• 11 Posts
Joined 3 anni fa
Cake day: giu 07, 2020


I will distrust CIA sponsored fact checkers. A lot of mainstream bullshit is cut down here.

If they really care about security, they should ban and dissolve all social media companies entirely. Otherwise this is just xenophobic targeting of non-Anglosphere and/or Chinese companies, like Huawei and ZTE in the past.

See, this is precisely why people like you deserve to be called wordsmith weasels.

When will Czech and Denmark (puppets of USA) declare such warnings against Google, Apple, Facebook, Instagram, Amazon and Microsoft? Spoiler: they will never dare to, because national security is basically excuse for curbing democratic freedoms of citizens they so love to honk and scream about.

Heard of “freedom of navigation” terrorism that USA Navy loves?

Got any shred of evidence that Huawei ever spied on people?

USA is undefeated since 1970s when CIA global surveillance programs started ramping up. And the global Skynet is 5/9/14 Eyes plus Israel and Japan.

I guess westerners eternally rely on a circular logic loop of projection-based trolling on international level, since that is their only talent. They and their countries are rotten useless mess destined to be like this forever, like hopeless daydreaming romantic hippies smoking weed on streets.

Energized GitHub has been unmaintained since few months, and is showing 404 error on HOSTS files. Here is a copy of Energized Ultimate HOSTS file, and alternative HOSTS ruleset providers to consider.
cross-posted from: https://lemmy.ml/post/830873 > The HOSTS ruleset has been not maintained for a while, and that is not very helpful. This is a copy of Energized Ultimate from April 2022 that I am still using just fine. https://www21.zippyshare.com/v/qRxZ0lp9/file.html > > The various lists that Energized project used in combination can still be referenced. https://i.imgur.com/yZRDVAl.jpg > > I think **1Hosts PRO** is a good replacement, but try Lite or Pro whichever you prefer. https://github.com/badmojr/1Hosts You may try combining other HOSTS lists with this if you want to, and are technically adept enough. > > Another good option is **AdAway**, but you might need to combine other lists with it to have competent blocking compared to Energized. > > You also need to reference, download and merge spam and phishing lists manually if you want extra protection, unless you want to rely solely on DNS providers. I prefer having both HOSTS ruleset systemwide and a DNS provider, then whatever network firewalling/tunnelling is needed.

yt-dlp (command line, for all OSes)

Also, on Windows you can use IDM’s video grabber (get IDM from LRepacks.net, safe site) which works very conveniently with websites that require sign-in/cookies, and on Linux that would be XDM + VideoDownload Helper addon in browser.

Since Ubuntu 18.04 (now 22.04) I have kept trying and forcing myself to try and use Wayland. Nope. Wayland is not ready yet. Still on X.

I like the featureset of AnySoftKeyboard way too much. It even managed to replace swipe typing for me. Stock GrapheneOS keyboard is just rebranded stock AOSP keyboard, pretty basic and lacking.

I want to share my snippet of thought on this AI chat assistant phenomenon. We should stay away from empowering any of these corporation models with our data and input, and exclusively choose to empower open community models. OpenAI CEO recently making a statement about how he is dismantling capitalism, as a corporation, smelled too foul to me.

4pda? Great, however it is Russian only.

FileCR, Apk4all, Apk4fun, onhax

Go to Telegram APK channels and try to notice the names of crackers/scene groups/creators on APK, and use that to find good scene cracker sources.

Well… seriously, go and read those archived r/linux and HN comments. This fellow here is pretty well known in privacy community to be basically someone who shits on Linux and praises Windows and MacOS security. This person and Brad Spengler were the ones to begin this trend of Big Tech “security” apologia in privacy community, which has become a disease with GrapheneOS on the mobile side of things now.

These specimens/entities coincidentally praise the security of Windows, MacOS, Google Pixel, Apple Secure Enclave, while calling Linux and FOSS projects horrible nightmare all the time, consistently. Moreover, they also coincidentally happen to call PRISM Snowden and Assange revelations irrelevant jokes (see https://web.archive.org/web/20220418214232/https://old.reddit.com/r/privacy/comments/iox6rq/should_i_get_an_iphone_if_i_value_privacy/ or https://i.imgur.com/xcryYvM.jpg).

There is a lot to it, and its hard to form a gist of it other than these entities being extremely dangerous to and being the equivalent of termites to privacy community, everywhere one exists.

