Avatar
BzzT!
214ad227ac30fce6f7287a4e9b659784a2298894d783b3294a8df5246e450746
gimme the loot!

Prefer the current one.

Some apps like Telegram allow the user to choose the app icon in the settings. You could give everyone the choice to choose what they like ;)

Respect. It is really hard to do. I've tried to cut as much out as possible in addition to sugar. Keep failing as it is so easy to cave. Shit is everywhere.

Well, it looks like I'm fucked.

This is troubling to hear. I see a lot of protein powders switching to this. I'm guessing it's in a lot more products I have never noticed too. Thanks for the info!

Replying to Avatar Cyph3rp9nk

Came across some analysis claiming that the foundries haven't seen an increase in orders/production now to be ready for when nvidia's projected sales are supposed to come in; queues are sitting low. Conclusion was that nvidia's numbers were bullshit...

Replying to Avatar QnA

Announcing my new nostr:npub1235tem4hfn34edqh8hxfja9amty73998f0eagnuu4zm423s9e8ksdg0ht5 guide!

Reclaiming some mobile phone privacy no longer requires crappy hardware, unacceptable trade-offs or command line knowledge.

Install Graphene in under 10 minutes with just a laptop and a web browser. Learn how👇

https://bitcoiner.guide/grapheneos

This isn't just a guide on how to install @GrapheneOS

, it's full walk through of everything you need to know before removing Apple or Google from your mobile life.

The guide covers:

- Tips on easing the transition

- The install process

- How to customize GrapheneOS

- The various different methods you can install apps

- An extensive list of Apple/Google app alternatives

- An honest discussion about the GrapheneOS trade-offs

- Sandboxed Google Play Services

- eSims and 'Profiles'

- Backups

I hope you enjoy reading this one as much as I enjoyed writing it. If you do, please give the guide a share so more people can learn about Graphene and opt out of the surveillance software they carry with them every day.

If you have any feedback or suggestions, get in touch.

🧡

Is there a good or recommended way to backup or transfer your settings for apps if you're still on stock android? I've been using my phone for 2 years and would like an easy way to backup and restore some things on the graphene side without having to start from scratch.

Thanks for sharing, had no idea they made these.

What model is this? I see other models but seem to be lacking some of the button clusters and other keys.

Replying to Avatar Derek Ross

nostr:npub12262qa4uhw7u8gdwlgmntqtv7aye8vdcmvszkqwgs0zchel6mz7s6cgrkj and I are trying to decide on a name for a new NostrPlebs.com service and having a hard time deciding between the two of them.

Help us out 🤣

Chose second name. There wouldn't be a second if the first was good enough.

I gotta stack more sats so I can finally register! 🤣

It's the seamless interoperability and synergy you get with your Apple devices. When you add a new product into the mix, they fit and work well together.

Your products also work well interacting with other Apple users and even 3rd party accessories.

They seem to manage the experience very well and plan out the 'what could go wrong'. But that leaves you having to do things their way. There are a lot of restrictions if you're more of a power user.

Sorry for the buzzword/jargon soup.

If the vaccines were so effective, why would they have to worry or care about the unvaccinated? They should be fucking immune.

Thanks for sharing your experience. Do you use your desktop daily and have you run into any situations that Qubes wasn't able to handle?

I want to give it a try now, but lack spare machines to try it on. I will see if I can do some nested virtualization to get a feel for it without downtime.

Replying to Avatar Cyph3rp9nk

Qubes OS

How does Qubes become the most secure operating system today?

By isolation. Qubes is not an ordinary Linux distribution, Qubes is a Xen distribution. Xen is an open source tier 1 (baremetal) hypervisor that runs directly against the hardware. Virtual machines run on top of Xen, each of these virtual machines is the one that provides services to the system. For example, there is a virtual machine that provides access to the network, another virtual machine provides the firewall, another virtual machine dom0 is the one that manages the Xen engine, another virtual machine manages the USB devices, and finally we have the different work environments, with which we can create various levels of reliability.

All this that you are telling me is all Greek to me. In short, if a virtual machine is compromised, it will not affect the rest of the machines, because each machine is isolated from the rest of the system.

Within Qubes, we can run different Linux templates, including Fedora and Debian, and we can also run Windows (I do not recommend it, because it is a severely compromised system).

What are these working environments?

The funny thing about all this, is that we have to re-educate ourselves to use Qubes. The idea is based on having several environments depending on the reliability of each one. For example, we will use the "untrusted" environment for everyday web browsing, we can use the personal environment for accessing password-required websites, and we can use the "work" environment or one created on purpose for the most critical websites such as bank websites. Finally we have an environment called "vault" which does not have Internet access, and in which we should store our files. The working environments are differentiated from each other by the color of their windows, which is customizable. For example, in the default installation the "untrusted" environment has a red window border, the "personal" one is yellow, "work" is blue, and finally the "vault" environment is black.

What does this achieve? That for example, if the "untrusted" environment is compromised, it will not affect the "personal" environment in which we have access to webs with passwords and therefore the access cookies. Or in the same way, if the "untrusted" environment or any other is compromised, it will never have access to our "vault" environment which is where we have the files.

We can create as many environments as we want in just seconds, since these are based on Templates predefined by the system.

How does Qubes achieve privacy?

Through Whonix and the Tor network. Whonix is a Linux distribution configured to use Tor by default, like Tails. Qubes uses a Whonix Template to give access to the Tor network. In case we want privacy, we just have to make use of the whonix machines that Qubes creates by default. We can even configure it so that all Qubes access is through Tor.

What do I need to use Qubes?

A processor and a motherboard that are compatible with Intel's vt-x and vt-d instructions or their AMD equivalents, AMD-V and AMD-Vi.

It's a bit of a pain, because not all computers, especially low-end ones, are compatible, but it's the price to pay for running a "reasonably secure" operating system.

How do you install it?

Well, like any other Linux distribution, it has its graphical wizard and it is not very difficult, but if you have any questions or problems, I will gladly help you.

https://www.qubes-os.org/downloads/

Is there a step down from Qubes that provides isolation with a relatively easy way to administrate? Qubes seems incredibly intimidating for someone who does not have a graybeard background.

The closest I've found is maybe an immutable distro, with some kind of elaborate flatpak sandboxing setup, or some kind of jailing? Distrobox currently does not have sandboxing.