

Actually RCS has encryption in the new spec now, and we could see encrypted RCS messages implemented on iOS and Android within a year.
But even so, use Signal.
Actually RCS has encryption in the new spec now, and we could see encrypted RCS messages implemented on iOS and Android within a year.
But even so, use Signal.
I dont want you in my device. I dont want your third parties. I have no desire to make my device more vulnerable just so you can install malware on yours. Any open apple device is a risk to my closed apple device.
Learn to take “no” for an answer. Let me enjoy the product and use it as I intended. I don’t use it for you.
The UK is so fucking nosey.
We can agree to disagree. I don’t think apple devices should be opened up at all. If you want an opened up device, look for a different manufacturer.
Thats the thing. I buy apple products for that sole reason rather than use a GrapheneOS device.
I want it locked down. I want it immutable. I want it matching every other device so im not fingerprinted. I want it backing up to the cloud with end to end encryption while syncing with all my other devices. I want it to airplay to my TV. I want it to be a webcam for my macbook. I want it to hold some health data while keeping it out of prying eyes. I want iMessage to end to end encrypt my text messages to other iMessage users.
Why bother getting an iOS device if thats not what you’re after? Their products are some of the most secure devices, with the longest support life. I save money by holding an iPhone for 6 years, versus 3 years with an Android phone.
Listen, I LOVE grapheneOS. Its just not a complete ecosystem yet.
GrapheneOS is how Android should be, but its a solitary experience versus iOS, which harnesses the interplay with other apple devices.
Honestly, fuck security. I want every app on my phone to phone home to other malicious app stores with all my personal data. I want them to install backdoor VPNs that tunnel all my data to a man in the middle. I want them to allow me to jailbreak my phone so I can install permanent rootkits, that way adversaries can reload their botnets even after I factory reset my phone.
On the real, i appreciate Apple for what they’ve done so far. If this happens, ill have to move back to GrapheneOS. Which is fine, but its just so much more time that I have to spend on making the phone work versus working on the phone.
We should force the entire EU to mandate GrapheneOS on all phones. Well see how much they enjoy the experience.
What if we all demand our employers for a tariff offset raise on our wages?
It would be a shame if some foreign actor could monitor Starlink internal networks.
Not entirely true. There is other sandbox software out there (such as firejail, distrobox, docker, chroot, any VM products, etc) although they should also be cautious about claiming to be more secure. Flatpak, however, is not considered a sandbox by some.
Care to explain?
If your distro doesn’t work unless you use Flatpaks, then stick to flatpaks ig. Its your system.
There are quite a few reasons to avoid flatpaks tbh.
You have no control over the dependencies. A flatpack can include a very old dependency and there is nothing you can do about it. You are at the mercy of the developer.
Many Flatpak applications available on flathub are not effectively sandboxed by default. Do not rely on the provided process isolation without first reviewing the related flatpak permission manifest for common sandbox escape issues.
Running untrusted code is never safe; sandboxing cannot change this. It can be a false sense of security.
It is generally not a good idea to run unattended updates via systemd, as the applications can get new permissions without the user aware of the changes. See this blogpost for examples
Flatpak does not run on the linux-hardened kernel unless you do additional kernel modifications that could have negative security implications.
What are the benefits of flatpacks? Like why not just install the actual Tor browser on your system? The one that is released and maintained by The Tor Project?
[edit] Looks like the Tor Project does support this flatpack. Im a silly goose.
Wow! I wish I could learn from copyrighted materials as freely as OpenAI!
Good.
Tor Browser and Mullvad browser also do this.
And technically the key file can just be a plain text password and still work. Just as long as the key file matches the drive’s encryption password.
If its encrypted, you can also decrypt the drive automatically once booted by adding an entry in /etc/crypttab
This will make it so you don’t have to type the password.
Store is disabled
Discord was recently integrated with PS5 and XBOX. Its not going away anytime soon.
Seeing as RCS with encryption based on the MLS standard hasnt been deployed yet, can you show exactly what metadata is leaking?