Imprint9816

joined 1 year ago
[–] [email protected] 1 points 2 days ago* (last edited 2 days ago)

Which is why I was super clear about not being one. Glad you were able to get the opportunity to say what another user already said a day before.

[–] [email protected] 1 points 3 days ago

I'm glad someone with more knowledge then me responded.

[–] [email protected] 38 points 4 days ago* (last edited 4 days ago) (7 children)

I'm always skeptical when something is called privacy focused and the article lists no privacy features.

Does this actually provide any new unique privacy features or is it something akin to arkenfox where it is just getting everything upstream from firefox?

[–] [email protected] 1 points 4 days ago* (last edited 4 days ago) (4 children)

I am not an expert so I would highly recommend looking into more credible sources but my guess would be, since this is most likely not a very popular add-on, any browser with it would stand out considerably more relative to not having it.

Typically its common for browsers that want to reduce fingerprinting (tor, mullvad etc) recommend not installing new addons as then you stand out from crowd.

I'd say, since there are so many alternative ways to get this filter list, even if its a marginal increase in fingerprinting, its not worth installing it as an add-on.

[–] [email protected] 3 points 4 days ago* (last edited 4 days ago)

You will be surprised to learn not everyone lives in the EU ;)

There will be a ton of great privacy services that will be unaffected or will just leave the EU market (including signal). No need to switch to a completely unproven chat.

[–] [email protected] 1 points 4 days ago

As someone who worked in the restaurant industry this name made me shutter.

[–] [email protected] 1 points 4 days ago (1 children)

Sorry my bad, I should of responded in a more professional tone.

Yeah I totally agree there is a valid reason to have the function but its all moot if the function doesn't work correctly.

[–] [email protected] 1 points 5 days ago* (last edited 5 days ago) (3 children)

Either you didn't read the github comments or dont understand how vpns work.

If the VPN over hotspot function leaks data outside the tunnel, then your phones data is going to be revealed in the clear.

[–] [email protected] 3 points 5 days ago* (last edited 5 days ago)

I don't think your giving people much credit. Anyone on here who can bind their VPN to their torrent client can easily handle this.

I mean the filter list github literally provides instruction. So does ublock, so does pretty much any DNS filtering service.

This isn't rocket science. All it takes is like 2% effort.

[–] [email protected] 1 points 5 days ago* (last edited 5 days ago) (5 children)

No offence but that's terrible logic.

There is no point in using a vpn if you don't care if your data leaks outside the tunnel.

It would be much better to just use a free VPN, like proton, on all devices instead and then just use the regular hotspot functionality.

[–] [email protected] 18 points 5 days ago (11 children)

Yeah Im gonna pass on the non audited chat with only 5 stars and stick to using signal.

[–] [email protected] 3 points 5 days ago (7 children)

LineageOS implementation of this is poorly done and will leak data outside of your VPN tunnel.

https://github.com/mullvad/mullvadvpn-app/issues/4016#issuecomment-2422616515

 

Was hoping to get help finding a guide with more detail on setting up something like rdt-client for people who don't use docker.

It appears like its very much possible but it seems like pretty much all guides assume the user is setting it up in docker.

Currently have zurg and plex debrid setup with RD which works great but i find plex debrid a little lacking in being able to find what im looking for compares to using the *arr programs.

 

Initially saw this article from Brian Krebs mastodon account.

https://infosec.exchange/@briankrebs/111608035574860035

18
Kuketz Custom ROM Review: /e/ (www-kuketz--blog-de.translate.goog)
84
submitted 11 months ago* (last edited 11 months ago) by [email protected] to c/[email protected]
 

Confirmation in linked github discussion.

 

"We can disclose only now that we had a server in Toronto seized in 2015, initially without our knowledge. Maybe a court order was served to the datacenter. For about 10 days we did not understand what happened to the server, which did not respond, while the datacenter did not provide information. After 10 days Italian police (and not any magistrate) contacted us. They informed us that Toronto police and FBI (*) asked for our help because they could not find any log in the server. Unfortunately their help request came after the server had been already seized. They did not even make a copy, they took it physically, therefore the server went offline, probably alerting the alleged criminals. It was obvious that forensic analysis could not find any log, simply because there were none. Our VPN servers did not even store the client certificates, go figure (now they also run in RAM disks, but in 2015 they did not). The whole matter was led by informing us without any document from any court or magistrate, but only through official and informal police communications, and only to ask for help after forensic analysis obviously failed completely.

We were not asked to keep confidentiality on the matter, but just to stay on the safe side and support the investigation on what it appeared as a serious crime (a whole database with personal information of a commercial service was cracked, stolen and published in public when the web site owners did not pay a "ransom"; while our server was apparently not used for the crack, it was used to upload elsewhere the database) we decided not to disclose the whole matter for at least 7 years. It's one of those cases confirming that our servers do not store log, data or metadata of clients' traffic.

(*) We may speculate that FBI was involved in a Canadian matter because the stolen database contained US citizens' personal data"

 

Thought this might be helpful to others who use Mullvad Browser.

Got to the advanced preferences and set webextensions.storage.sync.enabled to true.

view more: next ›