I use Android Oreo and it’s locked with a 15 character password (upper- and lower-case letters, numbers and symbols). Does the existence of Cellebrite kiosks mean I’m wasting my time, as far as law enforcement is concerned?
So I hear people can pull data off of a device after it’s deleted. How does one go about making sure they can’t before selling a phone?I have assumed encrypting the device with a loooooong key, filling with as much data as possible and then resetting the device might work.Any suggestions? It has been rooted in the past and it seems my bootloader failed to relock when restoring DRM.
I recently switched to Brave for my browser on my Mac. I know you don’t need to install that much extensions on Brave (apparently) but even so, all the extensions are through the Chrome Web Store. When it comes to privacy and even security, am I at risk as compared to something like Firefox’s extension store or are they similar?
As far as OFTC allows exit nodes, to use Freenode through Tor I need firstly create an account on clearnet server. I found the following information on Freenode website:Accessing Freenode Via TorFreenode is also reachable via Tor, bound to some restrictions. You can’t directly connect to chat.freenode.net via Tor; use the following hidden service as the server address instead:freenodeok2gncmy.onionThe hidden service requires SASL authentication. In addition, due to the abuse that led Tor access to be disabled in the past, we have unfortunately had to add another couple of restrictions:You must log in using SASL EXTERNAL or ECDSA-NIST256P-CHALLENGE (more below) If you log out while connected via Tor, you will not be able to log in without reconnecting.If you haven’t set up the requisite SASL authentication, we recommend SASL EXTERNAL. You’ll need to generate a client certificate and add that to your NickServ account. This is documented in our knowledge base.Connecting using SASL EXTERNAL requires that you connect using SSL encryption.Note that due to the SSL certificates not matching the hidden service, you might have to disable the verification in your client. If your client supports key pinning, you can verify our Tor server’s public key fingerprint:E0:1B:31:80:56:D9:78:C4:2B:2D:3F:B2:DB:81:AB:03:15:59:BF:04:7E:31:E8:60:5F:98:07:A1:BB:8F:A3:0DYou’ll then want to tell your client to try the EXTERNAL mechanism. We lack comprehensive documentation for this, but it’s a feature in most modern clients, so please check their docs for instructions for now.The problem is that after generating the SASL certificate, you need to register an account and a certificate on their server.But as you can expect when connecting to freenodeok2gncmy.onion we have:*** Notice — You need to identify via SASL to use this server * Closing Link: gateway/tor-sasl/account (SASL access only) * Disconnected (Remote host closed socket)And after connecting to irc.freenode.net/6667 through Tor we have:You are banned from this server- Your tor exit node must not allow connections to Freenode (tor exit node (webchat.freenode.net:443)). Email firstname.lastname@example.org when corrected.This is a vicious circle because in order to connect to their server I need to use SASL and to use SASL I must first connect to their server.Does anyone know how to solve this paradox?Source: https://forum.dug.net.pl/viewtopic.php?pid=320860