social.gl-como.it

Cerca

Elementi taggati con: F-Droid

@Debacle #librem looks interesting for more trustworthy phone hardware. Related: I have also seen #purism for trustworthy, open PC hardware.

I trust my phone hardware (on its own) to leak orders of magnitude less private info compared the OS and apps running thereon - although you're right, it's still a risk; data about what I do is available to my phone network, and from there to law enforcement, government and anywhere else it might unintentionally escape. I don't have the kind of threat model which means I need to go all-out with the tinfoil hat though ;-)

When running #LineageOS and apps from #F-Droid (especially #Blokada) I expect some of my data is leaking via apps/OS, but much less than a bog-standard vendor-installed Android and apps installed at random from the Play Store. I installed #OpenGAPPS so alas I have Google's tentacles in my phone at the moment - but I now know about Yalp Store for the few apps I need that are only available via Google's store so I'll change that in future.

To my mind it's a trade-off; I (like a lot of people) like the features and convenience I get from my smartphone, but I dislike the loss of privacy that comes with it. I've made some changes to tip the balance to a level I'm more comfortable with, and am always on the lookout for ways to improve that further.

I'm also a Linux geek, by inclination and profession. I've seen some attempts to bring Linux to mobiles, but without much apparent success so far. Maybe one day there'll be an ecosystem there that's feature-rich enough for me to jump into - I live in hope, if not expectation.
 

Use #matrix or #rocketchat



If you want a polished UI with certain group features for an organisation go to Rocket Chat else Matrix and note the client name #Riot is the best alternative out there.

* Rocket can be self hosted but not decentralised.
* Matrix is decentralised by nature and there are official debian packages.
* Riot the matrix client is on #F-Droid and doesn't connect to google messaging.
 
General good advice for freedom and privacy/security



Some general good advice to ensure the best possible respect of freedom and privacy/security on mobile devices includes:

Installing only free software applications, from trusted sources such as #F-Droid on #Replicant.
#Encrypting the device's storage, to prevent some unauthorized access to the device's data.
Using software that provides secure peer-to-peer-encrypted communications such as #ChatSecure for instant messaging and #AGP with K-9 Mail for emails on Replicant.
Using #Tor to achieve reliable anonymity, for instance with #Orbot on Replicant.
If the device is telephony-enabled, switching the modem to airplane mode or (when possible) turning it off when not in use, to avoid being tracked at all times.
Browsers using the webview framework (such as the browser shipped with Replicant and Lightning) are subject to various security flaws in Replicant 4.2.

In addition, the #FreeSoftwareFoundation provides a comprehensive guide to help protect freedom and privacy and the Tor project an article entitled Mission Impossible: Hardening Android for Security and Privacy.

Replicant

Replicant
 
General good advice for freedom and privacy/security



Some general good advice to ensure the best possible respect of freedom and privacy/security on mobile devices includes:

Installing only free software applications, from trusted sources such as #F-Droid on #Replicant.
#Encrypting the device's storage, to prevent some unauthorized access to the device's data.
Using software that provides secure peer-to-peer-encrypted communications such as #ChatSecure for instant messaging and #AGP with K-9 Mail for emails on Replicant.
Using #Tor to achieve reliable anonymity, for instance with #Orbot on Replicant.
If the device is telephony-enabled, switching the modem to airplane mode or (when possible) turning it off when not in use, to avoid being tracked at all times.
Browsers using the webview framework (such as the browser shipped with Replicant and Lightning) are subject to various security flaws in Replicant 4.2.

In addition, the #FreeSoftwareFoundation provides a comprehensive guide to help protect freedom and privacy and the Tor project an article entitled Mission Impossible: Hardening Android for Security and Privacy.

Replicant

Replicant
 

#WhereAreTheEyes sur #F-Droid


Where are the Eyes is a tool for detecting and evading surveillance. Together, you and other users build a map of surveillance cameras to protect activists, students, and other at-risk minorities.

Ca semble juste démarrer : moins de 2000 caméras enregistrées. A alimenter durant les ballades.

Le site :https://eyes.daylightingsociety.org/ L'app sur F-Droid: https://f-droid.org/repository/browse/?fdid=org.daylightingsociety.wherearetheeyes

#surveillance #camera #android

Where are the Eyes?

 

#WhereAreTheEyes sur #F-Droid


Where are the Eyes is a tool for detecting and evading surveillance. Together, you and other users build a map of surveillance cameras to protect activists, students, and other at-risk minorities.

Ca semble juste démarrer : moins de 2000 caméras enregistrées. A alimenter durant les ballades.

Le site :https://eyes.daylightingsociety.org/ L'app sur F-Droid: https://f-droid.org/repository/browse/?fdid=org.daylightingsociety.wherearetheeyes

#surveillance #camera #android

Where are the Eyes?

 
nuovi vecchi