13
submitted 2 weeks ago by byte1000@discuss.tchncs.de to c/tor@lemmy.ml

Onion link

In that respect, Tor Browser 13.5 feels like a milestone: in addition to the dozens of bug fixes and minor improvements noted in the changelog below, this release features major changes to Android's connection experience in preparation for the future addition of Connection Assist, including full access to Settings before connecting and a new, permanent home for Tor logs.

For desktop, we're continuing our efforts to improve the user experience of Tor Browser's fingerprinting protections. Following the changes we introduced to new window sizes in Tor Browser 13.0 for Desktop, this release features welcome design changes to letterboxing, including new options to remember your last used window size and adjust the alignment of the letterbox in General Settings. Bridge users will also discover a myriad of improvements to bridge settings, including a complete redesign of bridge cards with improved sharing features, and a new section designed to help you find more bridges elsewhere. Lastly, the design of onion site errors has received a visual refresh aimed at making them consistent with the other kinds of Network Errors you can find in Tor Browser.

29
submitted 3 weeks ago by byte1000@discuss.tchncs.de to c/tor@lemmy.ml
[-] byte1000@discuss.tchncs.de 9 points 3 months ago
16
submitted 3 months ago* (last edited 3 months ago) by byte1000@discuss.tchncs.de to c/tor@lemmy.ml

Onion link

This is an unscheduled emergency release with important security updates to Firefox for Desktop platforms. Android is unaffected.

5
Tails 6.1 (tails.net)
submitted 3 months ago by byte1000@discuss.tchncs.de to c/tails@lemmy.ml

Automatic upgrades are available from Tails 6.0 to 6.1.

43
Lockdown Mode for Android? (discuss.tchncs.de)

Is there a fork of Android (or a way to harden it) that locks down the OS similarly to how Apple does it?

Apple's implementation can actually protect you from commercial spyware. I'm impressed.

[-] byte1000@discuss.tchncs.de 4 points 3 months ago

~43% of all Lemmy's monthly active users are on lemmy.world .

Yeah, that's even worse.

[-] byte1000@discuss.tchncs.de 7 points 3 months ago* (last edited 3 months ago)

The instance has too many people registered. It has ~27% of all Mastodon's monthly active users.

A huge part of the network was down. People should be encouraged to migrate to smaller instances, so we can have better decentralization.

39
submitted 4 months ago by byte1000@discuss.tchncs.de to c/matrix@lemmy.ml

Element has been working with Meta since the end of last year to help test their DMA interoperability (given we’re probably the world leader in interoperable end-to-end-encrypted communication) - and Matrix announced last month at FOSDEM that Element has successfully integrated 1:1 chats between Matrix and WhatsApp via the DMA APIs, while maintaining end-to-end encryption (having implemented full Signal compatibility in vodozemac). We’ve also formally requested interoperability with WhatsApp, as of yesterday.

[-] byte1000@discuss.tchncs.de 16 points 4 months ago

All internet connections into and out of your Linux device will now be blocked unless a VPN connection to a Proton VPN server is active.

If I understand correctly, before version 4.2.0 (that includes the Advanced setting), the kill switch wasn't active until you opened the ProtonVPN program. So if you restarted you PC, it was connecting to the internet without going through the VPN tunnel, so your traffic was somewhat exposed.

Now, with the new permanent kill switch, there's no internet access without running ProtonVPN.

[-] byte1000@discuss.tchncs.de 5 points 4 months ago

The update seems to be bugged. I tried to upgrade version 0.0.57 to 0.0.58, and it seems like nothing have changed. I'm still on 0.0.57 after a "successful" install.

[-] byte1000@discuss.tchncs.de 3 points 7 months ago

Good to know. Thank you for your answers!

[-] byte1000@discuss.tchncs.de 6 points 10 months ago

You mean Pixel 5.

[-] byte1000@discuss.tchncs.de 3 points 10 months ago* (last edited 10 months ago)

Additionally, if you share your account with other people and haven’t enabled two-factor authentication, you may not want to join the Sentinel program, as it will increase your chance of being challenged during logins.

I wonder, so why not just force Sentinel program users to enable 2FA?

[-] byte1000@discuss.tchncs.de 10 points 10 months ago

If an app on one device connects to an app on another via Veilid, it shouldn't be possible for either client to know the other's IP address or location from that connectivity, which is good for privacy, for instance. The app makers can't get that info, either.

Is that considered a new thing? I don't think I've ever encountered a P2P service/protocol that also masks IP addresses.

4
submitted 10 months ago* (last edited 10 months ago) by byte1000@discuss.tchncs.de to c/bravebrowser@lemmy.ml

Release Notes v1.57.47 (Aug 15, 2023)

[-] byte1000@discuss.tchncs.de 6 points 11 months ago

Relatively high number of RCE vulnerabilities.

[-] byte1000@discuss.tchncs.de 4 points 11 months ago

IMHO that's a highly requested feature.

[-] byte1000@discuss.tchncs.de 3 points 11 months ago

What if the site was even able to fingerprint my Tor browser?

I didn't change anything in the browser settings menu. Only thing I did after loading the site for the first time was to click "block canvas fingerprinting".

I'm on Windows 11 BTW.

19
submitted 11 months ago* (last edited 11 months ago) by byte1000@discuss.tchncs.de to c/solarpunk@slrpnk.net
view more: next ›

byte1000

joined 11 months ago