• 0 Posts
  • 21 Comments
Joined 8 months ago
cake
Cake day: March 18th, 2024

help-circle


  • if you want to degoogle the only way to run some apps without unprivileged code (GMS/microG) is to use grapheneos & its sandbox compatibility layer. this is unfortunately only available on the pixels.

    I also worry you won’t be able to use some of the customization options that the nothing phone 2 offers with its hardware when using a custom ROM. if thats something u care about.

    I have the pixel 7a & have had essentialy no issues with anything for what that’s worth.


  • only as private as you make it. they are required by law when mandated by a warrant to release IP & other (unencrypted) data they have on you. use a proxy to connect & take other opsec measures to conceal your online identity just like other sensitive web browsing activities if you want to use email “privately”.

    this is really only helping anonymity though, as the email protocol has no built in encryption. unless you are using PGP it really isn’t apt for secure communication at all.






  • while I am by no means an expert on this, my gut tells me that this is probably something to do with “nessecary” cookies vs advertising & tracking cookies. its a common loophole for other policies so I wouldnt be surprised if they had some way of circumventing the normal limitations for tracking because of “fraud protection” or the likes.

    looking at the cookie descriptors, all of the 1825 day cookies are used to “store &/or access information on device refreshes”. the shorter cookies are the only ones that also mention “measuring advertising & content performance”.


  • ahhh I see what you mean.

    your thoughts on spacing out your connections & isolating is smart. unfortunately if you connect from the same device & browser any government agency or dedicated company with a big enough dataset (google, meta, etc.) would still be able to link you regardless of you IP by browser fingerprint alone. this does make YouTube more specifically being linked to your exact browser fingerprint porblamatic in a high stakes situation. As it, as you said is linked to your identity.

    for lower level tracking changing IP regularly is effective. however, instead of switching to your local IP it would be more privacy conscious to just switch to a different VPN server.

    unfortunately if you are genuinely worried about government level surveillance or the likes u enter into territory where VPNs often no longer cut it (or at least can’t truly be trusted too) as they are centralized & can be forced to make exceptions for law enforcement. traffic analysis is also easier, which makes time correlation deanonimization a more realistic risk when talking about government agencies specifically.

    the tor + vpn debate is one that lots of people argue & is excedingly complicated. tor is generally more than enough, unless you are wanted by INTERPOL haha. if you are genuinely worried about suppressive government or world powers targeting you look further into tor, & do not connect directly to your ISP at all as that data is essentially up for grabs to local authorities (depending on locale).

    for you specifically I would consider doing your more sensitive tasks in the tor browser without the VPN & then having your normal browser always on the VPN so they would be more difficult to correlate. anything torrent related is low enough stakes that I would imagine just about any proxy would suffice. hope this was helpful 🙏.


  • tldr; no, if you trust your vpn more than your ISP always use it, as any hit to fingerprinting is menial.

    it really can’t hurt much to always be using it. any fingerprinting metric it would give is outweighed by the hiding of your IP behind the proxy. this is the #1 unique identifier that is tied back to people/locations.

    the other fingerprinting metrics also are still exposed anyway & could probably be linked back to “you” regardless of your IP changing if they wanted too.

    if you are worried about fingerprinting look into some projects like mullvad, librewolf, or even tor. clearing cookies on quit &/or having a separate browser for permenant logins/tokens to live in is also a good mitigation technique.





  • telep@lemmy.mltoPrivacy@lemmy.mlWhat VPN are you using?
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    6 months ago

    I would avoid trying to make sure you use the “official instance” as it kind of works against the projects purpose of decentralizing web requests. pinging around instances helps with avoiding outages as well. you can find active instances here on the uptime monitor.

    otherwise, stealth should work just fine if u turn on webscraping mode. I have been using it since the reddit changes with only very occasional issues, as similar to you I have some quams with alternative reddit clients.1000018448


  • telep@lemmy.mltoPrivacy@lemmy.mlWhat VPN are you using?
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    6 months ago

    redlib is the updated version of libreddit & it seems to have circumvented the issues reddit caused so maybe consider giving it another try.

    I think stealth also broke when they removed free API access. although, you can still use the webscraping mode by changing it in the settings I believe. if u want another option maybe try out RedReader or Geddit.


  • have you considered using alternatives front ends for some of the major social platforms?

    I use libreddit/redlib to browse reddit. you can run an instance locally or connect to remote ones. this way your IP isn’t logged by reddit in the first place & no JavaScript is required to be run for the website to function properly.

    there is even an extension called libredirect which can automatically swap clicked reddit (& other platforms) links to the same page on public frontends, which removes the hasstle of manually changing the URL.


  • telep@lemmy.mltoPrivacy@lemmy.mlWhat VPN are you using?
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    6 months ago

    unfortunately the blocking of servers is a perpetual battle that plauges almost any publicly listed proxy (vpns, tor, etc). the only way I have found around it is using lesser known/blocked VPNs or residential proxies. both of which probably have subpar data privacy policies, if they even follow them at all.

    althought it likely won’t help your captcha troubles, I would like to give a huge +1 to mullvad. have been a happy customer for years. in compsrison to proton as a company they have a much more direct/benifitial effect on the web & furthuring users privacy online in my eyes.


  • scrambled exif is really practical & easy to use. it has been a player for a while now where as metadata remover seems newer & possibly less trustworthy/vetted because of it.

    it also doesnt seem to add much new functionality from scrambled exif besides viewing data in app.

    I personally use image toolbox which allows you to select what specific exif tags you would like to remove. however, I wouldnt put any more trust in its accuracy or comprehensiveness than any other adjacent app as they realistically all probably work very similarly.

    if its imperitive you don’t leak any exif data I would recommend checking that in an external & more trusted app anyway. something like aves or a similar gallery that will lay out all all metadata tied to an image.