Seoclaid12
FOLLOW
Seoclaid12
npub1f2s...jw04
FOLLOW
MESSAGE
21 hours ago•••
is it seeming to me that nostr is dead or am i not using it correctly? like does anyone sees this message? lemme know what you think
17 hours ago•••
I see you
20 hours ago•••
I see you because you used the #voyage tag and I'm following it.
32 hours ago•••
Watching a review video (by someone named Brandon Roswell) on Daylight's DC-1. Looks super cool but 10 minutes in I can see the apps: Gmail, Chrome, Google Drive, Play Store, ChatGPT, Google Docs. These are apps I go to great lengths to get away from. The presence of Google on this device (to me) is more unhealthy the the blue light Daylight is attempting to avoid in their screen.
nprofile1qqswhhhf99z77pfg80s2c00z27rusxn2tzss7450n34krkwa2yadhtgpp4mhxue69uhkummn9ekx7mqpz3mhxue69uhkummnw3ezuerkv36zuer9wcq3vamnwvaz7tmpw5h8yetvv9ukzcnvv5hx7un8lpntld do you plan offer the DC-1 with the option to flash a de-Googled version of AOSP? Is it possible to unlock the bootloader? Thank you
#daylightcomputer
32 hours ago•••
Check all of this out 🫡
29 hours ago•••
Nice! Thank you
2 days ago•••
What are good alternatives to Google Doc, with a focus on privacy? Something open source maybe?
#tech #opensource #foss #linux
2 days ago•••
I've used https://cryptpad.fr/ in the past and liked it.
29 days ago•••
"Life is too short to stay in your comfort zone. Do the hard things - they're the ones that transform you. 🚀
The easy path leaves no footprints."
29 days ago•••
Who are you quoting? I like that one.
3 days ago•••
I am paraphrasing based on a conversation I had with some folks.
2 days ago•••
Thank you
🚀
6 days ago
6 days ago•••
On November 19th, 404Media published a news article with the device support chart for Magnet Forensics GrayKey, a forensic device extraction kit used exclusively by governments and a competitor of Cellebrite's UFED and MSAB XRY. The article contains data on the devices supported by GrayKey and the best extraction type available for the device based on monthly Security Patch Level. The results available from the charts are the same as our expectations made from our insights with other forensic company activities and people who inform us of their capabilities. We also are seeing a domino effect of further publications of leaked capabilities from forensic firms after our publication of the April and July 2024 Cellebrite device support matrix.
From what you can see in the GrayKey documentation, our previous disclosure of vulnerabilities affecting Stock OS Pixel devices that were exploited by forensics firms such as MSAB in the start of the year have disrupted their capabilities. We reported those exploits to Google in January 2024 with multiple proposals on how to stop it. In April 2024, the first two patches for these vulnerabilities were shipped and we can see that since April 2024 the extraction capability for GrayKey on all Pixel devices they supported were downgraded.
We have a good idea of what was happening based on the detailed info we obtained about MSAB's XRY exploit tool. XRY was exploiting littlekernel-based fastboot mode firmware used on Pixels via USB. Many other devices also use littlekernel for this, or the higher attack surface EDK2. CVE-2024-29745 is the identifier for the reset attack vulnerability we reported for the fastboot mode. Google addressed this in April 2024 by implementing our proposal of zeroing memory on boot. Graykey was downgraded from Full access to Partial access in April 2024 and has stayed that way since.
Cellebrite Premium is clearly exploiting the stock Pixel OS via USB rather than using this approach. Therefore, Cellebrite didn't lose any capabilities on the Stock OS because of the improvement - however they lost brute force capability. Our exploit protections have been successfully blocking Cellebrite even before major improvements in 2024 and GrapheneOS is still unaffected by their tools.
