• 1 Post
  • 27 Comments
Joined 10 months ago
cake
Cake day: November 14th, 2023

help-circle






  • I game on Linux mint and have had very little issues out of the box. Worth noting its super easy to game on and steam is seamless. Not a hard distro to learn with tons of forums and updates. Lightweight and overall no major complaints as I only broke my system myself tinkering with things I wanted to tweak. I’ve always fixed it relatively easily and I don’t know much about terminal commands. Tons of info online, mostly copy and paste. Cheers.





  • What is unprivate about brave software? Assuming all telemetry is turned off and the browser is configured for strictest of settings no crypto, no ads, no telemetry, no java, session cookie delete, ect ect. Do we have RCP happening phoning home? I have never set brave up behind traffic analysis to see what outbound traffic gets sent that was not from the user. This can be directed towards desktop and mobile.

    Besides the above the only off putting thing I’m aware they have done is installed their VPN software without permission on dekstop which I found myself before I seen the news about it. Edit wording.



  • Brave has been thoroughly tested from many privacy advocate organizations EFF and more known names using default settings and ranks as the highest overall rated fingerprint resistant and anti tracking protected browser, again at default settings I have ran many tests once configured and get even better results even against librewolf with and without extensions and vanilla Firefox with privacy badger and ublock ect as well as without. (I use librewolf on desktop for those who are gonna down vote this) Gecko based browsers are advised against on Graphene and is spoken in length about on reddit from one of their Devs. Chromium and google is a bad combo sure reliance on Google and all to begin with, but so is supporting Google to degoogle with a pixel device. Could brave be a honeypot? Sure and many other services. So could VPN providers and any service for that matter. The biggest advantage I see using Firefox is promoting a non google alternative and balancing the scale against googles monopoly. In some cases Tor adds risk due to it being a giant vacuum for govt or other malicious entities looking to snoop. Its like taping a sign to your traffic. I think it serves a purpose but that varies from each persons use case.

    Edit typo.



  • Its my understanding the metadata is only stored on the home server that runs for the clients, so under a self host scenario the hoster would be the only party that could access such metadata. One big con to Matrix is that it lacks ephemeral messaging so I’m not sure if chat history is stored on client side once the server goes offline? I cannot find an answer through browser search or documentation. Couldn’t the hosted server be restarted anytime and it would essentially delete the metadata generated each cycle and chat history as well because the chat room would be deleted? Or ran inside say persistent Tails and with a device shutdown or unplug all data would be wiped due to its ram only nature while persistence only keeps the base setup of matrix not a full carbon copy so a new chat would be generated each power cycle. Similar to VPN services running on ram. Thoughts anyone?



  • I hate relying on anything big corp for privacy. Thanks for the reply and I’ll keep this in mind. It seems so far matrix chat is the only e2e chat that can remove the conversation from an individuals device once their removed from a room. I will have to do deeper research into matrix to see it it fits my use cases. I’m just not sure how it stacks up against other big name chat platforms as far as security/privacy goes. I’ve heard of it before. Never deep dived into the data.



  • This is called ephemeral messaging. A good feature of many apps. But doesn’t serve the same purpose for which I am asking. Thanks for mentioning another option other than the usual messenger apps. This is the description for others copied from a basic browser search.

    Keybase is a key directory that maps social media identities to encryption keys (including, but not limited to PGP keys) in a publicly auditable manner. Additionally it offers an end-to-end encrypted chat and cloud storage system, called Keybase Chat and the Keybase Filesystem respectively.

    Website here for those interested in reading about it -> https://keybase.io


  • Using scifs is widely known and of course a good addition to certain threat models. But doesn’t account for distance of individuals. My post was inferring distance between parties. That is why I talked about messaging clients and their features. For times when parties cannot possible be in person, also this is for everyday use not one time, I’m asking about a messaging client and feature set. Otherwise very good info here for others to learn and read on. Good post! FYI its worth reading on Pegasus and their zero click infection capabilities and multiple zero day exploits.