• 12 Posts
  • 254 Comments
Joined 3Y ago
cake
Cake day: Jun 07, 2020

help-circle
rss

If you believe DMCAs ever got successfully enforced on wild west internet, I have a little whisper secret to share with you about digital piracy.


The humanity impact of US puppet regime in Ukraine from 2014-2022; 14 million dead people. STOP USA, STOP Ukraine, STOP genocide!



Xiaomi lacks the patents and uses Qualcomm Snapdragon hardware. This is the same reason Honor will remain unaffected similar to Xiaomi. The goal was to destroy 5G patent pool of Huawei and prevent people from buying mainstream phones devoid of NSA backdoors.


Elaborate on these exceptions, sweetie. I want to know what is there in store for me.


Well idk about what or who are these tankies, but you are looking like a joke in this thread.


USA is always wrong. Add 2022 Ukraine and whatever countries from 1776 to 1899 yourself.


Yeah there was lots of actual murder from 2014-2022 you missed. Then you also missed Nazis painting blood swastikas on dead Russian womens’ chests. You are a little too late to the party.


You are too reactionary. Drink some water and go to sleep.



Failed Balkanisation of Russia + communism refuses to lose against genocidal superimperialist capitalist Anglo Fascism

Basically L + ratio for Anglo empire, so they cope using media-military propaganda bullshittery everyday





You end up with a catch22 problem of network effect. If Signal failed to move users with Felon Yuck’s tweet, nothing will move users off of WhatsApp, and you basically need it for social participation, if you live outside USA/Japan/Korea/China.


More than 32 million of the leaked records are said to be from users in the US, with 11 million from UK users. Other affected nations include Egypt (45 million), Italy (35 million), Saudi Arabia (29 million), France (20 million), Turkey (20 million), and Russia (10 million).

It seems that individual countries’ data is up for grabs, with the US dataset up for $7,000, and British numbers up for a similar per-capita figure of $2,500.

Most alarmingly, it doesn’t seem to be an empty promise designed to threaten the Meta-owned company, with almost 2,000 numbers shared with Cybernews in a sample request verified to be WhatsApp users.


Nice projection, but you herald the immoral orientation of a neofascist by opposing Russian special operation.


Well now if you could stop being a neofascist, we could make more progress. And Anglosphere countries are effectively Nazi and Nazi allied/oriented currently, as per UN vote this month. I called you neofascist, not Nazi, and will call you latter when I spot those tendencies.


Too bad a neofascist like you wants to sing the tunes of Hitler even to this date, about how NSDAP was socialist. Right?


You can stop using internet right now. There are closed source bits of code in the JS you run off of websites natively. If you are not using LibreJS and IceCat, you have already been assimilated.








The authors of node-ipc have pushed malware in an update, which wipes your disk if you happen to have Russian or Belorussian IP address. This affects some large projects [@bantg, Twitter]
Relevant reading: https://github.com/zlw9991/node-ipc-dependencies-list https://web.archive.org/web/20220318095406/https://github.com/RIAEvangelist/peacenotwar/issues/45 https://security.snyk.io/vuln/SNYK-JS-NODEIPC-2426370

What are easy to present criticisms of mainstream outlets like BBC and CNN?
While it is easy to use phrases like "use critical thinking", this is not easy for elders or cousins in families to be told, as this is not lucid to understand in a snap. It is essential for criticism to be easily communicable to ordinary people that watch Google Feed or MSN News daily, and I feel that such criticism is not even easy to access or read, considering ordinary people have been cornered from MSM, YouTube, Twitter, Facebook and rest of Big Tech and Western media apparatus. If you love your BBC and CNN feeds, avoid this post, this is not for you.

r/PrivacyGuides restored citation-less slander post as facts, and GrapheneOS community sockpuppet theory is proven correct by one of its members
cross-posted from: https://lemmy.ml/post/143981 > Mod statement: https://np.reddit.com/r/PrivacyGuides/comments/rxf02a/theanonymousjoker_false_privacy_prophet/hs1dxux?context=3 > > https://i.imgur.com/LahmNkO.jpg > > dng99/dngray has branded a citation-less slander post as facts. These are the "community standards" of r/PrivacyGuides. Always remember this. > > u/trai_dep, the record stands corrected once again > > Moreover, my theory about GrapheneOS community using sockpuppets is true, as confirmed by... > > https://np.reddit.com/r/fdroid/comments/rxtc14/came_across_this_thoughts/hs1o6no?context=3 > > https://i.imgur.com/JX6uTpx.jpg > > Tommy_Tran = B0risGrishenko (OP of slander post). Thanks for confirming my GrapheneOS community sockpuppet theory.

r/PrivacyGuides is allowing a personally targeting post with my name in post title currently, slandering me and my smartphone guide
https://teddit.net/r/PrivacyGuides/comments/rxf02a/theanonymousjoker_false_privacy_prophet/ This is one of key GrapheneOS community members doing it, and r/PrivacyGuides has the same moderation team as r/privacytoolsio before, and the main moderator of r/privacy is also same. Has anyone seen this kind of behaviour in overall privacy community? Edit: https://ghostarchive.org/archive/ttkkU reddit post archived

100% FOSS Smartphone Hardening non-root Guide 4.0
https://lemmy.ml/post/128667 Crosspost but the guide body is so long, I had to break it into 5 parts.

