Had the same, promptly uninstalled, didnt find infos.
Had the same, promptly uninstalled, didnt find infos.
Well opressivs governments dont work by serving good policys to the people, they work by blaming a part of the people for all problems and then promsing to get rid of them/punish them. A scapegoat basically. The opressors don’t make it better for the people, but the people are happy because the ones they think causing their suffering get punished.
Historically this has been the communists in Nazi Germany, or faschist italy, modern faschists try to make gay people and people from the far east this scapegoat atm.
The problem is: the scapegoat is never the real cause of the problem. After taking them all to the kz, and life for people still not getting better you need a new one. For Nazi Germany those where Jewish people, just because of their religion, has Hitler proposed the “kommunistisch-jüdische-weltverschwörung” (world conspiracy of Jews and communists) When after the pogromes stuff still would get better, they would blame everyone not arian. (Not blonde, blue eyed, northern heritage)
If a fascist government tries to exclude you or not is just a matter of time, at some point they will rum out of scapegoats and come for you.
You never know which aspect someone picks to exclude you (gender, political view, haircolor, Parents, lastname, sexual preferences, religion, mental health, physical health etcpp.) So it’s better to not have someone gather all that info about you in the first place.
I am with you in this one!
If something is “easy to use” this includes the time you need learn said thing.
Drinking rahmen from the bowl is easier then using chopsticks (even if you are more elegant with chopsticks)
Driving automatic is easier then driving manual (even if you may be more efficient with manual if you practised shifting a lot)
Walking is easier then flicflacs (even if you may be faster with flicflacs if you practised a lot)
Using Ubuntu is easier than using arch (even if arch gives you more control and opportunities if you understand it)
Well its shown to you at the bottom of the screen what it does…
And if you want Ctrl v,c,s etc. To work like in word etc you can always use nano --modernbindings
Well okay by that logic playing Beethoven on piano is super easy
Better? Maybe!
More efficient? Surley!
But easier?! Hell no! Easy means you can use it without a lot of training or studying. It is self explanatory. And there is no way on earth that vim is easier than nano. I don’t need to know anything to use nano I need to check docs for hours before I can even start using vim
Dunno what you used, but nano is literally a text editor that may be simple simple but it just works. Shortcuts are shown to the user, buttons work like you expect them to (arrow keys, ESC, shift, etc)
With vim you open it and if you haven’t read 5pages of doc you won’t even be able to close it again. I see that its useful for pier users, but for casuals who just want to edit a config once in a while nano is absolutely the way to go imho
Comes down to preference in security vs. Convenience: Keepass is local, so more safe, but with the downside of no automatic sync. can be solved with KDE connect (completly local) or nextcloud (trusted server) though it is not as smooth of a user experience.
Battery is good in my opinion, had an used LCD smartphone before, which held barely a day in the end, this one has two days and a half with battery saver kicking in at 25% which is more than enough for me.
YouTube: newpipe
Mail: fairmail
Cloud: nextcloud (you need to host a Server or join one hosted by someone you trust though)
Music: phonograph
Video: vlc
2FA: freeOTP
Passwords: keepass(XC)
I am using grpahene on a refurbished pixel 6a for 250€
I was coming from lineage os, and while I loved lineage for not having ads, possibility for no google etc. I AM SO HAPPY WITH GRAPHENE
it is better optimized, has higher security and the multiple users, sandboxes Google and stuff are soooo nice and easy to use
Also the pixel is a very nice phone (crazy camera, perfect oled) but I don’t like that it doesn’t support wired headphone and SD cards. Still very much worth it IMHO
You keep referring to concepts like “Keys encrypted with itself” “Tpm are by design encrypted”
When you don’t really say anything from value.
Not every “encryption” is the same.
When we talk about safe encryption we talk about file system level encryption of a system with safe algorithms like aes and a long enough random password (the key). this is safe.
If you store the key unencrypted on your phone, this encryption is no longer safe.
If you don’t know the 16 random digit key it HAS to be on the phone and it CAN’T be encrypted “by itself” because you would no longer have any means to decrypt it.
It could be encrypted with a pin, but again, then its only as strong as the pin, and I don’t know how long an only numeric pin would need to be to withstand modern brute forcing, but I doubt a relevant percentage of people have that kind of pin.
You can’t explain how this would be safe, so you just come at me with russels teapot and say “well you can’t prove its not safe” (which is true because I’m no security expert, but someone with enough knowledge could certainly) and lash out at me “acting in bad faith” because I don’t jump through your hoops of passive aggressive misunderstanding.
All I can do is refer to experts, who found things like CVE-2022-20465 - a bug which allowed lockscreen bypass.
As you could have googled that yourself, but you ask this just to throw me off.
But if you want to keep using your google android and bitlocker win and feel safe, its not my problem.
How do you think encryption works?
What do you think does a lockscreen?
If you think TPMs are always encrypted, a key can be encrypted “with itself” and still be any use to you and android system pin is secure you are right. Might also believe in santa
The device needs to be physically accessed and modified and then unlocked in order to exploit it.
Exactly the service the company offers
Yes it is a vulnerability but with those steps you could also just solder a keylogger to the keyboard.
This is not a hot take at all!
Sure thing, it is equally hard to confiscate/steal a device (if the user notices you just shrug) and open it no user input required And Stealing the device without the user noticing Solder a keylogger, get it back to the user without them noticing and having them put in their password, then steal the device again so you can use said passwort
I totally agree
You are right in a sense of: If the TPM holding the keys were itself encrypted with a strong password, this would be still be considered secure. You are wrong in the sense of: lenovo sells a device, tells its users its encrypted, their data is safe. None can steal their data
in reality the data can easily be accessed, which could be considered as “cracking the device/bypassing the encryption” because what lenovo prevent was someone ripping your ssd l, but not just decrypt it because the encryption was not implemented securely.
I don’t want to debate the security of a luks Linux volume or veracrypt windows laptop, (even though even those are in theory vulnerable to highly targeted and skilled things like cleverly exploiting e.g the logofail bug)
My point isn’t that there are no ways to have a secure system, my point is that the percentage of truly secure systems is low
Dude what encryption are you talking about? Hardware storage encryption is just by now getting more widely adapted, the phone I used till a year ago didn’t even support any encryption.
Sure, aes-256 with secure password only stored in your mind is quasi 100℅ safe, but that is not how most devices handle their “encryption”.
If the key for the encryption is on the device, and either stored in an unencrypted TPM or unencrypted storage, its not a matter if breaking the encryption (quite impossible) but breaking the software/hardware (quite possible for someone with good enough forensics and skilled programmers)
Also also: encryption only helps if the device is off, which is seldom the case with phones.
Yeah TPM chip encryption is mostly not secure (at least not by simply existing, as an encryption with with a strong password that only exists in your head is) I’ve seen a german youtuber crack the bitlocker TPM encryption of a windows think pad, I have no doubt big companies can do this for the 3-4 most used TPM chips in android phones
And if you got the device and can damage it, even if you couldn’t crack the chip, putting the silicia under an electron microscope is always an option (lots of actual manhours of actual experts needed, but you could charge the client heavily to compensate)
I am aware that there are secure encryptions, but android isn’t hardware encrypted isn’t it? Haven’t used google android for a while, but no encryption was one of the reasons I moved away from it.
No idea about apple, but longer startup times for storage encryption doesn’t seem like a very apple thing to do
Also phones are so seldom turned off, and if the system is running storage encryption becomes less of a concern as the key is somewhere in the ram
True, but the config settings should be good Form the get go, that’s the reason the app exitists after all and ublck and noscript are installed fast. But thanks for the tip :)