privacy

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

Templa, in Looking for FOSS android TV (or something like Kodi, but dumber)

I’m also currently looking for one as we really want to ditch our Nvidia Shield Pro. However the shield has so many features and codecs that I’m unsure if there’s such thing.

gomp,

You should be able to run Lineage on the shield (double check the specific model)… maybe you can try that and re-flash the stock OS if it doesn’t work for you.

Oisteink, in My idea of maintaining E2EE between people in the age of the UK's and EU's anti-privacy laws

Longest shower though I’ve seen for a while. While you seem somewhat clueless in what you talk about you manage to fit in many cool words. That’s a plus.

possiblylinux127, in Looking for FOSS android TV (or something like Kodi, but dumber)

To actually answer your question, the Banana Pi supports Lineage os. wiki.lineageos.org/devices/-pi

I’m not sure if Netflix will work on Lineage os but it might be worth a look.

gomp,

That’s a great tip! I didn’t know lineage supported Android TV on SBCs

As for Netflix on Lineage: it does work (at least w/ microg - I just tried on my phone), but you won’t find the app in aurora store so you’ll have to source it on apkmirror or the like.

KrapKake,

Not sure why Netflix wouldn’t be on the Aurora store. Anyway, I did use android TV on an OdroidXU4 for a few months. It worked well with an air mouse and made it work like a regular android TV. Only issue I had with it sometimes was getting it to wake up after being asleep for some time, but that issue could have been ROM+odroid (or air mouse) specific.

TheSun,

When I still had Netflix I was only able to get 720p streams on lineageOS because of netflix’s DRM checks (same with on a web browser)… does your method allow 1080p or even 4k streams or is it still the same deal?

gomp,

Wow: they also go to great lengths to piss off their paying customers.

Anyway, I have no idea if it’s 1080p or not: I can say it looks ok on my phone’s screen, but IDK how to check what the video resolution is

ultratiem, in is there a way tominimise risk while using facebook?
@ultratiem@lemmy.ca avatar

You can’t use Facebook privately. There’s no such thing.

library_napper, in Privacy wars will be with us always. Let's set some rules
@library_napper@monyet.cc avatar

The eIDAS regulation makes an enormous change by mandating man-in-the-middle attack technology that it would be illegal for browser makers to defend against

How would this law affect websites with Onion Services (eg Facebook) that don’t use http at all, but Tor’s internal pinned end-to-end encryption with a pinned certificate tied to the .onion name?

Illecors,

This doesn’t affect websites as such - it’s the end clients, i.e. browsers that would be forced to accept gov issued CAs. I don’t see anyone going after TOR as it’s already a very niche thing, so it should be fine.

library_napper, in Tor isn't as decentralised as we thought?
@library_napper@monyet.cc avatar

I, umm, this is good news. For project doing their job at keeping us safe.

digger, in is there a way tominimise risk while using facebook?
@digger@lemmy.ca avatar

It’s worth noting that Facebook regularly collects information and builds profiles about people who are not users (or are users who but aren’t logged in). The average user would be surprised what a company like Facebook can put together on individuals who have never made an account.

howtogeek.com/…/what-are-facebook-shadow-profiles…

TheBiscuitLout,

I’ve been fairly parsimonious with my information for a fair while - I don’t use my real name online except when unavoidable for payment etc, don’t put photos of me anywhere, use social media (other than Lemmy, and I’m not very social on here really!) and I think I have fairly good habits to keep information and habits separated. I alternate between using FF, Librewolf and Mullvad browser for different things, don’t reuse usernames/id’s, use a VPN router at home and have VPNs on my mobile devices, email masks and relays, and where possible pay with virtual cards etc. I think my most unique identifier, last time I checked with the EFF site, was the size and resolution of my screens. I’m not really sure how much data there is to collect about me past the mundane, as I don’t really associate with anyone in the real world online, and almost exclusively use signal in the real world.

woshang, in Tor isn't as decentralised as we thought?

It is not new.

virtualbriefcase, in My idea of maintaining E2EE between people in the age of the UK's and EU's anti-privacy laws

Sounds like what you’re looking for is PGP/GPG. Been around for a while, but does the job well.

