Is it possible to run docker/podman containers in the terminal?

Reply to this note

Please Login to reply.

Discussion

Should be possible, it's an entire Debian VM for you to install Docker in.

What would be the best way to route traffic through the Tor network first, then access a proxy after the last node, and finally reach the destination website? This applies to both smartphones and computers.

I don't recommend this and I don't try this.

RethinkDNS allows chaining numerous WireGuard VPNs. One of them with Tor would do it. All I can think of.

Once again, you've recommended an awesome app that I wasn't aware of. Do you have, or could you put together, a list of your top app recommendations for Android?

Most of the apps I use are tied to a service, so they're not really something I can recommend unless they like that service.

Organic Maps is a good maps app.

AppVerifier is a good app to check the APK signing key hash of an installed app. Some app developers put it in their repo as a way of verifying an authentic download.

I use this Gallery app:

https://github.com/IacobIonut01/Gallery

Thanks

What's the current situation with spyware like Pegasus and similar tools?

Companies of this business model are highly secretive and the amount of victims for such attacks isn't fully known since it depends on heuristics or TTPs used by the exploit during that exploit's period of not being exposed, there can always be more and it's not accurate to tell. It is almost certain such malware of its kind exists for iOS and the stock Android distributions. How that exploit is delivered also can vary and has a dependency on a user using a certain service or app, one example being WhatsApp.

Majority of GrapheneOS features and exploit protections like hardened_malloc and MTE are designed for protecting the user against memory corruption vulnerabilities. Memory corruption makes up the majority of critical vulnerabilities exploited in the wild because of the capabilities exploiting it can bring. There are many features users could opt into using as well.

For an exploit of its class to work on GrapheneOS, it would almost certainly have to be designed for GrapheneOS. This can be difficult to maintain due to regular updates and new features/enhancements of the OS or even the apps.

nostr:nevent1qqsfdvew2fde7lm6tkfqz5m43xxugr998sxe7tfqchfv59uf2yehh3cpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2qcyqqqqqqgh2glvj

this is gonna result in me buying a new pixel so soon lol.