The 8232 Project

“Unjust laws only burden the just, as the lawless will not heed them.” - 8232

  • 6 Posts
  • 25 Comments
Joined 9 months ago
cake
Cake day: February 25th, 2024

help-circle
  • The reason Brave is recommended is due to its boost in security over Gecko-based browsers, as recommended by the GrapheneOS team (see here and here). Any bloatware and tracking in Brave can be disabled. I don’t like some of Brave’s decisions just as much as anyone, and if a fork of Brave that removes the bloat by default is created, I will be sure to include it. Even still, I included Mullvad Browser as another alternative for those not happy with Brave and want a Gecko-based browser. Brave is my top choice, but it may not be yours. Feel free to make your own list of software that meets your own requirements, but you’ll find that the other software on my list is just as “credible” despite my browser choice. I’m not forcing you to use any software in that list, so feel free to use whichever web browser you wish.



  • it’s the best out there, but the bar is pretty low.

    For most open source health apps, I found that this is very true. Almost every app here is Android-exclusive (I put no restrictions on which OS it couldn’t be on, I only required it be on Android) meaning it doesn’t get wide adoption. Lots of them are outdated, buggy, abandoned, low quality, etc. I truly wish I could see (or spark) a movement in the open source community to start making health apps, because health data is the most sensitive and most exploited data there is. This post is a sort of doubles as a sad “this is the best we have, and it isn’t even that great most of the time”







  • IT’S AMAZING! HOLY…

    My exact reaction to trying it! I wish I had known about this so much sooner.

    When I get asked why, I just say I’m just confirming what Google Maps said to me (which tbf can be outdated) so I get updated!

    I’ve gotten so used to lying or social engineering to maintain my privacy, that it felt weird to be honest about actually contributing to a map and telling people what it is.

    Thank you so much for recommending this!

    You’re welcome! But thank the StreetComplete team for making such a wonderful way to contribute to OSM





  • I’m the creator of this list of open source software. Most of what is on there is stuff I use. The list, unlike others, tries to factorize user experience into the mix, so one could realistically use all the software there. There are a few proprietary options in the mix, but those simply have no open source alternative.







  • the community was more absolutist when privacy was concerned.

    Yeah, after the Rexxit (heh) started the whole r/privacy community lost a massive amount of quality in the community. Even before then, they pushed to tell people the clear disconnect between privacy and security (which, while there is, a threat model is a threat model, privacy or not). !privacy@lemmy.ml has a much nicer community and is very open to the idea of services that are designed for security and not privacy. In my eyes, c/privacy is the more “mature” version of r/privacy. I used to occasionally check up on r/privacy after the Rexxit, and always left feeling very mad about a lot of the posts and responses.


  • Preface: this is written with less care than I do usually. I was writing one of my usual replies, but my phone chose to restart while the text was being written in its browser.

    No worries, we’ve all been there! Was the restart due to annoying OS features (e.g. Windows used to restart immediately without asking, iOS restarts if your phone is locked and it’s night time, etc.)

    Was that rhetorical 😅?

    No, I’m just blind :,) I found it now

    Edit: Here it is!

    Would you mind sharing blogs/sites etc that you find exceptionally useful for finding out about these things?

    Until the Rexodus (by the way, I’m apparently the only one to call it that. Please, people, it’s such a good name!), I had simply kept current with every post on r/privacy. I had occasionally read a few old posts, but it was mostly just keeping an eye on what the community was posting about and reading the discussions to learn as much as possible. I have a few old screenshots, like from this post and this one, but besides that it was just miscellaneous posts.

    Edit: I found others calling it the Rexodus! Here is one


  • Do you recall the exact issue?

    No, sorry. Some Reddit/Lemmy commenter.

    Is it something fancy?

    No, although invisible ink would be somewhat cool. Have any ideas for a “password pen”?

    TIL. It’s definitely neat. Thank you for that!

    No problem! :) You can also thank whoever on privacy@lemmy.ml posted it (I wish there was a search box…)

    The exception, Qubes OS, has Fedora 37 (which has gone EOL since last december) in dom0

    Yikes, any reason for that?

    Is it what’s elaborated upon in this video? If not, would you mind elaborating?

    More backstory time! I have never used a cellular carrier, and only watched that video about a month ago (because it didn’t exist prior). The first part of my life was spent electronicless (because kids really shouldn’t have phones… look at me now mom, I’m talking to strangers on the internet by routing through a global censorship circumvention network!). The next part was spent somewhat disconnected, only had access to a non mainstream social media (it has since been merged with another one made by the same company, and became paid. Capitalism.) through WiFi + never went out much. I then finally had unrestricted access, but still never went out much. Then I started to go out much more, and the places I went to didn’t have WiFi. That, in turn, led me to take up network hacking as a hobby. I never managed to hack the network in question (WPA2-E). Finally, I got my first job around the same time I learned about privacy. That meant I had the money to get a cell plan, but I had the knowledge to know why that was a bad idea.

    It’s funny, my mother recently called me because she was stressing about trying to find me a carrier (apparently?) and started saying “Your sister offered to add you to her plan if-” and I told her “I don’t want a carrier, but thank you!” and she said “Oh… Well that solves that problem.” and looked very relieved.

    Edit: I guess your question is asking ultimately why I don’t want a carrier, and it is due to the points that were also brought up in that video, yes.


