What do you mean?
I’m so glad that you brought this up. As might be apparent, I have fairly strong sentiments regarding freedom of software. I won’t be spilling everything I feel into a single comment, but needless to say, this is a subject I feel strongly about.
I absolutely detest Intel and Qualcomm. I wish them the worst in their collective futures (alongside the likes of Samsung and Mediatek too, but I’ll keep to the two of these for now). I have a soft spot for AMD for sticking with the FOSS community to an extent and for their affirmative action towards open silicon initialisation with OpenSIL.
I am not one to drink, but I will personally purchase an expensive bottle of wine from the nearest Costco on the occasion I feel that RISC-V has finally reached the realm of everyday computing. Unfortunately, that seems to be a while away, with SBCs being the only ones to bring the technology forward.
On a related note, I am almost equally annoyed at software that has been locked down. Embedded software like the one in the EC and the PCH, alongside proprietary drivers in peripherals and microcode like you described, are something I wholly abhor.
But that was a lot of complaining. If you go through my posts, just the other day I was asking if the T440p was the last Thinkpad I could put Coreboot on (the answer is yes), alongside which I went over me_cleaner and the AMD PSP remover. I do not prefer Coreboot either, but it’s the best we can do till probably 2030.
I will be employing Faraday cages and metal shielding liberally around my electronics, in an attempt to prevent some of what you mention. Unless we’re talking about undisclosed exploits in Android, removing Google and most other proprietary applications should do the trick (I doubt I can do much if the NSA really wants to listen). Of course, by that logic, me_cleaner should be good enough too, but I digress. Of course, all network traffic will be logged and I will operate on a “whitelist by case” basis.
Thank you for bringing across the point of spying using an accelerometer (I’m interested in how that would work, could you point me towards what I should look for?), I’ll make sure to utilise simple and easily auditable hardware.
This is not a perfect method, and I have a lot to learn about OPSEC and cybersecurity. Thanks again for your comment.
I think you replied to the wrong comment haha
This machine will not be connected to the Internet, and the only way to get to it would be a VLAN-hopping attack (in which case, I’ll have to think of something else)
Thanks for your reply. Fortunately, I am not a person under such scrutiny, and the only reason I ask this is because I’m paranoid.
Thank you for the comprehensive answer. I will go through it again and attempt to implement some of these mitigations.
Thanks again, I saved your comment
Thank you, I realise that what I’m asking for might not be physically possible. I’m certain that RAM loses all of its contents after a loss of power, but would it be possible to pad the RAM before/during the shutdown process to make sure that nobody gets to the key?
Thank you, and indeed, I realise that I may have been asking for the impossible
I’m curious; how would you do it for VMs with an encrypted virtual disk?
The NSA has always had multiple 0-days for TOR, but that’s beside the point. The current rumour is that the NSA controls more than half of the traffic on the TOR network, courtesy of them owning a massive number of high-performance nodes.
I’m going to read more on how i2p works, but if I see more NSA involvement I’m bucking out of that too
Understand the fight. We have three major pipelines for leakage of inferences/data on the internet:
I’m interested in the problems you faced. I have realised that I will need GMS/MicroG for maps, and am unclear if I can get a FOSS app to host my local mail inbox without GMS. Other than that, everything else can be done in the browser (technically even maps can be used in the browser but I digress).
Would like to know which services prevent you from leaving Google
Technically speaking, anywhere that your face/body/gait can be seen/analysed, is where you will be tracked. At this point, the most prudent thing to do is to completely divorce your online identity from your physical self.
I am too, but on the other hand I’m also paranoid haha
Love your work in managing Lemmy’s infrastructure at scale. Would like to join you sometime
I completely agree with your statement (that’s how my day goes too), but I wanted a mobile device. Thanks
Likely not. Apologies for missing the reference, but I don’t have a clue
Where is the problem with going to the church?
Essentially, your usage of your mobile ends with calling?
Unfortunately, that won’t work for me since I need a browser to check my accounts and other needs on the move
Congratulations on the move!