- 5 Posts
- 29 Comments
Good mix of usability and learning curve. You will need terminal, but that’s never been easier with AI assistants to learn how. Plenty of support for applications or open source workarounds. It also is familiar enough to use rather quickly, but not so much that it feel like a Windows clone. Highly recommend starting with Ubuntu.
Thanks! Def going to disable play services and other Google options
Thanks! Will do
Thanks for the information - I’ll take a look at the thread. It is a snapdragon chip, so no mediatek thankfully
I’ll definitely check this out from the thread:
Everyone has their own use case, needs and preferences My thought is that you have the following options - not in any order as you will have your preferences Buy a Pixel and install Graphene See if you can install Linage OS, or buy another phone that can Universal android debloater / ADB (not as tricky as it seems) https://github.com/0x192/universal-android-debloater Search and disable apps you don’t want (limited at best) Install RethinkDNS & Firewall. What did I do? On my Samsung tablet, I used Universal Android Debloater AND run RethinkDNS & Firewall. Not as good as Graphene, but cheap / free and 90% of the same.
Unsure as this is new to me. the phone comes to me next week, so I can’t actually check ATM. It’s a carrier unlocked device, if that means anything.
Fair enough!
Maybe, I couldn’t say if it’s a premium for privacy, marketing, or what.
As for turning over data without a warrant, I don’t have a problem with companies complying with lawful orders, as Proton does. I don’t think there’s any evidence to support the notion that Proton complies with non-legal or mere requests from LE. Correct me if I’m wrong.
I don’t have an issue with telcos complying with lawful warrants, which is what Lawful Interception requires. but if your telco can only turn over limited amounts of data because that’s all it has access to, then that’s a plus.
Separately, do you have a source that telcos are unaware when LE is wiretapping? LE would likely need the assistance of the telco to do so and the telco should require the warrant.
collar@lemmy.worldto
Privacy@lemmy.ml•UK once again demands backdoor to Apple’s encrypted cloud storage
0·4 months agoWe can all condemn CP and rightfully so. But it’s asinine to think you can break encryption and that only the good guys will be able to take advantage of that.
True, expensive. Prosper to offset no selling customer data.
Yeah it looks like the cell network is the consumer facing product
Fair points. Different strategies for different threat models I assume. Anonymity through hardening (if we take Cape at their word, big if) or security through obscurity.
100% agree. I would definitely not have them install graphene for you. Do it yourself so you know what’s in the installation
Collecting and monitoring are two different things. If NSA is still dragnetting communications in the post-Snowden era, it’s likely storing and then accessing when something gives the reason. The sheer volume of communication data is far too large to monitor everything.
collar@lemmy.worldto
Asklemmy@lemmy.ml•Has anybody noticed Whatsapp adds cleavage to thumbnails?
31·4 months agoWtf? Is this real?
collar@lemmy.worldto
Privacy@lemmy.ml•UK once again demands backdoor to Apple’s encrypted cloud storage
0·4 months agoIt’s insane how intense the UK is being about breaking encryption. I could understand the hysteria if they had just suffered a terror attack or something and were riding public outrage, but as far as I know this is just based on some nebulous national security/protect the kids justification.
It’s insane. The U.S. and E.U. are not doing any better. The west is becoming a surveillance state.
“Is any SMS/phone call coming out of your personal number something you should consider private from the government? Probably not.”
Well your phone calls themselves – the actual conversation – shouldn’t be accessible without a warrant for a wire tap, that’s pretty longstanding precedent in the U.S. Cell phone location information is also protected by a warrant (Carpenter v. U.S.), but pen registers (logs of who you call) do not require a warrant (Smith v. Maryland). I’m not sure if governments are prevented from purchasing data from carriers, just as any data broker could do. Additionally, who knows if governments are secretly collecting phone call and cell phone data and storing it, but only accessing it once they have a warrant. It’s impossible to know what’s fully happening on the back end between big telco companies and the gov’t.
Either way, at the end of the day, whether you have Cape or some other service, if you’re at the level of the government getting a warrant for your data any legitimate company is going to comply. That’s why the best thing is to have a company that can only turn over limited amounts of data because that’s all they have.
You get you phone number through them and they act as your carrier and then they use other telcos that have the physical infrastructure to service calls/data. Not that different from how Mint or other virtual networks operate, but Cape alleges to collect little data about its users and not to sell any user data.
That’s always the concern with privacy-focused services, especially if they’re not open source or audited.
But if we think about the practical application – who needs a honeypot for cell phone services? Carriers already collect so much data (location, telemetry, payment, government-issued ID, etc) and sell it willingly to whoever wants to buy. How could Cape be any worse? lol. If they adhere to any of their stated policies it seems like a plus, no?
Additionally, at least to me, Cape is not marketing the way the Anom phone did, where it trying to gain adopting by nefarious users. That’s my take - I’m not advocating for Cape since I don’t really know much about them, but I’m trying to put things in context.



I’ve had an AIO for years and had no complaints, but I just bought a fan since AIO can fail more easily over time. There are more parts that can fail and water can eventually evaporate or break down the materials.
I think it depends on what the use case is. I’m using my PC as a sever that I want running 24/7. As such, I don’t want fewer points of failure and I’m concerned about potential failures when I’m not home. Whereas, if it was just a gaming PC that I only turned on while I’m playing, I might care less as I’d be able to monitor it in person easier.
Food for thought.