• 0 Posts
  • 24 Comments
Joined 18 days ago
cake
Cake day: February 5th, 2025

help-circle





  • This doesn’t change the situation at all. Each mail server has their own whitelists and blacklists. Some mailservers have explicit whitelists and will throw into the spam folder anything not on the whitelist. You could have a perfectly configured mail server and be doing everything right, but because your TLD isn’t on the whitelist its throw into spam regardless. It entirely depends on the configuration of the mail server to whom you’re sending mail.

    Mail is super hard.





  • Most Android versions have this now. Became popular as soon as SCOTUS ruled that police can compel you to unlock your device via biometrics. Enable it. If you think you may be arrested, simply restart your phone and now they need a court order to unlock your phone which means they have to convince a judge with probable cause.


  • Practically speaking, there’s a huge difference.

    RCS/iMessage are great. They’re a huge upgrade over SMS, however, the E2E statements they make aren’t really verifiable to the degree necessary to call them secure. They also require hardware compatibility, software compatibility, environment compatibility (root breaks RCS) as well as network compatibility so the pool of devices that work both ways with RCS is still pretty small. It’s frankly a mess. Default settings for most RCS/iMessage applications will attempt to send via E2E protocols and if it fails, it defaults back to sending SMS. So now your super secret content was just sent basically over cleartext if the protocol send fails. lol

    Realistically speaking, he’s right. There’s no difference. People don’t casually message information which is important enough to require perfect forward secrecy. So at the end of the day choose which works best for you and if you do dumb shit like sending credit card and social security numbers over clearnet, then prepare to have your anus widened.

    I personally prefer running an MTProto proxy on top of Telegram. I control the proxy, so I can view where the network traffic is going in transit for the most part. Is MTProto perfect? No. But it’s vastly improved since previous independent audits and it’s “good enough.”

    If critically sensitive information has to touch a device with internet access then you need a mature security protocol like PGP or some other shared key cryptography so you can verifiably ensure you’re talking to whom you’re supposed to be talking to. If that’s something you’re interested in, give Keybase a try. It’s a really great platform built around a really great technology (PGP). The mobile application comes with a chat option that uses your PGP key to symmetrically encrypt your chat messages using Scrypt (with PBKDF2) making it significantly more secure than any other option mentioned here.








  • Light + TIF                     https://sky.rethinkdns.com/1:AAkACAQA
    Normal + TIF                https://sky.rethinkdns.com/1:AAkACAgA
    Pro + TIF                 https://sky.rethinkdns.com/1:AAoACBAA
    Pro plus + TIF               https://sky.rethinkdns.com/1:AAoACAgA
    Ultimate + TIF              https://sky.rethinkdns.com/1:gAgACABA
    
    Light + TIF                 https://dns.dnswarden.com/00000000000000000000048  
    Normal + TIF                 https://dns.dnswarden.com/00000000000000000000028  
    Pro + TIF                 https://dns.dnswarden.com/00000000000000000000018  
    Pro plus + TIF               https://dns.dnswarden.com/0000000000000000000000o  
    Ultimate + TIF              https://dns.dnswarden.com/0000000000000000000000804  
    
    Light                https://freedns.controld.com/x-hagezi-light
    Normal                https://freedns.controld.com/x-hagezi-normal
    Pro                https://freedns.controld.com/x-hagezi-pro  
    Pro plus                https://freedns.controld.com/x-hagezi-proplus  
    Ultimate                https://freedns.controld.com/x-hagezi-ultimate
    TIF                https://freedns.controld.com/x-hagezi-tif
    
    

    DNS based adblocking with Hegezi blocklist and TIF (threat intelligence feeds). Works with any device on your network in one way or another (QUIC, DoH/3, DoT, etc) and doesn’t require installing anything. Just changing dns settings.

    This is a great list. Blocks about 95% of all advertisements. About 4% are unblockable due to one reason or another, and the remaining 1% get added very quickly. I highly recommend this solution. Sure, you can setup a PiHole and do it all yourself, but in the end that requires time and attention. It’s the same list, but if you roll PiHole yourself you don’t get access to TIF, which are amazing for protecting you from different kinds of threats.