The device's data is divided in 2 parts: The vast majority of data is Credential Encrypted (CE) per-profile and a small portion of OS data is Device Encrypted (DE). DE data is available to the OS Before First Unlock (BFU). Exploiting fastboot mode will only give DE data since April 2024. One of our planned features is a boot authentication toggle to request the Owner lock method in early boot. This will protect the small amount of DE data such as installed packages and saved Wi-Fi networks from firmware/hardware exploits. However, it's not sensitive user data.
Partial access means limited access to operating system metadata and the Device Encrypted data and we are not concerned over such a limited data scope.
Cellebrite's approach of exploiting the OS itself is more difficult but they avoided having nearly all their capabilities wiped out by the reset attack mitigation we successfully got Pixels to implement. Other Android devices haven't implemented reset attack mitigation though. The way Google implemented it only covers fastboot mode. We wanted them to cover the OS boot modes too but they haven't shipped it yet. Our zero-on-free feature addresses it for OS reboot/shutdown and we plan to add zero on boot too until we convince them to add it in firmware.
Cellebrite's approach involves attacking the OS itself so all of our generic memory corruption exploit protections and other defenses are there to stop it. We also nearly fully wiped out the USB attack vector for the OS with our 2024 overhaul of our USB attack surface reduction. By default, #GrapheneOS disables new USB-C connections as soon as the device is locked at both a hardware and software level. It then fully disables USB-C data at a hardware level once existing connections end or right away if there weren't any. They'd need another attack vector.
For example, they could still target GrapheneOS via Wi-Fi, Bluetooth or cellular. However, getting into the device from any of those will still be much harder than with the stock OS, and it's more complex than USB in general. There's a reason they have always preferred USB. USB is preferred because it provides little tampering with the OS and maintains forensic soundness.
At this current point in time Cellebrite is certainly the industry leader when it comes to Pixel research. Their research teams follow the same trends and innovations and want to research attacks for #security technologies we desire or have inherited on our platforms when they have become available, such as MTE and PAC. A GrapheneOS extraction capability of any kind is high-demand for any company in the forensics industry and they appear dedicated to want to be first which makes sense as they are certainly the largest. We will continue providing commensurate response to any new threats.
Since 2021, we've had an auto-reboot timer feature which reboots the device after it's locked if it isn't unlocked before the timer expires. iOS recently added this with a hard-wired 72 hour timer. Our default is 18 hours but users can configure it from 10 minutes to 72 hours. If you need maximum protection, using the 10 minute auto-reboot would be ideal. There's also the option to fully disabling USB-C while OS is booted by also disabling charging including USB-PD. You can also enable turning off Wi-Fi and Bluetooth via timers, which we plan to extend to NFC. You should also get any of the 4 currently available 9th gen Pixels to use GrapheneOS. They have more cellular radio hardening and GrapheneOS-specific kernel hardening implemented right now, but 8th gen is likely going to upgrade to the same 6.1 kernel branch soon.
We strongly recommend 8th/9th gen Pixels for greatly improved security on GrapheneOS via hardware memory tagging. It's enabled for the base OS including apps by default and opt-in for user installed apps, whcih we recommend, and then opt-out per app for apps with bugs it catches.
5 days ago•••
Thank you.
7 days ago•••
Nostr in a nutshell
With that said, I'm slowly gravitating towards #bluesky #bsky, simply because people there appear to have an interest in more than just #BTC and #Zaps. The #Nostr community seems to be centered around only these topics, as well as the handful of developers of Nostr clients. Oh, and around Jack, of course.
It's sad.
6 days ago•••
You are correct that there is a ton of crypto content here and users zap each other. Some posters here remind me of youtubers trying to make money off their channels, laser eyes on their avatars and all. It can become tiresome, actually. I started to like my nostr experience a lot more when I began using hastags like #linux.
I've followed your blog for a while. Love it, well done. Especially like your hardware photography, custom builds, and Linux content.
6 days ago•••
I should add that my interests in FOSS, cypherpunk themes, distributed systems, cryptography, others, overlap with many crypto users here and I appreciate their work on those things.
