Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)AA

Disclaimer: i'm not affiliated with with anything i post.

Posts 70
Comments 28
Switched to GrapheneOS today
  • That work was not available when GrapheneOS was developed

    What do you mean ? This has nothing to do with GrapheneOS in the first place (which by the way has been created in 2014. The article i linked refers to 2021).

    I still consider it a black box.

    Reverse engineering is a thing. It always has been. If every piece of closed source was a blackbox how can you explain exploitation ? How can bad actors exploit Windows, MacOS, CPU firmware and so on ? Your argument here is not practical. Also, why should Google put a backdoor inside a chip ? They already get every information they what directly from the people agreeing to use their software. So, why bother ? Moreover, every phone on the market has closed source firmware.

  • Switched to GrapheneOS today
  • The Titan security chip is not a black box. The Titan M1 gas been scrutinazed by blackhat: https://dl.acm.org/doi/fullHtml/10.1145/3503921.3503922

    Just because something is not open source does not mean you can't verify it (no, i'm not shilling closed slurce; no i don't think closed > open; no i don't think closed source is more secure)

  • Firefox added ad tracking and has already turned it on without asking you

    mastodon.social mcc (@mcc@mastodon.social)

    Attached: 1 image So this, from Firefox, is fucking toxic: https://mstdn.social/@Lokjo/112772496939724214 You might be aware Chrome— a browser made by an ad company— has been trying to claw back the limitations recently placed on ad networks by the death of third-party cookies, and added new featu...

    mcc (@mcc@mastodon.social)
    21
    www.bleepingcomputer.com Why all accounts (even test accounts) need strong passwords

    Strong passwords are the key to protecting your organization's accounts - even the accounts you've forgotten about. Learn from Specops Software about securing test accounts and environments before they are breached.

    Why all accounts (even test accounts) need strong passwords
    0
    www.androidauthority.com Google Maps tests new pop-up ads that give you an unnecessary detour (Update)

    Google Maps is testing a new ad format that gives users the option to add a stop for a sponsored location during navigation.

    Google Maps tests new pop-up ads that give you an unnecessary detour (Update)
    30
    stackdiary.com Signal under fire for storing encryption keys in plaintext

    Popular encrypted messaging app Signal is facing criticism over a security issue in its desktop application. Researchers and app users are raising

    Signal under fire for storing encryption keys in plaintext
    3
    appleinsider.com Authy got hacked, and 33 million user phone numbers were stolen

    Twilio has updated its iOS Authy two-factor authentication app following a hack that reportedly saw 33 million cellphone numbers being stolen.

    Authy got hacked, and 33 million user phone numbers were stolen
    4
    proton.me Introducing Docs in Proton Drive – collaborative document editing that’s actually private | Proton

    Create docs and collaborate in real time on documents knowing they are end-to-end encrypted.

    Introducing Docs in Proton Drive – collaborative document editing that’s actually private | Proton
    1
    www.theregister.com Police allege ‘evil twin’ in-flight Wi-Fi used to steal info

    Fasten your seat belts, secure your tray table, and try not to give away your passwords

    Police allege ‘evil twin’ in-flight Wi-Fi used to steal info
    3
    www.cbsnews.com As mind-reading technology improves, Colorado passes first-in-nation law to protect privacy of our thoughts

    The first-in-the-nation law in Colorado includes biological or brain data in the State Privacy Act, similar to fingerprints if the data is being used to identify people.

    As mind-reading technology improves, Colorado passes first-in-nation law to protect privacy of our thoughts
    4
    14
    14
    www.404media.co Lawsuit Claims Microsoft Tracked Sex Toy Shoppers With 'Recording in Real Time' Software

    The complaint claims that Babeland and Good Vibrations websites uses Microsoft's Clarity tracking software to see what visitors searched for and bought.

    Lawsuit Claims Microsoft Tracked Sex Toy Shoppers With 'Recording in Real Time' Software
    3
    www.techspot.com Google, Snap, Meta and many others are "quietly" changing privacy policies to allow for AI training

    Earlier this year, the Federal Trade Commission warned that companies would be sorely tempted to change the terms and conditions of their privacy statements to allow them...

