-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Do you accept suggestions of links? #1
Comments
Sure! I will check your second one 🍺 |
https://wonderfall.dev/docker-hardening |
I added all but last one. If you don't have more stuff, i would close this issue for now. |
Thanks for adding some of them! Got more suggestions :) https://research.nccgroup.com/2021/10/27/public-report-whatsapp-end-to-end-encrypted-backups-security-assessment/ a research done also on whatsapp E2EE backups https://sudneela.github.io/posts/the-workings-of-whatsapps-end-to-end-encrypted-backups/ https://www.ndss-symposium.org/ndss-paper/improving-signals-sealed-sender/ the video is well explained too. https://www.scss.tcd.ie/Doug.Leith/pubs/gboard_kamil.pdf Add https://www.hardenize.com/ , https://mxtoolbox.com/ to (How to test your eMail provider (security & privacy) ?? Also https://youtu.be/aC9Uu5BUxII (monreo) |
(An Antivirus does not improve your security) Most of these links are dead and not technical but rather opinion based, maybe in future add archive.org or arhive.ph link when referencing a tweet. |
Only first link is dead. @Zanthed @terezipyrope But yeah they’re not technical. |
https://sudneela.github.io/posts/the-workings-of-whatsapps-end-to-end-encrypted-backups https://www.ndss-symposium.org/ndss-paper/improving-signals-sealed-sender/ https://portswigger.net/daily-swig/multiple-encryption-flaws-uncovered-in-telegram-messaging-protocol https://www.cryptofails.com/post/70546720222/telegrams-cryptanalysis-contest Thanks @jermanuts #1 (comment) & #1 (comment)
I added most of it and also mentioned you again in the commits. |
Thanks, glad you liked them. |
https://www.bejarano.io/sms-phishing/ |
Added 🍺 Last link added in https://github.com/beerisgood/Smartphone_Security/blob/main/README.md |
https://tonyarcieri.com/4-fatal-flaws-in-deterministic-password-managers EDIT: do you think the last 2 links fit/related to security? Not related. |
Password manager link added. Thanks 👍 I read about Meta the other day, but since Meta itself is a problem in itself, i don't see the point of recording individual things about it. I am only active on GitHub. All other community platforms are always crap from the users or even from the moderation and i don't want that anymore |
Thanks for replying, What about #1 (comment) https://www.hardenize.com/ , https://mxtoolbox.com/ they seem to be more accurate than the ones recommended in this repo guardianproject/haven#454 (haven is broken) Mind changing the antivirus part in this repo with https://privsec.dev/knowledge/badness-enumeration/#antiviruses instead as we discussed #1 (comment) |
GrapheneOS is already listed in my Smartphone repository. Will check your newest links 👍 |
while they're nice, both doesn't provide any further information or are even bloated with too much different stuff. added other ones 🍺 |
+1
…On Fri, Sep 15, 2023 at 3:58 PM xTrEIX ***@***.***> wrote:
https://www.spacebar.news/p/stop-using-brave-browser
I don't use Brave and I'm not in favor of replacing ads with others, but I
don't see what ideology and politics has anything to do with a real
security / confidentiality, moreover, most of the things he writes are old
and have been discussed many times, have little impact on the user and can
be disabled, in short, it's not a relevant article from my point of view.
—
Reply to this email directly, view it on GitHub
<#1 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ACGU3TNJSOXG2FDHHKR6LQ3X2PVANANCNFSM54FYG5KA>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
If you have details why the technical research in that article is wrong, i'm open for links.
abusing an browser for own suspicious crypto shouldn't be activated in any way. No matter if you can disable it or not |
Agree
It's more politically motivated and all his points were already discussed before. Take a look yourself https://www.spacebar.news/p/expressvpn-is-sponsoring-far-right/ and several replies from privacyguides community https://discuss.privacyguides.net/t/why-recommend-brave-browser-on-android-and-not-mull/13957/2
What about Pocket in Firefox? |
Firefox did and do other suspicious crap and isn't recommend anyway. |
https://anarc.at/blog/2022-06-17-matrix-notes/ and https://crnkovic.dev/testing-converso/ btw I started my own "collection of links" repo https://github.com/jermanuts/bad-opsec/ 😊 |
Thanks I add both 🍻 Good luck with your collection! |
thanks I added some. |
Your Messages on Telegram Are Not Encrypted, the Platform Is Not as Private as You Think Takeout: only Secret Chat's are e2e encrypted. Everything else is cleartext. |
@CompSciFutures yes this is sadly still the case since years and I already include three links about that: |
fab :)
…On Sun, Feb 25, 2024 at 5:54 AM beerisgood ***@***.***> wrote:
@CompSciFutures <https://github.com/CompSciFutures> yes this is sadly
still the case since years and I already include three links about that:
https://portswigger.net/daily-swig/multiple-encryption-flaws-uncovered-in-telegram-messaging-protocol
https://www.cryptofails.com/post/70546720222/telegrams-cryptanalysis-contest
https://blog.bytebytego.com/p/ep29-online-gaming-protocol#§is-telegram-secure
—
Reply to this email directly, view it on GitHub
<#1 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ACGU3TMGC7JWTH6QDL423V3YVIZPBAVCNFSM54FYG5KKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOJWGI2TGOBRGI2A>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Thanks. |
https://educatedguesswork.org/posts/public-wifi/ public wifi security (clears all FUD about public wifi VPN marketing) EDIT: Adding quantum resistance to Signal double ratchet algorithm SimpleX Chat 😎 |
This comment was marked as spam.
This comment was marked as spam.
Thanks. I added this and also another new post about VPN. |
https://words.filippo.io/dispatches/telegram-ecdh/ (THE MOST BACKDOOR-LOOKING BUG I’VE EVER SEEN) TokTok/c-toxcore#426 (https://blog.tox.chat/2023/03/redesign-of-toxs-cryptographic-handshake/) |
Thanks! I added both 🍻 |
Sorry for hijacking this issue but https://ynwarcs.github.io/Win11-24H2-CFG |
Sounds like a good thing for user. |
Thanks. Added 🍺 |
https://wonderfall.dev/fdroid-issues/
https://cronokirby.com/posts/2021/06/e2e_in_the_browser/
The text was updated successfully, but these errors were encountered: