• 0 Posts
  • 42 Comments
Joined 7 months ago
cake
Cake day: June 23rd, 2024

help-circle





  • Lineage covers many devices but is not very privacy friendly. It does not include Google integration by default. The ßain advantage is longer software support.

    Graphene is most secure and privacy friendly OS and comes with support for sandboxed GApps (optional). Unfortunately it is only made for Google Pixel devices so I’m out.

    Depending on your reasons and device you could also check alternatives like /e/.









  • Undertaker@feddit.orgtoPrivacy@lemmy.mlHow private is a fairphone?
    link
    fedilink
    arrow-up
    7
    arrow-down
    1
    ·
    2 months ago

    The default is Fairphone OS. It is Google Android but they don’t pay to license the name ‘Android’, so they have to use an alternative name.

    You can install /e/OS (even preinstalled by Murena) or DivestOS. Any other option doesn’t make sense as Divest is best in terms of security and privacy among all available custom roms and /e/ is most convenient (good but not perfect privacy, bad security but with MicroG, relock and App Lounge as well as Murena Cloud)



  • Fairphone is an option. Can be relocked. It is not important, what Fairphone supports but if it is supported by custom ROM developers. Fairphone is supported by most. But please avoid using Calyx or iode. They are both outclassed by Divest.

    At least for /e/OS I can assure that relocking is simple enough. As there is partnership between Fairphone and Murena (/e/ developers) OTA updates are safe for future. Unfortunately the Fairphone support is horrible and /e/ is always too far behind security patch level.





  • VPN is both, an interface on your device and a network connection (to a provider). Netguard only uses the first. So every request is going through Netguard but is not sent to a VPN provider, it leaves your device like it would if Netguard wasn’t active.

    So no VPN provider can see your traffic.

    While being sent through your local Netguard, the request is checked whether it should be blocked or not. This is done by its name. If the name is on a block list (real list or manually blocked) Netguard ensures that the request will end in nowhere otherwise it will go through.