Redjard

joined 1 year ago
[–] [email protected] 2 points 16 hours ago

TPM isn't all that reliable. You will have people upgrading their pc, or windows update updating their bios, or any number of other reasons reset their tpm keys, and currently nothing will happen. In effect people would see Signal completely break and loose all their data, often seemingly for no reason.

Talking to windows or through it to the TPM also seems sketchy.

In the current state of Windows, the sensible choice is to leave hardware-based encryption to the OS in the form of disk encryption, unfortunate as it is. The great number of people who loose data or have to recover their backup disk encryption key from their Microsoft account tells how easily that system is disturbed (And that Microsoft has the decryption keys for your encrypted date).

[–] [email protected] 2 points 2 days ago

The default on android is to give every wifi network its own random but static mac.

[–] [email protected] 2 points 6 days ago (1 children)

What is the threat szenario?
If you are smart about parallelization and have access to custom hardware, couldn't you turn 5 days into 1 hour or less?

[–] [email protected] 3 points 6 days ago (1 children)

Syncthing is excellent for phone sync.
What I did was have it running on a system in the network of the nas, mount the nas on that system, and place the backups folder in the nas.

If you have a system that reliably runs, or can get syncthing running on the nas, I recommend doing that.
Synology has docker iirc, there aught to be a syncthing container.
Else, slapping a pi zero into the nas' network should do the trick and be fully independent of what the nas is.

[–] [email protected] 6 points 1 month ago

background: #f0f

[–] [email protected] 15 points 1 month ago (11 children)
[–] [email protected] 4 points 1 month ago

This really seemed like a good simplification until you threw in that d'Alembert operator at the end

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago) (1 children)

Default linux works too ofc, I didn't know they took that route.
Most other browsers have very specific useragents, so the main pool of same useragents will be hardened browsers anyway.

Thank you for checking

edit:
https://github.com/TheTorProject/tor-messenger-build/blob/581ba7d2f5f9c22d9c9182a45c12bcf8c1f57e6e/projects/instantbird/0001-Set-Tor-Messenger-preferences.patch#L354 would indicate it should be Windows, Ill check later.
Try it with high security settings in tor, it might be something like canvas. Did you enable any permissions for the website?

[–] [email protected] 9 points 2 months ago (20 children)

That would be a fail of the fingerprinting protection. A properly set up TOR browser for example should not allow that detection by any means. If you know how to detect it, please report it as a critical vulnerability.

I could think of maybe some edge case behavior in webrenderer or js cavas etc., which would mainly expose info on the specific browser and underlying hardware, but that is all of course blocked of or fixed in hardened browsers.

Further, if you have a reliable method, you could sell it off to for example Netflix, who are trying to block higher resolutions for Linux browsers but are currently foiled by changing the useragent (if you have widevine set up).

[–] [email protected] 7 points 2 months ago (22 children)

That can't have been the reason, rather the fact it could tell.
Your browser sends information about its version and the os in the useragent string. It is supposed to lie and say it is a very commonly used useragent, specifically for purposes of fingerprinting. That would be windows, default configuration, firefox version something not you firefox version

[–] [email protected] 1 points 9 months ago (2 children)

Did you repost this meme twice?

view more: next ›