6 days ago•••
Thank you, appreciate it! Indeed, I agree regarding the laser eyes cryptobro vibes. I am in fact following hashtags like #gentoo, #openbsd, etc. but unfortunately there's not a lot happening. Will give the more generic #linux a try now. However, I speculate that the general cryptobro vibes that surround #nostr is a big turn-off for many #hackers, #makers, #decentralists and the likes.
22 days ago
22 days ago•••
Brand new:
Simplified Privacy Podcast
Covering: -Linux -VPNs -Phones -Agorism -Email -VoIP -Open Source Tools -Decentralized Social Networks -Circular Crypto Economy -Making a Website -Persuading friends and family -Advanced Tricks
Don't miss out on the upcoming ones. Put the RSS link into AntennaPod or Apple: https://podcast.simplifiedprivacy.com/index.xml
22 days ago•••
Just had I listened to the first episode, and I absolutely love it. And Shadow Rebel totally has the voice for it. When will he be narrating an audiobook? Because I want to download it. LOL.
21 days ago•••
thanks for your time. monero content coming
22 days ago•••
I don't use antenna pod mainly because I find it to be too busy. So I will try it in escape pod and see if that works.
29 days ago
29 days ago•••
Unfollowing people whose timelines are full of politics bs. There's no reason in parroting either side's propaganda. If your life consists purely of consumption and you're not creating things, then you do not add value to anyone's life by reposting whatever purposefully shaped opinion you're reposting.
Start thinking for yourself, leave the politics circus and focus on building a meaningful life for you and the people around you, regardless of the clown show that governments have become. Politics thrives on people's attention and sucks out the last bit of energy from everyone that allow themselves to get sucked into the left-vs-right bs they're artificially making up. If there's no attention and, more importantly, no compliance to politicians' idiotic narratives and laws, then the people involved become rulers of nothing.
Become ungovernable.
39 days ago•••
I have successfully installed #Linux Mint… Feels amazing to give the finger to Microsoft
39 days ago•••
Well done! I don't miss any Micro$oft products (slow, bloated, surveillance tools).
47 days ago•••
This year's HCPP (the last one in a sense) was pretty special for me. As probably the only conference fully dedicated to cryptoanarchy it was always my favorite.
This year it was mostly about personal connections for me. I feel that over past few years, people have been running around the world and trying things and they came to tell us about their experience and results. In the hallways, but also talks. First few years were visions, last few were experiences and lessons learnt.
But it also gave me something more. I used to get this at CCC. This knowledge of what is important, what is going on and what we are doing. I became disconnected with the main CCC ideology, which is also very political, not very cypherpunk. It turned from "we write code and hack" more "we have to speak up and lobby the european commission".
I've just realized that I got the same feeling from hcpp that I used to get from CCC.
I love CCC for other things.
46 days ago•••
Hi, why was this year's HCPP the last one? I had aspirations to attend eventually. :(
45 days ago•••
under HCPP brand yes, but I think there will be something similar next year
45 days ago•••
thank you
45 days ago•••
favorite notetaking app for GrapheneOS? #asknostr #privacy
45 days ago•••
Markor
45 days ago•••
Easy Notes
49 days ago•••
Let's assume we have some product ideas for IVPN customers to test, invite-only. We start a chat community to get feedback and offer a place to discuss our service, privacy etc.
Which platform would you prefer?
- Needs to support multiple channels
- Ideally self-hosted
- Discord and Telegram are no-go due to privacy policies
Options:
- Matrix
- IRC
- Nostr based solution which we have not heard about
- Something else
49 days ago•••
SimpleX
51 days ago•••
Please, can anyone recommend a service to recieve text messages that actually works??
I really appreciate it, every single one I have found online never actually gets the text message.
#asknostr #nostr #privacy
51 days ago•••
In the US, JMP.chat via a Snikket account (or other XMPP provider)
51 days ago•••
I’ll check it out, thank you
57 days ago•••
#GrapheneOS: The Purpose, The Strategy, and The Why [Article]
This post explains a bit about the development approach, reasoning and strategy behind GrapheneOS security innovation and how power users protect themselves.
