• 1 Post
  • 12 Comments
Joined 1 year ago
cake
Cake day: June 5th, 2023

help-circle




  • This is…not the best idea, imo. If I had to guess, I would say that it is attempting to disable diagnostic data by setting a registry key — only on Windows Home or Pro, that’s ineffective and doesn’t have any extra benefit compared to just disabling optional telemetry in the settings app. It also seems to pointlessly duplicate things the user already has control of (why does there need to be a toggle for Hyper V and Windows Subsystem Linux?) Last I checked they were pretty simple enough to turn on and off in the base system. Same goes for stuff such as Location Tracking and Activity History, which I’m fairly sure are literally already in the privacy settings.

    Attempting to do large scale “debloating” will inevitably lead to system breakage and things not working. Start Menu shortcuts? They’re one click away from being uninstalled. OEM Bloat such as random third party antiviruses? You should be doing a clean install to get rid of those. Apps such as Cortana? winget uninstall. You also don’t need a third party program to manage your app updates, that’s literally what winget upgrade --all is for.





  • Well for one thing matrix clients on mobile are…not the best. Element X is looking promising, but it’s currently still in beta. Element misorders messages and crashes often, and most other clients are not as feature complete. Whereas in my experience Signal tends to just work. Plus for the average person it makes for a dead simple drop in replacement to WhatsApp or iMessage. Yes, the phone number requirement has led to issues with governments just blocking the sign up SMSes, but that is a tradeoff they make for convenience.

    Matrix also leaks more metadata in comparison to Signal (this is just how decentralization works). Not to mention that the recent vulnerabilities seem to suggest (in my opinion at least) that matrix cryptography is not as battle tested as the Signal protocol.

    Besides the observed implementation and specification errors, these vulnerabilities highlight a lack of a unified and formal approach to security guarantees in Matrix. Rather, the specification and its implementations seem to have grown “organically” with new sub-protocols adding new functionalities and thus inadvertently subverting the security guarantees of the core protocol. This suggests that, besides fixing the specific vulnerabilities reported here, the Matrix/Megolm specification will need to receive a formal security analysis to establish confidence in the design.

    Real world example: The university I study at promoted matrix as a way for students to chat at the start of the semester, and pushed them to use Element. Practically no one uses it, but I’ve met a few people who do chat with Signal.





  • I think it’s a bit of a mixed bag. Their ecosystem may be good and all but they deliberately don’t interoperate very well with others. Example: if I plug my iPhone into my windows laptop, it will only expose the gallery, unlike with Android where it will allow me to transfer non image files. I have to download another app (iTunes, and now the Apple Devices App which is currently in preview) in order to be able to transfer files via cable (KDE Connect or Localsend are also good options for this). Then there’s their sticking with their own cable when everyone else is going to USB C, and their refusal to implement proper messaging with Android users/integrate with RCS - granted, RCS has its own set of issues, but still. And of course there’s their refusal to allow sideloading, which has led to governments being able to censor apps from the app store. It doesn’t help that App Store review isn’t the best at catching security issues, as scam apps slip through from time to time. The EU seems to be trying to fix this with their new regulations, but it’s now speculated that Apple will be petty and region lock sideloading.

    Their hardware is nice and performant, but unfortunately they’re against upgradeability as well as right to repair. I don’t watch him much, but I think Louis Rossmann’s youtube channel is recommended for learning about this.

    I don’t have strong opinions on their hardware/software design and aesthetics, it works for me, but I can see why others don’t like how opinionated they are. I don’t like how Android phones have been getting bigger, but it’s not the end of the world for me should I switch to a Pixel.

    Privacy and security wise they overmarket too much but they do have some advantages:

    • No OEM bloat/telemetry. With Samsung phones for example, you’ll have to put up with Samsung telemetry and Google’s data collection. With Apple, you only have Apple nonsense to put up with.
    • iOS devices tend to get updates for longer, and they backport critical patches to older devices. While Android is more modular (allowing Google to update certain parts of the system through google play services), and the situation is improving (newer Google Pixels get 5 years of security updates now), iOS still has a slight edge.
    • For Macbooks, I’ll just quote the Asashi Linux documentation:

    It would be remiss not to briefly cover where these machines stand in terms of user control and trustability. Apple Silicon machines are designed first and foremost to provide a secure environment for typical end-users running macOS as signed by Apple; they prioritize user security against third-party attackers, but also attempt to limit Apple’s own control over the machines in order to reduce their responsibility when faced with government requests, to some extent. In addition, the design preserves security even when a third-party OS is installed.

    From a security perspective, these machines may possibly qualify as the most secure general purpose computers available to the public which support third-party OSes, in terms of resistance to attack by non-owners. This is, of course, predicated on some level of trust in Apple, but some level of trust in the manufacturer is required for any system (there is no way to prove the non-existence of hardware backdoors on any machine, so this is not as much of a sticking point as it might initially seem).

    • Lockdown Mode, which apparently has somewhat protected against zero click exploits.

    • For iOS Safari (no clue on Mac), they allow adblocking without having to grant the extension privileged access to the page. This includes cosmetic filtering. (Somewhat hit and miss on Youtube tho). Malicious extensions and filter list exploits are a problem, and while Google is attempting to fix this somewhat with Manifest V3, it’s not perfect. From my experience with Ublock Origin Lite in Edge, you don’t currently get cosmetic filtering without granting privileged access, which defeats the point. Otherwise, it appears to be as effective as DNS blocking.

    • The App Privacy Report makes it super easy (provided you’re not connected to a VPN) to see what domains an app connects to. I can check the entry for my offline password manager for example, and see that it isn’t pinging anything other than inappcheck.itunes.apple.com. I think this is used to query the in app purchase status.

    For disadvantages:

    • Telemetry: even with everything opted out of, Apple still collects hardware data, local MAC Addresses (for their location services database, this is also noted in their documentation). Also, for some reason they insist on tying collected click heatmaps in the app store/books/stocks app directly to the Apple ID. (This is just off the top of my head, I may be missing something). I don’t personally consider this a deal breaker (Apple already knows what apps I download), but I can understand why they’ve been raked over the coals for it given how much they market privacy.

    • While iMessage is touted for being end to end encrypted, the defaults have it backing up unencrypted to the cloud, which defeats the point. There is Advanced Data Protection now, but both sides of a conversation would have to turn it on.

    • VPNs on iOS leak. This is different from Android where it can be argued that connectivity checks are a good thing and don’t send personal data, but with iOS certain system apps appear to just straight up bypass it.

    • Without sideloading, it’s basically impossible to use an iPhone without logging in.

    • Some stuff such as the gyroscope still doesn’t require a permission to access.

    • Allowing carriers to do this.

    Some other points I’d like to make: