Former FBI Director James Comey indicted on criminal charges
Former FBI Director James Comey indicted on criminal charges
"No one is above the law," Attorney General Pam Bondi wrote in a post on X as news of the indictment of James Comey broke.Kevin Breuninger (CNBC)
copymyjalopy likes this.
[Announcement] Major Endgame Changes in Patch 0.3.1 for Path of Exile 2
As you know, the improvements to the endgame are a big focus of our next 0.4.0 content update for Path of Exile 2. However, we realised that it might be better to introduce some of the mechanical changes to the endgame sooner than that. Next week, we are planning to release Patch 0.3.1 with major changes and improvements to the endgame. Watch the video below!
Video: Path of Exile 2: Major Endgame Changes
The video covers the broad strokes of the changes coming to the Endgame in 0.3.1, but there are other changes and details that will be important. Below we are covering some of the additional changes included in this patch.
Alchemy Orbs
With the introduction of tiered currency in 0.3.0, Alchemy Orbs became less valuable and had fewer uses. To give them more function and to smooth out the process of crafting your Maps, Alchemy Orbs can now be used on magic items. This will upgrade the magic item into a rare with 4 new random modifiers.
Towers and Tablets
As your tablets are now directly applied to your Maps, this means that you can now apply the content you desire to every single Map you run (assuming you have the tablet supply). However, the ceiling for the amount of content you can apply to a single Map has been lowered. Overall this results in a more streamlined and consistent experience, but in order to not have the ceiling come down too far, we've buffed the modifiers on Tablets. Generally the modifiers are approximately two to three times as powerful. Here's a few examples:
- Collector's now has a value of 10% to 30% increased Rarity of Items found in your Maps (from 7% to 10%)
- Teeming now has a value of 25% to 70% increased Magic Monsters (from 15% to 25%)
- of Strongboxes now has a value of 50% to 100% increased chance for your Maps to contain Strongboxes (from 30% to 50%)
We have also added a few new modifiers:
- of the Devoted - Area contains an additional Shrine
- of the Antiquarian - Area contains an additional Strongbox
- Crystallised - Area contains an additional Essence
- Exiled - Area is inhabited by 1 additional Rogue Exile
- Azmeri's - Area contains 1 additional Azmeri Spirit
- Summoner's - Area contains an additional Summoning Circle
- of the Summoning - Area has 25 to 50% increased chance to contain a Summoning Circle
And here's some other pieces of information to know about Tablets:
- Unique tablets have their own individual number of uses
- When using Tablets in the reforging bench, the resultant item will have the sum of the input tablets as its remaining number of uses. However this value cannot exceed the original maximum value
- When in an inventory like your personal one or a stash, the number of uses remaining on each Tablet can be seen on the bottom right of its icon
- Existing Tablets that have been applied to your Atlas will remain and you will not lose any value due to these changes
Map Size
Some Maps took considerably longer than others to navigate or complete, so we've reduced the size of the following Maps:
- Augury
- Bastille
- Blooming Field
- Channel
- Epitaph
- Fortress
- Grimhaven
- Hidden Grotto
- Oasis
- Penitentiary
- Rupture
- Savannah
- Slick
- Vaal City
- Wetlands
Atlas Trees
As a result of changes such as every Map now containing a Boss, we've had to make some modifications to the Atlas Tree. For example, the Crystal Realm notable on the Map Boss Tree, which previously added an additional Essence to areas containing a Map Boss, now only applies to areas with Powerful Map Bosses. Note this results in effectively no change; it is the same amount of Essences before and after.
In general the Map Boss Tree applies to all Map Bosses, with only a select few notables now specifically applying to Maps with Powerful Map Bosses. For example, the Fit for a King notable applies to all Map Bosses.
Additionally you'll notice a number of other nodes changing throughout the core Atlas Tree to account for mechanical changes around Towers. We've tried to make sure these are kept approximately the same before and afterwards, so your Atlas Trees will remain the same.
Citadels
Citadels have had their spawn rate increased by 66%.
Other Improvements
Modifiers that cause the area to be covered in Chilled/Shocking/Ignited Ground now cause much less ground to be covered. At least 66% of the ground effects currently covering the ground will be removed, this value is higher on lower tier Waystones.
We have fixed a few problems where Map Boss difficulty was not applying to many multi-form Bosses, so a few of the Maps with Deadly Map Bosses will now be more difficult as a result. It was always pretty odd that the second and third phases of some of these Bosses had ten-times less life than the first phase, this was an unintentional mistake.
Alongside the changes mentioned above, the patch contains various improvements and fixes to a plethora of issues. All the details will be covered in the full patch notes, which we'll post as soon as we can. Stay tuned!
Early Access Announcements - Major Endgame Changes in Patch 0.3.1 for Path of Exile 2 - Forum - Path of Exile
Path of Exile is a free online-only action RPG under development by Grinding Gear Games in New Zealand.Path of Exile
Neon takes down app after exposing users' phone numbers, call recordings, and transcripts
Call recording app Neon was one of the top-ranked iPhone apps, but was pulled offline after a security bug allowed any logged-in user to access the call recordings and transcripts of any other user.
like this
copymyjalopy e adhocfungus like this.
Hegseth abruptly summons top military commanders to a meeting in Virginia next week
WASHINGTON (AP) — Defense Secretary Pete Hegseth has summoned the military’s top officers — hundreds of generals and admirals — to a base in northern Virginia for a sudden meeting next week, according to three people familiar with the matter.
The directive did not offer a reason for the gathering Tuesday of senior commanders of the one-star rank or higher and their top advisers at the Marine Corps base in Quantico. The people, who described the move as unusual, were not authorized to publicly discuss the sensitive plans and spoke on condition of anonymity.
The Pentagon’s top spokesman, Sean Parnell, confirmed that Hegseth “will be addressing his senior military leaders early next week.”
Across the military, there are 800 generals and admirals of all ranks. Many command thousands of service members and are stationed across the world in more than a dozen countries and time zones.
The meeting, first reported by The Washington Post, comes on the heels of several unusual and unexplained actions that Hegseth has taken involving military leaders.
like this
copymyjalopy e adhocfungus like this.
Some questions about ssh and Overthewire:wargames
Hi there,
In my search to learn a bit more about Linux, i came across this website called "OverTheWire", which teaches basic and some advanced concepts over SSH. It seems like a fun and engaging way to learn.
However, as a bit of a paranoid beginner when it comes to Linux and networking, i find myself worrying about the potential dangers of connecting to an untrusted network.
So, my questions are:
- Does anyone have any experience with the website?
- In the hypothetical case that I open an SSH connection to a compromised network, could that expose me to attacks?
(Aside from obvious risks like downloading malicious files myself.) - Should I use a virtual machine (VM) for this?
