To be additionally fair, Android still has phones out there in use that still dont have the RCS feature, and never will because those phones are no longer supported.
To be additionally fair, Android still has phones out there in use that still dont have the RCS feature, and never will because those phones are no longer supported.
I don’t think ive heard about any privacy issues regarding modems. They convert your data into the Level 1 format so that it can be moved to the next hop. There isn’t really anything to spy on, and its very hardware dependent (hence no open source software that can standardize across each device). There might be open source modems out there, but your ISP probably doesn’t support them.
As you wish. But maybe open up to some new perspectives.
What does a healthy opinion of F-Droid look like though? Lol
Well, then its still 2FA. Something you are and something you have.
The website has to build in support for them. Youll start seeing it more over time.
To be fair, you cant use the passkeys unless you are logged into your password manager, which requires a password you “know”.
This blog is specifically for websites that are public facing. Sure, you can wireguard into your local network, but you can also SSH into your local network. Either way you have to poke a hole.
Good read.
I would just like to add some additional information that favors changing your SSH port to something other than the default. When crawlers are going around the internet looking for vulnerable SSH servers, they’re more than likely going to have an IP range and specifically look for port 22.
Now can they go through and scan your IP and all of its ports to look for the SSH service? Yes. But you will statistically have less interactions with bad actors this way since they might specifically be looking for port 22.
This is one of those features that should be ON by default. If its OFF by default, then this wont be adopted by advertisers, thus letting the internet continue down its dark, invasive, malicious path. Firefox is taking a chance here at making the entire internet better than it was before.
Those that are upset by this feature being enabled by default have the right to be upset about it. Totally fine with that, and I get it. I just think its also fine that Mozilla inconvenienced those people in order to push this. They could have communicated it more clearly than they did, but overall, this seems like a tool that I hope advertisers can get behind rather than the aggressive tracking methods they currently deploy.
I know its tough to source something that says that this new Firefox anonymization tool for advertisers will individually fingerprint someone, but if you find it, please share it and I will gladly read through it.
Have a good day.
Im talking about this new feature specifically, not in general. Thanks for the overview though.
This wont make your browsing anymore private than it already is or not. This is just telling advertisers to back off and accept that this is the only data you’re going to get willingly, and its nothing that can fingerprint you individually.
Source for how this anonymization is a myth?
They can believe what they wish. This doesn’t add or reduce any advertisements that show up. This only gives advertisers anonymized data instead of advertisers using very invasive and possibly malicious methods of tracking. If they read any of the documentation for this, they could help themselves understand what its for.
You’re going to be tracked regardless if this enabled or disabled. It doesn’t matter what web browser you use.
Yes, verified boot will have out-of-bands alerts for you by design. Without the online component, you will risk not being able to detect tampering.
If the hardware is tampered, it will not pass the attestation test, which is an online component. It will fail immediately and you will be alerted. Thats the part of verified boot that makes this so much harder for adversaries. They would have to compromise both systems. The attestation system is going to be heavily guarded.
Phishing emails exploiting people who click every link possible affecting millions of users worldwide.