Also, I doubt most projects built outside of the UK (or Europe as the EU seems to be moving in a similar direction) will actually comply and backdoor their own software. As long as you have internet they’ll always be actually secure software to download.

MigratingtoLemmy,

Well, yes, GnuPG is certainly an option. I don’t care how it’s implemented though, but I do care about the fact that clients/client apps take encryption into their own hands instead of relying on middleware.

virtualbriefcase,

Clients taking it into their own hands reminds me of delta chat. Basically the same thing but the client handles encryption and uses a generic email server as the chat server.

But any good client will handle encryption themselves (heck even “bad” clients will do that). As long as they’re not UK based and don’t neuter the clients for their UK users they’ll still retain proper encryption completely client side (outside of public key infrastructure which is a whole different topic).

MigratingtoLemmy,

From what I understand of PKI and the way the Internet is right now, trust in identity would be very hard to build if clients engage in PKI.

But taking encryption into one’s hands basically brings back control into one’s hands. You do not specifically need an encrypted connection in such a case, just a tamper-proof connection.

woshang, in My idea of maintaining E2EE between people in the age of the UK's and EU's anti-privacy laws

if everyone started to use p2p messengers with asymmetrical encryption, the EU would have very little they could do

Totally agree with you; a p2p network is resilient and unstoppable. Every user acts as a node within the p2p network, and as long as people are actively online, it can survive. This means it cannot be banned by any country or government.

Plus, since a P2P network is a decentralized network, there is no central server to store user data such as chat histories or contact lists**. From a data privacy perspective, nothing can compare with a p2p network.

I know people are quite familiar with Signal and Whatsapp due to their E2EE services. However, they are managed by tech companies and utilize a centralized network (central server = another computer). All your chat histories and data are kept in their giant computer/server. Even though it is encrypted, who in the world knows if they have memorized your private key (I think they do, by the way, because governments need these things to monitor suspicious activities or potential criminal incidents).

So, start using applications that operate on a decentralized P2P network; it is the safest way to safeguard your privacy rights.

t4k3, (edited )

start using applications that operate on a decentralized P2P network;

Have you heard of this one? They said it’s a secure messenger based on P2P network, also with end-to-end encryption technology.

https://lemmy.world/pictrs/image/05bd9dfc-7fe1-486c-8f1a-7428c9a78cc8.png

RandoCalrandian,
@RandoCalrandian@kbin.social avatar

… why post a png?
Link to the service

Asudox, in My idea of maintaining E2EE between people in the age of the UK's and EU's anti-privacy laws
@Asudox@lemmy.world avatar

Basically P2P. The government can’t do shit about them.

skullgiver, (edited )
@skullgiver@popplesburger.hilciferous.nl avatar

deleted_by_author

  • Loading...
  • Asudox,
    @Asudox@lemmy.world avatar

    Well, then you just get the hell out of that country.

    skullgiver, (edited )
    @skullgiver@popplesburger.hilciferous.nl avatar

    deleted_by_author

  • Loading...
  • Asudox,
    @Asudox@lemmy.world avatar

    I doubt that the majority would want to leave their country just for e2e though.

    RandoCalrandian,
    @RandoCalrandian@kbin.social avatar

    And then we move to steganography with cat pictures

    The government being an abusive piece of shit isn’t a good enough reason to stop trying to protect yourself

    skullgiver, (edited ) in My idea of maintaining E2EE between people in the age of the UK's and EU's anti-privacy laws
    @skullgiver@popplesburger.hilciferous.nl avatar

    deleted_by_author

  • Loading...
  • MigratingtoLemmy,

    You are right. I didn’t think about it like so before. I could point at I2P and TOR but I don’t think that’s foolproof either, neither do I know enough to be able to comment. Is there no way out?

    skullgiver, (edited )
    @skullgiver@popplesburger.hilciferous.nl avatar

    deleted_by_author

  • Loading...
  • MigratingtoLemmy,

    Wait, if the EU is in favour of secure encryption, then who is opposing it in the EU? I haven’t heard of encryption being broken in America

    skullgiver, (edited )
    @skullgiver@popplesburger.hilciferous.nl avatar

    deleted_by_author

  • Loading...
  • MigratingtoLemmy,

    Thanks for the list. I live in the US but I’ll keep this in mind

    Eideen, in How to backup 2FA
    @Eideen@lemmy.world avatar

    I uses authy.com

    Separat from my passwords

    shortly2139,

    Just a heads up. There is no way to export from authy. So if you ever want to switch apps for whatever reason, lets say they were bought by big evil corp., then you would have to go and regenerate all your keys. Where as a good app would let you export and import from anywhere