Tor has completely broken application on Brave, and leaks a lot of information.

Be grateful for the transparency I portray, and for presenting what people otherwise would never have known. Even I see it as a bit cringey, but I was neck deep into privacy community back then, and you have to use certain lingo to mesh with that crowd.

If I told you madaidan used to (probably still moderates) NSFW subreddits years ago, you would be shell shocked.

GrapheneOS is a custom Android fork with largely no security enhancements, besides UX rework and copypasting other security projects. They sell snake oil in the name of prestigious glory that FLOSS label carries.


Its lead developer (who became irrelevant in society) and his acolytes believe in purposely creating insane amounts of toxicity and drama to remain relevant in the privacy community. They baselessly label everyone with political epithets to defame everyone, and then scream “defamation” when a counter argument is presented to their manufactured position.

The long comment by official GrapheneOS account should be here: https://web.archive.org/web/20220502064114/https://old.reddit.com/r/PrivacyGuides/comments/uged1y/is_grapheneos_actually_good_or_just_hype/

Recently someone informed me of them creating drama with Bromite (on which their Vanadium browser is based) and FlorisBoard projects. They labelled those project maintainers with very bad, false epithets.




I had the opportunity to elaborate on the entire feature list of GrapheneOS, as per their website, last year. Look here. https://i.imgur.com/pQHoq84.jpg

There are only 3 things they ever did on their own as extras, and even they have basically no value in the grand scheme of things, them being offering:

  • instead of 16 character, 64 character password limit on lockscreen
  • PIN scrambling
  • Morula method of exec spawning instead of Zygote method used in most AOSP projects

Now, I will elaborate on these 3.

  • Elaborating on first one, it is kind of useless as you can see for obvious reasons.
  • For second one, you already understand why fingerprint avoids the issue of someone peeping at your PIN/password entered across your shoulder. Fingerprint is infinitely superior. Even more so with Android and iOS both offering biometric Lockdown features.
  • This one is somewhat half credible, but the goal is to destroy the memory blocks used by an app after it is exited, so that memory blocks do not retain essential text strings of data to exploit. For this, you can just go to Developer Options and enable “Don’t keep activities” and it will achieve the same effect as Morula method of exec spawning implemented by GrapheneOS.

So out of the 20-30 features GrapheneOS claims they developed, everything is either a modification of app permissions or firewalling or AOSP feature rebranding.

Also, as you may have famously heard about “Sandboxed Play Services”, it is not developed by GrapheneOS, but a project called ProtonAOSP, whose developer is kdrag0n. GrapheneOS copied that off and rebranded it as their own developed thing.

Recently someone informed me of them creating drama with Bromite (on which their Vanadium browser is based) and FlorisBoard projects. They labelled those project maintainers with very bad, false epithets.




Brave is basically just for people too dumb to install uBlock Origin on Firefox, and who desire a worse experience with the fickle greed of BAT garbage.

Let me provide you a little more on the subject.



Tweet linked in above hysteric post https://web.archive.org/web/20200812145114/https://nitter.net/MichalPurzynski/status/1293220570885062657

The job of madaidan/Spengler/GrapheneOS church is to hate and destroy FLOSS projects that condemn their actions or do not fall in line with them, and even attempt witch hunts on people that criticise them. I was a victim of it last year, as they hijacked the Matrix room of this very community (which I was unable to save since admins did not listen to me) and attempted to create fabricate projection lies against me because I moderate this place. https://archive.ph/acy2h

No, he is just another victim of madaidan/Spengler/GrapheneOS church propaganda.

One of the best… you mean toilet papers of the internet, repeatedly trashed by r/linux and HN users?




madaidan is an admin of GrapheneOS, NoGoolag, SpiteChat communities/chatrooms across various platforms. The “insecurities” blog chap, notorious for a lot of misinformation in FOSS and Linux communities but opposite in a big chunk of mainstream privacy community. A staple of the “redditor hackerman” starterpack, for people who know nothing better.

He knows literally nothing and has proven his credentials https://i.imgur.com/UHhQRIU.jpg and https://i.imgur.com/FiYhbkk.jpg, among many other places.

BAT is Brave Attention Token, a form of crypto exclusive and locked into Brave. Its like a little crypto mining scam.

