spinning_disk_engineer

joined 7 months ago

I'm not entirely sure what you're trying to say here. To clarify, telegram uses a store-forward architecture, meaning that it deletes messages from the server once they have been received by everyone. Until that time, the messages are stored on the server in plaintext, unless you're using a secret chat. They do this to avoid having to exchange keys between different clients, but what that really means is that it isn't actually private most of the time.

[–] spinning_disk_engineer@lemmy.ca 6 points 1 week ago (2 children)

By default, yes. It is possible to create a so-called secret chat, which is standard for signal and similar, but that's something you have to manually do. Furthermore, it's not even possible to make secret chats for groups. When it was initially released, I was cautiously optimistic that it could turn into a good, secure application, but knowing it's been this long and it hasn't, I wouldn't consider that likely.

HID means a human interface device, so most commonly a keyboard, but remote controls can and do use the same protocol just fine.

[–] spinning_disk_engineer@lemmy.ca 1 points 1 week ago (1 children)

It's easy to find a TV with USB-C input, though not universal. That still uses the DP protocol, and cables with different connectors on opposite ends are both cheaper and more common than those with HDMI as a result. Also, this is only even an issue if HDMI 2.0 isn't fast enough for you, so old devices aren't a concern.

[–] spinning_disk_engineer@lemmy.ca 1 points 1 week ago (2 children)

I've never actually used CEC, but everything I've seen says it's just like a USB HID, correct? According to wikipedia, there already exist USB to CEC adapters.

Yes, but that adds more cost. I don't have any hard data on this, but it feels like their current solution works fine, since anyone using more data than 2160p60, who also won't accept chroma subsampling, probably is already using DP. Maybe this is a direction to pressure the HDMI forum, since unlike AMD, valve's drivers are actually open source on the majority of their users' machines. And if things change in the future, external adapters or proprietary adapters are both solutions.

[–] spinning_disk_engineer@lemmy.ca 8 points 2 weeks ago (4 children)

All of these supposed advantages are solved by USB-C though. Even the length is higher (5m, I believe). I'd be fine if the DisplayPort connector is gone, but the actual standard is just better for most purposes.

[–] spinning_disk_engineer@lemmy.ca 9 points 2 weeks ago (6 children)

That's still a licensing issue: you're not allowed to license from the HDMI consortium and then freely sublicense to all your users, which is what open source requires. Hopefully this eventually concludes in the end of relevance for HDMI and we can have a freer, and just better ecosystem in general.

[–] spinning_disk_engineer@lemmy.ca 7 points 2 weeks ago (1 children)

This exists in Canada, and it's called jmp.chat. They use jabber, rather than simpleX, but they will optionally provide a server, which you could then bridge to your own server without needing port forwarding or anything like that.

They do take payments in monero, but for some reason you can't create an account with only monero unless you contact support first…and they don't do support by email, only phone/sms and jabber. There are public jabber servers, so it should be entirely possible, just inconvenient. They also take payment by mail, which I think includes cash.

I'm not sure the logistics of using jmp.chat outside of Canada, but I know it is somewhat possible to do in the US. Of course, there's nothing forcing you to actually be in the same area as the service, but people who live in the same area as you might question the +1 phone number, and might get charged more by their provider.

The thing is, trusted computing as a security feature isn't useless. For the particular case of phones, people generally use relatively low entropy passwords, because it's impractical to do otherwise. The Titan chip uses trusted computing technologies to ensure that an attacker with physical access cannot bruteforce the password, which it does by forcing a timeout between successive attempts. It might do other things too, this isn't my area of expertise, but (I believe) it isn't needed for the general functioning of the device, as opposed to e.g. the intel ME.

Of course, a security chip that you have the power to control would be better, and no less secure, but that doesn't exist. However, neither the OS itself not the apps directly depend on trusted computing. Otherwise GrapheneOS couldn't exist in the first place.

Note that this problem doesn't exist on desktops or laptops: it is entirely possible to memorize a passphrase around 96 bits of entropy, which is high enough that it can't practically be bruteforced, especially if the algorithm to check if it is correct is computationally slow.

So, you lost a bit of sovereignty for your phone in the interest of security, but phones aren't private to begin with: the actual modem also uses trusted computing. The devs behind GrapheneOS considered this the best solution to the problem, after weighing the pros and cons. Personally, I'd be happy to have a flip phone which has no password, and then do everything of significance (possibly including call and SMS) on my laptop. That is to say, I'd rather I didn't have to use GrapheneOS, but it's compromises align well with my own for now.

