privacyguides

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

hellfire103, in What is your favorite cybersecurity tool and why?
@hellfire103@sopuli.xyz avatar

I have a page on my Gemini capsule with a list of the software I use. Ask away about my reasons for any of the entries.

Gemini | HTTPS

I also quite like LUKS, VeraCrypt, and geli(8) for disk encryption, and I use mainly physical media (e.g. CDs) for music and video.

sir_reginald, in What is your favorite cybersecurity tool and why?
@sir_reginald@lemmy.world avatar

half of these are not even barely security related.

and if you meant privacy, well, definitely none of the images either. SimpleX, SearXNG, Tor and I2P

PS: I find it hilarious that you include proprietary software like Vivaldi or Obsidian. That is how flawed this post is.

Mandy, in What is your favorite cybersecurity tool and why?

that seems like a pretty random selection of things honestly, what qualifies as a cybersecurity tool? hows vivaldi a part of that? or openotp?

akilou, in What is your favorite cybersecurity tool and why?

I use Firefox, Proton everything, Signal (for the 4 contacts who have it). I guess that’s it.

I try to use Plex as much as possible instead of streaming services…?

Vexz, (edited )

Sadly Plex collects some data about its users. I remember opting out of some telemetry stuff but I can't remember where that was. If you want a self-hosted streaming service like Plex that completely respects your privacy, Jellyfin is what you're looking for. I tried it and it's okay but not as good as Plex imo. But if your main focus is privacy then you should definitely check it out. It's FOSS.

Edit:
I found where I had to opt out some data collection for Plex. Open this site, scroll halfway down the page. You'lle see two checkboxes for "Send playback data to Plex" and "Advertising Consent".

akilou,

Yeah I tried Jellyfin too but Plex is much better. I just threw it in the list because I figured it was better than having a bunch of video and music streaming services.

whale, in Thoughts on shizuku?
@whale@lemm.ee avatar

deleted_by_author

  • Loading...
  • Lemongrab,
    @Lemongrab@lemmy.one avatar

    Shouldnt be able to brick because it uses ADB debugging. Protected system files still can’t be altered, therefore factory reset would fix and problem with system instability.

    2xsaiko, in Is this a good network setup?
    @2xsaiko@discuss.tchncs.de avatar

    have a Turris Omnia as my wireless access point.

    Why? Don’t get me wrong, I have an Omnia as well and think it’s awesome, but I use it as an all-in-one router, as a pure wireless access point I’m sure you could get something less expensive.

    sic_semper_tyrannis, in What is your favorite cybersecurity tool and why?

    Ublock Origin as ads have lots of malware these days and browsing the internet is a normal occurance. I think looking at it that way it gets used far more than any other tool.

    netchami, in Thoughts on shizuku?

    Shizuku uses adb to grant apps elevated privileges, which unnecessarily increases attack surface. For security reasons, I would not use it.

    chemicalwonka, in What is your favorite cybersecurity tool and why?
    @chemicalwonka@discuss.tchncs.de avatar

    Brave is far from being a cybersecurity tool

    My favorites tools in this image is Aegis and Signal

    Zoidberg,

    I have to say my faith in signal has been shattered since I got crosstalk on a signal conversation. I still can’t imagine how that’s possible but it was there, clear as day.

    chemicalwonka,
    @chemicalwonka@discuss.tchncs.de avatar

    Explain more I didn’t undestand you.

    kadotux,

    Please elaborate?

    kugiyasan, in What is your favorite cybersecurity tool and why?

    Why is Obsidian on the list?? How is a closed source electron app for editing markdown files a good cybersecurity tool/privacy respecting? I could use nano to do the same job with much more confidence for my privacy.

    thesmokingman,

    I’m not sure I follow the closed source bit. For example, Virus Total is closed source but a something used by cybersecurity professionals across the world. Most of the software that powers cloud giants is closed source and security professionals everywhere accept the shared security model.

    Closed source matters for encryption, not necessarily tooling. It’s a red herring unless you’re talking about a tool’s ability to encrypt/decrypt.

    online,

    Tbh I don’t think that’s a list. I think that’s just their website’s graphic banner thing and they slapped it on.

    mqvisionary, in What is your favorite cybersecurity tool and why?

    Joplin, a note taking app… and is that obsidian icon under it? The picture is so dumb.

    trash80, in AirVPN discloses server seized in 2015

    This is a “I’ve got bad news and I’ve got good news” type thing, right?

    OsrsNeedsF2P,

    Yea. Seems odd they didn’t make a blog post, but seems like the situation was handled quite well.

    AProfessional, in AirVPN discloses server seized in 2015

    Such a strange comment.

    Surely they kept it private because it’s bad for business. Then they randomly respond with this on a forum post?

    crawley,

    I dunno, if my VPN came out and said “heads up, one of our servers was seized and you have literally nothing to worry about because nothing is stored or logged on our servers,” that’s good news IMO. Obviously the best case scenario is not having it seized, but sometimes that’s not possible, and it’s a mark of a good VPN when the consequences to you of a server being seized are the same as if it wasn’t (i.e., none).

    AProfessional,

    I agree, if they said this 7 years ago…

    Imprint9816,

    Yeah disclosure is always good its just odd the way they handled it

    -no official post (yet)

    -makes the announcement as a reply to a forum post even though they have a specific forum thread for this exact thing

    -all of a sudden has a 7 year wait time on disclosures policy

    -not written very professionally (i tend to assume english is a 2nd language for the staff but still as an orginization the staff should be a bit more refined).

    I’m a user of airvpn. I like them but they do odd things like this, or being very obtuse about why they wont get audited.

    stillwater,

    It probably wasn’t their timeline. Seven years is standard for gov record retention in Ontario.

    Imprint9816,

    Yeah the whole thing is odd, especially since they disclosed it as a response instead of in the disclosure thread the first comment mentioned.

    thesmokingman, in What is your favorite cybersecurity tool and why?

    I’m not really seeing much in the way of cybersecurity tools in this thread. These are all FOSS and usable without extra cost (although some have paid upgrades)

    SkybreakerEngineer, in What is your favorite cybersecurity tool and why?

    My favorite cybersecurity tool is the clue-by-four. I apply it directly to Layer 8 problems.

    Enkrod,

    I see you know how to deal with ID-10t errors.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacyguides@lemmy.one
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #