SecurityPro

joined 1 year ago
[–] SecurityPro@lemmy.ml 9 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

Best option I can think of is privacy.com

You can create virtual cards linked to your bank account and the transaction data is masked when processed by you bank. All my bank transactions show up as NSA Gift Shop. My bank doesn't know where I'm spending my money. Yes you have to trust privacy.com...

[–] SecurityPro@lemmy.ml 3 points 1 month ago

Similar question: Android smart watches only connect to one phone. I like receiving silent notifications on my watch from my android phone. However I also have an Apple phone for work and would like a ring or some other small wearable (not a second watch) to receive notifications from my Apple phone.

[–] SecurityPro@lemmy.ml 2 points 1 month ago (3 children)

I use Eufy doorbells, locks, and cameras. I realize they are a Chinese company, but that is almost unavoidable until the US gets back to actually manufacturing tech.

The reason I like Eufy is the local storage and no required subscription fees.

[–] SecurityPro@lemmy.ml 8 points 1 month ago (1 children)

First quick check of the app with classysharkExodus shows the following trackers built in:

  1. Google AdMob - "AdMob makes earning revenue easy with in-app ads, actionable insights, and powerful, easy-to-use tools that grow your app business"
  2. Google Firebase Analytics - This logs user language preference and user location
 

The October issue of Consumer Reports has a full page ad for their app called "Permission Slip". The tagline reads "Companirs collect and sell you personal data. Our easy to use app helps you take back control."

Anyone have any experience with this? I haven't heard of it before but plan to install and do some testing.

[–] SecurityPro@lemmy.ml 5 points 3 months ago

I think Graphene OS was commenting about them on Twitter. I'll see if I can find the posts.

[–] SecurityPro@lemmy.ml 62 points 4 months ago (4 children)

We need an online guide, based on make and model, on how to disable the transmission of this data.

[–] SecurityPro@lemmy.ml 3 points 5 months ago (1 children)

Apparently not, I have a Pixel 8 Pro that I got free on a promotion from AT&T. The bootloader is locked on it and grayed out.

[–] SecurityPro@lemmy.ml 5 points 5 months ago (3 children)

Not in the US. A phone "purchased" on contract is carrier locked and you can't unlock the bootloader, which needs to be done in order to install a different OS.

[–] SecurityPro@lemmy.ml 6 points 5 months ago (3 children)

I believe NetGuard will act as a VPN. This will prevent you from using an actual VPN.

[–] SecurityPro@lemmy.ml 14 points 5 months ago* (last edited 5 months ago) (4 children)

Since it is a free phone from a carrier it will be locked until the phone is "paid off" by keeping their service for a specified amount of time. Once that time has passed, then your best option is to have the carrier unlock it and install Graphene OS. Until then, there is not much you can do.

 

I've had some luck blocking ads on Hulu but it seems to be an ever evolving situation. Is anyone having decent success blocking Hulu ads with pi-hole? What domains do you block and which ones are required?

 

I recently purchased my first laser. I'm interested in adding color to my engravings. Specifically I want white text engraved on black metal. However I've searched online and can't find any white marking materials.

 

The Bill includes no definition of hate and is wide open to abuse by bad actors. Defend free speech – say no to this legislation, and any legislation of is kind... Anywhere!

https://x.com/FreeSpeechIre/status/1746854766032846910?t=g8nSn9maY3dX0v76oHa9Cg&s=09[https://x.com/FreeSpeechIre/status/1746854766032846910?t=g8nSn9maY3dX0v76oHa9Cg&s=09](url)

 

I purchased a brand new Xbox wireless controller. It paired with my steam deck easily but it will not connect and the "X" button on the controller keeps flashing. I've hit every button on the controller and can't get it to actually connect. I've also rebooted the steam deck.

Any help would be appreciated...

 

Quoted from GrapheneOS:

Cellebrite and others in their industry use logical extraction to refer to extracting data from a device after unlocking it, enabling developer options (requires PIN/password), enabling ADB and permitting access for the ADB key of the attached device. See https://cellebrite.com/en/glossary/logical-extraction-mobile-forensics/ The baseline doesn't involve exploitation. The next step up is exploitation via ADB to obtain more data than ADB makes available.

Obtaining data from a locked device requires an exploit. If it was unlocked since boot, the OS can access most data of the currently logged in users.

GrapheneOS includes our auto-reboot feature to automatically get data back at rest so that it's not obtainable even if the device is exploited. Can set this to a much lower value than the default 72 hours. 12 hours won't cause inconveniences for most users, but you can go lower.

User profiles that are not currently active have their data at rest. GrapheneOS provides the option to put secondary users back at rest via end session for convenience. Sensitive global system data is stored by the Owner user, which is why you can't log into another user first.

GrapheneOS also provides the option to disable keeping a secondary user active in the background, to force ending the session when switching away from it.

We provide substantial exploit protection features (https://grapheneos.org/features#exploit-protection), and we're working on some major improvements.

For user profiles that are not currently logged in, their data is protected by encryption even if the device is exploited. An attacker needs to brute force the password. If you use a strong random passphrase, they cannot do it. Otherwise, you depend on hardware-based security.

Most Android devices don't have decent hardware-based encryption security. If a typical Android device has the OS exploited, the attacker can trivially bypass any typical PIN/passphrase via brute force. We only support devices defending against this (https://grapheneos.org/faq#encryption).

iPhones, Pixels and certain other Android devices provide hardware-based throttling of unlock attempts via a secure element. We explain how this works at https://grapheneos.org/faq#encryption. This protection depends on security of the secure element, which is quite good for Pixel 6 and later.

view more: next ›