  • it’s worth reviewing what Privacy Guides has to say on this.

    Interesting! Considering my threat model includes my ISP as an enemy, it would make sense for me to use a VPN behind Tor: However my threat model doesn’t care if my ISP knows I am using Tor, as it would only be collecting data uncorrelated with my activities. Although it could cause legal trouble if a presidential threat (for example) over Tor happened at the same time as my usage of Tor. The change I will make is this: I will resume my current usage until I am able to use a paid VPN plan to speed it up.

    but please consider to review Proton VPN on port forwarding

    See above, no paid plan yet ;)

    Unfortunately, at least for torrents, you’re no longer able to rely on Mullvad VPN.

    Bleh, and I was really beginning to like them for allowing cash payments!

    Easiest (and also one of the best options) is probably the use of a VM 😅.

    Fair, although didn’t GNOME Boxes have some sandboxing issues?

    there is merit in forsaking Anonaddy for SimpleLogin if decreasing the amount of trusted parties is desired. However, this comes at the cost at moving more into the the direction of putting all your eggs in one basket.

    I am using Anonaddy for that reason specifically, plus the severe lack of features in SimpleLogin’s free version.

    I hope an offline password manager is involved to some capacity.

    As mentioned, I will switch to KeePass soon. Some of my passwords are stored completely offline, however. Pen and paper never fails, I even dedicated a specific pen for it! On a related note, take a look at this

    Do you happen to know how they currently fare against each other in security/privacy features (beyond what’s found on the linked spreadsheet)?

    Once I get an Android phone, I will try out Briar (because I am obsessed with the idea). I personally reached out to SimpleX regarding the spreadsheet, and the response I received back outlined that SimpleX pads the encrypted messages both during transit and in cold storage, which they said a lot of other messengers don’t do. A comment on the original post for the spreadsheet mentions that the spreadsheet doesn’t outline which services route through Tor (which Briar does, of course). The spreadsheet is very thorough, and SimpleX is still a relatively young project, so I don’t have much I can say. I’ve tried using it on iOS, and my friend and I both agree it’s terrible to use sometimes due to lag and choppiness. I currently testflight the app, but still no change. Either way, if you want, you can use SimpleX’s built-in support chat if you want to reach out to the team yourself. They are very friendly and don’t talk like a CEO, but there can be delayed response.

    Ah, we’ve found the password manager, KeePass (be it DX/XC) is indeed excellent.

    Yep! One related note, KeePass on Tails is outdated for some reason. Have any idea why?

    I also planned to add this to my original message: I have never once had a cellular provider, which to me has been the biggest privacy boost since burning Windows at the stake.



  • If I would have to distill your philosophy, it would be something like “be protected from attacks targeted towards low(er) hanging fruit”. Would that be fair?

    It may help for me to elaborate a bit. My number one enemy (like most) is Google. I have been completely Google free for 1-2 years now (with the exception of YouTube on iOS, as the alternatives ultimately require a Mac to install, which I don’t have), but I haven’t used Google as a search engine in over 4 years. Besides trying to give as little information as possible (I am currently experimenting with setting up a hard firewall block against their IP addresses, if you have any recommendations on how that could be automated, potentially in Python, please let me know), I also try to give as little information to other companies (Microsoft, etc.) as I can. Now, certain authorities have the permission to request data from companies, not just privacy disrespecting ones. That means that part of my threat model entails certain defenses against such agencies, to make it hard enough to correlate that data with my person. I don’t go overboard, in case anyone is worried. I’ve seen the bondage between paranoia and privacy, and I’ve set myself clear boundaries I won’t cross. So, my main goal is to protect against companies trying to collect my data (bleh, how cliche), but it doesn’t hurt to put in place some decent practices in case the world turns for the worst. I am protecting against attacks from the government towards low hanging fruit, but when it comes to large corporations, I don’t play nice.

    If you want an overview of my setup, here it is:

    • Tails occasionally (because it’s fun)

    • SecureBlue (Soon!)

    • Tor Browser when using personal accounts (email, Lemmy, etc.)

    • ProtonVPN on all devices 24/7 except when using Tor (for speed) or large downloads/torrents (may look into Mullvad VPN)

    • Mullvad browser as a default browser

    • Librewolf for functionality Mullvad Browser doesn’t have (Yubikeys, etc.)

    • Firefox for streaming some videos that require a specific DNS configuration (Soon looking into how to put an extreme sandbox on it)

    • uBlock Origin for all browsers

    • GrapheneOS (Soon, finances be blessed)

    • ProtonMail + Anonaddy, use disposable emails for accounts that “don’t matter”

    • Very, very strong and unique passwords + 2FA/FIDO for everything applicable

    • As much FOSS software as I can

    • Signal as my main messenger (to help bridge the gap for my friends) until GrapheneOS, then SimpleX (Please take a look at https://privacyspreadsheet.com/messaging-apps !)

    • SearXNG as my main search engine (with Google turned on, because my threat model does not go against them collecting data not correlated with me)

    • Bitwarden as my password manager until GrapheneOS, then KeePass

    • NextDNS as my DNS resolver (which gets overridden by the VPN’s DNS on iOS)

    I’ve come a long way since I first (unknowingly) started my journey in 2019(!)