zwekihoyy

joined 1 year ago
[–] [email protected] 1 points 1 year ago (2 children)

you're a moron change mine.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (4 children)

I said nothing about not having anything to hide. I said it doesn't mean much. dns resolvers were intended to be cloud based. the only difference between nextdns and standard dns resolvers is the control over function nextdns hands the user.

using cloud services also allows home devices to stay secured via keeping ports closed. the whole "the cloud is someone else's computer" is just another way of saying "I don't know how to practice good opsec".

your isp/vpn provider also can log all your data, or are you going to suggest running everything over tor now?

a dns query does not send that much info since all the contained data from site to user is encrypted and takes network routes separate from the DNS query.

[–] [email protected] 4 points 1 year ago (2 children)

Firefox has a weaker sandbox than chromium and less mature site isolation and therefore has lower security. privacy is a different story, but remember you're only as private as you are secure so Firefox is inherently not that private assuming a malicious site escapes the sandbox.

I'm fully against chrome's growing monopoly as well as Google surveillance capitalism but let's not be so dramatic with the "google mother ship" nonsense.

using chromium as a base does not equal data being sent back to Google, just like using Android as a base doesn't inherently send data back to Google.

[–] [email protected] -2 points 1 year ago (6 children)

this doesn't mean as much as you think it does.

[–] [email protected] 2 points 1 year ago (4 children)
[–] [email protected] 3 points 1 year ago (2 children)

Android is not a single OS (?)

[–] [email protected] 0 points 1 year ago

what makes you suggest you are safer on Linux?

[–] [email protected] 2 points 1 year ago (1 children)

most people don't nor do the aforementioned measures have substantial documentation that is easily accessible by the average user.

they aren't even meant for enthusiasts but rather, in industry professionals

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago)

a better solution than giving blanket root access would be an API/daemon that provides more fine grained permission control, similar to how flatseal manages the flatpak sandbox.

edit: anyone wanna help me on a new project idea...?

[–] [email protected] 2 points 1 year ago

well sure, for customisation sake there is plenty benefit. the security concerns are more plentiful, however

[–] [email protected] 1 points 1 year ago

one of the reasons I use nix package manager is because it doesn't require root. it has separate build users and a daemon responsible for privileged file management. I also have a separate user with access if I absolutely need it, or I can log in with a live session and chroot into my system.

if you need root for a general purpose application then it's badly designed

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (4 children)

you can't lock your bootloader and retain access for one. that's an easy way to brick your device. it cripples security because in order to gain this access you are patching in the sudo binary (which doesn't normally exist on Android and is therefore not designed to be securely used) and a bunch of selinux policies that give extremely vague permissions systemwide. data exfiltration is made a much simpler task when a user has rooted their device.

it is also increasing attack surface. you now have to trust that this per app permission model is actually functioning correctly and isn't exploitable.

edit: it is worth noting that having root access on a desktop Linux system is horribly insecure as well, though. I completely remove sudo on my systems (although considering one can just invoke su -c or su - root that doesn't help too much in actuality)

view more: ‹ prev next ›