[–] spinning_disk_engineer@lemmy.ca 15 points 1 month ago (2 children)

First off, I would be careful around browser-based VPNs, especially free ones. If it's in the browser it's often just a proxy (as opposed to wireguard or openvpn), which is potentially bad for normal functionality or privacy. Also, if it's a free service then it almost certainly collects your data itself, and won't necessarily be allowed by sites either.

That being said, there are two ways to layer the two type of tunnels:

Connecting to the VPN first is relatively common. This means that your ISP can't see you connecting to Tor. Furthermore, VPNs are designed to tunnel your entire system, while Tor generally is not. Thus, you can have some traffic that is merely VPN protected and some that runs through the Tor network as well. In this situation my ISP knows which VPN provider I use, my VPN provider knows (1) my identity and (2) my network activity outside of Tor, and sites that I visit can only see that I use Tor.

The other direction is to connect first to Tor, and tunnel the VPN connection through there. This is very much not intended: Tor only tunnels TCP, while most VPN protocols use UDP (only, or more efficiently). The reason is that it's actually quite difficult to hide your identity from your VPN provider. If the VPN is the innermost tunnel, then that means that it has access to all your network traffic. I'll assume that all of it is encrypted with TLS (but be careful because a single error is bad). Then, the VPN only knows which domains you visit, how long, how much data, and at what times. This is still quite significant. Then there's the issue of payment. If you choose a free service, it almost certainly means it's selling your data. I will say that this is better than most other uses for free VPNs, but it's still pretty sketchy. If you're paying, then you need one which accepts payments in monero (or zcash or another private cryptocurrency) or cash by mail.

Overall, Tor over VPN is relatively normal. I use this configuration regularly. VPN over Tor is highly unusual, and you should consider if you need it. If you need a recommendation for a VPN though, Mullvad supports both monero and cash by mail (sweden), and is generally a good all around VPN (as long as you don't need port forwarding). One final thing to note: If for some reason you want to use a VPN on both sides, do not use the same VPN, even with separate accounts. Probably, they won't check, but at that point you might as well just use straight Mullvad VPN.

[–] spinning_disk_engineer@lemmy.ca 11 points 1 month ago (3 children)

One thing that's worth keeping in mind: physical retailers may have cameras, but they (in general) rotate their recordings and don't provide an API for law enforcement. By contrast, any data that an online service gets is probably stored forever, possibly across multiple companies. If you do pick up the online package at a physical store, then you're losing most of the benefits, so you also need to provide an address.

That being said, much of China and some of the US have significant outdoor surveillance camera networks. These usually do provide law enforcement with real time, AI search, and may keep recordings for a very long

For me, as a Canadian, I'd consider physical stores more private, maybe putting on generic clothing and a mask if it's really important. If your city has its own surveillance system, that might be different for you. Though really, in that case, you should be more concerned about pushing for the cameras to be removed, or failing that looking into moving elsewhere: it is not sufficient to have privacy only online, only from major storefronts.

9
submitted 3 months ago* (last edited 3 months ago) by spinning_disk_engineer@lemmy.ca to c/privacy@lemmy.ml
 

I use mailbox.org. Mailbox.org provides an "encrypted mailbox" feature, which PGP encrypts incoming unencrypted emails. The server can of course intercept incoming messages, but it can't look at the entire backlog unless it was compromised the entire time.

Alternatively, using POP3 instead of IMAP (at least with the default settings) deletes emails from the server after downloading, whenever my laptop is connected. Thus, the server can intercept incoming messages, but not the entire backlog.

Of course, both of these have downsides. The encrypted mailbox is PGP, so it misses important details like the subject lines and source addresses. Meanwhile, POP3 can leave my mail entirely unprotected for as long as I'm offline, and it also means that I can't access it from anything other than my laptop, and means that I have to do manual backups.

Which is more important in terms of security, or should I use both? I'm looking for the legal perspective of law enforcement (In Canada and Germany, home to myself and my email provider respectively), but also that of some hacker who's trying to get into my (and everyone else's) accounts.

