

Sad but understandable. I saw the donation button but I don’t have spare money atm.
I’m the Never Ending Pie Throwing Robot, aka NEPTR.
Linux enthusiast, programmer, and privacy advocate. I’m nearly done with an IT Security degree.
TL;DR I am a nerd.
Sad but understandable. I saw the donation button but I don’t have spare money atm.
It might have been your DNS that was identified? It depends on whether you enabled proxy DNS for SOCKS5.
For best fingerprinting protection, use either:
Avoid using Tor with a normal browser because you will stick out like a sore thumb.
The link to the Joplin’s website is https://joplinapp.org/
I recommend Notesnook. It is open source, cross platform, and cloud synchronized E2E encrypted. I know cloud based wasn’t something you wanted especially, but I thought it was worth mentioning because it is encrypted.
That is one of the reasons I switched recently from Jerboa. It was annoying how it’d lag behind on features…
That feeling when you encounter the floating gay shuttlecock for the first time.
Username history is public info for Minecraft accounts, using Mojang’s API.
For example Richard Stallman
Thank god. It is a fantastic game.
I personally like flatpak and its build system. Flatpak applications are sandboxed by default and don’t require root during any part of installation, reducing the risk of malicious/broken software damaging the host. They also are available for basically any base distro, meaning i can use the same apps if a ever distrohop and i can even just copy over the config folders as if nothing happened.
It’s a panel of tests for browsers. It isn’t the clearest what each mean (without doing a little research) and not all categories and subcategories have equal importance. I still like this website though just for the listed information.
I recommend Fedora or openSUSE Tumbleweed.
Lol, understandable.
It seems like an interesting setup. I don’t really have too much to say other than nitpicks.
Why not use Mullvad browser for both scenarios. Mullvad with security level safest should block all JS. You could create a 2nd profile for safest only mode.
Using Linux .desktop launcher scripts, you could:
-P
)Related to your choice of host OS, I personally avoid Debian for desktop because it is slow to adapt (cus its Debian). I know it isnt directly applicable to situation since your main concern seems to be anti-fingerprinting, but a secure base is important. I’d like to know your reason for picking it. I don’t dislike Debian and I still use it for different things (mostly VMs and some dev work).
Thanks for the rant, I liked your write-up.
I think it may also help some people to create simple decision flowcharts to help with acting consistent and avoid making simple mistakes with a complex threat model. Basically a scenario and the decision tree. Say for example someone is using QubesOS and needs to keep consistent what each qube is for and why.
Of course creating charts that show your strategy and make your decision predictable is itself just even more privileged information you now need to protect.
Also, any effective threat model also requires consistent reevaluation to assess the effectiveness of your methods and adjust with the evolution of threats.
Which would that be *pulls out the deathray which terminates fun places on the internet*?
It wont be a problem because from the Live USB you can mount the encrypted drive in the file explorer app (Dolphin on KDE) after supplying the encryption password.
No
/jk obvi I like Python
Firejail is a large SETUID binary which can (and has) aid in privilege escalation. It is recommended to avoid it for this reason.
See: https://madaidans-insecurities.github.io/linux.html#firejail
If you are relying on community sandboxing profiles and not making your own, i can understand why Firejail is interesting as a choice because of its large community.
If you are making your own, consider checking out Bubblewrap (available on most Linux systems), Bubblejail), Crablock, and Sydbox, which all use unprivileged sandboxes.
That is not what I was referring to. DoH is easy to access in the settings, but with a SOCKS5 proxy you want DNS from the provider to avoid fingerprinting of your location by using a network or DoH provider, which may be a geographically closer server because of your host IP.
Under about:config, change “network.proxy.socks5_remote_dns” to true.
I don’t know definitively why they were fingerprinted to there local city, this is just a theoretical reason.