I sincerely appreciate any responses. Thank you!
- I do not personally have experience with this website
- Connecting to an SSH server with an SSH client is much like connecting to a webserver with a webbrowser. It is theoretically possible for bad things to happen, but automatic ("zero click") attacks of any kind are difficult to pull off when the software is up to date. Most bad things that happen come from the user doing it themselves, like downloading and running untrusted programs, entering your password on a phishing site, etc.
- This is not necessary, given your host system is up to date.
Note that my answer to 2 is heavily oversimplified, but applies in this scenario of SSH to "OverTheWire".
So in summary, having software up to date and being aware of what you do, should in most cases be safe.
I was asking just in case there was some configuration i should do before connecting. With browsing i know that if i use something like firefox and ublock, i should be safe from most malware unless i screw up pretty bad.
I will probably research ssh a bit more, as how it works, but you put some fears away. Thank you again.
The main oversimplification is where browsers "just visit websites", SSH can be really powerful. You can send/receive files with scp, or even port forward with the right flags on ssh. If you stick to ssh user@host without extra flags, the only thing you're telling SSH to do is set up a text connection where your keyboard input gets sent, and some text is received (usually command output, like from a shell).
As long as you understand what you're asking SSH to do, there's little risk in connecting to a random server. If you scp a private document from your computer to another server, you've willingly sent it. If you ssh -R to port forward, you've initiated that. The server cannot simply tell your client to do anything it wants, you have to do this yourself.
firejail if you are on linux). Just for ssh, a very lightweight vm would cut it.
This is How Trump’s Monstrous Ballroom Will Dwarf White House
This is How Trump’s Monstrous Ballroom Will Dwarf White House
New renderings show that the White House’s new ballroom will tower over the executive mansion itself.Josh Fiallo (The Daily Beast)
adhocfungus likes this.
Bosch to cut 13,000 jobs in Germany to save billions in costs
Bosch to cut 13,000 jobs in Germany to save billions in costs
The engineering giant says increased competition and costs mean it must scale back.Faarea Masud (BBC News)
geneva_convenience likes this.
Microsoft blocks Israel’s use of its technology in mass surveillance of Palestinians
Microsoft has terminated the Israeli military’s access to technology it used to operate a powerful surveillance system that collected millions of Palestinian civilian phone calls made each day in Gaza and the West Bank, the Guardian can reveal.
Microsoft told Israeli officials late last week that Unit 8200, the military’s elite spy agency, had violated the company’s terms of service by storing the vast trove of surveillance data in its Azure cloud platform, sources familiar with the situation said.
The decision to cut off Unit 8200’s ability to use some of its technology results directly from an investigation published by the Guardian last month. It revealed how Azure was being used to store and process the trove of Palestinian communications in a mass surveillance programme.
In a joint investigation with the Israeli-Palestinian publication +972 Magazine and the Hebrew-language outlet Local Call, the Guardian revealed how Microsoft and Unit 8200 had worked together on a plan to move large volumes of sensitive intelligence material into Azure.
The project began after a meeting in 2021 between Microsoft’s chief executive, Satya Nadella, and the unit’s then commander, Yossi Sariel.
Microsoft blocks Israel’s use of its technology in mass surveillance of Palestinians
Exclusive: Tech firm ends military unit’s access to AI and data services after Guardian reveals secret spy projectHarry Davies (The Guardian)
How do you get used to small form factors?
I've spent years with a lovely huge IBM Model M.
Then I've moved to a TKL (no numpad) keyboard: no pain at all, except (sometimes) when in need for Windows Alt-numpad sequences for special characters.
Then I've moved to a 68 keys split keyboard! And I love it, since I (almost perfectly) customised it for my needs.
And I'm now thinking to go to a 42-keys split keyboard... (see Piantor Pro)
But it also took less than a month to see my (tiny, still) wrist pain disappear because of better hands positioning.
like this
Maeve e geneva_convenience like this.
So what if he blames them?
The rest of the world outside of MAGA knows he's a fucking moron and can easily discount anything he has to say
like this
Maeve likes this.
don't like this
☆ Yσɠƚԋσʂ ☆ doesn't like this.
NATO exists primarily to counter Russia and the Soviet Union. The European defense posture assumes America is an ally. Previously America has cut off intelligence sharing with Ukraine and that includes targeting data for missiles. America has also put restrictions on what Europe can do with weapons they've bought from America.
Then there's the fact that Biden willfully invited this invasion by suggesting Ukraine join NATO (with Biden himself previously saying publicly that that would be a red line for Putin) while also repeatedly stating America won't defend Ukraine if Russia does invade.
like this
☆ Yσɠƚԋσʂ ☆ likes this.
like this
☆ Yσɠƚԋσʂ ☆ likes this.
like this
☆ Yσɠƚԋσʂ ☆ likes this.
like this
☆ Yσɠƚԋσʂ ☆ likes this.
☆ Yσɠƚԋσʂ ☆ doesn't like this.
like this
☆ Yσɠƚԋσʂ ☆ likes this.
don't like this
☆ Yσɠƚԋσʂ ☆ doesn't like this.
NATO encroaching
*Free Nations previously invaded and/or dominated by Russia desperate to join the Don't be Invaded by Russia Alliance
don't like this
☆ Yσɠƚԋσʂ ☆ doesn't like this.
don't like this
☆ Yσɠƚԋσʂ ☆ doesn't like this.
You asserted "decades of peace" when Libya was fucking bombed. Libya presented zero threat to Europe or Europeans.
That's not peace.
Also, is Libya better off today than it was under Qaddafi?
Trump approves TikTok deal through executive order, Vance says business valued at $14 billion
Trump approves TikTok deal through executive order, Vance says business valued at $14 billion
President Donald Trump on Thursday approved a proposed deal that would keep TikTok alive in the U.S.Jonathan Vanian (CNBC)
Regulating AI hastens the Antichrist, says Palantir’s Peter Thiel
like this
thisisbutaname e adhocfungus like this.