    Automated_Footprint,
    @Automated_Footprint@sh.itjust.works avatar

    Yep took me several days to transfer all the logins to Aegis

    AtmaJnana, (edited )

    lets say they were bought by big evil corp

    Is this an intentional joke? (I often miss jokes so I am asking seriously)

    Authy was bought ages ago by Twillio, which also owns Segment (customer data platform)… So Twilio may not be all that big, but they’re fairly big players in the tracking and ads space. Which I loathe.

    I’m in this thread because I want to move away from Authy for this very reason.

    shortly2139,

    An unintentional one it would seem. Had no idea. Thanks for highlighting this.

    Cotillion189, in How to backup 2FA
    @Cotillion189@lemmy.world avatar

    Use Aegis on android or 2FAS on iOS. And just backup your seed on hdd/usb stick. Dont upload on cloud.

    rambos,

    Thx, looks perfect!

    SamsonSeinfelder,

    IOS has a 2FA feature included in the key chain (passwords) settings. No need for a third party app. If you backup passwords via icloud, you are already set.

    Cotillion189,
    @Cotillion189@lemmy.world avatar

    Never upload your passwords to any cloud. Always use good foss instead of proprietary software.

    Dave, (edited ) in How to backup 2FA
    @Dave@lemmy.nz avatar

    Aegis is a free open source TOTP 2FA app like Google Authenticator, and available on both F-Droid and Google Play. You should be able to export from Google Authenticator and import into Aegis.

    Edit: I had assumed because Aegis had an option to import from Google Authenticator that this would mean you could export in bulk. Bad assumption to make, it sounds like you can do it if you have a rooted phone but Authenticator doesn’t make it easy. I did find this that shows a method to do a handful at once: blog.jay2k1.com/…/how-to-bulk-migrate-from-google…

    rambos,

    Most comments recommend aegis, Im installing it right now. Thx

    illi,

    You should be able to export from Google Authenticator and import into Aegis.

    If there is a way, I was unable to find it

    rambos,

    Yes, I just did it. Go to google auth - transfer accounts - you get QR code, screenshot it - and import in Aegis

    illi,

    Huh. I was not able to make it work, perhaps I just overlooked something.

    Dave,
    @Dave@lemmy.nz avatar

    I had assumed because Aegis had an option to import from Google Authenticator that this would mean you could export in bulk. Bad assumption to make, it sounds like you can do it if you have a rooted phone but Authenticator doesn’t make it easy. I did find this that shows a method to do a handful at once: blog.jay2k1.com/…/how-to-bulk-migrate-from-google…

    01189998819991197253,
    @01189998819991197253@infosec.pub avatar

    What’s the benefit of Aegis over FreeOTP+?

    Dave, (edited )
    @Dave@lemmy.nz avatar

    For one, Aegis is more well known. Aegis has 6k+ stars where FreeOTP+ has about 500. This doesn’t mean it’s better, just that people are more likely to recommend it.

    Aegis also has more features, and can import from many different authenticator apps (though as many don’t allow exports, this may require technical knowledge to get the database and feed it in). If you have root then Aegis can pull directly from the other apps.

    Aegis claims they are better than FreeOTP because the encrypt passwords at rest.

    One big difference is FreeOTP+ lets you not have to enter a pin/password to see the codes while Aegis you need to enter a pin, password, or biometric to see your codes.

    01189998819991197253,
    @01189998819991197253@infosec.pub avatar

    Popularity aside, you sold me on the import compatibility. FreeOTP+ can export to other FreeOTP+ installations, but I’ve had issues with exporting to other apps. I had to manually import using the secrets displayed within FreeOTP+. The encryption sold me. I will be migrating to Aegis. I haven’t heard of it until this post, and have been using FreeOTP+ sans encryption.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #