I’m also currently looking for one as we really want to ditch our Nvidia Shield Pro. However the shield has so many features and codecs that I’m unsure if there’s such thing.
You should be able to run Lineage on the shield (double check the specific model)… maybe you can try that and re-flash the stock OS if it doesn’t work for you.
Longest shower though I’ve seen for a while. While you seem somewhat clueless in what you talk about you manage to fit in many cool words. That’s a plus.
That’s a great tip! I didn’t know lineage supported Android TV on SBCs
As for Netflix on Lineage: it does work (at least w/ microg - I just tried on my phone), but you won’t find the app in aurora store so you’ll have to source it on apkmirror or the like.
Not sure why Netflix wouldn’t be on the Aurora store. Anyway, I did use android TV on an OdroidXU4 for a few months. It worked well with an air mouse and made it work like a regular android TV. Only issue I had with it sometimes was getting it to wake up after being asleep for some time, but that issue could have been ROM+odroid (or air mouse) specific.
When I still had Netflix I was only able to get 720p streams on lineageOS because of netflix’s DRM checks (same with on a web browser)… does your method allow 1080p or even 4k streams or is it still the same deal?
The eIDAS regulation makes an enormous change by mandating man-in-the-middle attack technology that it would be illegal for browser makers to defend against
How would this law affect websites with Onion Services (eg Facebook) that don’t use http at all, but Tor’s internal pinned end-to-end encryption with a pinned certificate tied to the .onion name?
This doesn’t affect websites as such - it’s the end clients, i.e. browsers that would be forced to accept gov issued CAs. I don’t see anyone going after TOR as it’s already a very niche thing, so it should be fine.
It’s worth noting that Facebook regularly collects information and builds profiles about people who are not users (or are users who but aren’t logged in). The average user would be surprised what a company like Facebook can put together on individuals who have never made an account.
I’ve been fairly parsimonious with my information for a fair while - I don’t use my real name online except when unavoidable for payment etc, don’t put photos of me anywhere, use social media (other than Lemmy, and I’m not very social on here really!) and I think I have fairly good habits to keep information and habits separated. I alternate between using FF, Librewolf and Mullvad browser for different things, don’t reuse usernames/id’s, use a VPN router at home and have VPNs on my mobile devices, email masks and relays, and where possible pay with virtual cards etc. I think my most unique identifier, last time I checked with the EFF site, was the size and resolution of my screens. I’m not really sure how much data there is to collect about me past the mundane, as I don’t really associate with anyone in the real world online, and almost exclusively use signal in the real world.
Sounds like what you’re looking for is PGP/GPG. Been around for a while, but does the job well.
Also, I doubt most projects built outside of the UK (or Europe as the EU seems to be moving in a similar direction) will actually comply and backdoor their own software. As long as you have internet they’ll always be actually secure software to download.
Well, yes, GnuPG is certainly an option. I don’t care how it’s implemented though, but I do care about the fact that clients/client apps take encryption into their own hands instead of relying on middleware.
Clients taking it into their own hands reminds me of delta chat. Basically the same thing but the client handles encryption and uses a generic email server as the chat server.
But any good client will handle encryption themselves (heck even “bad” clients will do that). As long as they’re not UK based and don’t neuter the clients for their UK users they’ll still retain proper encryption completely client side (outside of public key infrastructure which is a whole different topic).
From what I understand of PKI and the way the Internet is right now, trust in identity would be very hard to build if clients engage in PKI.
But taking encryption into one’s hands basically brings back control into one’s hands. You do not specifically need an encrypted connection in such a case, just a tamper-proof connection.
if everyone started to use p2p messengers with asymmetrical encryption, the EU would have very little they could do
Totally agree with you; a p2p network is resilient and unstoppable. Every user acts as a node within the p2p network, and as long as people are actively online, it can survive. This means it cannot be banned by any country or government.
Plus, since a P2P network is a decentralized network, there is no central server to store user data such as chat histories or contact lists**. From a data privacy perspective, nothing can compare with a p2p network.
I know people are quite familiar with Signal and Whatsapp due to their E2EE services. However, they are managed by tech companies and utilize a centralized network (central server = another computer). All your chat histories and data are kept in their giant computer/server. Even though it is encrypted, who in the world knows if they have memorized your private key (I think they do, by the way, because governments need these things to monitor suspicious activities or potential criminal incidents).
So, start using applications that operate on a decentralized P2P network; it is the safest way to safeguard your privacy rights.
You are right. I didn’t think about it like so before. I could point at I2P and TOR but I don’t think that’s foolproof either, neither do I know enough to be able to comment. Is there no way out?
Just a heads up. There is no way to export from authy. So if you ever want to switch apps for whatever reason, lets say they were bought by big evil corp., then you would have to go and regenerate all your keys. Where as a good app would let you export and import from anywhere
Is this an intentional joke? (I often miss jokes so I am asking seriously)
Authy was bought ages ago by Twillio, which also owns Segment (customer data platform)… So Twilio may not be all that big, but they’re fairly big players in the tracking and ads space. Which I loathe.
I’m in this thread because I want to move away from Authy for this very reason.
IOS has a 2FA feature included in the key chain (passwords) settings. No need for a third party app. If you backup passwords via icloud, you are already set.
Aegis is a free open source TOTP 2FA app like Google Authenticator, and available on both F-Droid and Google Play. You should be able to export from Google Authenticator and import into Aegis.
Edit: I had assumed because Aegis had an option to import from Google Authenticator that this would mean you could export in bulk. Bad assumption to make, it sounds like you can do it if you have a rooted phone but Authenticator doesn’t make it easy. I did find this that shows a method to do a handful at once: blog.jay2k1.com/…/how-to-bulk-migrate-from-google…
I had assumed because Aegis had an option to import from Google Authenticator that this would mean you could export in bulk. Bad assumption to make, it sounds like you can do it if you have a rooted phone but Authenticator doesn’t make it easy. I did find this that shows a method to do a handful at once: blog.jay2k1.com/…/how-to-bulk-migrate-from-google…
For one, Aegis is more well known. Aegis has 6k+ stars where FreeOTP+ has about 500. This doesn’t mean it’s better, just that people are more likely to recommend it.
Aegis also has more features, and can import from many different authenticator apps (though as many don’t allow exports, this may require technical knowledge to get the database and feed it in). If you have root then Aegis can pull directly from the other apps.
Aegis claims they are better than FreeOTP because the encrypt passwords at rest.
One big difference is FreeOTP+ lets you not have to enter a pin/password to see the codes while Aegis you need to enter a pin, password, or biometric to see your codes.
Popularity aside, you sold me on the import compatibility. FreeOTP+ can export to other FreeOTP+ installations, but I’ve had issues with exporting to other apps. I had to manually import using the secrets displayed within FreeOTP+. The encryption sold me. I will be migrating to Aegis. I haven’t heard of it until this post, and have been using FreeOTP+ sans encryption.
privacy
Oldest
This magazine is from a federated server and may be incomplete. Browse more on the original instance.