Russia Just Redefined Iran's Peaceful Nuclear Energy Future: Here's How
Russia Just Redefined Iran's Peaceful Nuclear Energy Future: Here's How
Rosatom and the Atomic Energy Organization of Iran have inked a new memorandum of understanding on the construction of a series of small nuclear power plants.Sputnik International
DPRK seeks ways to aid Palestine amid Israeli aggression: Reports
DPRK leader Kim Jong Un is seeking ways to provide comprehensive support to Palestine.Al Mayadeen English (DPRK seeks ways to aid Palestine amid Israeli aggression: Reports)
Of course
- Accrescent: Store ~~run~~ (edit: advocated) by the GrapheneOS team for third-party apps
- Aegis: 2FA TOTP code generator
- AirGuard: Scans for persistent AirTags in the vicinity, notifies if I may be victim to AirTag tracking
- AntennaPod: Podcast manager, also supports importing local folders of podcasts
- AudioMonitor: Measure sound level
- Binary Eye: Support for many types of 1D and 2D barcodes
- ByeDPI: routes internet traffic through the DNS port to bypass certain types of filtering
- Canvass: doodle app, useful for mid-conversation diagrams and clarifying things visually in the absence of pen and paper
- ClassiCube: Minecraft Classic clone
- Conversations: XMPP client
- Editor: raw text editor
- Elementary: periodic table
- SimpleEmail: minimalist e-mail app that does not automatically fetch linked images. Refereshes in the background every 15 minutes and sends notifications without need for Play Services or equivalent
- FakeStandby: for edge cases when I want something to keep running in the foreground, but don't want to keep the screen on
- Feeder: RSS client
- Fintunes: Jellyfin client optimized for music
- FlorisBoard: customizable keyboard
- Fruity Game: Suika but with MS-Paint art style
- Graph 89: Graphing calculator emulator
- Invizible: Tor and DNS client
- Kiwix: Offline Wikipedia (you can download just the parts useful to you, e.g. medical articles without storage-hungry media files)
- Lemuroid: GBA emulator
- LocalSend: instant P2P filesharing over WLAN
- Markor: notes app with markdown
- Material Files: files app with SMB share support and various handy features
- Molly: Alternative Signal client
- Fossify Messages: I use it over the default messages app since it is easy to block numbers by pattern
- Notally: notes app with nice checklists
- Open Camera: as easy to use as the regular camera, but with a bunch more features below the surface
- OpenContacts: saves contacts as individual .vcf files to a directory for easy backup and allows dropping unknown callers without bothering me with a notification
- Organic Maps to be replaced with CoMaps later
- OSS Document Scanner: best FOSS scanning app I've found so far. Includes auto-cropping (given enough contrast) and adjustable B&W filter to eliminate off-white background colors.
- phyphox: view output of sensors like the barometer, magnetometer, accelerometer, etc.
- PipePipe: NewPipe but better (except for the occasional memory leakage)
- QDict & QuickDic: offline dictionaries and bilingual wordbooks
- RadioDroid: IP radio client. Can tune in to international news, music, sports broadcasts
- RHVoice: TTS app
- RiMusic: NewPipe, but for ~~Spotify, etc.~~ YT Music
- SecScanQR: QR scanner and generator with history, useful to save QR addresses for later use since I don't want to fill out forms or read documents on my phone
- SuperTuxKart: the only [edit: other] game on my phone
- Symphony: Music app with a slick UI
- Trail Sense: Compass with various goodies useful for outdoor activities
- Breezy Weather: weather app and homescreen widget with a slick UI
- MicroMathematics: Math engine, but I never learned how to use it
It's on the IzzyOnDroid repo: apt.izzysoft.de/fdroid/index/a…
Fossify Paint does the same thing without adding the IzzyOnDroid repo, I just happen to have Canvass since it was the first thing that showed up when I searched.
„Canvass“ – IzzyOnDroid F-Droid Repository
Draw and take notes anywhere on your deviceIzzyOnDroid Repo Browser
Honest question: I see a lot of people here use their mobile phones as a computer platform. I have a general uneasiness about doing so. Not throwing any shade whatsoever, I just feel there is too much out of my control on a mobile phone, for me to trust it more than I do. My general policy is not to use my phone as a mobile computing platform even tho I have a VPN installed and use Firefox as a browser.
My local network for instance. There is one pipe in and out. I can easily see what is coming in and what's going out and I can control that with the granularity of a gnat's ass. I know what my software is doing or not doing. I can allow or disallow anything I want. On a mobile phone, I feel that the control I have on my PC is not equal to the control I have on my phone.
How have you come to terms with what you can't control on your mobile phone?
I definitely agree with you on this. My pet theory is that phones have been getting uncomfortably big, at least from my perspective, since the average consumer is expecting it to serve as a computing and productivity platform, while all I want is a nice little digital Swiss army knife. I'm only logged into my messaging apps and personal email, and don't expect to do any sort of "productivity" on my phone. When my friends and colleagues assume I'm logged in to this-or-that on my phone, all I can think about is how afraid I would be if I were logged in to so many things on my personal phone. It's so much harder to inspect what's going on in the background of mobile devices.
One of the compromises I've had to accept is the closed, yet exploitable nature of the baseband and firmware. Also how much more spying it could do compared to any PC if an exploit were to get through. Compiling Coreboot and neutering the Intel ME taught me a lot about who's really in control - and how much control we all lose to smartphone manufacturers and telecom companies.
How have you come to terms with what you can't control on your mobile phone?
Threat level analysis.
Lemuroid and PipePipe ❤
Btw if you're signed it with your youtube account on pipepipe you might not be able to watch videos. There were recent changes to the youtube
Really?? It's not appearing on mine 🙁
I've got an old Samsung J7 from 2016, maybe that's why
you can get it from GitHub:
github.com/supertuxkart/stk-co…
and you can use obtanium to automatically update it (or any apps from GitHub/ the web)
Releases · supertuxkart/stk-code
The code base of supertuxkart. Contribute to supertuxkart/stk-code development by creating an account on GitHub.GitHub
If you press show all assets, there is an .apk for each release as well.
its called SuperTuxKart-[version].apk, doesn't have android in its name
Thanks for pointing that out !
Turns out the releases were just not shown in openhub
It keeps Google 100℅ seperate or vice versa.
Then when it's locked down it shuts down play services and apps to complete non functionality.
Go into system and create a new user. Set up that user exactly like you would a standard smart phone. And any apps you have on your main profile completely open source. That way it's 100℅ Google free
There is a guy in YouTube who does this. Side of Burritos? He has Google play on his main profile and then has a degoogled account for the second profile and transfers all the play store apps to the second profile. (Essentially making it his main).
I don't do that for battery purposes.
Pull down your notification bar twice. In other words expand it all the way. There is a small person Inside of a circle icon. That is how you can select the other profile. It's super fast and easy.
Then when you are done inside the profile. Hold the power button and select "Lock Out" and this will completely close down the second profile and put you back in the Main profile with the other completely shut down.
Downside is you wont get notifications in one area or the other from the opposing profile when it's not in use.
An alternative that is pretty secure too instead of profiles is to do the same thing in Private Space. This is found in the settings under the Security tab. This WILL get notifications to your main profile and when you shut down Private Space all apps stop completely including Play Services. But it's not as isolated as profiles
Yes, when you google profile is shut down.... It is completely isolated. You could install an application that is 100℅ malware and it would be completely closed down the moment you lock down that profile.
