Author Topic: Computer and smartphone privacy thread  (Read 4423 times)

Just Joe

  • Walrus Stache
  • *******
  • Posts: 7780
  • Location: In the middle....
  • Teach me something.
Computer and smartphone privacy thread
« on: May 27, 2022, 11:28:37 AM »
I haven't much to offer but I'd love to learn from the most experienced here.

What options do we have in 2022 to protect our privacy when using a computer or a smartphone?

https://www.vice.com/en/article/m7vzjb/location-data-abortion-clinics-safegraph-planned-parenthood

I use Linux at work and home. I have an Android phone. I tend to compartmentalize private and professional activities by browser and email addresses. I use EFF browser plugins and uBlock Origin.

I occasionally scan my phone with Malware Bytes and have never found much. On Linux I'm looking for something to occasionally run manual scans with. I've never had any security issues that I am aware of and I've been using Linux since the late 1990s.

My employer maintains my Win10 laptop and keeps it locked down pretty tight. I rarely use it except for CAD. At home we have a Win10 desktop mainly used for gaming. I scan it with Malware Bytes and have rarely seen any issues except a Minecraft plugin that caused problems. That computer dual boots Linux and everything sensitive it has ever done (banking or taxes) was done on the Linux side.

What is the most privacy oriented smartphone right now? I'd like to have a Linux powered phone but I understand they are really just low powered toys at this point. I've ventured down that path a couple of times - one was with a Nokia N810. That was an expensive dud. Still works, not useful.

PDXTabs

  • Walrus Stache
  • *******
  • Posts: 5160
  • Age: 42
  • Location: Vancouver, WA, USA
Re: Computer and smartphone privacy thread
« Reply #1 on: May 27, 2022, 11:31:42 AM »
I use Linux at work and home. I have an Android phone. I tend to compartmentalize private and professional activities by browser and email addresses. I use EFF browser plugins and uBlock Origin.

I do something similar. Social media is on Chrome and everything else in on Brave Browser. I really like it, I highly recommend that you try it out on Android.

EDITed to add - and maybe buy a burner phone before you need it.

OtherJen

  • Walrus Stache
  • *******
  • Posts: 5267
  • Location: Metro Detroit
Re: Computer and smartphone privacy thread
« Reply #2 on: May 27, 2022, 11:42:47 AM »
Good question.

I've deleted my period tracker app and have gone back to paper calendar tracking. I'll start turning off my phone before leaving my house for all doctor visits. I look forward to suggestions on tech options.

ministashy

  • Stubble
  • **
  • Posts: 233
Re: Computer and smartphone privacy thread
« Reply #3 on: May 27, 2022, 12:53:39 PM »
Some good resources; surveillance self-defense by EFF - https://ssd.eff.org/en

The plugins I use are DuckDuckGo privacy essentials, adblock plus, privacy badger and cookie autodelete.  But these are only good for computers - anything that uses apps (phones, ipads, etc) are trickier.  General recommendations I've seen for phones is turn off your location except as needed for apps, and just general unpredictability in terms of shutting off your phone/leaving it behind, so it's harder for people to track your movements with it.  Definitely would love to see what other suggestions people have for that.  And also whether or not a VPN is actually worth it - I've been debating that for a while.

zolotiyeruki

  • Walrus Stache
  • *******
  • Posts: 5835
  • Location: State: Denial
Re: Computer and smartphone privacy thread
« Reply #4 on: May 27, 2022, 01:16:06 PM »
On my phone:
Before LineageOS threw in the towel on their Privacy Guard, I used it extensively on every app on my android phone.  I use NetGuard to block certain apps from accessing the internet at all (e.g. the app that connects to my fitness band, and has no business being on the internet).  My phone is rooted, so I use AdAway to block ads.  I use firefox with uBlock Origin, and I don't do anything facebook on my phone.  I'm currently using a Pixel 3a running Android 12, having recently upgraded from a phone running LineageOS 14 (Android 7), and all of the new Android functionality has left me a bit squeamish.  I'm seriously considering loading up LineageOS 19 on it, just so I can avoid all the cruft that Google has glommed into Android.

