Category: internet s

What free iPhone security apps are you using?

What free security apps are you using on your iPhone? email app with autocrypt? pgs key ring? Network tools? self contained contacts calender(by self contained I mean separate from iPhone databases) other free tools?

Regarding Windows, Email Client and MS Office

Hey, I’m stuck on these things:

1) I’m thinking to go back to Win 7. I just dont like this privacy thing of Win 10. My purpose is only work – Chrome and Firefox (Multiple tabs), Photoshop, Illustrator, Video Editing, Word, Excel and that’s it. No movie, songs, games etc. And I will just turn off automatic updates in Win 7. I do have paid version of Bit defender total security 2018 and malware bytes. So, I’m okay to proceed, right? Oh and will there be any issue of USB 3.0 in Win 7? Because I have a couple of external hdds that need USB 3.0

2) I’m thinking to get Office 365 but before that I need to know that can MS see what we write and save in Word, excel and powerpoint? And can they even see our emails in outlook from the backend?

3) Till now I was using Thunderbird but to me it’s very slow and annoying. I’m thinking to get either Mailbird or Postbox email. Any reviews for either of them?

Please help me with those. 🙂

Thanks in advance!

Found here

Does VIP ACCESS allow monitoring on my phone?

This is going to make me sound dumb but I’m definitely not a techie. My company now requires that we download and use the VIP access app as a 2 step verification process to log in to our work emails.

My question is it does it allow access the company to see my phone and what I do on it?

Found here

How much privacy does a fresh iPhone provide?

I’m fairly new to the privacy discussion. I’m aware of three major pieces in the threat model…

  1. Hackers/other people
  2. Corporations
  3. Governments

If I reset my iPhone and use only stock apps, am I effectively safe from corporate and hacker tracking and data mining? I don’t believe that the iPhone is impervious to government surveillance as I’ve been made aware that an iPhone’s data can be retrieved through NSA’s PRISM. Outside of that, is the iPhone effectively protecting your privacy?

Found here

Why do so many sign ups require phone number?

It’s a bit ridiculous that they require so much information just to do anything. First name, last name, phone number, blood of your firstborn.

Wasn’t the rule of thumb in the past, “Never reveal your full name on the Internet”? What happened to that?

I may or may not have been writing this based on emotions. But I am genuinely curious as to the NEED for these kinds of information.

Found here

Best Hardware –> OS –> Browser Setup?

Forgive me if this is the wrong place to post this, but I am looking for help in narrowing down which hardware implementations would work best for a threat model in which a state-level actor does not have physical access to the individual, but does have access to their overall network (and so one would initially assume all traffic is possibly intercepted).

Hardware: (remove untrusted peripherals, regardless)

  • OpenRISC: (on FPGA – one of the only GPL ISAs)
  • SPARC: (only via open implementations: LEON or OpenSPARC varieties T1, S1, T2 [all on FPGA – one of the only GPL ISAs] )
  • RISC-V: SiFive HiFive Unleashed, LowRISC (when complete)
  • MIPS: Lemote YeeLoong 8089D or 8101B ( “Stallman approved” but RISC-V is preferred once mature )
  • POWER: (only via an open implementation: TALOS II LITE running on POWER9)
  • ARM: EOMA68, Novena, BeagleBone Black, Reform ( when complete ), OLinuXino ( category, not a single thing ), possibly the PandaBoard
  • X86: (Lenovo Thinkpads via) Libreboot / Taurinus (models X200 or T400, X60, T60)

Firmware: Libreboot w/ GRUB2 bootloader ( not applicable to / needed by all hardware )

OS: Qubes running Tails running [ can add Trisquel or Debian here, running ] Whonix <– [ Is this even physically possible? ]
( all can be used separately or else together, in this specific order; Trisquel and Debian are FLOSS, but not as secure as the others )
Network: Tor, Freenet, (or I2P)
Router: (Any that has been flashed with LibreCMC)
Browser: IceCat

Found here

is my iphone listening to the movies i watch?

hello don’t normally use reddit so i am sorry if i am posting in the wrong subreddit but something a little weird happened to me today with youtube’s recommended videos and was not sure where else to post it.

so Apocalypto was playing on the tv at my parents house and then when i got home tonight I check my youtube homepage and this uploaded video (a documentary about how the movie was made) was in my recommended. how is this possible? when i did not search the movie on my phone i was simply channel surfing on tv and decided to watch it. then when i get home i check my laptop to see this on my youtube homepage and there is no way it could have been due to wifi or similar circumstances because again my laptop remained at home.

I am not really a tech guy I know some, so maybe I missing something obvious, but just couldn’t understand how a youtube video uploaded from a year ago had anything relevant to do in my feed aside from the fact that i had watched the movie separately at another location.

Found here

Are the details in this movie “Snowden” true?

Are the details in this movie “Snowden” true?:

Are the details in this movie “Snowden” true?

From here

Surprise, the FCC Lied About That DDoS Attack

Surprise, the FCC Lied About That DDoS Attack:

Surprise, the FCC Lied About That DDoS Attack

From here

Setting up Pi-hole: Step-by-Step Instructions

Setting up Pi-hole: Step-by-Step Instructions:

Setting up Pi-hole: Step-by-Step Instructions

From here