If you need what's app, I would either check your side profile a few times a day for messages OR you can stick What's App on the Private Space area of your FOSS profile so that it's Super easy to check. Private space works the same way in that when it's shut down..... The apps are 100℅ turned off including Play Services.
Even if you fixed the issue with drivers...
...your modem runs it's own firmware with a lot of extremely shady behavior, and you can't touch that regardless of which OS you install. Even your SIM card can arbitrarily execute Java applets and fetch from the network without your command, but at least it's somewhat contained. Your modem though, it can do a lot without your control and people like Qualcomm have been caught doing nasty stuff with it (plus, of course, giving the US the data whenever they ask for it).
This is why people like Stallman and Snowden often talk about teaching users how to use libre software on their computers, but rather than pushing for the same with smartphones, they tell you to not touch these at all instead. They're fundamentally anti-privacy devices, built this way.
Of course I carry one, it's fairly hard to live without a phone nowadays, but we must be aware of the impossibility of fully containing the data harvesting they do.
I haven't been keeping up with Organic Maps updates to see if they differ but I'd assume they're basically functionally the same, except for potentially Kayak results.
Man, I had hoped they fixed the search.
Those apps are fictionally useless for me. Does anyone know how to use it?
CoMaps is on both F-Droid and izzyondroid repos.
f-droid.org/packages/app.comap…
CoMaps - Hike, Bike, Drive Offline with Privacy | F-Droid - Free and Open Source Android App Repository
Easy map navigation - Discover more of your journey - Powered by the communityf-droid.org
like this
Omer_Ash likes this.
Last I tried RHVoice is was very unnatural sounding.
Sherpa-onnx is a much much more natural option. I personally use vits-piper-en_GB-southern_english_female-medium because I thought it sounded the most natural. You can also use Glados from Portal
Hegseth abruptly summons hundreds of top military commanders to a meeting in Virginia next week
In May, Hegseth ordered that the military cut 20% of its four-star general officers, directed an additional 10% cut from all general and flag officers across the force, and told the National Guard to shed 20% of its top positions.
In February, Hegseth fired Adm. Lisa Franchetti, the Navy's top officer, and Gen. James Slife, the Air Force's second highest officer, without explanation. He also relieved the military's top lawyers.
Since then, Hegseth has fired other military leaders without saying why. Most recently it was a general who led a military intelligence agency whose initial assessment of U.S. damage to Iranian nuclear sites in American strikes angered President Donald Trump.
Hegseth abruptly summons top military commanders to a meeting in Virginia next week
Defense Secretary Pete Hegseth has summoned the military's top officers to a base in northern Virginia for a sudden meeting next week, according to two people familiar with the matter.AP via Scripps News Group (News Channel 5 Nashville (WTVF))
RPG: A Repository Planning Graph for Unified and Scalable Codebase Generation
TLDR: the paper introduces the use of a Repository Planning Graph to overcome the planning and consistency problems that have prevented LLMs from generating complete, complex software projects.The graph allows reliably generating codebases 3.9x larger at 36K lines of code with far more correct pass rate at 69.7% compared to mere 33.9% before. Replacing ambiguous natural language with a structured graph allows the LLM to plan and execute long-horizon tasks reliably and at scale.
RPG: A Repository Planning Graph for Unified and Scalable Codebase Generation
Large language models excel at function- and file-level code generation, yet generating complete repositories from scratch remains a fundamental challenge.arXiv.org
Israel’s future in Uefa could come to a head before World Cup qualifiers
Uefa could decide as early as next week whether to suspend Israel from its competitions, with the governing body facing growing pressure from inside and outside the game.
Reports on Thursday, initially in the Times, suggested a vote that would determine Israel’s participation in World Cup qualifying and that of Maccabi Tel Aviv in the Europa League could be held by Uefa’s executive committee before the international break begins on 6 October.
Israel’s future in Uefa could come to a head before World Cup qualifiers
Uefa could decide as early as next week whether to suspend Israel and its club teams from its competitionsPaul MacInnes (The Guardian)
Proper way to setup fstab and crypttab for encrypted /boot partition?
When I moved to Coreboot, I also elected to encrypt my /boot partition, which is decrypted by the GRUB payload of Coreboot. I mostly worked on this by trial-and-error, which resulted in the workflow:
- GRUB unlocks
/boot - Keyfile in
/bootopens/ - Partition for
/bootis listed in/etc/crypttab, with another keyfile to unlock/bootagain from within Linux /bootis mounted via/etc/fstab
Steps 3 and 4 always seemed inelegant to me, but after doing systemd-analyze, I realized how much those steps consume when booting (9 sec).
My questions:
- After GRUB unlocks
/bootand boots into Linux proper, is there any way to access/bootwithout unlocking again? - Are the keys discarded when initramfs hands off to the main Linux system?
- If GRUB supports encrypted
/boot, was there a 'correct' way to set it up? - Or am I left with mounting
/bootmanually for kernel updates if I want to avoid steps 3 and 4?
After GRUB unlocks /boot and boots into Linux proper, is there any way to access /boot without unlocking again?
No. The "unlocking" of an encrypted partition is nothing more than setting up decryption. GRUB performs this for itself, loads the files it needs, and then runs the kernel. Since GRUB is not Linux, the decryption process is implemented differently, and there is no way to "hand over" the "unlocked" partition.
Are the keys discarded when initramfs hands off to the main Linux system?
As the fs in initramfs suggests, it is a separate filesystem, loaded in ram when initializing the system. This might contain key files, which can be used by the kernel to decrypt partitions during boot. After booting (pivoting root), the keyfiles are unloaded, like the rest of initramfs (afaik, though I can't directly find a source on this rn). (Simplified explanation) The actual keys are actively used by the kernel for decryption, and are not unloaded or "discarded", these are kept in memory.
If GRUB supports encrypted /boot, was there a 'correct' way to set it up?
Besides where you source your rootfs key from (in your case a file in /boot), the process you described is effectively how encrypted /boot setups work with GRUB.
Encryption is only as strong as the weakest link in the chain. If you want to encrypt your drive solely so a stolen laptop doesn't leak any data, the setup you have is perfectly acceptable (though for that, encrypted /boot is not necessary). For other threat models, having your rootfs key (presumably LUKS2) inside your encrypted /boot could significantly decrease security, as GRUB (afaik) only supports LUKS1.
Or am I left with mounting /boot manually for kernel updates if I want to avoid steps 3 and 4?
Yes, although you could create a hook for your package manager to mount /boot on kernel or initramfs regeneration. Generally, this is less reliable than automounting on startup, as that ensures any change to /boot is always made to the boot partition, not accidentally to a directory om your rootfs, even outside the package manager.