    Google, Snap, Meta and many others are "quietly" changing privacy policies to allow for AI training
    1
    arstechnica.com Shopping app Temu is “dangerous malware,” spying on your texts, lawsuit claims

    Temu "surprised" by the lawsuit, plans to "vigorously defend" itself.

    Shopping app Temu is “dangerous malware,” spying on your texts, lawsuit claims
    7
    arstechnica.com Mac users served info-stealer malware through Google ads

    Full-service Poseidon info stealer pushed by "advertiser identity verified by Google."

    Mac users served info-stealer malware through Google ads
    6
    organicmaps.app The major June update and a follow-up OSM data-only update (with a hotfix for the iOS app hanging) were successfully published and are available in all app stores and on our GitHub.

    The major June update and a follow-up OSM data-only update (with a hotfix for the iOS app hanging) were successfully published and are available in all app stor…

    The major June update and a follow-up OSM data-only update (with a hotfix for the iOS app hanging) were successfully published and are available in all app stores and on our GitHub.
    1
    mullvad.net To those of you with nothing to hide: One day you might have. Because you don’t make the rules.

    The most common argument used in defense of mass surveillance is ‘If you have nothing to hide, you have nothing to fear’. Try saying that to women in the US states where abortion has suddenly become illegal. Say it to investigative journalists in authoritarian countries. Saying ‘I have nothing to h...

    To those of you with nothing to hide: One day you might have. Because you don’t make the rules.
    29
    www.bleepingcomputer.com New Medusa malware variants target Android users in seven countries

    The Medusa banking trojan for Android has re-emerged after almost a year of keeping a lower profile in campaigns targeting France, Italy, the United States, Canada, Spain, the United Kingdom, and Turkey.

    New Medusa malware variants target Android users in seven countries
    0
    www.bleepingcomputer.com New Medusa malware variants target Android users in seven countries

    The Medusa banking trojan for Android has re-emerged after almost a year of keeping a lower profile in campaigns targeting France, Italy, the United States, Canada, Spain, the United Kingdom, and Turkey.

    New Medusa malware variants target Android users in seven countries
    1
    thehackernews.com Warning: New Adware Campaign Targets Meta Quest App Seekers

    Discover how AdsExhaust adware targets Meta Quest app users, manipulates browsers, and generates unauthorized revenue through sophisticated techniques

    Warning: New Adware Campaign Targets Meta Quest App Seekers
    4

    PSA: always update your smartphone | Ratel RAT targets outdated Android phones in ransomware attacks

    www.bleepingcomputer.com Ratel RAT targets outdated Android phones in ransomware attacks

    An open-source Android malware named 'Ratel RAT' is widely deployed by multiple cybercriminals to attack outdated devices, some aiming to lock them down with a ransomware module that demands payment on Telegram.

    Ratel RAT targets outdated Android phones in ransomware attacks
    24
    *Permanently Deleted*
  • I personally blocked him and it was one of the best decision of my digital life. He's basically wasting his life spreading misinformation about GrapheneOS. He's simply too much to handled for my mind. Without seeing him, i feel this place is much more relaxing and useful to see it.

  • What's the best messaging platform?
  • I think this question has some sort of relativity. What is your threat model ? Are you trying to protect your data from the service itself, fromyour mom, from the police ? You want anonimity ? And so on.

    There is no an ultimate answer to this question. For example, i'm using WhatsApp because it fits my threat model (messages are encrypted, metadata is not but for me is fine). Then, i use Signal with people that use Signal (where i live, 99% of people use WhatsApp).

    I would never use Telegram since is not encrypted by default.

  • It's possible to back up my Whatsapp chats without using Google accounts?
  • Yes you can! Your offline backup is inside the app data (you need a file manager to access the folder). If you use a Samsung Device, i think you won't be able to see it unless you plug the phone on your PC.