tmpod

joined 3 years ago
MODERATOR OF
[–] tmpod@lemmy.pt 1 points 1 month ago

Mullvad Browser isn't bullet proof, it will not prevent fingerprinting entirely, though it makes it less reliable, especially if it isn't sophisticated.

[–] tmpod@lemmy.pt 3 points 1 month ago

Finally! I had tried using the clunky torsocks not long ago and wondered why there was no namespace based solution yet. Glad to see this getting released, it will help many people. Tor ❤️

[–] tmpod@lemmy.pt 7 points 1 month ago

This is quite misleading and frankly low effort. Besides the readability issues, the chart makes a clear distinction between Proton Pass and Bitwarden when it comes to privacy, citing their privacy policy.

As it happens, however, Proton's server code is closed, unaudited[^1] and not distributed, and the apps (web, Android and iOS) do not support setting different homeservers. This effectively means you cannot self-host your password manager and must be "locked" to Proton for what I consider to be one of the most fundamental and important pieces of technology a person can use.

Bitwarden, however, has opened their official C# server, their internal Rust SDK and the apps themselves too. Furthermore, they have several guides on how to self-host your own personal server, and have implemented settings in their apps to change the homeserver. There's even an unofficial server, vaultwarden that is even better tailored for small, personal deployments.

All this to say: the fact they may collect some usage data on their website is very insignificant for their offering, in my opinion. The real value is in providing a secure vault that only the user can manage. If you need better privacy and/or anonymity, you should use tools specialized for that anyway, instead of blindly trusting a third-party's Privacy Policy, no matter who they are. But then again, it's the old game of threat models.

Ultimately, Bitwarden inspires more confidence than Proton, by giving those you can and want the ability to truly own their secrets.

[^1]: As far as I'm aware, there's only this audit by Cure53, in which they performed a white-box pen test on the API, with only its documentation provided, no code whatsoever. These audits are important from a cybersecurity point of view, but security is not the same as privacy and should not be taken as such.

[–] tmpod@lemmy.pt 2 points 6 months ago

Very useful, even for someone who has been using Linux for many years. Sometimes you just forget or need that tool you rarely use. tldr can be much handier than parsing a man page when you're in a pinch.

I use the tealdeer implementation, but any is fine really.

[–] tmpod@lemmy.pt 4 points 6 months ago

Never knew about prelockd, seems like a pretty neat and useful idea, thanks!

[–] tmpod@lemmy.pt 4 points 7 months ago (3 children)

I'm either being very dense right now, or I don't have that o.I How is it called, or where is it located next to?

[–] tmpod@lemmy.pt 14 points 7 months ago (5 children)

Wait what? Was there ever an option to open a private tab as a normal tab?? 🤔 I'd love to have that, but thought it would never get added. What version were you on before (and in which one are you now)?

[–] tmpod@lemmy.pt 2 points 7 months ago

Adding onto what's already on the thread, you can try look at the newer Element Call, which is an implementation of Matrix's native calls.
I've been using it a bit recently, since Jitsi seems to have stopped working reliably for me (to be frank, I've not put much effort into debugging it yet). It works well, but it's still early stage, lacking some features Jitsi has. If that one works for you, I recommend you stick to it.

[–] tmpod@lemmy.pt 9 points 9 months ago

I still don't think it's there, but development hss been fast, so a lot has changed and improved in the last couple of months.

[–] tmpod@lemmy.pt 5 points 9 months ago

Not exactly. Matrix 2.0 relates to the protocol (Matrix) version, which has its major number incremented due to a bunch of, well, major changes/updates to make it much better. OIDC, sliding sync and native calls are some of the new things that comprise the 2.0 update.

The server implementations are somewhat orthogonal to this. Synapse (the original Python server) is still the main implementation, and is Matrix 2.0 ready.

[–] tmpod@lemmy.pt 2 points 10 months ago

conduwuit is a fork of the less "energic" conduit.rs software, and both are maintained by the community, not by the Element people, like Dendrite.

[–] tmpod@lemmy.pt 13 points 10 months ago

Agree, but mad props to the Gentoo people too. Nice community and incredible wiki as well.

view more: ‹ prev next ›