Brave Browser is funded by DoD: https://np.reddit.com/r/privatelife/comments/fe34ls/exclusive_brave_browser_funded_by_dod_contractor/

Brave traffic detected with Cryptocompare despite BAT rewards disabled: https://unddit.com/r/privacytoolsIO/comments/gr8nue/ (removeddit no longer works, use unddit)

Brave also has a known history of whitelisting Facebook and Twitter trackers, and has a crippled adblocker that does not work on Brave’s “acceptable” advertisements.

Brave Browser hardcoded their crypto partner Binance referral links (https://twitter.com/cryptonator1337/status/1269201480105578496) alongwith Ledger and soon-to-be-compromised Coinbase (https://decrypt.co/31461/coinbase-wants-to-identify-bitcoin-users-for-dea-irs)

Also some new stuff you might want to check.



Well, Braxman is not really about the useless services he offers. His commentary on privacy is fine, and there are a lot more scams like GrapheneOS that people need to worry about.

Because I wanted to democratise privacy for masses by giving them 97-100% benefit of “elitist” setups.

Also I must destroy the elitists, pretend experts and privacy circus that goes on in the community. They exist to harm FLOSS movement, use the prestigious label to masquerade as sheeps and harass and datamine privacy users by gaining trust.

It was always a lie to fool everyone thinking GrapheneOS is in the same race as XDA, Braxman and individual reflashed Pixel sellers, trying to capitalise on privacy market by selling a phone.

It was always a lie to fool everyone thinking GrapheneOS is in the same race as XDA, Braxman and individual reflashed Pixel sellers, trying to capitalise on privacy market by selling a phone.

The Z in czf stands for ze

ze ze ze ze ze… (very sorry, I need a ban for this)

I wholly support this and would have done the same in their place, before AI art gets out of control.

That moment when even Taiwan sees USA as a threat to its future…

I stick to ProtonMail. It is the most mainstream one that also does things that Gmail and Outlook do not do, and has well polished service.

Thread is locked due to unnecessary back and forth comments.

If you believe DMCAs ever got successfully enforced on wild west internet, I have a little whisper secret to share with you about digital piracy.

All that I do these days is get the 160kbps OPUS files from YouTube. I am getting old and tired, but must look into this matter ASAP.

loathsome and moist, is it time for me to finally look into Soulseek?

Xiaomi lacks the patents and uses Qualcomm Snapdragon hardware. This is the same reason Honor will remain unaffected similar to Xiaomi. The goal was to destroy 5G patent pool of Huawei and prevent people from buying mainstream phones devoid of NSA backdoors.

The authors of node-ipc have pushed malware in an update, which wipes your disk if you happen to have Russian or Belorussian IP address. This affects some large projects [@bantg, Twitter]
Relevant reading: https://github.com/zlw9991/node-ipc-dependencies-list https://web.archive.org/web/20220318095406/https://github.com/RIAEvangelist/peacenotwar/issues/45 https://security.snyk.io/vuln/SNYK-JS-NODEIPC-2426370

What are easy to present criticisms of mainstream outlets like BBC and CNN?
While it is easy to use phrases like "use critical thinking", this is not easy for elders or cousins in families to be told, as this is not lucid to understand in a snap. It is essential for criticism to be easily communicable to ordinary people that watch Google Feed or MSN News daily, and I feel that such criticism is not even easy to access or read, considering ordinary people have been cornered from MSM, YouTube, Twitter, Facebook and rest of Big Tech and Western media apparatus. If you love your BBC and CNN feeds, avoid this post, this is not for you.

100% FOSS Smartphone Hardening non-root Guide 4.0
https://lemmy.ml/post/128667 Crosspost but the guide body is so long, I had to break it into 5 parts.

