Imprint9816

joined 1 year ago
[–] [email protected] 2 points 2 days ago* (last edited 2 days ago) (2 children)

Not sure where your getting your information but the Pixel 5 has not gotten Android updates or security updates in over 7 months.

There are tons of examples of exploits being used to target EOL phones as its common for people to not care about these updates, or be misinformed, so they are easy targets.

If OP or anyone else wants to use an EOL phone that's fine but, don't pretend its a smart security practice. Although even if I were to use an EOL phone, LineageOS doesn't have the greatest background and isn't really degoogled

[–] [email protected] 2 points 3 days ago* (last edited 3 days ago) (4 children)

I am not sure if there is an example of that specific situation as it would be pretty odd for a phone to be receiving security patches but not firmware updates.

Anyway its not super relevant as the Pixel 5 does not receive firmware or security patches anymore.

OP also seems to be inferring he suggested to his friend to use a very specific security / privacy OS that does not recommend using that model phone anymore for the exact reasons I mentioned. Plus the model is only receiving partial support as a stop gap for users to have time to get a newer model and won't be supported much longer anyway.

[–] [email protected] 13 points 3 days ago* (last edited 3 days ago)

Its always better to try and get firsthand knowledge through the FAQ then rely on, possibly inaccurate, Lemmy users. I would also seek answers on their official forum over Lemmy as well.

[–] [email protected] 10 points 3 days ago (2 children)

Did you try reading through the FAQ?

[–] [email protected] 1 points 4 days ago* (last edited 3 days ago) (6 children)

Pixel 5 is end-of-life and shouldn't be used anymore due to lack of security patches for firmware and drivers.

I understand if your friend is on a budget and simply can't afford a non EOL phone but, they should really consider a 6th gen Pixel or better if they care at all about their data security.

[–] [email protected] 2 points 1 week ago

That's not how end to end encryption works.

Your scared of a slide to the right but already falling for their propaganda to undermine privacy by destroying encryption.

[–] [email protected] 9 points 2 weeks ago

Do this all the time with video games. Pirate to try before I buy. If I really like the game I buy it in the hopes it creates an incentive to make more games like the ones I like.

[–] [email protected] 4 points 2 weeks ago* (last edited 2 weeks ago)

There are legitimate versions of windows that are hard to get as a non enterprise consumer. Such as some of the IOT versions that have much longer security support.

[–] [email protected] 10 points 3 weeks ago* (last edited 3 weeks ago) (3 children)

Here you go:

"Google makes the most secure phone. Including for securing your phone against Google."

Its better then explaining you rather risk your data security then buy a phone from Google.

[–] [email protected] 1 points 3 weeks ago

For the majority of connections you can. Some connections bypass your VPN and there is nothing you can do about it. Its been reported to Google by multiple groups, including Mullvad but Google refuses to fix this.

[–] [email protected] 26 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

I like grapheneos the product.

The staff is super abrasive and they constantly attack other privacy projects. See the recent attacks on Jonah from privacy guides, or the attacks on calyx, or the bs with rossman that forced micay out of the spotlight.

They need to hire an outside professional to manage their PR. The way they communicate is their biggest flaw.

[–] [email protected] 2 points 3 weeks ago* (last edited 3 weeks ago)

FYI- Its not a ROM.

EDIT: for the person down voting a fact - https://x.com/GrapheneOS/status/1588599635337445377

 

Initially saw this article from Brian Krebs mastodon account.

https://infosec.exchange/@briankrebs/111608035574860035

15
Kuketz Custom ROM Review: /e/ (www-kuketz--blog-de.translate.goog)
78
submitted 7 months ago* (last edited 7 months ago) by [email protected] to c/[email protected]
 

Confirmation in linked github discussion.

 

"We can disclose only now that we had a server in Toronto seized in 2015, initially without our knowledge. Maybe a court order was served to the datacenter. For about 10 days we did not understand what happened to the server, which did not respond, while the datacenter did not provide information. After 10 days Italian police (and not any magistrate) contacted us. They informed us that Toronto police and FBI (*) asked for our help because they could not find any log in the server. Unfortunately their help request came after the server had been already seized. They did not even make a copy, they took it physically, therefore the server went offline, probably alerting the alleged criminals. It was obvious that forensic analysis could not find any log, simply because there were none. Our VPN servers did not even store the client certificates, go figure (now they also run in RAM disks, but in 2015 they did not). The whole matter was led by informing us without any document from any court or magistrate, but only through official and informal police communications, and only to ask for help after forensic analysis obviously failed completely.

We were not asked to keep confidentiality on the matter, but just to stay on the safe side and support the investigation on what it appeared as a serious crime (a whole database with personal information of a commercial service was cracked, stolen and published in public when the web site owners did not pay a "ransom"; while our server was apparently not used for the crack, it was used to upload elsewhere the database) we decided not to disclose the whole matter for at least 7 years. It's one of those cases confirming that our servers do not store log, data or metadata of clients' traffic.

(*) We may speculate that FBI was involved in a Canadian matter because the stolen database contained US citizens' personal data"

 

Thought this might be helpful to others who use Mullvad Browser.

Got to the advanced preferences and set webextensions.storage.sync.enabled to true.

 

I have been switching from Brave to Mullvad Browser and one odd issue I am running into is that I am not able to use my yubikey to login to sites such as simplelogin or protonmail anymore.

My guess is its something with noscript as the other addons I used on Brave but, even if I mark an entire site as trusted the yubikey prompt still seems to be blocked.

view more: next ›