you can still use a yubikey or even a password manager like keepassxc with passkeys, no need for any google/apple or even secure enclave.
programmer interested in privacy/security. Mostly Go and Python
you can still use a yubikey or even a password manager like keepassxc with passkeys, no need for any google/apple or even secure enclave.
it was always free for me but i think i was early enough of an adopter to be grandfathered in on some old setup
cock.li but it doesn’t encrypt your inbox so keep that in mind.
At least on my phone, rebooting also makes it require PIN
For those who don’t remember, not only could signal be used for SMS, it used to be able to do encrypted sms convos.
The main benefit is since it is locally installed, it is harder for proton’s server to access your encrypted data by serving you malicious JS. A malicious desktop app/update could be served too, but that may be trickier.
It usually isn’t super hard to tell apart randomized junk like this from real human patterns. That is why Tor Browser for example tries its best to make everyone look the same instead of randomizing everything.
That said, for the mere purpose of throwing off the ISPs profiling algorithms, you could make a relatively simple python program to solve this. A naive solution would just do an http GET to each site, but a better solution would mimic human web browsing:
If you have no programming capability this will be rough. If you have at least a little you can follow tutorials and use an LLM to help you.
The main issue with this goal is that it isn’t possible to tell how advanced your ISP’s profiling is, so you have no way to know if your solution is effective.
Feel free to DM me if you go this route.
You can make actual docker compose
use podman by running a user podman docker socket and setting that as an environment variable (export DOCKER_HOST=unix:///run/user/$UID/podman/podman.sock)
https://brandonrozek.com/blog/rootless-docker-compose-podman/
deleted by creator
Just because you can’t stop all the leaks in your plumbing doesn’t mean you shouldn’t fix the ones you can.
Its best to have some defence in depth. Ideally you would have a firewall on your network AND your local machine. If you are running a laptop definitely have a local firewall on that as you cannot trust random networks you connect to when out and about in the world.
firewalld is sufficient, i suggest learning its CLI as it is not super complicated. ufw is ok if you are allergic to command line.
I believe he does extend it to JavaScript however, so if he were required to run unfree javascript on a webpage relating to his treatment that could be a problem.
Unfortunately, its not clear if masks actually stop facial recognition. I think it helps, but not probably not as well as it did before covid.
I don’t think tar is actually hard, we are just in the time where we externalize more information into resources such as Google. Its the same reason why younger people don’t remember routes by name or cardinal direction as much anymore.
side note: $ tldr is much better than man for just getting common stuff done.
Yes and no. decentralization is great for a lot of reasons but it does come with downsides. I don’t know about you, but i convinced my family and friends to use and keep Signal for years now and i don’t think i would have had such luck with Matrix/Element, let alone a p2p app.
I’m glad decentralized options exist and think they deserve more funding and love, however.
deleted by creator
Depending on what you’re doing, Local LLM can help a bit. Like if i want a recipe for an apple pie i could use LLaMA-2 to find out even without an internet connection.
Not saying its a replacement for a search engine, i just think its worth mentioning.
(edit for grammar)
On one hand they are incentivized to not f-over their users. On the other hand, because you need a paid account it wouldn’t be as private as SearXNG-over-Tor or whatever.
technically there is a lot it could do, but it would not be a number 1 pick for any of it (even if you only have a $100 budget) so i agree, get rid of it.