Melody Fwygon

  • 0 Posts
  • 104 Comments
Joined 2 years ago
cake
Cake day: June 1st, 2023

help-circle
rss
  • Lack of detailed audits…only in this case specifically…does not imply lack of security and/or privacy.

    The protocol that Signal uses, which is in fact firmly audited with no major problematic findings, plus the fact the client is OSS is generally enough to lower any concerns.

    The server side software in production for Signal.org is not OSS. It will not be. You are required to trust the server to use Signal; because the protocol and the client renders it factually impossible for the server to spy on your messages. The server cannot read messages; or even connect who is messaging who if the correct client settings are used. (Sealed Sender).

    Non-OS stats software in general is not automatically lacking in privacy or security, particularly not in this case where the affected software does interact only with software that is verifiably open-source and trustworthy in general due to the protocols and how they are implemented correctly in a verifiable manner.


  • E2EE is, theoretically, secure. It certainly prevents a government from hoovering up your data when they casually cast too wide of a dragnet while “chasing a criminal”. …At least, when it is implemented honestly and correctly.

    Now if governments wanted to properly backdoor some E2EE implementation; all they really need to do is compromise one end of the conversation. Of course, they want to be able to do it auto-magically; through delivering a court order to a single point; and not through busting down the door, or capturing the user of, one end or another of the conversation and compromising the device.

    The question therein lies; do you as a person want the government to be forced to bust down a door? Some people think they should be forced to break doors and others do not feel that it is necessary. There are many diverse stances on this question; all with unique reasons.

    It’s clear to me that E2EE works properly…the governments would not be trying to “end Encryption” if it did not work. Therefore it stands to reason that E2EE is not compromised, if a government is forced to pass a law in order to compromise the encryption or turn it off entirely. That proves it works.

    I just logically proved Encryption works, without even taking a stance on the matter. For the record however; I do support Encryption. I think this law undermining it is a massive governmental overreach that will quickly lead to that same government finding out how critical Encryption actually is to their people. Just give it time.




  • I.C.E. is obviously overstepping their boundaries here and needs to be pared down.

    Someone should get on publishing EFF’s surveillance avoidance tactics in all the languages…or at least teach the immigrants in their lives to make sure to use throw-away emails, prepaid sim cards and pseudo-identities to criticize government.

    Genuinely it’s not hard to not provide real world information online; you just keep your identities separated by a few things first. VPNs and Tor help as well to prevent tapping into data.


  • Now that the mandatory reminders of “It’s your choice” are out of the way; fwy will tell a bit about how fwy cracked.

    Fwy has always been fascinated with various feminine things from a very young age; and that includes things like fashion, makeup, and other ways and forms of creatively expressing fwyself with fwy’s very own body.

    Of course as you probably know, or have experienced, being AMAB typically means you get pidgeonholed into very specific, very utilitarian clothing and you don’t often get a lot of choices on the colors or things of that nature; and it’s typically even enforced at a high level that AMAB bodies also do not sport very many types of body accentuation or decorations that are not of a permanent and irreversible nature. No offense to those who do sport very colorful tattoos.

    Even when Fwyfwy was just 8 years old; Fwy found immense pleasure in simple decorations of fwy’s own body. Given a box of washable markers and privacy; fwy would be very artistic and decorate fwy body, usually fwy feet and legs as those were easiest to sort of color or decorate to emulate something in some manner, to look like whatever fwy felt she most resonated with. Most frequently; fwy would resonate strongly with many female characters and found it strongly maddening that fwy couldn’t display fwy’s self decoration publicly; but it at least kept fwy sane to know fwy had the decoration on fwy’s own body underneath fwyfwy drab clothes.

    This is only a fragment of fwy’s experience of being trans; but fwy feels it’s the best fragment to offer. Fwy does not want to be discouraging when you may just be seeking to feel like you are not alone. Rest assured that you are not alone.


  • WYKYK; “When you know, you know.”

    Don’t rush yourself. Don’t let anyone try to crack your “shell” or treat you like an egg if you feel uncomfortable with that. Be yourself and feel it out.