(short rant) A relative of mine works for Google, and when I told him I was getting a 3A, he smacked his forehead and said "but that's before they put all the custom silicon in there for AI and stuff!"  When 100% of the functionality I require from a phone has been in place since...oh, Android 4 (or earlier?), it's a tough sell :)

On my home computer:
I use Firefox instead of Chrome, and use the following extensions: uBlock Origin, FB Purity, Facebook Container, Webmail Ad Blocker, and Remove Google Redirection.  Our computers are a mix of Windows 7 and Linux, with a singular Win10 machine.  I'd like my next main rig to run Linux, with a VM for Win10 for those few cases where I need it, so that I can manage its behavior.

I don't go crazy with the privacy stuff, but I try to take a few steps to reduce my trackable footprint.

elysianfields

  • Pencil Stache
  • ****
  • Posts: 579
  • Location: Asia
Re: Computer and smartphone privacy thread
« Reply #5 on: May 28, 2022, 01:17:03 AM »
Yes, one should use all the privacy apps & plug-ins on your workstations & smart phones...

and nobody has yet mentioned using VPNs!

They're cheap, many solid ones (private, no logs, not in one of the five-eye or fourteen-eye countries), and most have servers around the world so you can connect to different POPs as needed.

RWD

  • Walrus Stache
  • *******
  • Posts: 7319
  • Location: Arizona
Re: Computer and smartphone privacy thread
« Reply #6 on: May 28, 2022, 07:09:47 AM »
And also whether or not a VPN is actually worth it - I've been debating that for a while.
and nobody has yet mentioned using VPNs!
You missed the post above.

They're cheap, many solid ones (private, no logs, not in one of the five-eye or fourteen-eye countries), and most have servers around the world so you can connect to different POPs as needed.
I hesitate to recommend the layperson use a VPN for privacy purposes. There are inherent limitations and you risk being sold the illusion of privacy. You have to trust whichever VPN you choose as much as you would trust your ISP, as they instead will have access to all your traffic. It is also still possible to be tracked if you don't take additional measures (see fingerprinting).

cool7hand

  • Handlebar Stache
  • *****
  • Posts: 1321
Re: Computer and smartphone privacy thread
« Reply #7 on: May 28, 2022, 08:37:01 AM »
Out of curiosity, what are the primary risks those with the technical know-how believe they are avoiding? How? Why?

innkeeper77

  • Bristles
  • ***
  • Posts: 368
Re: Computer and smartphone privacy thread
« Reply #8 on: May 28, 2022, 08:40:04 AM »
Good question.

I've deleted my period tracker app and have gone back to paper calendar tracking. I'll start turning off my phone before leaving my house for all doctor visits. I look forward to suggestions on tech options.

I know iphones can leak Bluetooth location data even when "off"- this may be limited to iphone, but most things in ios make their way over to android eventually. The only way to defeat this edge case would be Faraday bags or actually leaving he phone at home. Of course, a turned off iPhone will make it a lot harder for ADVERTISERS to track- just it isn't foolproof anymore.

(The bluetooth while off is used for their airtags and other location tracking features, and is also meant to make tracking a stolen phone possible)

EDIT: Apparently you can turn off this feature! https://9to5mac.com/2021/06/07/ios-15-find-my-network-can-find-your-iphone-when-it-is-powered-off/
« Last Edit: May 28, 2022, 08:42:27 AM by innkeeper77 »

RWD

  • Walrus Stache
  • *******
  • Posts: 7319
  • Location: Arizona
Re: Computer and smartphone privacy thread
« Reply #9 on: May 28, 2022, 10:10:04 AM »
Out of curiosity, what are the primary risks those with the technical know-how believe they are avoiding? How? Why?
I'm assuming you're asking in relation to VPNs. I think one of the bigger risks with VPNs, particularly with how hard they are advertised these days, is overconfidence in the security/privacy they provide. Someone with technical know-how is in a better position to understand what additional measures need to be taken to actually be anonymous and/or protect the contents of their internet traffic. They are also probably better equipped to evaluate the trustworthiness of the various VPN offerings.

There are a lot of good reasons to use a VPN. The purpose of a VPN is to connect to a remote private network securely. I actually set up my own personal VPN using WireGuard on my pfSense router so that I would have access to all my files while traveling. That your IP address changes (assuming full tunnel and not split tunnel) is more of a side-effect than an original goal of VPN. But because your IP address is often used for location data this side-effect is useful for getting around region blocks.