Would there be a server software that I could use to download emails from mailbox.org over POP3 and then provide them to all my own devices over IMAP? That might, in some sense be the best of both worlds. Right now, I am using both POP3 and the encrypted mailbox, but convenience is definitely not optimal, so I'd like to change if it can be done safely.

 

Jmp.chat provides an adapter (a eUICC device?) that can be used to store an eSIM on a physical card. I have such an adapter that I have already used for a plan tied to my identity. Is it safe to purge the chip, and then to reuse it for anonymous communications?

 

I'm looking into getting some domains for email, so I don't need to use the same few addresses for everything. In doing this, the domain name itself becomes the identity, but it's also entirely arbitrary.

What is a good method to choose domain names so that they look more or less normal? Catch all addresses can of course be detected in SMTP, but the idea is just to not look suspicious. Would anyone be comfortable sharing the constructions they use? (though not the domains themselves, for obvious reasons) Should I use subdomains for the things that can safely be correlated, (as spam defense) or is it better to only use different mailboxes on one domain?

16
submitted 4 months ago* (last edited 4 months ago) by spinning_disk_engineer@lemmy.ca to c/android@lemmy.world
 

What part of an android device is responsible for carrier locking? I understand that custom ROMs can sometimes be used to bypass a carrier lock, but how might I go about making such a ROM from stock?

This is complicated somewhat by the fact that the actual device I have, an Orbic Speed RC400L, isn't technically an android device; it runs busybox/linux, but its bootloader, adbd, and cellular systems seem to be android-like. I'm happy to experiment if someone can provide resources for the general android case.

14
submitted 5 months ago* (last edited 5 months ago) by spinning_disk_engineer@lemmy.ca to c/privacy@lemmy.ml
 

I am trying to get rayhunter, but I am confused about a few things. What kind of hardware may be used? The Orbic RC400L advertises itself as being for Verizon network only, which I am not going to use. Does the rayhunter software allow it to work on arbitrary networks?

Furthermore, I don't see a good way to acquire such a device. They aren't sold locally as far as I can tell. On amazon they are available, though expensive. However, that would mean losing any form of privacy. I don't need it to be completely anonymous—someone looking at the location could probably see home and work easily enough—but better than amazon would be much preferred.

Are there any alternate devices that are known to work well in Canada? I will be keeping the device powered off most of the time anyways, (so as to hide my location) but it must be reliable when I need it.

EDIT: eSIM support is a plus, but not required

 

I store playlists as m3u files, but sometimes I want to play it on an external device or send it over the network. The playlist references files using absolute paths, and they have various formats (wav, flac, mp3, ogg).

I would like to convert it into a single cue/flac, as if it were an album that I just ripped from CD (though it may be longer than 80min.) It would be acceptable to create a directory full of uniform flacs with appropriately adjusted metadata, again as if ripped from CD.

I would like to avoid writing intermediates to disk unnecessarily, and I would like to avoid GUI if possible, but the only hard requirement is that it run quickly (that is to say, faster than realtime.)

15
submitted 7 months ago* (last edited 7 months ago) by spinning_disk_engineer@lemmy.ca to c/privacy@lemmy.ca
 

Since laser printers all encode metadata into the printed image, and handwriting is unique to the writer, I was wondering if a typewriter would provide a more anonymous form of paper communication.

I expect it would be possible to determine the model of typewriter, but would it be possible to tell if two samples were made on the very same machine? Are electric typewriters better or worse than manual? (assuming the same operator) What about Selectric or Wheelwriter – would frequently swapping out the typing element help?

 

I would like recommendations for a set of wireless headphones. I already have a set of headphones which are of the overhead style, but those cannot be used in all situations, so I would like to get a backup set of in ear headphones. I have a budget around $150-$200, though that isn't hard and fast.

My criteria are as follows:

  • Comfortable, inconspicuous
  • Good passive noise isolation. Active noise cancellation is a potential asset, especially if it can distinguish speech from other sounds, but passive properties must hold up.
  • Wireless, preferably with an open standard (e.g. Bluetooth)

Audio quality is not the highest concern, as I already have a set of wired headphones. I'm just looking for something to play music when I am working.

I already have a transmitter for bluetooth, if the wireless protocol is anything different I would have to buy that. Additionally, I might in the future buy an MP3 player, and some of those come with bluetooth support. If you have any specific suggestions for small MP3 players, put them also in the comments. That's definitely a more long term idea though.

Recommendations?

view more: next ›