Smartphone Hardening non-root Guide 2.0 (for normal people)
(1/2) Lemmy does not allow too long post walls **UPDATED 16/8/2020: Major edit, replaced closed source App Ops and Shizuku with AppOpsX (Free Open source) on F-Droid. ~~This guide is nearly FOSS supported now.~~** **UPDATED 17/9/2020: MAJOR EDIT, replaced closed source Access Dots with Privacy Indicator (FOSS) on Izzy's F-Droid repo. This guide is completely FOSS.** Hello! I am the founder of /r/privatelife . Finally my smartphone non root guide is back, and there are some big upgrades. I was taking time to test everything myself on my daily driver, so apologies for keeping everyone in the wait, but stability and ease of use is the important goal to strive in my playbook. Privacy must be accessible to maximum amount of people without being annoying or tedious. **A kind request to share this guide to any privacy seeker.** #User and device requirement * ANY Android 9+ device * knowledge of how to copy-paste commands in Linux or Mac Terminal/MS-DOS Command Prompt (for ADB, it is very simple, trust me) #Why not Apple devices? iPhone [does not allow you to have privacy](https://gist.github.com/iosecure/357e724811fe04167332ef54e736670d) due to its blackbox nature, and is simply a false marketing assurance by Apple to you. Recently, an unpatchable hardware flaw was [discovered](https://9to5mac.com/2020/08/01/new-unpatchable-exploit-allegedly-found-on-apples-secure-enclave-chip-heres-what-it-could-mean/) in Apple's T1 and T2 "security" chips, rendering Apple devices critically vulnerable. 17/9/2020: [Apple gave the FBI access to the iCloud account of a protester **accused** of setting police cars on fire](https://www.businessinsider.com/apple-fbi-icloud-investigation-seattle-protester-arson-2020-9). Also, [they recently dropped plan for encrypting iCloud backups after FBI complained](https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT). They also collect and sell data [quite a lot](https://i.imgur.com/n8Bk0bA.jpg). Siri still records conversations 9 months after Apple [promised not](https://www.theregister.co.uk/2020/05/20/apple_siri_transcriptions/) to do it. Apple Mail app is vulnerable, yet Apple stays in [denial](https://9to5mac.com/2020/04/27/iphone-mail-vulnerabilities-2/). Also, [Apple sells certificates to third-party developers that allow them to track users](https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/), [The San Ferdandino shooter publicity stunt was completely fraudulent](https://www.aclu.org/blog/privacy-technology/internet-privacy/one-fbis-major-claims-iphone-case-fraudulent), and [Louis Rossmann dismantled Apple's PR stunt "repair program"](https://invidio.us/watch?v=rwgpTDluufY). Also, Android's open source nature is starting to pay off in the long run. Apple 0-day exploits are far [cheaper](https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/) to do than Android. ----- #LET'S GO!!! **ALL users must follow these steps before "for nerdy users" section.** **Firstly, if your device is filled to the brim or used for long time, I recommend backing up your data and factory resetting for clean slate start.** * **Sign out all your** Google and Huawei/Samsung/other phonemaker **accounts** from your device so that Settings-->Accounts do not show any sign-ins **except WhatsApp/Telegram** * Install ADB on your Linux, Windows or Mac OS machine, simple guide: https://www.xda-developers.com/install-adb-windows-macos-linux/ * Use ["Universal Android Debloater"](https://gitlab.com/W1nst0n/universal-android-debloater) to easily debloat your bloated phone. NOTE: Samsung users will lose Samsung Pay, as Samsung has been caught and declares they sell this data: https://www.sammobile.com/news/samsung-pay-new-privacy-policy-your-data-sold/ * **Make DIY camera covers**, for front camera notch use a tiny appropriate-sized thin opaque plastic cutout and use an invisible tape to stick it in place, replace every month (cost: tape roll and one minute of your time per month). [**My rear camera cover**](https://i.postimg.cc/T37Qvc52/image.jpg) * Install **F-Droid app store** from [here](https://f-droid.org/en/) * Install **NetGuard** app firewall (see NOTE) from F-Droid and set it up with [privacy based DNS like Uncensored DNS or Tenta DNS or AdGuard DNS] NOTE: NetGuard with [Energized Ultimate](https://block.energized.pro/ultimate/formats/hosts.txt) HOSTS file with any one of the above mentioned DNS providers is the ultimate solution. NOTE: Set DNS provider address in Settings -> Advanced settings --> VPN IPv4, IPv6 and DNS * In F-Droid store, open Repositories via the 3 dot menu on top right and add the following links below: 1. https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo?fingerprint=8F992BBBA0340EFE6299C7A410B36D9C8889114CA6C58013C3587CDA411B4AED 