But in the context of privacy and security a VPN is not a panacea. In a lot of ways it is just moving the problem. A tracking profile will just be built for your VPN persona instead of your home IP persona, which may end up equating to the same thing if you just switch all your internet usage to a VPN. If you want to do something actually anonymous on the internet then it needs to appear to be a brand new user to trackers. Private browsing with fingerprint resisting enabled, extensions disabled, don't log-in to anything unnecessary for the session, and using a VPN is probably sufficient (if you can trust the VPN). For security it's only as good as the VPN provider. If the encryption is weak/broken or they are susceptible to government meddling then it's basically the same as no VPN at all. Using a VPN is like putting a letter in a locked box and mailing it to a third-party with the key who promises to forward it to the intended recipient unlocked (and then will take any responses and lock it back up before returning it to you).

bacchi

  • Walrus Stache
  • *******
  • Posts: 7809
Re: Computer and smartphone privacy thread
« Reply #10 on: May 28, 2022, 10:33:27 AM »
Related to fingerprinting, you should install a canvas blocker. There's an EFF (?) tool out there that'll tell you how unique your browser and machine is.

I use CanvasBlocker on Firefox, which returns a spoofed canvas signature.

https://en.wikipedia.org/wiki/Canvas_fingerprinting


Edit: Here it is: https://coveryourtracks.eff.org/
« Last Edit: May 28, 2022, 10:35:47 AM by bacchi »

Syonyk

  • Magnum Stache
  • ******
  • Posts: 4610
    • Syonyk's Project Blog
Re: Computer and smartphone privacy thread
« Reply #11 on: May 28, 2022, 07:05:45 PM »
Sorry, I'll try to keep this under a small novel... and will probably fail.

Before you can launch into reasoning about this topic, you need to be able to answer several questions.

* What am I trying to protect myself against?
* How much effort do I expect attackers to use against me?
* How much inconvenience am I willing to tolerate for these goals?
* How much am I willing to inconvenience other people in these goals?

And from then, you can start learning about the threat landscape if you care.  But a decent heuristic is "It's worse than you think it is in terms of data mining and behavioral surplus extraction," and "Nobody cares about you in particular."  If they do, you're probably hosed.  If a national agency is after you in particular, you're hosed, and I'm not in the slightest bit qualified to offer you advice on the matter.

Warning: My increasingly strong bias against consumer tech is going to show here.  I do not like what computers have been used for by our "tech overlords," and I'm increasingly willing to compromise functionality to give them less to work with on me, and to support that which allows me to get out of their grasps.

Also, I think modern computers are very, very broken, from the hardware on up.  So some of this is going to come from that perspective as well.

You can find some longer form ponderings related to this on my blog:
https://www.sevarg.net/2022/05/07/tech-philosophy-2022/
https://www.sevarg.net/2022/05/21/technology-and-diminishing-returns/

So, to give some answers to the questions, at least from my context:

What am I trying to protect myself against?
First and foremost, I care very deeply that my computers only do that which I expect them to do, and that they serve me.  Not other people's ideas of what data they ought to be able to extract from my local use of computers, and particularly not the desires of those who wish to hold my data hostage or extract my credentials.  I reject the framing of myself as a "consumer" and "set of eyeballs to be monetized," so I'm trying to foil as much data collection as possible.  However, neither do I care strongly about keeping myself "fully anonymous" in my normal accounts - I'm not a hard one to find, based on my general writings, and "writing style analysis" is reasonably advanced (plus I tend long form).

However, I also care about demonstrating that "something different from the default" can work, so I'm a bit inclined to use "flashy" techniques at times, especially around cell phones, to open conversations with people about what can be done.  I could be perfectly happy with a defanged black mirror type device, but at this point, I keep carrying a flip phone because it does what I need and I rather enjoy the reactions it gets, largely along the lines of "I had no idea those still existed!"

How much effort do I expect attackers to use against me?
I expect I'm subject the usual hostility all users of the internet face, but probably not exceptionally more.  If I believed myself likely subject to more directed efforts against me in particular, I'd do some things differently.

