That is one of the most beautiful and noble things I've read in a long time. You should proud of yourself for taking that initiative!

I would understand if you questioned yourself wanting to do something dangerous or reckless, but I don't quite understand your hesitation here. You clearly have the kids and the LGBTQ communities' best interest in mind. Please do discuss gender roles, gender expression, the concepts of "boy", "girl" and "neither" and whatever other topics that challenge cisnormativity and heteronormativity.

We are already teaching children from a young age that if you have dick you have to wear blue and that you have to play with dolls if you have a pussy... Why not teach them to be and to do whatever the hell they want instead? Within reason. ๐Ÿ˜

I'm rooting for you! ๐Ÿ˜Š

[-] emotional_soup_88@programming.dev 10 points 16 hours ago

Nice! Especially the Liberux, as it seems like it's going to have "jailed" Android for apps that need that environment. Maybe that's similar to what Graphene does with their sandboxed Google Play Services?

If my Samsung is shot (and shut) down during this year, I'm leaning toward a Liberux, Jolla or a Fairphone with Ubuntu Touch, in that order.

I agree, I tried to shove two themes into one. Samsung's decision to disable bootloader unlocking from OneUI 8 just kind of puts more weight on Google's decision on disallowing unauthenticated apks. For Samsung users, that is.

120

https://www.change.org/p/stop-google-from-limiting-apk-file-usage

I hope that my rooted One UI 7 doesn't get the update through some backdoor in the Google Play Services package... Or the next time I unblock Google Play to update the very few paid apps that I use...

Forget it. Check out fossuser 's response!

+1

Also, WiFi can also be used to track users: https://www.youtube.com/watch?v=poaqwozBqHY

Try resetting your access point settings. Connections -> Mobile Networks -> Access Point Names -> reset to default

If your VPN app/settings provide an option to turn off IPv6, try that.

Holy crap it's like localsend on steroids! Thanks for sharing! https://github.com/localsend/localsend

[-] emotional_soup_88@programming.dev 5 points 1 day ago* (last edited 1 day ago)

Hero (2002)

Drunken Master (1978)

Shaolin Soccer (2001)

Nezha Conquers the Dragon King (1979)

Taegukgi: The Brotherhood of War (2004)

[-] emotional_soup_88@programming.dev 8 points 1 day ago* (last edited 1 day ago)

Not a tool or website per se, but more of a system that I thought of to share loot - mostly single files - with normie friends that neither use a VPN or pirate in any capacity: just pack it in an encrypted archive, encrypt the file headers too, change the filename to something random, upload it to the cloud service of your choice, share the download link and the password to the archive with them and Bob's your uncle.

70

Page 35. I haven't confirmed anything, so do your own research!

Happy new privacy respecting year!

24
submitted 2 days ago* (last edited 2 days ago) by emotional_soup_88@programming.dev to c/linux@programming.dev

Edit/Solved: Thank you for all the great input! Both on alternative solutions and on security implications. I'm going to make a draft on how I would setup the e-mail method as securely as possible as a programming/scripting exercise, but will IRL probably end up using either some reverse tunnel/shell variant.

Edit 2: or, as a hardware solution, install an extra NIC that I expose to the opennet - thus enabling remote port forwarding - while binding all my sensitive processes/traffic to my encrypted NIC.

I cannot ssh into my Linux box from outside of my LAN since I'm behind a VPN that doesn't support port forwarding. Is it possible to make my Linux box receive, interpret and execute commands through e-mail instead? I've tried looking for answers through DuckDuckGo's search engine, to no avail. If I may dream, I would like to setup an e-mail server with a systemd service or just run a script that continuously downloads the emails, prints their content to stdin and executes, perhaps through command substitution, whatever is in stdin.

13

Late night reading. :)

129
submitted 3 days ago* (last edited 3 days ago) by emotional_soup_88@programming.dev to c/privacy@lemmy.ml

Learned a lot from this essay/presentation. One point that I "liked" is how Trump and US based big tech virtually (pun intended) hold other countries hostage, either with export/import tariffs or by threatening to stop trade ("adapt this policy or forget about trading with us") or with sensitive data.