If you require it, there are "more secure" ways of booting than GRUB with encrypted /boot, like UKIs with secure boot (custom keys). If you only want to ensure a stolen laptop doesn't leak data, encrypted /boot is a hassle not worth setting up (besides the learning process itself).
Migrant Detainees Shot in Attack at Dallas ICE Facility
Migrant Detainees Among Those Killed, Injured in Dallas ICE Shooting
Multiple individuals were shot at an ICE facility in Dallas, with the Department of Homeland Security reporting migrants were among those injured.Nikki McCann Ramirez (Rolling Stone)
copymyjalopy likes this.
Pretty Guardian Sailor Moon - Atto 10, l'incontro con la Luna
Anche il capitolo 10 del manga di Sailor Moon, come inevitabilmente sospettavo, offre degli spunti di riflessione interessanti, anche se questo è...
Tosse persistente? Sicuro che hai bisogno di una medicina?
Tosse Persistente? Forse Caffè e Miele Battono il Cortisone! Uno Studio Sorprendente dall'Iran
Oggi voglio parlarvi di un argomento che molti conoscono fin troppo bene: quella tosse persistente che non vuole proprio andar via dopo un ...Giuliano (Blogger)
RPG: A Repository Planning Graph for Unified and Scalable Codebase Generation
TLDR: the paper introduces the use of a Repository Planning Graph to overcome the planning and consistency problems that have prevented LLMs from generating complete, complex software projects.
The graph allows reliably generating codebases 3.9x larger at 36K lines of code with far more correct pass rate at 69.7% compared to mere 33.9% before. Replacing ambiguous natural language with a structured graph allows the LLM to plan and execute long-horizon tasks reliably and at scale.
RPG: A Repository Planning Graph for Unified and Scalable Codebase Generation
Large language models excel at function- and file-level code generation, yet generating complete repositories from scratch remains a fundamental challenge.arXiv.org
Technology reshared this.
Fedora 43 Release Date and New Features
Fedora 43 Release Date and New Features
A close look at the new features coming in Fedora 43.Sourav Rudra (It's FOSS News)
Could have used more than 1 measurement
1g = ml = 1x1x1cm cube of water
Meter can be divided by 100 to make cm or multiplied by 1000 for km, a cm can be divided by 10 to get mm.
A 100x100m square is a hectare
Shouldn't it be 1g = 1 ml = 1x1x1 mm cube of water?
1g = 1ml = a 1x1x1cm cube if pure h2o
g = weight
mL = volume (3d)
cm = distance (2d)
Brits need to stop implementing inferior (though accessible) standards, then after abandoning them when realizing their mistake, make fun of others using the previous standard. Don't let anyone find out you used to call association football "soccer" to be distinct from rugby football or still measure some things in imperial stones.
Non-brits, this isn't directed at you lol. I know imperial measurements suck
speaking about time... How should we measure it?
Currently it is 60/60/[12,24]/7/[28,29,30,31].
Plus Timezones, plus Leap seconds + days.
decimal-time.com/
thank you for that hint!
Didn't know it was proposed with the other decimal units but not adepted by the people....
I grew up with metric and moved to an imperial country as an adult. I now have a different view of the systems and honestly prefer imperial. Hear me out.
Imperial organically evolved over centuries to better match the lived human experience. The major units used now are more useful to the average person. The fact they are not base 10 is due to the fact that the main uses for each aren't related in that way.
For temperature, 1 degree Fahrenheit is the minimum I can feel. 50 F is a middle temperature outdoors for many temperate climates: 0 F is very cold and 100 F is very hot. The temperature at which water boils or freezes at sea level is not as useful to my daily experience and the difference in a degree Celsius is too large.
I like inches, yards, and miles. I prefer ounces and pounds. Pints, quarts, and gallons now make more sense to me. I am not a scientist or engineer (who absolitely should use metric), but a guy trying to deal with weather, get places, and buy things to eat/drink.
Of course, if I learned an aircraft type was designed in imperial only, I wouldn't get on it. Metric has its purpose. It's just not as good for daily life.
To me, kilometers and miles are in a similar class; I don't have a reason to prefer one over the other. Same with kilos/pounds. Even though a kilo is more than double a pound, it's used to measure the same kinds of things. As with Centimeters/inches, quarts/liters, yards/meters.
Metric seems to do better at measuring very small things, or very precise things, but lacks middle measures that help with day to day life like Ounces and Feet. If there was a metric foot, like a quarter or third of a meter, it would be more useful. Same if there was a metric ounce, lets say 25 grams (an actual ounce is slightly over 28 grams).
I prefer metric for anything I do, despite living in the US.
My coffee recipe is in mL.
I use g and mL while cooking.
Metric is the superior system.
Hegseth orders rare, urgent meeting of hundreds of generals, admirals
Time for everyone to take the Trump loyalty pledge that supercedes the Constitution. Those who don't kneel will be replaced ASAP.
Hegseth Orders Rare, Urgent Meeting of Hundreds of Generals and Admirals
copymyjalopy likes this.
Let It Begin — The Real Fights Are Finally Coming Into View
Let It Begin — The Real Fights Are Finally Coming Into View
I have a growing sense of optimism about the political situation in the United States. But it’s not necessarily because I’m more confident about the outcomes…Josh Marshall (TPM - Talking Points Memo)
copymyjalopy likes this.
Adding/removing "pinned statuses" to an actor
Mastodon has a concept called "featured statuses", which is a special collection attached to a Person actor.
docs.joinmastodon.org/spec/act…
It wasn't readily know how this collection is updated and federated (not without code achaeology), but claire@social.sitedethib.com recently shared some additional info :smiley:
- The actor itself will issue an
Addactivity targeting the collection with the status inobject. - This activity is sent to all followers of the actor.
- No activity is sent if the actor has no remote followers.
- A
Removeis sent when a pinned post is unpinned.
This is what the Add looks like:
{
"@context": "https://www.w3.org/ns/activitystreams",
"type": "Add",
"actor": "https://example.org/users/testUser",
"target": "https://example.org/users/testUser/collections/featured",
"object": "https://example.org/users/testUser/statuses/115266412340579560"
}The corresponding
Remove is identical except for type, which is of course, Remove.ActivityPub - Mastodon documentation
A decentralized social networking protocol based upon the ActivityStreams 2.0 data format and JSON-LD.docs.joinmastodon.org
Fitik likes this.
just small circles 🕊 reshared this.
Since we're sharing our phone setups now, I might as well join in
First one is from my personal profile and the second one is from ny work profile.
I need Instagram for our class group chat and Discord for communicating with my friends.
like this
Kami likes this.
Every single browser sync solution requires some sort of storage at the company, something to keep in mind when it comes to privacy.
