If privacy is of utmost concern, we recommend that you refrain from communicating any personal data to us since plain-text email is not a safe media for communication. If necessary, use PGP-encrypted email.
…
…
We do use a third party to operate our email service, so we remind you to carefully read #1 again.
I went to ask nicely for help from their support department and got a development build for one of their routers. Not only was it an ancient version of OpenWRT with the myriad of unpatched vulnerabilities, but it had absolutely dumb/weird configurations like the Wi-Fi password being a user account password exposed to a patched up SSH daemon with shell /bin/false. Just a whole lot of why and an obvious lack of care put into the software.
Their devices function… Most of the time. That’s about all that’s redeeming.
…because why would you go to all the trouble to pay Mullvad (presumably to keep your sensitive information away from big tech) to then give it to google in the form of an e-mail should you reach out to Mullvad for support? Google would then suck up any and all data that comes via their gmail service.
It’s because of the difference in credentials. One is a website positing as having both privacy and cryptocurrency investment advice services, and the other is a random Lemur
Fwiw the TP link bulbs usually have a local API that Home Assistant has an integration for. You can use that and block their internet access - unless they’ve removed that feature. I only used one of these briefly because someone gave it to me. Usually just use cheap ZigBee bulbs. I would throw that one out though as someone else said it’s likely been compromised already…
The zigbee bulbs I’ve had the best luck with are Innr, although they are kind of pricy. Ikea bulbs are good for the price, but every one I have, has very loud coil whine when off. I had some on bedside stands and had to move them to other rooms. Sengled are nice when they work, I’ve had issues with them dropping off my network.
Both Ikea and Innr are also repeaters, Sengled does not do repeaters in their bulbs. Neither Ikea or Innr are exactly cheap, but they’ve been the most solid for me.
Sideloading is explicitly about enabling the user to install multimedia and apps that are not approved by the manufacturer or OS vendor, so this is probably illegal (depends on how the law’s been written) and I expect Apple to be taken to court over it in the very near future.
So this one guy maintains a mobile OS and a browser and an openwrt fork? That seems like too much work for one person and too few people to have issues with lack of donations if he actually does pull it off.
Two browsers, Mull (Firefox Android) Mulch (Chromium Android), and their own System Webview, and a bunch of their own apps, and comparison tables for releases etc. They are incredibly hard working and usually release updates same day as a security patch is released.
Yes, but I did not want to take credit for this discovery, especially on a federated site, which is why I have shared the toot of the person who found it
The Onion is not exactly obscure. If you want to credit the Vivaldi user, I think it’s still preferable to link the Onion directly, and add a note saying where you found it. That saves people from some clicking and tracking.
Tracking? I think that the Fediverse isn’t Facebook, no tracking conecting or linking from one to another, tracking from the Onion, but not from Mastodon. Look for yourself who is tracking you themarkup.org/blacklight (nice in your Bookmarks)
That isn’t avoidable if you don’t use an VPN. ProtonVPN (OpenSource) is fine, even the free one (no logs, encrypted military level, no data limits in the free version, made by cientifics of the CERN)
OMG, I don’t care about which boogyman you fear, it would have happened eventually regardless of color in the position. Money and power speaks much louder than political party.
I have encountered a handful of sites that it broke as well. I use the strict protection option and manually add exceptions to the few sites it breaks - then I never have any other issues with them
I’ve been having a pretty good experience with Mullvad, however I don’t hear many people talking about it. I wonder why is that, IIRC it’s being developed with Tor Foundation, and is basically a Tor browser for clear web, and that sounds perfect. So far, I didn’t run into any issues, so is there a catch, or are they just not well enough known yet? Or, maybe people are turned away by their optional VPN?
Probably because LibreWolf is most of the way there, and the Mullvad branding + proprietary VPN is more than a bit much. I use(d) the VPN alongside it and found the add-on “hints” regarding the correct DNS settings more frustrating than helpful, too.
I was using LibreWolf before, but I really like the idea of bundling VPN + Browser, and also the way they handle payments - not only is Mullvad VPN kind of cheap, I can just pay with crypto and don’t need any account (kind of - you just generate username that also serves as an password, without any other contact information required).
But what I like the most about it is the idea of making a browser with the goal of having the same fingerprint between users (as much as possible), and offering it with a VPN - becuase that means that most of other users of the VPN will probably also have the same fingerprint from the browser, so you will blend in with them. I wasn’t really sold on the idea of VPN before that and didn’t use one, but this was what convinced me.
But tbh I haven’t done much research into the company, or into the effectivness of their implementation. I’m kind of betting on their cooperation with Tor Browser, which should have most of this stuff already figured out. But it’s possible that other browsers are just better at it, I never checked.
I do however still use LibreWolf for the occasional site that breaks with Mullvad, but it’s not something that happens too often.
I use(d) the VPN alongside it and found the add-on “hints” regarding the correct DNS settings more frustrating than helpful, too.
Hmm, I don’t think I’ve ever noticed anything about DNS. I think I’ve actually never click on the browser vpn extension, though :D Is it the encrypted DNS hint?
EDIT: Found this, apparently it’s doing pretty well privacytests.org
I can recommend buyvm. 500gb storage from them (hdd) is $2.5/m I think. You can mount it encrypted. Small hosts like that usually have enough trouble keeping up with the day’s tickets that they can’t spend time messing with your files unless there is a definite issue. Note that if you are serving semi public content (seedbox?) then by definition it’s not very private. And no vps can be as private as using your own hardware.
TIL that Snapchat is an app used in 2024 without E2EE, Wikipedia article on Snapchat :
Encryption
In January 2018, Snapchat introduced the use of end-to-end encryption in the application but only for snaps (pictures and video), according to a Snapchat security engineer presenting at the January 2019 Real World Crypto Conference.[138][139][140] As of the January 2019 conference Snapchat had plans to introduce end-to-end encryption for text messages and group chats in the future.[141]
Well, doesn’t matter if it’s proprietary. Just need to sniff packets and you’d find out if they are encrypted or not, no?
Edit: looks like it’s not E2E truly. It might be encrypted in flight, but snapchat as an entity can read anyone’s messages. They have a policy to act on threats within thirty minutes and report it to the authorities. Dystopian.
It very much matters. When something is proprietary there is a, no alternatives that will function exactly the same and b, you don’t know what its really doing. For all you know its detecting the sniffing and changing its behavior.
Additionally how do you know what’s being sent if its encrypted.
Before the edit, I just meant the technicality itself: is it actually encrypted or is it plain text? This would have mattered if the state intercepted the message somehow, spying on their citizens. But apparently they did not, because snapchat leaked the data to them in a semi-automated manner: auto-generated incident report based on filtering gets escalated to authorities.
privacy
Active
This magazine is from a federated server and may be incomplete. Browse more on the original instance.