poVoq

joined 2 years ago
[–] [email protected] 2 points 2 weeks ago

This is kinda the same idea but made for what you originally asked for: https://garagehq.deuxfleurs.fr/

[–] [email protected] 17 points 2 weeks ago (1 children)

It's likely Cloudflare related. Some of the larger instances are behind that, but many of the smaller ones aren't. Cloudflare isn't only a problem for VPN users, so its a good idea to avoid those instances as a user. You can still interact with their communities via Federation.

[–] [email protected] 10 points 2 weeks ago

No, they found some billionaires to do it 😉

[–] [email protected] 8 points 3 weeks ago
[–] [email protected] 9 points 3 weeks ago

There is also Google maps integration. Sure, it's not mandatory anymore, but if you install the official Signal app on a phone with Google play services installed, you are effectively not running an open-source app anymore and this potential backdoor is also not noticeable with reproducible builds.

F-droid has strict rules in place to prevent these sort of things for good reasons, thus the original comment is not entirely wrong in saying that an app that claims to be open-source, but can't be made available on F-droid is a red-flag.

[–] [email protected] 6 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

The external Google dependencies I am talking about are loaded into the client not the server, so that's an entirely different issue.

[–] [email protected] 8 points 3 weeks ago* (last edited 3 weeks ago) (7 children)

I'll leave it up to you to decide if that is bad or not, but one of the reasons the Signal app can't be put unaltered on F-droid is because it loads in external dependencies from Google at run-time, which can also be altered by Google at will with any Android update.

[–] [email protected] 5 points 3 weeks ago* (last edited 3 weeks ago)

No, if your system can't support 3rd party clients properly, it is inherently insecure, especially in an e2ee context where you supposedly don't have to trust the server/vendor. If a system claims to be e2ee, but tightly controls both clients and servers (for example WhatsApp), that means they can rug-pull that e2ee at any point in time and even selectively target people with custom updates to break that e2ee for them only. The only way to realistically protect yourself from that is using a 3rd party client (and yes, I know, in case of Signal also theoretically reviewing every code change and using reproducible builds, but that's not very realistic).

Now admittedly, Signal has started to be less hostile to 3rd party clients like Molly, so it's not as bad anymore as it used to be.

[–] [email protected] 42 points 3 weeks ago

Loads of people working for these companies are also on special visas that have been described as modern slavery... so maybe they are culpable of signing up for such jobs/visas, but once you are in such a setup the threat of immediate deportation to some 3rd world country is quite real.

[–] [email protected] 6 points 3 weeks ago (2 children)

I wonder if Yuri decided to parachute himself (because he didn't trust the landing vehicle), and this was made part of the plan retroactively to not embarrass anyone involved.

[–] [email protected] 2 points 3 weeks ago (1 children)

There is the MLS standard now that was explicitly developed with e2ee group chat applications in mind. From what I have read so far, this new standard seems well regarded by cryptography experts.

[–] [email protected] 11 points 3 weeks ago (5 children)

Telegram’s encryption isn’t open source, so no one can verify it’s soundness or risks.

This is not true, it is available in the open-source Telegram clients.

What you probably mean is that it is using an unusual and not well studied encryption algorithm. This means you need to be a real cryptography expert to spot flaws in it.

Telegram justifies this with a bit of FUD about well known encryption algorithm being NSA sponsored etc, but when cryptography experts did look at Telegram's homegrown algorithm they were less than impressed.

 

I am not overly happy with my current firewall setup and looking into alternatives.

I previously was somewhat OK with OPNsense running on a small APU4, but I would like to upgrade from that and OPNsense feels like it is holding me back with it's convoluted web-ui and (for me at least) FreeBSD strangeness.

I tried setting up IPfire, but I can't get it to work reliably on hardware that runs OPNsense fine.

I thought about doing something custom but I don't really trust myself sufficiently to get the firewall stuff right on first try. Also for things like DHCP and port forwarding a nice easy web GUI is convenient.

So one idea came up to run a normal Linux distro on the firewall hardware and set up OPNsense in a VM on it. That way I guess I could keep a barebones OPNsense around for convenience, but be more flexible on how to use the hardware otherwise.

Am I assuming correctly that if I bind the VM to hardware network interfaces for WAN and LAN respectively it should behave and be similarly secure to a bare metal firewall?

 

Loads of other interesting talks as well next week.

1
Double Edged (www.monkeyuser.com)
 
 
view more: next ›