Yes, FF fanbois, even self-hosted Firefox sync server needs the Mozilla account verification server and it's ridiculously difficult to set it up compared to just self-hosting the data storage component.
like this
unknownuserunknownlocation likes this.
Why Droid-ify over F-droid
What is Kraken
Was zum Teufel ist "Kontakte"
- A Lemmy client
- It's easier to use
- Look it up
- Contacts app.
If AI Was Really Used to Censor ‘Together’ in China, It Represents a Potentially Terrifying Future
But people in China certainly seem to think this is an example of AI. China Digital Times reports that it wasn’t just the same-sex image that was altered, but the distributor did also cut out some straight sex scenes from the film... As one user implies, the AI is a more sophisticated and “terrifying” form of censorship because smart viewers have figured out ways to get around obvious censorship or can tell the difference, but that’s much harder with AI. Here’s a smattering of some of the comments, sarcasm implied on the last one:...in the future, we won’t even be able to tell if we’re watching the original film or not.
...This is nauseating because it not only interferes with the integrity of the plot, it disrespects the sexual orientation of the actors....
...Awesome! Next, let’s use one-click AI to re-release “Brokeback Mountain,” “God’s Own Country,” “Lan Yu,” and “Happy Together” as “restored” hetero romances...
AI Censorship of 'Together' in China Makes a Subplot Make No Sense
A scene showing a gay wedding in the movie 'Together' was censored in China using AI, but it makes a big chunk of the movie nonsensical.Brian Welk (IndieWire)
Microsoft blocks Israel’s use of its technology in mass surveillance of Palestinians
Microsoft has terminated the Israeli military’s access to technology it used to operate a powerful surveillance system that collected millions of Palestinian civilian phone calls made each day in Gaza and the West Bank, the Guardian can reveal.
Microsoft told Israeli officials late last week that Unit 8200, the military’s elite spy agency, had violated the company’s terms of service by storing the vast trove of surveillance data in its Azure cloud platform, sources familiar with the situation said.
The decision to cut off Unit 8200’s ability to use some of its technology results directly from an investigation published by the Guardian last month. It revealed how Azure was being used to store and process the trove of Palestinian communications in a mass surveillance programme.
Microsoft blocks Israel’s use of its technology in mass surveillance of Palestinians
Exclusive: Tech firm ends military unit’s access to AI and data services after Guardian reveals secret spy projectHarry Davies (The Guardian)
Oklahoma Threatens Public Schools' Accreditation Unless They Set Up Turning Point USA Chapters | Common Dreams
Ryan Walters, the state’s superintendent of public instruction, released a video address on Tuesday saying that “every Oklahoma high school will have a Turning Point USA chapter.”
“For far too long we have seen radical leftists with the teachers unions dominate classrooms and push woke indoctrination on our kids,” Walters said in the video posted to social media.
The state-mandated chapters of “Club America,” Turning Point’s high school program, will ensure students “understand American greatness” while enabling them to “engage in civic dialogue and have that open discussion,” said Walters.
Oklahoma Threatens Public Schools' Accreditation Unless They Set Up Turning Point USA Chapters
State school superintendent Ryan Walters said public high schools across the state must partner with late activist Charlie Kirk's organization to counter "woke indoctrination."julia-conley (Common Dreams)
like this
YoSoySnekBoi, Oofnik, Rozaŭtuno e adhocfungus like this.
don't like this
Kami doesn't like this.
It would have been helpful to explain why, whether that's privacy, ethical, or political concerns.
But maybe the use of "🤣" says it all
Kami doesn't like this.
don't like this
Kami doesn't like this.
"Childish behavior" is calling out a "privacy" company that does questionable stuff.
Noted.
Kami doesn't like this.
Kami doesn't like this.
Kami doesn't like this.
AHAHAHAHAHAH
Don't cry bro, I only told you to ditch an untrustable company which at first supported Trump and then was called out for silencing journalists.
I am 100% going to make it unpleasant for all who still use it, especially if they seem to care about privacy.
Kami doesn't like this.
What are you blabbering about?
Keep using whatever you like, but I will still call crap the crap.
Cry me a river.
Kami doesn't like this.
Lol... Now I understand...
My little cute brother, I asked for Proton fanbots to downvote me, not you...
Kami doesn't like this.
Kami likes this.
Kami doesn't like this.
Kami doesn't like this.
It's not my fault if you are out of the loop.
You asked for thoughts I gave you my thoughts.
Also I don't have time to list every time everything wrong with Proton or other crappy company. It's all over the internet, use the search button as I already told you.
Kami doesn't like this.
Ceo of Proton is a huge Republican fan, that might deter some people. Are you not interested in this?
Proton CEO embraces Trump for "standing up for the little guys"
Unnecessary and deeply concerning bow to the new "king"Update: position got backed up by an official Proton post on Mastodon, it's an official Proton statement now. mastodon.social/@protonprivacy…
Update 2, plot-twist: they removed this response from Mastodon - seems they realize it exploded into their face!
like this
Kami likes this.
Kami doesn't like this.
like this
Kami likes this.
Kami doesn't like this.
Also you don't have to migrate all the entries right away, you can always just make new accounts on a new email provider, and if you do use password expiry in your pw manager you can migrate emails right then
Goldfish memory? It was one of the biggest things on lemmy
Proton ceo not politically neutral as he advertised
Proton CEO embraces Trump for "standing up for the little guys"
Unnecessary and deeply concerning bow to the new "king"Update: position got backed up by an official Proton post on Mastodon, it's an official Proton statement now. mastodon.social/@protonprivacy…
Update 2, plot-twist: they removed this response from Mastodon - seems they realize it exploded into their face!
like this
Kami likes this.
Kami doesn't like this.
Did the CEO tweet in support to Trump administration? Yes he did!
Did two journalists have their accounts suspended after external pressure? Yes they did!
Debunk this, fanboy!
As I have said already to another of yours, time will tell if I was too cautious or you were a fool.
I didn't say anything about the Trump tweet. I only mentioned the journalist comment, which there is more information an nuance to it than you allow for.
But you assume because I say one thing I must be your enemy. You call me names. You refer to me as a group instead of a person.
So clearly you are an island to yourself. I hope your relationships in real life are far more fruitful.
Kami doesn't like this.
Kami doesn't like this.
Brave, like Proton, has a lot of fanboys (assuming they aren't bots) that blatantly ignore key informations about the companies of said products.
In this kind of scenario resorting to your own independent search is the only thing you can do.
In NanoGPT You also got TEE (Trusted Execution Environment) models which are more private/secure from my understanding. From GPT-OSS 120B TEE:
"TEE‑based AI models run their inference or training inside a Trusted Execution Environment (TEE), a hardware‑secured enclave that isolates code and data from the rest of the system. This provides data confidentiality, protects the model’s IP, enables cryptographic attestation of the exact model version, and satisfies regulatory privacy requirements, making AI services trustworthy and suitable for secure multi‑party or decentralized applications." One downside is that they are usually pretty expensive to run
Oh shit... Damn. sorry that happened to you 🙁
I do back it up with the rest of my stuff to an external hard drive, but that's... Like once in a year so could be better.
