Q: Why do I have to enable Google Password Manager as an additional provider in order to make it work on Android?
Q: Why do I have to enable Google Password Manager as an additional provider in order to make it work on Android?
I didn’t know this app existed. Anyway, the project was discontinued.
That’s true, all devices are hackable, there’s no 100% protection.
No tool is perfect, but if that’s a security improvement, it might be worth enabling.
I know of at least one instance where lockdown mode protected a user from NSO spyware.
A Citizen Lab’s research confirmed it:
For a brief period, targets that had enabled iOS 16’s Lockdown Mode feature received real-time warnings when PWNYOURHOME exploitation was attempted against their devices. Although NSO Group may have later devised a workaround for this real-time warning, we have not seen PWNYOURHOME successfully used against any devices on which Lockdown Mode is enabled.
It is encouraging to see that Apple’s Lockdown Mode notified targets of in-the-wild attacks. While any one security measure is unlikely to blunt all targeted spyware attacks, and security is a multi-faceted problem, we believe this case highlights the value of enabling this feature for high-risk users that may be targeted because of who they are or what they do.
Can any of them prevent a Pegasus-style attack?
If I understand correctly, Apple does it by disabling common attack vectors, remote fonts for example.
~43% of all Lemmy’s monthly active users are on lemmy.world .
Yeah, that’s even worse.
The instance has too many people registered. It has ~27% of all Mastodon’s monthly active users.
A huge part of the network was down. People should be encouraged to migrate to smaller instances, so we can have better decentralization.
All internet connections into and out of your Linux device will now be blocked unless a VPN connection to a Proton VPN server is active.
If I understand correctly, before version 4.2.0 (that includes the Advanced setting), the kill switch wasn’t active until you opened the ProtonVPN program. So if you restarted you PC, it was connecting to the internet without going through the VPN tunnel, so your traffic was somewhat exposed.
Now, with the new permanent kill switch, there’s no internet access without running ProtonVPN.
The update seems to be bugged. I tried to upgrade version 0.0.57 to 0.0.58, and it seems like nothing have changed. I’m still on 0.0.57 after a “successful” install.
You mean Pixel 5.
If an app on one device connects to an app on another via Veilid, it shouldn’t be possible for either client to know the other’s IP address or location from that connectivity, which is good for privacy, for instance. The app makers can’t get that info, either.
Is that considered a new thing? I don’t think I’ve ever encountered a P2P service/protocol that also masks IP addresses.
When you hide read posts, are my own posts hidden? Is there a distinction between read posts on my feed versus read posts on a specific community page? Or maybe it just hides everything?
Relatively high number of RCE vulnerabilities.
IMHO that’s a highly requested feature.
Did you get any spam calls?
Use FreeTube?