Smartphone Hardening non-root Guide 2.0 (for normal people)
(1/2) Lemmy does not allow too long post walls **UPDATED 16/8/2020: Major edit, replaced closed source App Ops and Shizuku with AppOpsX (Free Open source) on F-Droid. ~~This guide is nearly FOSS supported now.~~** **UPDATED 17/9/2020: MAJOR EDIT, replaced closed source Access Dots with Privacy Indicator (FOSS) on Izzy's F-Droid repo. This guide is completely FOSS.** Hello! I am the founder of /r/privatelife . Finally my smartphone non root guide is back, and there are some big upgrades. I was taking time to test everything myself on my daily driver, so apologies for keeping everyone in the wait, but stability and ease of use is the important goal to strive in my playbook. Privacy must be accessible to maximum amount of people without being annoying or tedious. **A kind request to share this guide to any privacy seeker.** #User and device requirement * ANY Android 9+ device * knowledge of how to copy-paste commands in Linux or Mac Terminal/MS-DOS Command Prompt (for ADB, it is very simple, trust me) #Why not Apple devices? iPhone [does not allow you to have privacy](https://gist.github.com/iosecure/357e724811fe04167332ef54e736670d) due to its blackbox nature, and is simply a false marketing assurance by Apple to you. Recently, an unpatchable hardware flaw was [discovered](https://9to5mac.com/2020/08/01/new-unpatchable-exploit-allegedly-found-on-apples-secure-enclave-chip-heres-what-it-could-mean/) in Apple's T1 and T2 "security" chips, rendering Apple devices critically vulnerable. 17/9/2020: [Apple gave the FBI access to the iCloud account of a protester **accused** of setting police cars on fire](https://www.businessinsider.com/apple-fbi-icloud-investigation-seattle-protester-arson-2020-9). Also, [they recently dropped plan for encrypting iCloud backups after FBI complained](https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT). They also collect and sell data [quite a lot](https://i.imgur.com/n8Bk0bA.jpg). Siri still records conversations 9 months after Apple [promised not](https://www.theregister.co.uk/2020/05/20/apple_siri_transcriptions/) to do it. Apple Mail app is vulnerable, yet Apple stays in [denial](https://9to5mac.com/2020/04/27/iphone-mail-vulnerabilities-2/). Also, [Apple sells certificates to third-party developers that allow them to track users](https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/), [The San Ferdandino shooter publicity stunt was completely fraudulent](https://www.aclu.org/blog/privacy-technology/internet-privacy/one-fbis-major-claims-iphone-case-fraudulent), and [Louis Rossmann dismantled Apple's PR stunt "repair program"](https://invidio.us/watch?v=rwgpTDluufY). Also, Android's open source nature is starting to pay off in the long run. Apple 0-day exploits are far [cheaper](https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/) to do than Android. ----- #LET'S GO!!! **ALL users must follow these steps before "for nerdy users" section.** **Firstly, if your device is filled to the brim or used for long time, I recommend backing up your data and factory resetting for clean slate start.** * **Sign out all your** Google and Huawei/Samsung/other phonemaker **accounts** from your device so that Settings-->Accounts do not show any sign-ins **except WhatsApp/Telegram** * Install ADB on your Linux, Windows or Mac OS machine, simple guide: https://www.xda-developers.com/install-adb-windows-macos-linux/ * Use ["Universal Android Debloater"](https://gitlab.com/W1nst0n/universal-android-debloater) to easily debloat your bloated phone. NOTE: Samsung users will lose Samsung Pay, as Samsung has been caught and declares they sell this data: https://www.sammobile.com/news/samsung-pay-new-privacy-policy-your-data-sold/ * **Make DIY camera covers**, for front camera notch use a tiny appropriate-sized thin opaque plastic cutout and use an invisible tape to stick it in place, replace every month (cost: tape roll and one minute of your time per month). [**My rear camera cover**](https://i.postimg.cc/T37Qvc52/image.jpg) * Install **F-Droid app store** from [here](https://f-droid.org/en/) * Install **NetGuard** app firewall (see NOTE) from F-Droid and set it up with [privacy based DNS like Uncensored DNS or Tenta DNS or AdGuard DNS] NOTE: NetGuard with [Energized Ultimate](https://block.energized.pro/ultimate/formats/hosts.txt) HOSTS file with any one of the above mentioned DNS providers is the ultimate solution. NOTE: Set DNS provider address in Settings -> Advanced settings --> VPN IPv4, IPv6 and DNS * In F-Droid store, open Repositories via the 3 dot menu on top right and add the following links below: 1. https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo?fingerprint=8F992BBBA0340EFE6299C7A410B36D9C8889114CA6C58013C3587CDA411B4AED 