gibson

joined 4 years ago
[–] [email protected] 2 points 1 year ago (1 children)
[–] [email protected] 3 points 1 year ago (3 children)

cock.li but it doesn't encrypt your inbox so keep that in mind.

[–] [email protected] 9 points 1 year ago

xpra: it is like tmux but for X windows (works on wayland), but it can do much more than that. You can seamlessly run GUI programs from a container or VM on your main desktop while still sandboxing their X capabilities, forward windows from Windows desktops, and it has efficient encoding so it is usable over poor connections as well.

[–] [email protected] 2 points 1 year ago (1 children)

At least on my phone, rebooting also makes it require PIN

[–] [email protected] 11 points 1 year ago

For those who don't remember, not only could signal be used for SMS, it used to be able to do encrypted sms convos.

[–] [email protected] 2 points 1 year ago (2 children)

As a Go dev, its simplicity is arguably taken too far. For example there are no union types or proper enums

[–] [email protected] 1 points 1 year ago

The main benefit is since it is locally installed, it is harder for proton's server to access your encrypted data by serving you malicious JS. A malicious desktop app/update could be served too, but that may be trickier.

[–] [email protected] 6 points 1 year ago

It usually isn't super hard to tell apart randomized junk like this from real human patterns. That is why Tor Browser for example tries its best to make everyone look the same instead of randomizing everything.

That said, for the mere purpose of throwing off the ISPs profiling algorithms, you could make a relatively simple python program to solve this. A naive solution would just do an http GET to each site, but a better solution would mimic human web browsing:

If you have no programming capability this will be rough. If you have at least a little you can follow tutorials and use an LLM to help you.

The main issue with this goal is that it isn't possible to tell how advanced your ISP's profiling is, so you have no way to know if your solution is effective.

Feel free to DM me if you go this route.

[–] [email protected] 3 points 1 year ago

I do something similar with rclone and vultr's s3 service. I made an s3 remote in rclone and then a encryption layer remote on top of that.

[–] [email protected] 5 points 1 year ago* (last edited 1 year ago)

You can make actual docker compose use podman by running a user podman docker socket and setting that as an environment variable (export DOCKER_HOST=unix:///run/user/$UID/podman/podman.sock)

https://brandonrozek.com/blog/rootless-docker-compose-podman/

[–] [email protected] 1 points 2 years ago (1 children)

Just because you can't stop all the leaks in your plumbing doesn't mean you shouldn't fix the ones you can.

view more: ‹ prev next ›