How much inconvenience am I willing to tolerate for these goals?
Quite exceptional.  I've written kernel patches for some of my computers, and I joke that I'm not sure I'd know what to do with a computer that was fully working.  My hobby of using little ARM computers means that I'm often not capable of actually playing videos with sound, because the machines with sound don't have a working video player, and the machines that can play video don't have a working sound output connected to anything.  This is fine with me.  I don't mind the lack of GPU acceleration that certain options require.  Etc.

How much am I willing to inconvenience other people in these goals?
However, I try to avoid inconveniencing other people too terribly much.  I experimented with one phone that was fine, except for group texting - it simply couldn't do it.  That's annoying enough to other people that I wasn't willing to use it long term.  However, I don't care if I'm not accessible on short notice on most messaging platforms.  I merge those I'm wiling to use into a common interface with Matrix bridges, and I don't care about the rest.

That said:

What options do we have in 2022 to protect our privacy when using a computer or a smartphone?

"Don't use them" is the best one.  "Use them as little as possible, with as little capability as possible" is the next best approach.

I've expanded on it substantially in the blog posts I linked above, but at this point, I don't think there's a "safe/private" way to use most mainline OSes.  Microsoft has demonstrated in a variety of ways that Windows 11 is solving the "problems" with Windows 10 of not being able to extract enough good data about behavior, and not being able to deliver integrated-enough ads to the OS.  Apple had been sane, but seems to have burned all their privacy capital in a glorious bonfire of on-device content scanning (that they've yet to push out - so they, in my view, burned all their good will, and haven't accomplished anything either - it's a bit weird to watch).  Android is simply a location and behavioral data extraction platform for Google that happens to run apps (if you don't believe this, go check your timeline at https://www.google.com/maps/timeline ).

I'm pure Linux for almost all my activities now, though I do have some legacy Windows 10 installs and a Mac I use as I've had a lot of my data in Mac-only formats for long enough that it's worth keeping at least something around that can read them.  Although I'm considering just moving it to a VM and being done with it.  For phones, I consider a defanged Android device sane (Lineage/Graphene/etc), a pure Linux phone fine but unusable (PinePhone and the like), and my daily carry device is a KaiOS device.  Apple might be OK for now, but I simply don't wish to give them any more money.

The main threat on a desktop is the browser, and both tracking user behavior and delivering malware - 0days in ad networks are more common than one would prefer.  Using various ad blockers removes a lot of threats.  PiHole as a network level DNS blocker solves a lot, although DNS over HTTPS is a bit of a thorn there (browsers just going around your local DNS configuration - it helps against some threat models like a compromised router, hurts in others like local network ad blocking).  NoScript helps a ton, if you're willing to discover how many websites are simply broken without extensive Javascript, but on the flip side, it reduces the weight of most websites in terms of RAM/CPU quite a bit - which is helpful if you're on little ARM boxes without enough RAM.  Obviously, don't download random crap.

There's something to be said on desktops for some aggressive sandboxing between "high security personal activity" (email, core SSH keys, etc) and "random web activity."  QubesOS offers a lot here, at the cost of no GPU acceleration of anything and a somewhat stiff learning curve.  I like it.  It's wonderfully paranoid in all the ways I like.

For a phone, Apps are Evil.  No, really.  Whatever of interest you think they're collecting, they're collecting 10x more, and hoping someone can find some magic to make it useful.  There are some great papers looking at things like "How you can use general locational data combined with timestamped accelerometer data to disambiguate who's sharing a vehicle with other people," and "Using accelerometers and such as microphones when you aren't granted microphone permission."  In additional to all the stuff we know is going on with Bluetooth and Wifi beacons being used to track people through stores and such at high precision, probably tied to your checkout behavior.  Not my idea of a great time.

Apple tends to be reasonably secure if you're running the latest OS in terms of 0day resistance, Android tends terrible given their update model.  One option for a black mirror device is to just have as little as possible on it.  Instead of having "all your accounts" on it, have as few as you can reasonably have, and strive to reduce that over time.  You just don't need email on a phone.  It's high latency and can stay that way.  Consider how little you really need and go that route.

However, given the evils of behavioral collection on a modern smartphone, as has been demonstrated by some people later in this thread, the best option now is to get out of the habit of carrying one.  Or, at least, out of the habit of always carrying a powered on one.  You can solve many problems by powering it off or leaving it at home, and I know very well a lot of people on this forum are old enough to remember when "carrying a cell phone in your pocket" became a thing.

