• 0 Posts
  • 124 Comments
Joined 3 years ago
cake
Cake day: July 29th, 2023

help-circle
  • Sideloading APKs is an easy vector but so is the Google Play Store. It’ll take scammers like 5 minutes to just perma move to GPlay shenanigans, and its already well known to have poor quality control and tons of malware available to download with the useless play protect logo.

    This is just Google’s public justification for creating their walled garden. They already pulled this exact scam with Chinese OEMs which is how Huawei got banned, and others stopped selling in the US. They huffed up some story about CCP spyware and then mandated that GPlay be installed in full, otherwise face consequences from congress.

    Even Samsung got pulled in and they essentially agreed to use GApps as the de facto communication suite for their phones in exchange for allowing Samsung to continue to use their Galaxy store.

    They see stuff like AOSP as a threat because anyone can just fork the OS and make their own non google Android, and they don’t want any OEM to replace GPlay like what Motorola is attempting right now (hence the increased urgency to lock down Android).

    Google’s monopoly in the mobile space revolves around every phone using GPlay, so they’ll do anything to maintain their control.


  • (I don’t need strong censorship resistance; it just has to work in offices and hotel WiFis.

    Wireguard on 443 or OpenVPN + Stunnel on 443

    Wireguard is easier to setup because there’s no OpenVPN app that packages stunnel (afaik), so you have to run 2 apps on your phone to make it work.

    A server like caddy can also accept HTTPS traffic for some regular websites next to the VPN server.

    Wireguard uses UDP, so just run whatever you want on 443 TCP with caddy (unless you want QUIC for some reason?)

    Anything beyond that and you’d be looking at using a proper obfuscation solution like Shadowsocks or obfs4, in which case you should look into Amnezia or Tor bridges.




  • Use our easy bash oneliner to install our software!

    Looks inside script

    if [ $(command -v apt-get) ]; then apt-get install app; else echo “Unsupported OS”

    Still less annoying than trying to build something from source in which the dev claims has like 3 dependencies but in reality requires 500mb of random packages you’ve never even heard of, all while their build system doesn’t do any pre comp checking so the build fails after a solid hours of compilation.





  • mlg@lemmy.worldtoLinux@lemmy.mlHow important is a DE to you?
    link
    fedilink
    English
    arrow-up
    4
    ·
    2 months ago

    Very critical. GNOME and KDE have two very different UX paradigms.

    Usually people used to Windows opt for KDE, and Mac or older Ubuntu users opt for GNOME.

    The thing is though, a golden standard DE can easily be setup to act as both. XFCE is so customizable that I’ve seen both DE types setup as UNIX like or Windows like workflow.

    I’m not sure if KDE or GNOME can do the same because I’m pretty sure they focus on a target audience.

    What are your issues with KDE exactly? I always hated GNOME’s lack of standard window buttons and handling multiple windows in a Mac like fashion. Also the app menu which gives me flashbacks of ChromeOS.


  • I tried protonmail not for the privacy purpose but just to have a normal web email client.

    After wasting an hour before finding out you can’t disable the “sent from protonmail” footer without manually deleting it in each draft you make, I said screw it and deployed my own email server with stalwart lol.

    It’s receive only because outgoing SMTP is a pain to make reliable these days and my ISP blocks outgoing SMTP anyway, but for everything else I now use Thunderbird.





  • mlg@lemmy.worldtoSelfhosted@lemmy.worldDocker security
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    1
    ·
    3 months ago

    How I sleep knowing Fedora + podman actually uses safe firewalld zones out of box instead of expecting the user to hack around with the clown show that is ufw.

    I could be wrong here but I feel like the answer is in the docs itself:

    If you are running Docker with the iptables or ip6tables options set to true, and firewalld is enabled on your system, in addition to its usual iptables or nftables rules, Docker creates a firewalld zone called docker, with target ACCEPT.

    All bridge network interfaces created by Docker (for example, docker0) are inserted into the docker zone.

    Docker also creates a forwarding policy called docker-forwarding that allows forwarding from ANY zone to the docker zone.

    Modify the zone to your security needs? Or does Docker reset the zone rules ever startup? If this is the same as podman, the docker zone should actually accept traffic from your public zone which has your physical NIC, which would mean you don’t have to do anything since public default is to DROP.






  • Ubuntu and Docker.

    Really? Netplan alone disqualifies Ubuntu as a “friendly stable starter distro”, and I can guarantee you that your guide will somehow become outdated with a single new Ubuntu release, or some poor soul who accidentally selected an LTS release.

    Docker doesn’t matter as much, but there’s a reason beyond just FOSS licensing why podman exists.

    Would highly recommend Debian instead.

    I started on Ubuntu similar to this many years ago and both the server and desktop experience was not fun at all.