

Interesting 🤔
I regularly use both apps and never experienced these issues. You can create an issue on GitHub to report this.
Mastodon: @Andromxda@infosec.exchange
wiki-user: Andromxda
Interesting 🤔
I regularly use both apps and never experienced these issues. You can create an issue on GitHub to report this.
That sounds like a terrible VPN client implementation. Which client do you use?
In my experience, and from what I have heard, it’s quite the opposite.
SpamHaus type of bad host
That already kinda exists: https://gui.fediseer.com/
It probably needs some permissions that aren’t available in newer Android versions anymore
I honestly don’t know
It didn’t mention anything about the CPU in the install instructions…
Try locating the binary that crashes with the “Bad CPU type” exception and run the file
command on it. It will show you which architecture the binary was built for.
Edit: Linux install was successful
That’s good to hear
Can I message you on Matrix to help you diagnose this?
You’re right, I forgot about that
Bad CPU type in executable
Do you use an Apple Silicon Mac by any chance?
I couldn’t find anything on that yet. I think that since the project is still in a rather early stage of development, it’s more of a proof of concept. But I do know that the PCAPs are saved on the device, and you can download them onto another computer.
Is it necessary to get a cell plan to run the hotspot?
As far as I’m aware: no. Cell-site simulators could theoretically only target devices that connect with a valid IMSI, but I kinda doubt that they are doing that. But you could get a cheap prepaid SIM, instead of an actual cell plan.
This is the easiest explanation I could come up with:
Your phone (or other cellular devices) constantly broadcasts a few identifiers. The IMEI, which is tied directly to the cellular hardware in your device, and the IMSI, which is tied to your SIM card. Law enforcement uses so called cell-site simulators, which basically pretend to be cellular antennas, while actually just grabbing IMEIs and IMSIs from every device in the area. This is often used during protests, in order to identify those who attend them.
Rayhunter is a piece of software that detects the presence of cell-site simulators, making attendants of protests aware of the hidden danger.
This is especially important, now that the US basically transformed into an authoritarian state. We’ve already seen how Trump strategically uses law enforcement to crack down on protests, such as the BLM movement in 2020. (https://www.youtube.com/watch?v=K_a63r5Km9I) Being aware of law enforcement/intelligence operations that try to identify and track down protest attendants is more important than ever.
I actually used this a few years ago (never noticed the ads or popups because I always use an adequate ad-blocker with lists that also filter out stupid banners and other annoyances), but I immediately stopped using it after I learned about the parent company. It’s not like they made much profit from me anyways, but still, they see which articles you’re visiting, and I wouldn’t trust them with this information.
The main reason I used it was the design anyway, ever since Wikipedia slightly updated their standard theme to make it look more modern. I hope they start using the Citizen skin for MediaWiki, which would finally make it look like an actual modern website. Other wikis like The Apple Wiki also use it, and it’s beautiful in my opinion.
I now use Wikiless for privacy reasons, this page has some reasons why it’s a good idea to use it: https://github.com/Metastem/Wikiless/wiki/FAQ
LibRedirect automatically redirects all Wikipedia links in my browser to Wikiless
Hell no, we don’t need corporate enshittification for an open knowledge platform https://en.wikipedia.org/wiki/Wikiwand#Business_model
If you actually read the post, you would have known, it does work, but there are some privacy concerns with it:
“However, in 2024, the situation changed: balenaEtcher started sharing the file name of the image and the model of the USB stick with the Balena company and possibly with third parties.”
If you actually read the post, you would have known, it does work, but there are some privacy concerns with it:
“However, in 2024, the situation changed: balenaEtcher started sharing the file name of the image and the model of the USB stick with the Balena company and possibly with third parties.”
Just use dd
. It’s not that hard. You pass it 2 arguments: if=
the file you want to flash, and of=
the destination. If you’re feeling fancy, pass in some status=progress
. And don’t forget to prepend it with sudo
. That’s it.
Insecure. https://madaidans-insecurities.github.io/linux-phones.html