7 Followers
120 Following
23 Posts
Web apps, Android, and Linux desktop security.
Passionate about privacy & opsec. 🕵️‍♂️
Ik leer Nederlands 🇳🇱
Using English as the common language 🌐
it would great if people would put under CW whatever is happening in bluesky (or whatever is called) I mean this is the fediverse, there's nothing we can do about here other than not opening an account

Fascinating for privacy and "Turn off your phone before you go to the secret location" threat models:

"What's more, even phones that are powered off or that have dead batteries can be located for "several hours" after they go dark. However, this only applies to certain handsets, including the Pixel 8 series and Pixel 9 series from Google; the phone needs specialized hardware that enables a low-power Bluetooth signal to be broadcast, even if the handset itself isn't turned on."

https://www.wired.com/story/android-find-my-device-upgrade-whats-new/

Android ‘Find My Device’ Has Gotten a Major Upgrade. Here’s What’s New

Google’s device location service is catching up to Apple’s.

WIRED
My timeline has been eerily quiet over the last few days... 🤔 somehow it's made me ponder the intersection between socials and the classic philosophical question: 'If a tree falls in a forest and no one is around to hear it, does it make a sound?' 🌳💥
Zeer creatief!
#outdoor #benches #chairs
@freddy It's not about age, I generally don't believe in long-term key pairs, and if I put a public key on my profile I kinda need to keep it around forever. Instead I prefer folks reaching out for a single-purpose limited-use key.

My virtual machines topology on Qubes OS looks like this (without going too much in details)

Thanks to Qubes OS, using this is not a nightmare.

- 3 VM per client (web ui, development, administration) + 2 VM per VPN
- 1 VM for my web browser (that resets every start)
- 2 VM for emails (I use 2 emails providers)
- 1 VM for each communication app (matrix, xmpp, whatever)
- 1 VM for handling the audio device
- 1 VM for the network device
- 2 VM for each VPN (clients VPNs, home VPN, infra VPN...)
- 1 VM offline for data storage
- 1 VM offline for secret storage (ssh, gpg, password databases)
- 1 VM for development
- more or less 1 VM for each program I run from there :D

I have 2 VMs per VPN as one holds the VPN and another one is holding the firewall rules under it, so if the VPN is compromised the rules below and upper will not be affected.

below rules affect the VM using the VPN, upper rules affects the VM with the VPN to restrict it only to the VPN destination