WiFi (to conserve battery).

The problem: she often forgets to do the above. Sometimes she leaves home without switching on mobile data. Sometimes she accidentally uses lots of mobile data when at home.

Is there an app that can automatically switch on/off mobile data and WiFi based on the phone’s location? Location should be detected based on all the following data: latitude/longitude coordinates (if location is enabled on phone), WiFi networks in range (if WiFi is enabled on phone), and cell tower signals (if airplane mode is not on).

We would strongly prefer to use a privacy-respecting open source app for this. Phone: Samsung Galaxy A series. OS: Android 13.

 

Is there any open source and privacy-respecting Android keyboard for Chinese input? I want to avoid proprietary keyboards such as Gboard and Samsung Keyboard. Unfortunately, the open source Android keyboards that I found only support alphabetic input:

For Chinese input I would like pinyin input for both traditional characters and simplified characters. Handwriting input would be nice to have but it is not essential.

 

Not sure if any of you have encountered the same resistance to using Signal. Some of my cousins refused to use Signal because they are already using "too many chat apps" (e.g. WhatsApp, Facebook Messenger, WeChat, Telegram, Line, Snapchat, etc.). To them, Signal will just be another chat app among their numerous other chat apps. I understand that jumping between so many messaging apps imposes some kind of cognitive and maintenance burden. What are some ways to convince such people to use Signal?

 

cross-posted from: https://beehaw.org/post/789646

An official FBI document dated January 2021, obtained by the American association "Property of People" through the Freedom of Information Act.

This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata ("Pen Register") or connection data retention law ("18 USC§2703"). Here, in essence, is the information the FBI says it can retrieve:

  • Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.

  • Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).

  • Signal: date and time of account creation and date of last connection.

  • Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.

  • Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.

  • Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).

  • WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.

  • WhatsApp: the targeted person's basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time ("Pen Register"); message content can be retrieved via iCloud backups.

  • Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.

TL;DR Signal is the messaging system that provides the least information to investigators.

[–] citytree@lemmy.ml 1 points 1 year ago* (last edited 1 year ago)

Why is Ecosia on the list?

Quoting from tosdr.org:

  • This service can view your browser history
  • This service may collect, use, and share location data
  • This service allows tracking via third-party cookies for purposes including targeted advertising
  • This service tracks which web page referred you to it
  • Your personal data is given to third parties

Doesn't look privacy-respecting.