I have my keepass database file in my cloud that i use to sync it between phone and PC. I create a backup of all of my files on my PC + cloud folder once a year to an external hard drive. Better than nothing but probably would be better to do this more frequently 😄
I also empty my phone from time to time and move everything I want to keep to my PC (like photos).
Didn't see this comment but: I trust enough my cloud provider + the database file is encrypted with the masterpassword you set for your keepass.
I also use this cloud to host my Joplin notes, which are also E2EE (joplin supports it) so even if my cloud provider would take a peek it's all encrypted.
You can of course. I think the selling point is that you control it and it's a single file that you can decide where you'll keep it, how you access it, and what app you use to interact with it.
I can copy, delete, move it all without needing a service for it. Can modify it offline and everything!
I don't host the file on a password manager dedicated cloud, it's my own cloud space with other files I have there as well. So the file is just in my cloud space, with other files, and i have a synced folder on my phone + pc and just access that cloud folder with the file from keepassXC on my PC and keepassDX on my phone 😀
For me keepass offered a single databae file that I can decide where and how I keep it. Also works offline because the cloud syncs folders and even without internet a version exists on my phones cloud folder (until it gets synced again with internet).
I had not heard of ubicloud, that's pretty cool! Thanks for the tip!
And sure:
I don't self host it, I got managed owncloud space from a domain and web host provider.
I manage my own VPS that I got from them but the cloudspace came extra with buying the domain + email services (I've managed email server at my job and no way in hell will I do that for myself, too much headache).
So basically, in short, I have a managed email + owncloud space (just 5gb, don't honestly need more) from a commercial provider and just use owncloud app on my phone and PC to sync folders on both. I keep my encrypted joplin notes and (encrypted by default) keepass database on this cloud. Owncloud takes care of syncing and I just use Joplin and KeePass on both devices and set them to use the files in owncloud folder. Never had an issue in 2 years with anything.
Technically my provider could scan my stuff, but they won't get anything out of joplin notes or keepass.
Your idea for a setup sounds way more private, but i think for my usecase I've been happy since it's so low effort and still does what I want it to do.
I have seen on lemmy people recommend syncthing (syncthing.net/) for keepass, which directly synchronizes a folder between devices without a middleman if you wanr. But everytime you want to sync you need to have both devices on for that as there is no automatic middleman that is always available. Maybe that could be done with a raspberry pi?
Anyway: you can easily set this up with proton if you already have proton cloud no?
That sounds like a nice stack! And true, self hosting is really nice. Just wanted to give options if you don't feel like getting into self hosting.
Nevertheless, good luck on your privacy journey! I'm working on it too!
Are those green mini icons an indication of a PWA shortcut?
I use the app Hermit to run isolated websites, usually as PWAs. It's replaced quite a few apps, but I've noticed that many companies are intentionally making their web experience shit so they force you to use invasive apps.
Anyway, it can create home icons for those sites, and they run separately (i.e. in your task switcher), so it works better than browser shortcuts.
Kami doesn't like this.
GitHub - protonpass/android-pass: Android code for the Proton Pass application
Android code for the Proton Pass application. Contribute to protonpass/android-pass development by creating an account on GitHub.GitHub
don't like this
Kami doesn't like this.
GitHub - brave/brave-browser: Brave browser for Android, iOS, Linux, macOS, Windows.
Brave browser for Android, iOS, Linux, macOS, Windows. - brave/brave-browserGitHub
Some apps that you use are not safe. Aurora store doesnt send too much data to google but it doesnt verify app signatures which can lead to installing malicious apps, use normal play store instead which verifies app signatures (its also suggested to use by grapheneos devs). Whatsapp, collects data about you. Cromite, uses adblock plus which is really bad.
Also here is another reason why cromite is bad:
“Cromite has very problematic changes included which substantially reduce privacy and security. It reduces security more than it improves it. For example, it includes the highly problematic Eyeo filtering engine from the company behind Acceptable Ads, Adblock Plus, etc. which took over the forked uBlock extension misleading people with the name pretending to be the uBlock Origin project among other extensions. Eyeo’s C++ code is low quality and has memory corruption issues… Cromite including the incredibly sketchy Eyeo content filtering engine and stuff like additional codecs goes against what we’re trying to achieve. We also don’t think the randomization-based anti-fingerprinting approach works, among other issues”.
"Casually reminds you that Ironfox exists & it's a lot more "private" than most chromium-based browsers, & has ublock origin. (slow by default tho)
also while aurora store doesn't verifies signatures, is has Exodus integrated which dynamically analyses & warns about spyware, tracks and telemetry so you more caucious about the littered "free" apps...
IronFox OSS / IronFox · GitLab
Private, secure, user first web browser for Android. https://ironfoxoss.org/GitLab
Yes, ironfox is good too (i forgot to mention it) but on grapheneos you will want to end up using their browser
Avoid Gecko-based browsers like Firefox as they're currently much more vulnerable to exploitation and inherently add a huge amount of attack surface. Gecko doesn't have a WebView implementation (GeckoView is not a WebView implementation), so it has to be used alongside the Chromium-based WebView rather than instead of Chromium, which means having the remote attack surface of two separate browser engines instead of only one. Firefox / Gecko also bypass or cripple a fair bit of the upstream and GrapheneOS hardening work for apps. Worst of all, Firefox does not have internal sandboxing on Android. This is despite the fact that Chromium semantic sandbox layer on Android is implemented via the OS isolatedProcess feature, which is a very easy to use boolean property for app service processes to provide strong isolation with only the ability to communicate with the app running them via the standard service API. Even in the desktop version, Firefox's sandbox is still substantially weaker (especially on Linux) and lacks full support for isolating sites from each other rather than only containing content as a whole. The sandbox has been gradually improving on the desktop but it isn't happening for their Android browser yet.
Also, having exodus integration in app downloader is good but not worth it for exchange of no signature verification, so it's better to just check it in browser instead or use their app to check trackers
Cool, especially more so on PWA.
But I'd still recommend having ironfox for general browsing & not throwing privacy to the window.
(You won't believe it but, I just wrote a blog-size reply and accidently deleted it for trying to put it on a pastebin service...)
UPDATE: Switched from AuroraStore to Google Play Store, switched from Cromite to Brave, and lastly I deleted WhatsApp
Don't!
Your whatsapp session will expire over time & you gonna need to reinstall it on your phone.