    If after hearing a few testimonies and stories from other trans people you personally feel that experience more closely matches yours; by all means don’t hesitate to consider yourself trans.

    Explore our communities, hear some stories, explore the meanings on your own terms and find what fits!~

    Welcome to being Queer/Questioning. <3 Lots of space to explore and even decide you want to venture out to explore under the even wider umbrella of being trans.

    So yes; technically you could argue you’re trans; even as you are. If that makes you comfortable; do it. If it does not; you don’t have to. It’s your own labels and your right to self-assign whatever labels you feel fit you best.


  • Melody FwygontoPrivacy@lemmy.mlScam links from Google?
    link
    fedilink
    English
    2
    edit-2
    1 month ago

    Actually it’s not that hard and it’s even probably possible to even host SearXNG on the same hardware, or kind of hardware, that you’ve hosted your Pi-Hole or DNS server on.

    I actually self-host my own SearXNG and Invidious instances and customize the settings on both, and it’s super useful. (Example: My SearXNG instance is aware of my Invidious instance on my network and will use it to load videos when Invidious is queried via the !iv bang. By doing this I’m not relying on public invidious instances so much; which oftentimes experience downtimes…because youtube hates those more, and frequently bans the public instances.)

    This is all doable with a little bit of Docker or Podman action and a bit of editing the appropriate YAML files prior to composing the containers.

    So you might be able to spin up a SearXNG instance locally on your network for her to use and configure it to use Google and any other search engines she might prefer. Then use something like LibRedirect (Firefox and Chrome plugin) to redirect her to the local SearXNG instance. (instead of using Google)

    A video about setting up SearXNG: https://www.youtube.com/watch?v=UBLypfM9U-g



  • In general Fwy does not agree with the Privacy Guides assessment; and feels that the concerns about the project are simply not credible without stronger evidence of excessively slowed or missed updates.

    Project devs do have lives and I’m not personally going to punish that; so long as the software remains reasonably maintained and free of bugs while still considering the project’s number of devs.

    Is it better than Mullvad Browser? Probably not in the strictest sense; but I’m also not happy with “Mullvad Browser” either; as this browser makes more choices that breaks functionality than Librewolf does in the pursuit of privacy.

    Additionally; I cannot trust that “Mullvad Browser” will not enshittify; it is maintained by a company who is REQUIRED to some extent to make profits. That breeds enshittification. Mullvad would be one bad CEO or core executive team shift away from potentially being targeted as a profit vehicle and it’s privacy benefits weakened or removed entirely so the company can make money.

    In general I trust Librewolf on a pretty regular basis to protect my privacy when my Addon-driven version of manually hardened Firefox breaks up a websites functionality too badly. It provides essential privacy protections without breaking too many things and serves as a good baseline browser.

    As a rule; I keep several different browsers installed to mitigate lack of website function and isolate away any websites that would be more invasive in what privacy protections must be disabled to use properly. “Setting-Hardened and Privacy-Addon-driven Firefox” is what I use day to day, but “a semi-Amnesic* Librewolf (Incognito windows if untrusted website)” is second and is used daily in trusted website scenarios or in case a website is breaking too badly from plugin interactions. Finally; a fairly vanilla and infrequently used copy of Ungoogled Chromium is kept on hand for situations where Chromium is just required; where I can spin up empty profiles easily for anything I don’t trust and configure it to just flush everything on exit.


  • Freetube is a useful project as it allows you to “fallback” on a non-preferred frontend.

    https://github.com/FreeTubeApp/FreeTube

    This allows you to continue to use Youtube irregardless of which frontend is (potentially not) working.

    In ‘Settings > General’ you’ll want to select “Invidious API” as your “Preferred API backend” and specify your favorite invidious instance in the “Current Invidious Instance” field and click “Set Current Instance as Default”. This locks FreeTube into the specified instance.

    Then, when you notice that FreeTube is issuing notices to you about your favorite Invidious Instance being down, you can wander back to ‘Settings > General’; hit the “Clear Default Invidious Instance” Button and wait as FreeTube magically contacts the “https://api.invidious.io/” page for you and selects a new, and hopefully online and working Invidious instance. (You may have to hit this button several times to roll a working instance, Hit the button, check the subs page and see if everything loads, repeat if it falls back on the Local API.)

