4a
Seoclaid12
4aa1c8de9a61b93f9f1a814fd9ff2143503ce8123b81cc17090fec1d1308b18e

this is good but please make the flatpak Signal-certified

so it can be a signer for nostr web-based services.

the amber github has a version without that functionality you can use on device.

works well for me

@greenart7c8 please correct me if incorrect

iPhone Air, yawn. So shiny and Huxlian. Funny to me now that I ever went to Macworld back in the day. Apple's offered "privacy" is tyrant privacy. You are a peasant under their boot. Take control of your tech stack.

Replying to Avatar Final

If you consider yourself a target of a high risk threat, you should do the below. This will be a repost of a past post. However, I updated this. This list is also far from a complete scope of what you should or could do.

Device / OS security:

- Use the most recent device you possibly can.

- Upgrade your device to the newest generation as soon as possible if you can comfortably afford to.

- Use the latest version of your operating system as soon as possible.

- Use full disk encryption.

- Use a long, secure, unique passphrase for your device. Ensure they are unique between all devices.

- Never leave your devices unattended. Keep in your proximity or in a safe place.

- Turn your device off in a tense situation or when not in use for many hours.

- Do not plug devices into unknown ports or with unknown cables.

- Never download unknown apps or files.

- Uninstall preinstalled applications and disable services you do not use.

- Disable WiFi, Bluetooth, NFC etc. when not in use.

- Use airplane mode and/or take out your SIM card as much as possible to minimise cellular network tracking.

Network / Web browsing:

- Only use encrypted protocols i.e. HTTPS, SSH, SFTP and more. You can enable certain applications like Web Browsers to always use HTTPS. Manually type in the https:// part of the URL.

- Use a VPN or an anonymity network like Tor if you are concerned about web sites knowing your IP address or wish to obscure traffic from the ISP of your connected network. Understand you are shifting trust by moving your traffic into other servers.

- Disable JavaScript just-in-time (JIT) compilation for a significant attack surface reduction. Disabling JS is a massive attack surface reduction, but may cause you to stand out and make web browsing unsustainable.

- Disable web browser features you do not need.

- Use an ad blocker if your browser doesn't have one.

- Use the least amount of extensions as possible.

- Use feed readers.

Communication:

- Communicate only over secure messaging apps.

- Only message people you trust or know.

- Do not open unknown attachments.

- Enable scheduled deletion of messages.

- Remember in a private message your communications are as secure as the least secure person there.

Accounts:

- USE MULTI FACTOR AUTHENTICATION. TOTP is secure, and a hardware MFA like U2F keys are most secure. Avoid SMS or email-based MFA where possible.

- Use unique passwords for accounts.

- Use email aliases or burners. Not everything needs to be attributed to you.

- Lie. If a service isn't required to know about your real world identity, like applying for a passport or deliver a product, then don't use real details.

- Delete accounts you don't use. Make new ones when you need services again.

- Assess whether signing up for something is necessary.

Opsec:

- Search yourself on Google, Bing, Yandex, etc.

- Post more of what you want everyone to know, not what only certain people should know.

- Don't create an incentive for people to try and uncover you or misuse your trust. Be private but not mysterious. Don't be a bad actor people will and target you for.

- AI face search / reverse image search yourself.

- Do not post pictures of interiors or locations unless you want everyone to know you was at the location at some point.

- Opt out of data brokers and public indexes.

- If you know too much or too little about something, it's better not to talk about it at all.

- Decide whether you want fame or you want privacy, and stick to that. Regret is a mental toll that will distract you.

- Use common sense and rationale. Be diligent but do not be paranoid. Growing an obsession over a tiny detail leaves you vulnerable to being distracted by a red herring, attention that could be used to uncover a flaw in your approach.

- Learn to concede. Find the answers sources tell you, not the answers you want to hear. Unless you are a professional, then you are not a reliable source.

- Disassociate with data. Learn to only keep files or other data as long as it is necessary. If they serve no use, delete. If they serve a future use, then back it up and encrypt.

- Remember that you are only as secure as the people you trust. If they do not meet your safety or security requirements, don't enable them to do things that could cause trouble.

GrapheneOS users:

- Toggle on enabling hardening like memory tagging, Dynamic Code Loading restrictions and disabling WebView JIT by default.

- Use a strong diceware passphrase if you are concerned about a sophisticated actor with physical access.

- Use user profiles or private spaces if you need something uniquely compartmented or their own VPN.

- Set automatic reboot time to the lowest time you have comfort with.

- Enable duress password. Make it something easy to trigger but difficult to misfire.

