Avatar
NotAFBIpot
154af92e35b9768a93b493f310a8a709f91bc5a7277a4a380e1e72f26eac36d7

https://youtu.be/66pnt974mvQ?si=X1-f9ujCORjuiYA6

GrqpheneOS update with some nice features

#google

#pixel

#Grapheneos

I think people should check out cryptomator (especially in the UK)

Machdyne let's me shitpost 100 years from now

#data

#usb

#coldstorage

If you're an IPhone User in the UK and the ADP being disabled makes you angry, you should migrate to the more Free and Open source security option GrapheneOS.

While I'm glad that apple Didn't backdoor their phones , I think that non walled garden options are far better #Grapheneos #Apple #uk

I love Digital preservation

#forever

Friendly reminder why these online platforms don't respect you and you don't own your media

Physical media is looking better then ever #fuckamazon

https://hackaday.com/2025/02/18/auto-download-your-kindle-books-before-february-26th-deadline/

https://fountain.fm/episode/9IHudNJKOT4aOs1UfW0v

(Okay I fucked up the audio on this one )

#encryption

#podcast

#backdoor

#security

#eu

Fun fact

You can run Syncthing over I2p

Why

No NAT

100% self hosted

No traceable connection between hosts

You get to run two I2P nodes

You don’t have to trust Syncthing relay servers with anything

More cover traffic for I2P

Here's a guide I found

https://web.archive.org/web/20171008035012/https://barry.im/post/2017/10/6/syncthing-over-i2p/

#syncthing

#selfhosted

#i2p

Fun fact

You can run Syncthing over I2p

Why

No NAT

100% self hosted

No traceable connection between hosts

You get to run two I2P nodes

You don’t have to trust Syncthing relay servers with anything

More cover traffic for I2P

Here's a guide I found

https://web.archive.org/web/20171008035012/https://barry.im/post/2017/10/6/syncthing-over-i2p/

#syncthing

#selfhosted

#i2p

Update Tails NOW!

Important security fixes

The vulnerabilities described below were identified during an external security audit by Radically Open Security and disclosed responsibly to our team. We are not aware of these attacks being used against Tails users until now.

These vulnerabilities can only be exploited by a powerful attacker who has already exploited another vulnerability to take control of an application in Tails.

Prevent an attacker from monitoring Tor circuits. (#20733 and #20744)

In Tails 6.11 or earlier, an attacker who has already taken control of an application in Tails could then exploit vulnerabilities in Onion Circuits and our Tor Browser wrapper that might lead to deanonymization.

Prevent an attacker from changing the Persistent Storage settings. (#20745)

Looking at all of these Data breaches make me glad I use virtual cards

Xmr and aliases, its not bullet proof, but self hosting on my phone and my server that I physically own and have makes me feel much better

#selfhost

#databreach