2. https://apt.izzysoft.de/fdroid/repo?fingerprint=3BF0D6ABFEAE2F401707B6D966BE743BF0EEE49C2561B9BA39073711F628937A 3. https://guardianproject.info/fdroid/repo?fingerprint=B7C2EEFD8DAC7806AF67DFCD92EB18126BC08312A7F2D6F3862E46013C7A6135 Go back to F-Droid store home screen, and hit the update button beside the 3 dot menu. ----- ###LIST OF APPS TO GET * Get **Firefox Preview** web browser from F-Droid (install uBlock Origin addon inside ([if technically advanced, try doing this](https://github.com/gorhill/uBlock/wiki/Blocking-mode:-medium-mode))). Also get **Firefox Klar** if you like a separate incognito browser. * Get **Aurora Store** from F-Droid for apps from Play Store without actually using Play Store, use Anonymous option to sign in * for 3rd party APKs source them only from **APKMirror** OR **APKPure** OR **APKMonk**, quite trusted, BUT **TRY AND AVOID IT IF POSSIBLE** * Get **Privacy Indicator** from F-Droid for **iOS 14 like camera/mic dot indicator feature** * Get **OSMAnd+** from F-Droid or **Qwant Maps inside web browser** for maps and/or print physical maps if you live and travel in one or two states or districts. NOTE: Qwant Maps has better search results than OSMAnd+ * Get **PilferShush Jammer** from F-Droid to block microphone (use this in malls, restaurants or such public places if you can to prevent beacon tracking) * Get **OpenBoard** (user friendly) OR **AnySoftKeyboard** (nerd friendly) from F-Droid instead of Google GBoard, Microsoft SwiftKey et al, they are closed source keylogger USA spyware * Get **FTP Server (Free)** from F-Droid and **FileZilla on computer** for computer-to-phone internet less file sharing NOTE: for phone-computer sync or sharing, can TRY **KDE Connect**, available for Android, Windows, Linux * Get **TrebleShot** instead of SHAREIt for phone to phone file sharing * Get **K-9 Mail** or **FairEmail** as e-mail client * Get **NewPipe** for YouTube watching, or YouTube in Firefox Preview/Klar * Get **QKSMS** from F-Droid as SMS client app * Get **Shelter** from F-Droid to sandbox potential apps that you must use (eg WhatsApp or Discord or Signal) * Get **SuperFreezZ** from F-Droid to freeze any apps from running in background * Get **Librera Pro** from F-Droid for PDF reader * Get **ImgurViewer** from F-Droid for opening reddit/imgur/other image links without invasive tracking * Get **InstaGrabber** from F-Droid for opening Instagram profiles or pictures without invasive tracking (seems like a revived fork is [here](https://github.com/austinhuang0131/instagrabber/releases), thanks u/sad_plan ) * Get **GreenTooth** from F-Droid to set Bluetooth to disable after you have used it * Get **Material Files** or **Simple File Manager** from F-Droid for file manager app * Get **ImagePipe** from F-Droid if you share lot of pictures, and want to clear EXIF metadata snooping (often photos contain phone model, location, time, date) * Get **Note Crypt Pro** from F-Droid for encrypted note taking app * Get **Vinyl Music Player** from F-Droid for music player * Get **VLC** from F-Droid for video player ----- ###CRITICAL FOR CLIPBOARD, LOCATION AND OTHER APP FUNCTION BLOCKING I would say this is one of the critical improvements in my guide, and will solve the problem of clipboard and coarse location snooping among other things. AppOpsX is a free, open source app that allows to manage granular app permissions not visible normally, with the help of ADB authorisation without root. This app can finely control what granular information apps can access on your phone, which is not shown in app permissions regularly accessible to us. Now that you would have set up your phone with installing apps, now is a good time to perform this procedure. Step 1: Install **AppOpsX** from F-Droid. (https://f-droid.org/en/packages/com.zzzmode.appopsx/) Step 2: Plug phone to computer, and enable USB debugging in Settings --> Developer Options (you probably already did this in the starting of the guide) Step 3: Keep phone plugged into computer until the end of this procedure! Open AppOpsX app. Step 4: On computer, type commands in order: ```adb devices``` ```adb tcpip 5555``` ```adb shell sh /sdcard/Android/data/com.zzzmode.appopsx/opsx.sh &``` Step 5: Now open "AppOpsX" app, and: * disable "read clipboard" for apps except your messengers, notepad, office suite, virtual keyboard, clipboard monitor apps et al. NOTE: Most apps that have text field to copy/paste text require this permission. * disable "modify clipboard" for every app except for your virtual keyboard or office suite app or clipboard monitor/stack special apps. * disable "GPS", "precise location", "approximate location" and "coarse location" for every app except your maps app (Firefox and OSMAnd+) (2/2) in comment below.