Also, read this: https://www.whonix.org/wiki/Speculative_Tor_Attacks
Also, read this: https://www.whonix.org/wiki/Speculative_Tor_Attacks
tor (TBB) doesn’t work for everything and most people want something fast and convinient that only takes clicking a few buttons to get working. They will think it is too much work.
I recommend Brave browser which can use tor in private browsing mode but also has a regular browser with encrypted DNS (cloudflare, https strict, and shields) for things like banking, shopping, and online accounts (that might help to have a password manager for).
Also, Tor browser does not have any passthrough for security keys but Brave based on chromium does and does not have a password manager.
Firejail should work on a profile for Brave as sandboxing is always helpful. TBB can be sandboxed easily.
This “multi-tiered” approach would be better for most people who aren’t just accessing a handful of onionsites that replace or are in opposition to an entirely different set of services than those usually accessed on the conventional internet (online banking, social media, a few publication sites, and a search engine).
Don’t use Discord. That is a major vector for attack. Seen it happen myself.
Even Sandboxed Google Play has problems.
I don’t think there is any equivalent of Graphene for Mac hardware. With Pegasus and Predator software around, phones are very hard to secure.
Rely on tor browser and torrifying where you can with Orbot (Guardian Project).
Instead of Telegram, how about Signal and Briar? We just heard about how Telegram’s executive got hit and may now have to bow to pressure. Signal has kept its design integrity as far as we know.
Minimal apps are better than many to reduce attack surface. Maybe try accessing some of those services on other devices instead of on your personal tracking device.
Yep. They all pretty much just jack with the flag.
Especially if it is at someone else’s expense so they can get a rush off of subjugating defenseless civilians and leading off sadistically with the enslaved, risking nothing in their hidden-bunker cowardice.
“guard against the impostures of pretended patriotism”
deleted by creator
yes, the more layers of security, the better, even if it is just a futile matter of time to consume the time of an ATP.
Ah, that must be it. 2FA is still a very good security feature to have.
But there is nothing only you know that is still useful because a secret must be shared in order to be useful (unless you just have full disk encryption and then when it is unlocked and network connected, it is still vulnerable). In short, admins could change your password since you are not the sole admin of your own server but then you would have to have mass appeal to be “useful”, i.e. popular.
In theory, Tim Cook might have a keybearer who could usurp the throne with all the proprietary OEM crypto keys that only the Company knows, but everyone knows who the CEO is and the keybearer could get in big trouble unless he had an army…
Things can be changed on the server side and the network is not the same as the device: these are technology truths some people refuse to ever understand.
This is what I thought. I keep telling people they don’t exclusively own their passwords / security tokens once they give it to a site.
If I shared encrypted info that I kept encrypted, I guess it would still be mine but no one could then read it.
This is what I thought. I keep telling people they don’t exclusively own their passwords / security tokens once they give it to a site. Salted hashes to obscure the pw don’t even matter since the admin could also bypass that. Tanks for the validation.
Actually, I have never received a proof that there actually is such a thing (all mass produced looks like every other mass produced) besides electromagnetic properties https://www.whonix.org/wiki/MAC_Address#Burner_Wi-Fi_USB_Sticks but there is, unfortunately, “clock” which is the totalitarian World Order.
If you like anonymity, then the Retro thinkpads should still be the best as they are numerous and hardware profiling is useless (if you are a TAILS or tor user – “Windows” everywhere!).
Also, check out the “hardware compatibility list” from Qubes OS (they’ve got an endorsement from Snowden right on their homepage). The i5 and i7 Intel CPUs virtualize and are very well understood by people that work with Xen. Notice how Intel just crashed with the latest generation CPU lines. Just because it is brand new, doesn’t mean it is highest security and reliability. (For example, nuclear silos sometimes still use floppies and are air gap compartmentalized with people in the loop. Might not be best for all the nukes to be on skynet and latest videogame capable. Depends on what you are doing for what is “best.”)
Modularity on Framework is pretty cool though.
Well understood tech and still damn good math! To think, just because the newest stuff is shinny! Total junk really just for ads and video games full if unknown complications and adverse effects. All a 'furbish needs to be back in top is a good Linux soul!
Qwell, so long as 40 year old gunmen (pigs) are dictating all the fluck, it’s swall OK then, isn’t it?
Don’t tell me we have lost control!!
30s are not old, just more magical powered!! The 20s need submissed!!
I thought these stills from Paglen recent CCC talk were pretty funny.
Unfortunately, Tinder doesn’t work and that is helpful to get in touch with the ladies. That app is too hell bent on location data which GOS handles more privately.
NFC should work, it is just scheduled to be deactivated after 3 months if not used for security reasons.
I think GOS is very user friendly and has many positive privacy and security enhancements. I would like to see if they can surpass sandboxed Google Play and officially support other repositories and updaters like Accrescent. Also, a standard way of securing traffic beyond encrypted DNS would be good such as a tor client like Orbot.
Looking into the Veilid ecosystem might also be a source for further development ideas.