[-] wincing_nucleus073@lemm.ee 6 points 9 months ago

simplex uses relays/servers, but incoming and outgoing messages are configured to pass through separate servers. you can see this in the network settings

[-] wincing_nucleus073@lemm.ee 13 points 9 months ago

Is this about browsers or about privacy in general?

But your privacy should be tailored to your specific threat model and desires. Or, you can choose to be private as possible while keeping your convenience, and slowly be more private. You should not just be hardcore and right away. This will leave you feeling hopeless.

As far as browsers, i recommend Librewolf or mullvad browser, or Brave for Chromium. You do not need to use TOR for everything. A good quality VPN like mullvad vpn or proton is more than sufficient for most people.

[-] wincing_nucleus073@lemm.ee 4 points 9 months ago

tuta has an open source email app, have you tried it?

[-] wincing_nucleus073@lemm.ee 11 points 9 months ago

As long as you are running closed source Operating Systems, they can listen to whatever they want, and scan whatever they want that's happening on your screen. Wake up people. Facepalm.

[-] wincing_nucleus073@lemm.ee 14 points 9 months ago

laughs in crtv and dvd player

[-] wincing_nucleus073@lemm.ee 6 points 9 months ago

"hello my friend i am the fbi please hand over the iTunes gift card or you will be under the rest"

[-] wincing_nucleus073@lemm.ee 4 points 9 months ago

seriously? they got duped by a random protonmail account? good grief, actual retards work for verizon.

this should highlight why you should always protect yourself from these soulless uncaring corporate gargantuans that have zero desire to protect your basic data.

use PO boxes, JMP.chat numbers, email aliases, etc. never give out info that can be used to screw you over.

[-] wincing_nucleus073@lemm.ee 9 points 10 months ago* (last edited 10 months ago)

Cromite is the closest thing i can think of to Librewolf. Tons of hardening. but i dont think he ships a Linux version. just android and windows.

[-] wincing_nucleus073@lemm.ee 14 points 10 months ago

this is a physical access attack. if they already have physical access they can do a million other things too. this is kind of not important to be fair.

[-] wincing_nucleus073@lemm.ee 6 points 10 months ago

I've thought about this for a long time. Nice to see it getting attention.

this is why I don't really appreciate Graphene's sandboxed google play services as much as I appreciate MicroG. MicroG allows you to control which GPS-compatible apps get registered to your random ID on google's servers.

It's also worth studying your individual apps and how exactly they handle google push notifications. I know that there are various configurations, some which allow Google to see the content of the notification and some which done. of course, regardless of that, metadata such as who it gets delivered to and when, is still there.

8
submitted 10 months ago by wincing_nucleus073@lemm.ee to c/privacy@lemmy.ml

I am looking for a solution. I'm thinking of a locally hosted socks5 proxy like TOR has, but instead of TOR, this self hosted proxy can be configured to rotate through other remote proxies that I have access to

is there anything like this?

[-] wincing_nucleus073@lemm.ee 4 points 10 months ago

i feel bad for laughing at this lol

view more: next ›

wincing_nucleus073

joined 10 months ago