• 0 Posts
  • 15 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle






  • I dont know about other models but I think I have managed to limit how much my phone (fairphone) spies on me quite decently.

    I installed application called ReThink, which is basically a firewall and I can block even google services with it. I know it works because its really pain in the ass when I want to use their services like calendar and i have to temporarily unblock it. It can also block ads by completely blocking internet for programs that dont really need it. I have also removed/disabled anything extra and removed permissions to anything that absolutely doesn’t need it. It also alerted me to that stupid google safetycore spyware being installed (by blocking and informing about newly installed program) so i managed to remove that immediately.

    At least according to the logs the phone seems secure, since nothing is being allowed to connect anywhere that shouldn’t be allowed. Can’t do much to occasional breaches due to restarts or temporary allowings, but I dont think such sparse information is much use or it might require more effort to utilise.



  • I made an account over decade ago, never really used it even back then because I was suspicious even then. Then i tried logging in years after that and they demanded passport or some other identification to even let me log in.

    So i sent them a picture i drew myself, i would post it here but i dont think i have the file anymore. It was basically like a mockup passport with picture of a clown and a stamp with picture of middle finger. I hoped they would just ban my account or something since that is about best I can hope. They would never abide by gdpr request and even if they say they did there is no way to know if they actually did.





  • well, isn’t security kind of about setting the “filter” for potential attackers? You can break a padlock with hammer, but it will keep out random people from wandering in. Having to rewire and program stuff to access this would keep many types of away. The kind of attacker who would want to go through all that trouble wouldn’t be kept away even with more secure methods most likely. Though I guess you could just take the drive and pay someone to deal with it, but still it would need at least some knowledge to even know what should be done with it.