• 0 Posts
  • 16 Comments
Joined 1 year ago
cake
Cake day: July 6th, 2023

help-circle


  • jet@hackertalks.comtoPrivacy@lemmy.mlAnyone here use GrapheneOS??
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    12 hours ago

    I’m not sure I understand your architecture.

    Let’s say I’m traveling. I have two phones and one laptop

    One of the phones has a SIM, unlimited data for the phone, and no data available for tethering. The Sim phone has a VPN

    In your use case, how do I get other phone, and the laptop to use the VPN?







  • Windows is enterprise, nothing else comes close if you want to manage many hundreds or thousands of computers.

    Enterprise Windows has full control, everything can be automated, everything can be removed. All the annoyances you have in retail windows disappear. It’s just a group policy rule, which is managed centrally, away.

    Prevent users from installing apps? Lockdown what devices can be plugged in? Windows makes it possible

    HyperV on windows is a super power for enterprise. Want a locked down environment, run it in A VM. Want a qubes experience, do it in hyper-V.



  • Typically the attacks don’t take 10 hours… they take seconds, what takes time is getting the captured device a laboratory and the laboratory having time to look at it. So what will happen usually is the phone is put into a faraday bag, hooked up to a usb charger, and put on a shelf until the laboratory can get around to it.

    Once the lab starts attacking the phone, it could take seconds as I said above, but some attacks are more involved requiring the phone to be disassembled and leads soldered onto the board. The restarting is about reducing the time the lab has before they can start and finish their attack

    The same process applies to computers and laptops as well, there are lots of mouse jigglers for sale to prevent a screen saver from going on.




  • Fdroid is introducing another trusted party to your supply chain, which should be a factor in anyone’s threat molding.

    https://f-droid.org/docs/Reproducible_Builds/ However, with reproducible builds now a package is built and signed by both fdroid and the original developer, so you get a net security benefit of having a third party attesting they can independently reproduce the binary from source. Problem solved right? Well, yes but mostly no. Most projects and packages don’t have reproducible builds, so if your using fdroid for most packages your still trusting droid.

    I think a lot of the online hate comes from people making assumptions that their use case and threat model applies to everyone. That’s why I prefer discourse where we just talk about the attributes and not “you should”