Also, this is the organization that he is working for. They have some tools for and guides on privacy too: https://www.eff.org/

10

TLDR: 1) I recommend the cyber security related podcast Jack Rhysider's Darknet Diaries. 2) This seemingly (former) normie guy who got hacked and then recovered gave me some insight into how cybercrime can affect people.

Probably more related to cyber security and hygiene in general rather than pure privacy.

I follow the amazing Jack Rhysider's Darknet Diaries and came across this video in one of his playlists on his YouTube channel.

I appreciate and admire people who work with cyber security on either red or blue teams. I am also a huge fan of hackers that use their skills to stand up against oppressive regimes or for instance those hilarious guys that make videos of when they hack scammers.

I mean, I obviously realize logically speaking that it must be a truly awful and horrible experience to become the victim of a sinister and malicious cybercrime, but until I saw this video, I had never really felt it. And I still haven't been a victim myself. I've invested a lot of time and energy in learning IT and networking in order to stay safe, both against private individuals but also against state level actors. But that's a different story.

It's heartbreaking to hear how the hacker turned his hopes and dreams upsidedown, almost making him want to quit. Hats off for you (young?) man! His dexterity is fucking next level and it's inspirational!

15
NAT vs firewall at home (programming.dev)

Why would I need to have software firewalls on my devices behind my NAT router at home? The topology is a basic consumer grade one: ISP -> my router (NAT) -> LAN, and vice versa.

If NAT already obfuscates my private addresses through translation, how would a potential adversary connect to anything beyond it?

What "good" would my public IP do for a hacker if I have no ports forwarded?

Is a firewall a second line of defense just in case I execute malware that starts forwarding ports?

I do have software firewalls on all my devices, but that wasn't an informed choice. I just followed the Arch Wiki's post installation guidelines.

44
OpenKeychain ยท OpenKeychain (www.openkeychain.org)

Sorry if this is yesterday's news to you all, but I just found out about this Android app that makes it easier - as in, less steps - to encrypt and send any message in a highlight-copy-paste fashion, with automatic integration in several e-mail front ends.

It still receives security updates and the repo is still maintained, but the app is no longer being actively developed to add new features. https://github.com/open-keychain/open-keychain

57
167
The Useless Web (theuselessweb.com)

Whatever

32

It just struck me - watching Brad Wright's Travelers for the third time - that even though we might not have developed light sabers or faster than light drives or teleportation devices yet, we might already have all the components or ingredients or raw materials "laying around" and the only thing standing between us and technological advancement is the knowledge on how to assemble and them the correct way.

Aaand while writing this I realized what an oversimplification this is. We not only had to learn how to assemble materials in order to invent, say, batteries but we also had to understand electricity and how to manipulate it.

So, never mind. ๐Ÿ˜‚

60
submitted 6 days ago* (last edited 6 days ago) by emotional_soup_88@programming.dev to c/privacy@lemmy.ml

There is a lot of totalitarian shit going on, this being only one of the recent tragedies: https://www.youtube.com/watch?v=Fshsk8MCAf4

I always try to say to myself: don't wallow in grief, organize and act!

Except for advocating for online privacy in one's everyday life and being politically active when I have the ability to, do you have any tips on what one can contribute with technologically, from home?

I have:

  • A 1Gbps up/down connection
  • An RTX 3080
  • A few Raspberry Pi:s
  • 20TB storage
  • A static public IP if I ask for it

What I have found so far:

  • running a Tor bridge or guard/middld relay - bridge for the sake of our peers living in places where Tor in inaccessible and middle relay to contribute with bandwidth
  • running a Monero node - although my GPU is LHR, so perhaps it wouldn't contribute much to decentralization...?
view more: next โ€บ

emotional_soup_88

joined 1 month ago