slackness

joined 1 week ago
[–] [email protected] 7 points 2 hours ago* (last edited 2 hours ago) (1 children)

TLDR; risks far outweigh the benefits. See bottom of response for recommendations.

Should you use it?

It works by setting up a proxy that intercepts HTTP requests from all applications

During the first run, Zen will prompt you to install a root certificate

Zen will be able to decrypt and analyze your entire traffic. And then it'll encrypt what it allows before letting it leave/enter the device. This means even if you trust Zen, that one certificate is the only thing standing between your traffic staying encrypted. It gets compromised, you're compromised.

Do not trust an app with your entire traffic, ever. Even if its not malicious there are going to be bugs, vulnerabilities, leaks, etc.

Moreover, something being open source does not mean its audited by people who know what they're doing - neither for hidden malicious code or mistakes. I did not see any formal audits being mentioned in the readme.

https://grapheneos.org/faq#ad-blocking-apps

What can you use instead?

You should instead use ublock in the browser and system wide DNS blocking on your device. You can use an adblocking public DNS server (e.g. Mullvad) or setup pihole locally. You do not have to self host pihole, you can just set it up on your computer and use on that device only which would be the same thing as using Zen on that device.

Note that using a public, blocking DNS will block less domains because they have to make sure it does not break anything for anyone but it will make you less fingerprintable. OTOH, using a custom blocklist you can get the most out of blocking but you're probably the only person blocking that specific subset of domains which will make you more fingerprintable. Take your poison.

What about content filtering on desktop/mobile apps DNS blocking cannot solve

DNS blocking merely stops the application from accessing certain domains. It won't be able to block malicious content served from the same domain as the content you actually need (e.g. YouTube serves both ads and videos from the same domain so you can't block their ads without blocking the video itself).

You should not install applications you don't trust on your device and use them on the browser as much as you can or use and alternative FOSS frontend (e.g. Reddit, Discord, YouTube etc.)

But some applications might be circumventing system DNS

Yes, there's nothing stopping an application from doing its own DNS resolution or using hardcoded static IPs. You should not run applications trying to be actively malicious in this way. Neither Zen, nor anything else will be able to protect you from untrusted code doing suspicious things on your machine.

[–] [email protected] 1 points 2 days ago (1 children)

Scratchcards are sold at ecommerce sites which makes them significantly more accessible. If you really want to be "anonymous" (with very big quotes) you can buy gift cards for those sites with cash then order to a collection point. Otherwise, sure, it's not as good as paying with cash but all there's a trail for is that you bought Mullvad credits that cannot be tied to any account.

[–] [email protected] 2 points 2 days ago

You would be able to do this for a short while but unless you can make an agent that's indistinguishable from you or you already have very bot-like traffic, they'd catch up pretty quickly. They aren't going to just let a trillion dollar industry die out because some bots are generating traffic.

[–] [email protected] 1 points 2 days ago

Aah my web client wasn't showing any links in your original message.

[–] [email protected] 3 points 2 days ago

good source in case anyones interested. I'm fine with them generally being available.

[–] [email protected] 1 points 2 days ago (2 children)

Not seeing where it says install arch

[–] [email protected] 26 points 2 days ago (3 children)

I'd much prefer paying cash to get a scratch card from a retailer like Mullvad does.

 

A new version of fontconfig release recently with the added option to disable bitmap fonts. If you're using a rolling release distro, this might break bitmap fonts for you. It definitely does on Arch (and likely Arch-based distros) because they opted to disable them by default for some reason (AFAICT upstream gives the choice but does not recommend one way or the other).

This'll cause fontconfig to skip bitmap fonts, your apps won't be able to access them.

To fix it, you need to configure fontconfig to not ignore bitmap fonts. There are a number of ways to do that.

I'd recommend a user-level fontconfig file. Create $XDG_CONFIG_HOME/fontconfig/fonts.conf with below contents and you get your bitmap fonts back. This negates the file in /etc/fonts/conf.d/70-no-bitmaps-except-emoji.conf. This is the first time I'm configuring fontconfig so there may be a better way ¯_(ツ)_/¯

This should've definitely been news imo especially because this is not the default behavior of upstream. I shouldn't have to read fontconfig PRs to figure out why my fonts broke, even on Arch.

<?xml version="1.0"?>
<!DOCTYPE fontconfig SYSTEM "urn:fontconfig:fonts.dtd">
<fontconfig>
  <description>Accept bitmap fonts</description>
  <!-- Accept bitmap fonts -->
  <selectfont>
    <acceptfont>
      <pattern>
        <patelt name="outline"><bool>false</bool></patelt>
        <patelt name="scalable"><bool>false</bool></patelt>
      </pattern>
    </acceptfont>
  </selectfont>
</fontconfig>
[–] [email protected] 2 points 3 days ago

It doesn't break that often.

[–] [email protected] 1 points 5 days ago

You're paying for redundancies in different regions, migrations, backups, upgrades, maintenance, generally not having to worry about losing your data. The storage costs nothing.

[–] [email protected] 2 points 5 days ago

That doesn't address the original point which is whatever's shared has to exist on all machines.

Either way, you would need to backup your data if you were self hosting Nextcloud or friends so you do need multiple copies of it anyway.

[–] [email protected] 6 points 5 days ago (1 children)

As someone who doesn't know much about war tactics: why was that tank just sitting in a very open position, with its hatch open and how did the fighter approach it without getting noticed?

[–] [email protected] 2 points 1 week ago (1 children)

In most "free" countries digitally cracking or cloning phones or trying to scare the owner to unlock as well as remote exploitation is legal. Beating people up in interrogation rooms isn't. Either way, GOS has a panic mode that will immediately erase the phone in a cryptographically secure fashion.

 

I'm looking into buying one of AMD's newer GPUs. Either a 9060xt or 9070xt. Is there a way to track driver support (I know they're supported but I'm interested in bugs/missing features/performance/etc.) for these cards other than asking people who owns them?

I will be on latest Mesa and firmware so I'm interested in the current state.

view more: next ›