Ether install whatsapp on private space or, if you feel adventurous, selfhost a Matrix-Whatsapp bridge.
Alternatively, convince your socials to use smh foss & more reliable,
Maybe telegram if they insist on mainstream,
It got a foss client but telegram doesn't enable E2EE by default (Secret Chat).
GitHub - mautrix/whatsapp: A Matrix-WhatsApp puppeting bridge
A Matrix-WhatsApp puppeting bridge. Contribute to mautrix/whatsapp development by creating an account on GitHub.GitHub
WARNING: this reply have 2 ounces of opinion-like ""facts"", a pinch of logic that make 0 sense & a whole bottle of chunky post,
Read, at your own warrenty...
Of course, signal, molly&unipush or even threema or anything more practical / security-audited is more worthy of your phone number and storing your data in an encrypted form,
I'd recommend conversation or matrix even more so they don't require a phone number(but for some reason, they're more scarce in usage)
Since messaging apps have to do with, well, messaging people & socializing, going to a person that doesn't have your app & genteelly asks them to install an app is an inconvenience that people want to avoid...
Don't get me wrong, I'd spend an hour talking messaging apps their differencies & cons but, as far as I'm aware, most non-tech invested ppl would consider this "dead-time" and would rather already text on the "avaliable app"
So, instead, you'd preinstall "mainstream" apps to not even mention it and start texting instandly since you're usually expected to have it (pre)installed. (i remember whatsapp and fb-messanger being preinstalled on some vendors)
This or use imessage & make them question their existence 😀 Even on android
To the best of my knowledge, the top "mainstream" apps out there are:
whatsapp, telegram, discord (yes, DiScOaRd), imessage and sadly, facebook messanger.
(I know signal is getting recognised in "mainstream" & getting more adoption, but for some reason, I don't see ppl installing it because it's not "that" viral to have enough contacts or it would go unoticed by them because "muh FBI and privacy controversies are too creepy" )
most ppl are aware of these apps and their mass adoptions so they wouldn't even bother and just get it done with or install the app already.
Out of these options only 2 are actually viable for secure & private messaging especially for Floss:
Telegram, for being "transparent" & having it's source avaliable for security auditing.
imessage: for being E2EE encrypted by default with The Manufactureᵀᴹ showing some dedication about the anonimity & security of the product.
Telegram don't E2EE by default, but you can just start a secret chat that would be private, at least they allowed for foss, third-party clients & made their own "proxy" while encoraging VPNs,
imessage can't be really called floss because the offical client isn't & is also gate-limited by The Manufactureᵀᴹ , but at least it has a foss unoffical client that still faily usable (with the compromise of needing MacOS "installed & certified" or paying for an access token.
Outside of this, there's really no scope for consideration, most messaging apps that made it to "mainstream" ether doesn't care about their users securities & would actively report anything big bros for " the general safety of the userbase" or be a hidden honeypot that collect dats & sell it to advertisers while lying about it. (even whatsapp that & think we're dumbies),
When one starts to pick for messaging applications, there's no "choice", "consideration" or even the qualities to think if it genually a good platform, you're left with only dedication to utilize a messaging app for what it offers & push your circle of people to join you there...
You may convince your friends, but you can't convince your coworker, team, boss, partner of a project, your online fellas or even your family memebers depending on their tech literacy.
OP didn't consider ditching whatsapp, instead, they considered methods to hinder whatsapp's privacy violations & telemetry, I'm not OP but, that's seemingly the case;
Even if they run whatsapp on an sandboxed, private space & use a 20 yr-old trash phone, running whatsapp at all on android is a risk since android has lots of APIs that provides device metadata that can be used to uniquely profile users & fingerprint them.
I can be wrong, but I see only 2 actions OP can do:
1) Utilize whatsapp web (& android vm to scan) to setup a bridging server / service (like matrix-bridge or beeper & make devices connect to it (port forward, local "vpn" or beeper) or,
2) Push their circule of people to use an another "mainstream" platform OP can trust...
Sometimes, having online conversation can be totally inconvenient or tiresome, not only because of whom, but how, this is one of them...
I don't like telegram at all, especially so with the latest policy change but, it's easier.
GitHub - OpenBubbles/openbubbles-app: A cross-platform app ecosystem, bringing iMessage to Android and PC!
A cross-platform app ecosystem, bringing iMessage to Android and PC! - OpenBubbles/openbubbles-appGitHub
I see,
But at this rate, you gonna always make sure whatsapp runs on a VPN AND behind a kill switch so it doesn't leak,
also maybe you're interested in using tailscale or netbird to skip the port forwarding / domain hassle so you can connect to your matrix server and use the bridge in minutes.
There's a new foss netbird client for android if it satisfies.
Tailscale · Best VPN Service for Secure Networks
Securely connect to anything on the internet with Tailscale. Deploy a WireGuard®-based VPN to achieve point-to-point connectivity that enforces least privilege.tailscale.com
Why I recommend against Brave
If you are keen on personal privacy, you might have come across Brave Browser. Brave is a Chromium-based browser that promises to deliver privacy with built-in ad-blocking and content-blocking protection.Luca Bramè (LibreNews)
I just noticed that this post has more comments than upvoted
🤣
Firefox is not secure on mobile
Can you elaborate?
I'm on the go right now. This is a quote for an old privacy guides snapshot, but when I was looking for it, I saw some articles from April saying that this was no longer true, so further searching needed when I get home
On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, GeckoView, has yet to support site isolation or enable isolatedProcess.
Introducing Firefox's new Site Isolation Security Architecture - Mozilla Hacks - the Web developer blog
With Site Isolation enabled on Firefox for Desktop, Mozilla takes its security guarantees to the next level.Anny Gakhokidze (Mozilla Hacks - the Web developer blog)
Sarkozy condannato a 5 anni per il caso dei fondi libici: “Dormirò in carcere, ma a testa alta”
Un terremoto politico-giudiziario scuote la Francia: Nicolas Sarkozy, ex presidente della Repubblica, è stato condannato a cinque anni di reclusione per associazione a delinquere nell’ambito del processo sui presunti finanziamenti libici alla campagna elettorale del 2007.
Si tratta di una sentenza senza precedenti nella storia della Quinta Repubblica, che pone per la prima volta un ex capo di Stato francese a rischio di una lunga detenzione.
LEGGI L'ARTICOLO: Sarkozy condannato a 5 anni per il caso dei fondi libici: “Dormirò in carcere, ma a testa alta”
Sarkozy condannato a 5 anni per fondi libici: “Dormirò in carcere, ma a testa alta”
Nicolas Sarkozy condannato a 5 anni per associazione a delinquere nel caso dei fondi libici. Tre anni da scontare in carcere.Redazione (Atom Heart Magazine)
BrikoX
in reply to nearhat • • •