I've been trying to revert to a late 90s or early 2000s way of interfacing with tech, and it's been quite nice.

Quote
I use Linux at work and home. I have an Android phone. I tend to compartmentalize private and professional activities by browser and email addresses. I use EFF browser plugins and uBlock Origin.

Having different browsers helps a lot, though I would encourage having separate VMs for personal and professional activities.  If you can deal with the limitations, Qubes lets you do this very cleanly...

I'm trying to move to a model in which all my regular activities are in Qubes, with some "raw iron" Linux installs for stuff like gaming, but on installs that don't get access to email or such.  I need to pave over a few things here.

Quote
I occasionally scan my phone with Malware Bytes and have never found much. On Linux I'm looking for something to occasionally run manual scans with. I've never had any security issues that I am aware of and I've been using Linux since the late 1990s.

I have no idea what "scanning phones" accomplishes other than making you feel good about a progress bar.  Any decent malware author is going to ensure that nothing detects their malware with the usual tools... and the stuff that tends to show up on Android has gotten clever about waiting for a while before deploying.

Quote
My employer maintains my Win10 laptop and keeps it locked down pretty tight. I rarely use it except for CAD. At home we have a Win10 desktop mainly used for gaming. I scan it with Malware Bytes and have rarely seen any issues except a Minecraft plugin that caused problems. That computer dual boots Linux and everything sensitive it has ever done (banking or taxes) was done on the Linux side.

The "culture" around Minecraft plugins is horrifying.  "Download this thing and install it" from some insanely sketchy file hosting sites - of the variety that, in the past, have been found injecting their own bonus content in downloads.  But that's a sane approach.  Another would be to get a Chromebook for secure work, and abandon the desktop for banking/taxes/etc.  Though I'm not sure you actually gain much there from what you're doing.

Quote
What is the most privacy oriented smartphone right now?

The best I'm aware of, once you get past "privacy oriented smartphone" being an oxymoron with how vile apps are about data collection, would be one of the third party OSes on an Android devices.  Though if there's any way to not use a smartphone, that's far better, IMO.

EDITed to add - and maybe buy a burner phone before you need it.

What threats are you protecting against with it?  To actually keep a "burner" phone from being associated with your other devices by locational proximity is exceedingly hard, if you're worried about higher level actors associating it with you.  Used carelessly, it's pointless security theater.  I generally assume the popularity of "burner" devices in various TV shows/movies is a bit of a bait to make people think they're gaining security with them, when it's trivial for law enforcement to associate them properly.

I don't think there exists a reasonable way to "privately" use a smartphone, and if I wanted to do something very high security, I wouldn't use a burner phone.  I'd use a laptop, tethered, with a range of other tricks.

I've deleted my period tracker app and have gone back to paper calendar tracking.

Good!  The state of "health apps" is abysmal, and when people go poking at them, they "share data" with a huge number of "partners."  You can safely assume that a period tracker app exists to feed as much data about your private medical state to advertisers, who now know for sure that you're a woman within a certain age range, and a wide range of actors can use the time of the month in your cycle to fine tune how they deliver advertisements or social media feeds for "engagement."  I assume that variations in timing can be tied to other things of interest to advertisers/marketers/influencing agencies/etc.  And I'd assume that app feeds up more than you think it does.

Paper calendars at home are great.  You don't have to worry about them exporting data to advertisers.  We've gone back to a paper calendar for family events as well.

Quote
I'll start turning off my phone before leaving my house for all doctor visits. I look forward to suggestions on tech options.

Careful.  If the only time you turn your phone off is for some particular event, that's useful information.  If you never turn your phone off, and you turn it off and leave it at home for one particular thing, this can be used to demonstrate that you're doing something interesting.  It's better to cultivate a "forgetful 80 year old's" phone habits.  Turn it off randomly.  Leave it at home randomly.  Turn it off and take it with you, and turn it on only if you need it.  Voicemail works fine, text messages eventually get around.  But if you cultivate a "forgetful" phone habit, then it's not "weird" when you leave it behind.

Don't forget that your car, if it's got a cell modem, is also leaking your location data.  If your car has a cell connection that always matches your personal phone's location, and all of a sudden it doesn't, huh.  That's interesting...  You might remove the cell modem from your car if you're particularly concerned about location data.  Then it's just the license plate cameras and such, which is far better than the fine grained data other available.