2. https://apt.izzysoft.de/fdroid/repo?fingerprint=3BF0D6ABFEAE2F401707B6D966BE743BF0EEE49C2561B9BA39073711F628937A 3. https://guardianproject.info/fdroid/repo?fingerprint=B7C2EEFD8DAC7806AF67DFCD92EB18126BC08312A7F2D6F3862E46013C7A6135 Go back to F-Droid store home screen, and hit the update button beside the 3 dot menu. ----- ###LIST OF APPS TO GET * Get **Firefox Preview** web browser from F-Droid (install uBlock Origin addon inside ([if technically advanced, try doing this](https://github.com/gorhill/uBlock/wiki/Blocking-mode:-medium-mode))). Also get **Firefox Klar** if you like a separate incognito browser. * Get **Aurora Store** from F-Droid for apps from Play Store without actually using Play Store, use Anonymous option to sign in * for 3rd party APKs source them only from **APKMirror** OR **APKPure** OR **APKMonk**, quite trusted, BUT **TRY AND AVOID IT IF POSSIBLE** * Get **Privacy Indicator** from F-Droid for **iOS 14 like camera/mic dot indicator feature** * Get **OSMAnd+** from F-Droid or **Qwant Maps inside web browser** for maps and/or print physical maps if you live and travel in one or two states or districts. NOTE: Qwant Maps has better search results than OSMAnd+ * Get **PilferShush Jammer** from F-Droid to block microphone (use this in malls, restaurants or such public places if you can to prevent beacon tracking) * Get **OpenBoard** (user friendly) OR **AnySoftKeyboard** (nerd friendly) from F-Droid instead of Google GBoard, Microsoft SwiftKey et al, they are closed source keylogger USA spyware * Get **FTP Server (Free)** from F-Droid and **FileZilla on computer** for computer-to-phone internet less file sharing NOTE: for phone-computer sync or sharing, can TRY **KDE Connect**, available for Android, Windows, Linux * Get **TrebleShot** instead of SHAREIt for phone to phone file sharing * Get **K-9 Mail** or **FairEmail** as e-mail client * Get **NewPipe** for YouTube watching, or YouTube in Firefox Preview/Klar * Get **QKSMS** from F-Droid as SMS client app * Get **Shelter** from F-Droid to sandbox potential apps that you must use (eg WhatsApp or Discord or Signal) * Get **SuperFreezZ** from F-Droid to freeze any apps from running in background * Get **Librera Pro** from F-Droid for PDF reader * Get **ImgurViewer** from F-Droid for opening reddit/imgur/other image links without invasive tracking * Get **InstaGrabber** from F-Droid for opening Instagram profiles or pictures without invasive tracking (seems like a revived fork is [here](https://github.com/austinhuang0131/instagrabber/releases), thanks u/sad_plan ) * Get **GreenTooth** from F-Droid to set Bluetooth to disable after you have used it * Get **Material Files** or **Simple File Manager** from F-Droid for file manager app * Get **ImagePipe** from F-Droid if you share lot of pictures, and want to clear EXIF metadata snooping (often photos contain phone model, location, time, date) * Get **Note Crypt Pro** from F-Droid for encrypted note taking app * Get **Vinyl Music Player** from F-Droid for music player * Get **VLC** from F-Droid for video player ----- ###CRITICAL FOR CLIPBOARD, LOCATION AND OTHER APP FUNCTION BLOCKING I would say this is one of the critical improvements in my guide, and will solve the problem of clipboard and coarse location snooping among other things. AppOpsX is a free, open source app that allows to manage granular app permissions not visible normally, with the help of ADB authorisation without root. This app can finely control what granular information apps can access on your phone, which is not shown in app permissions regularly accessible to us. Now that you would have set up your phone with installing apps, now is a good time to perform this procedure. Step 1: Install **AppOpsX** from F-Droid. (https://f-droid.org/en/packages/com.zzzmode.appopsx/) Step 2: Plug phone to computer, and enable USB debugging in Settings --> Developer Options (you probably already did this in the starting of the guide) Step 3: Keep phone plugged into computer until the end of this procedure! Open AppOpsX app. Step 4: On computer, type commands in order: ```adb devices``` ```adb tcpip 5555``` ```adb shell sh /sdcard/Android/data/com.zzzmode.appopsx/opsx.sh &``` Step 5: Now open "AppOpsX" app, and: * disable "read clipboard" for apps except your messengers, notepad, office suite, virtual keyboard, clipboard monitor apps et al. NOTE: Most apps that have text field to copy/paste text require this permission. * disable "modify clipboard" for every app except for your virtual keyboard or office suite app or clipboard monitor/stack special apps. * disable "GPS", "precise location", "approximate location" and "coarse location" for every app except your maps app (Firefox and OSMAnd+) (2/2) in comment below.