57 days ago•••
Thank you for this article and also your work with the GOS team.
68 days ago•••
What/who is ReplyGuy, "Master of GMs"? Why all the duplicated posts? It is quite annoying.
#asknostr
81 days ago•••
hmmm, changing SDDM themes on Atomic Fedora spins appears to have not been fixed by upstream yet (the theme directory is immutable!). Fedora SDDM themes are not my style, don't like them at all. Do I really want to build sddm2rpm after installing all the dependencies? No. Fedora Project, please fix SDDM theming on the atomic distros.
99 days ago
100 days ago•••
Monero (XMR) Best Practices for Privacy & Security
1 Use Official WalletsAlways use the official Monero wallet (GUI/CLI) or trusted mobile wallets like Monero.com https://monero.com/ (Cake Wallet https://cakewallet.com/) or Monerujo https://www.monerujo.io/. Download from the official website: https://www.getmonero.org/
2 Keep Your Wallet UpdatedAlways use the latest version of your Monero wallet to benefit from security updates and bug fixes.
3 Control Your Private Keys Self-custody is key. Always have control over your private keys and back up your seed phrase securely in multiple locations.
4 Use Proper Network SecurityWhen transacting use a VPN (IVPN https://www.ivpn.net/, Mullvad https://mullvad.net/) or Tor https://www.torproject.org/ to enhance privacy. Avoid public Wi-Fi networks when accessing your Monero wallet.
5 Minimize Address Reuse Always use a new address for each transaction. Monero automatically generates new stealth addresses, this helps you stay anonymous.
6 Avoid KYC ExchangesPrefer decentralized exchanges or P2P platforms that don’t require KYC. Platforms like Bisq https://bisq.network/ and Haveno https://haveno.exchange/ can help you trade privately. Find more https://kycnot.me/?t=exchange&q=&xmr=on
7 Practice Good OpSecBe cautious of linking transactions to your identity. Don’t send Monero directly from an exchange to your personal wallet. Use a proxy wallet.
8 Regularly Check Transaction PrivacyUse the view key sparingly and stay informed about potential privacy leaks. Conduct audits if needed.
9 Education & VigilanceStay updated with the Monero community for the latest best practices and security advisories. Knowledge is power. Good starting point is https://libereco.xyz/resources/
10 Consider Cold WalletsIf you hold a significant amount of XMR, consider using a cold wallet. More infos see https://libereco.xyz/monero-cold-storage-with-feather-anonero/ and https://web.archive.org/web/20240518195127/https://localmonero.co/knowledge
12 Run a Full NodeRunning your own Monero node helps increase your privacy and strengthens the network. Plus, it’s great for decentralization. Great tutorial from @npub1tr4...2y5g here: https://sethforprivacy.com/guides/run-a-monero-node-advanced/
13 Stay Anonymized When Converting When converting XMR, use P2P platforms like UnstoppableSwap https://unstoppableswap.net/ or BasicSwap https://basicswapdex.com/. Preserve your anonymity.
14 Legal Awareness Stay informed about the legal environment in your area regarding cryptocurrencies, especially Monero (e.g. MiCA for EU).
15 Post-Mortem PlanningEnsure there’s a privacy-preserving plan in place for loved ones to access your Monero in the event of your death.
115 days ago•••
Anyone got any good map suggestions for #GrapheneOS?
#asknostr
115 days ago•••
I like organic maps
122 days ago•••
Want to browse X (Twitter) privately without an account? Or someone blocked you? Check out the Nitter instances under https://github.com/zedeus/nitter/wiki/Instances for a totally anonymous experience!
122 days ago•••
farside.link is nice for finding working instances - I use nitter nearly daily (don't want to be logged into an account, though).xcancel and poast have great uptime recently.
144 days ago
144 days ago•••
This is how Bitcoin has felt in the last few months...
LOAD OLDER THREADS