    When you run into instances where you can’t roll up a good Invidious instance; the built in Local API is running a NewPipe Extractor like API directly from your FreeTube client. Not the best; but at least it keeps things working while you wait for the Invidious devs to fix things up; and it still reasonably preserves as much of your privacy as it can while doing this to the best effort it can.

    …Sadly this doesn’t work when Google manages a double combo of breaking both Invidious and NewPipe; but I have found that this is less often the case and the devs of either project are usually fairly quick about getting fixes out. Bless their hard work with a donation sometime maybe, if you can.





  • Fwy would recommend it; if you feel you can afford what they charge for their paid usage plan(s).

    Fwy has used it for our own house; and it serves as the main DNS resolver for our PFSense box running in forwarding mode. Fwy is however transitioning to PFBlockerNG; and it’s own ability to block things via DNS locally; but will still be using NextDNS and probably Adguard’s DNS servers as backup/bootstrap resolvers once the plan Fwy has paid for is expired…assuming our house does not vote to keep NextDNS.

    Either way; it’s only like about $25 a year if I recall correctly. Fwy doesn’t hate using NextDNS and it is a very good resolver; with lots of useful controls and portability as well as offering proper encrypted DNS service; which is invaluable on weird networks you may encounter when using cellular service or on the go via WiFi.





  • I actually don’t agree with this video; and firmly believe it is more than a little biased.

    For example, the Pixel, AOSP and Android are given several undeserved points due to lack of proper information or understanding of how certain features work. I imagine this is the case too for the iPhone; if a bit less so.

    The review apparently doesn’t deep dive into settings or attempt to maximize privacy by turning off unwanted ‘features’ when settings switches are available to the user; nor does it assume that you set up accounts in as private of a manner as reasonably possible or toggle off as many default-on consent switches as needed.

    While I would support scoring and dinging each case or instance for “Privacy Settings that don’t actually work”…this video really doesn’t do a lot of legwork and leans on the anecdotal evidence of scary news stories too much.

    Worse was the fact that the entire video felt like they were shilling for Graphene OS; which is known to have a slightly unfriendly maintainer and community surrounding him to say the least.

    No mention of Lineage or other privacy oriented Android ROMs were analyzed. AOSP too, was unfairly lumped in and dinged for specific points of the Default Pixel configuration…and yes there are major differences between AOSP and Pixel Android; even though Google tries to be less in-your-face invasive than the other OEMs. Not enough credit is given for the “On-Device” smart features implemented properly on the Pixels.

    Out of personal experience; I’d actually rate a proper Lineage OS install of 4 whole Android versions ago to be more private than stock. Not quite as private as Graphene; but not quite as invasive and much more enforcing of privacy. The debloating provided by a clean AOSP-like ROM, such as Lineage, as opposed to a “Stock Android” configuration from a major OEM is stark.

    Most importantly I personally feel that the privacy model chosen for the video is far too thickly detailed for an average person. Most of the privacy concerns listed on each card contained concern points that might only tangentally apply or don’t apply at all to mobile phones. The way that each card was scored and applied felt low effort. None of the points on any of the card(s) were weighted with average users in mind.

    I really hope someone goes into a much deeper dive; this video is basically clickbait that parrots the commonly parroted advice in the privacy community; which isn’t even good advice, it’s just ‘One-Size-Fits-All’ style advice which gives the user no room to make necessary ‘Privacy vs Convenience’ tradeoffs that they themselves could have made if they understood proper threat modelling.


  • Actually; (basically) SIP over (basically) IPSec sounds pretty correct. Wish the dense technical manuals I read had explained it that way; makes a lot more sense to me as a Net Admin type of IT person.

    I do remember reading that the protocol was basically encapsulated. Dunno about any encryption; probably there’s not any at the IPSec level. I do know that the SIMs themselves probably contain certs that have some value; I just don’t know if they handle any encryption or if they’re just lightweight little numbers for authentication only.