- Use your duress password just before shit hits the fan, not when it already has.

- Use two-factor fingerprint unlock with PIN scrambling. to prevent shoulder surfing your primary passphrase credential to decrypt the device when BFU.

- Use the right USB-C port control setting for you.

- Enable LTE only mode for attack surface reduction if you choose to use the cellular network.

- Use Storage Scopes and Contact Scopes for apps more often.

nostr:nevent1qqsvav3pn4j26k5zrldf90vtpujq5d46s0zjtsh7mnah5xw655kxtnspr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgstnr0dfn4w5grepk7t8sc5qp5jqzwnf3lejf7zs6p44xdhfqd9cgsrqsqqqqqphk6g6e

nostr:nevent1qqsvav3pn4j26k5zrldf90vtpujq5d46s0zjtsh7mnah5xw655kxtnspr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgstnr0dfn4w5grepk7t8sc5qp5jqzwnf3lejf7zs6p44xdhfqd9cgsrqsqqqqqphk6g6e

Core guidance. Thank you for taking time to do this.

Replying to Avatar Final

A cold, hard truth a lot of social media influencer privacy / security enthusiasts won't like to admit about themselves is that you are likely to know much less than you think you actually do. Including myself.

A cyber security professional who uses all the normie-tier, status quo products will be far more safe than someone who isn't a professional and is using software focused on privacy or security. If you want to know more you need to study with the mentality like you want to be a professional.

The former groups of people know and understand the products they use and their security properties. Depending on the role they also know how to reverse engineer, discover vulnerabilities and have a consistent threat model when building defences. The latter are often using a product because some place online told them to without much critical care or observation. It shows a lack adaptive technical skills, approach or mindset.

Talented hackers and security professionals using Windows, Apple products and more aren't hiding some secret incompetence. They just know what their requirements and demands are and their choices fill them. They know they can move and use something tougher at any time should their needs change. Changing a software or a device choice is only a small part.

It's a shame that a lot of online spaces have this mentality that many things are completely compromised in secret, when in reality this only works in a nonsensical dystopia where all the intelligent people ONLY work with their perceived threat (whether it is secretive agencies, governments, some advanced actor or whatever else) and the common man is stupid. This is the same mentality that some, like flat earthers, believe how the world is run.

Being a hacker is all about learning how things work, how do you think people get to understand malware without source code? How do the bad guys break into systems they never touched?

Reading can only do so little in a specialty that changes frequently and information is outdated all the time. A book or and not every forum post can't get updated. If you want to start getting serious, log off the forums and go on a security lab platform and check out their guided training, or take a course, or get a entry level job.

Great advice, thank you.

works for me, always has

Zapstore is cool but is your npub still tied to your app list and known to Zapstore and the public? I like Zapstore but that may be a concern for some threat models to have installed apps known.

Also, I've been watching for more apps on Zapstore to be signed by devs themselves rather than Zapstore. Some are, most aren't. Should improve.

It has trended over time. Feels like nowadays there are more conventional IT professionals among the mods. They more often give advice like I feel I woukd hear in a corporate setting. Less FSF, coreboot kinds of people there.

I've seen discussions RE Linux power management in forums related to Linux mobile devices such as Librem 5, Librem 11, Starlabs Starlite. Maybe check out Purism forums and Starlabs computers Reddit if you haven't run across those yet.

Several of those countries are 5 eyes, 9 eyes, etc, or have their own assaults on freedom, encryption, privacy. Both right and left governments have their own reasons for advancing authoritarian control. One must be cautious in Europe as well.

Yep, flashed it from another pixel device. The Google case allows easy portrait mode orientation use which I prefer. I placed a sticker over the unfortunate Google logo, of course.

Well done, Tavi. Thank you for your hard work across 10 years.

Watching a review video (by someone named Brandon Roswell) on Daylight's DC-1. Looks super cool but 10 minutes in I can see the apps: Gmail, Chrome, Google Drive, Play Store, ChatGPT, Google Docs. These are apps I go to great lengths to get away from. The presence of Google on this device (to me) is more unhealthy the the blue light Daylight is attempting to avoid in their screen.

nostr:nprofile1qqswhhhf99z77pfg80s2c00z27rusxn2tzss7450n34krkwa2yadhtgpp4mhxue69uhkummn9ekx7mqpz3mhxue69uhkummnw3ezuerkv36zuer9wcq3vamnwvaz7tmpw5h8yetvv9ukzcnvv5hx7un8lpntld do you plan offer the DC-1 with the option to flash a de-Googled version of AOSP? Is it possible to unlock the bootloader? Thank you

#daylightcomputer