But these are only good for computers - anything that uses apps (phones, ipads, etc) are trickier.

Hence my advice to use them as little as possible.  Location off is a good idea, as little permissions as possible is a good idea, but even just the stuff the apps get by default (gyro, accelerometer, etc) is enough to be worrying.

Quote
And also whether or not a VPN is actually worth it - I've been debating that for a while.

What threats are you concerned about that a VPN would solve?  If you're worried about the "first hop" for public use locations - coffee shops, airport wifi, etc, then, absolutely, a VPN will help.  But I'm honestly not that worried about those places, because https is now just about everywhere, and a browser with an existing trust set for sites isn't going to be easily redirected away from https.  HSTS and cert pinning and such gain you a lot on that front.

And if you want to run a VPN endpoint, Outline makes it easy to run your own VPN endpoint on various cloud providers.  I use it if I'm going to be on travel, just to deal with the first hop thing.

What a VPN, and especially the heavily marketed ones won't do is the stuff that they claim to do.  All they do is move your browsing activity from your home IP to another IP, and if you're not careful, it's trivial to link things together - "Oh, hey, you access the ad network from this IP, and also from a FnordVPN IP, OK, you're a FnordVPN user which probably means I can market security things to you!"  It neither adds meaningful security or privacy unless done carefully.  What it does seem to do is add massive affiliate marketing profits to various video producers.

They're cheap, many solid ones (private, no logs, not in one of the five-eye or fourteen-eye countries), and most have servers around the world so you can connect to different POPs as needed.

The more a VPN provider goes on about how bulletproof and secure and log-free and such they are, the less I believe them.  Quite a few "Totally Secure Hide Your Activity Online VPN Extreme" type services have been literal government honeypots over the years - along with some disturbing number of the "secure phones" one can buy.  If you've never heard of it, it's probably safe to assume it's a honeypot.  It's a pessimistic viewpoint, but if I'm going to be doing something sensitive online, I'm not going to trust some random no-name company who tries to have all the security buzzwords on their site (that's probably not even using https).

Again, if my goal is to protect my first hop, I can (and do) host infrastructure to protect that.  Anything else they claim to do other than move my IP around can be assumed to be either an outright lie or at least deceptive.  It's a pessimistic point of view, but neither have I been convinced it's wrong.

If I really would rather be non-attributed, a Whonix VM setup (easy to launch in Qubes, and one of the default templates!) is far better.

I know iphones can leak Bluetooth location data even when "off"- this may be limited to iphone, but most things in ios make their way over to android eventually. The only way to defeat this edge case would be Faraday bags or actually leaving he phone at home. Of course, a turned off iPhone will make it a lot harder for ADVERTISERS to track- just it isn't foolproof anymore.

I believe you can turn the AirTag/Location Network stuff off when the phone is shut down.

... I hate to brag on my KaiOS device, but I just pull the battery out if I want to make a point.  It's an old habit, but for sensitive conversations, I'll set the phone on the table, battery visibly removed.

====

Sorry.  3000 words of pessimism.  My biases are well known.

PDXTabs

  • Walrus Stache
  • *******
  • Posts: 5160
  • Age: 42
  • Location: Vancouver, WA, USA
Re: Computer and smartphone privacy thread
« Reply #12 on: May 29, 2022, 02:10:14 AM »
EDITed to add - and maybe buy a burner phone before you need it.

What threats are you protecting against with it?  To actually keep a "burner" phone from being associated with your other devices by locational proximity is exceedingly hard, if you're worried about higher level actors associating it with you.  Used carelessly, it's pointless security theater.  I generally assume the popularity of "burner" devices in various TV shows/movies is a bit of a bait to make people think they're gaining security with them, when it's trivial for law enforcement to associate them properly.

I don't think there exists a reasonable way to "privately" use a smartphone, and if I wanted to do something very high security, I wouldn't use a burner phone.  I'd use a laptop, tethered, with a range of other tricks.

What threats am I protecting against? I'm not sure yet or I'm not willing to write about them on the internet. But you bring up some points that I forgot to enumerate:
1. Don't drive your car to buy your burner.
2. Don't buy your burner with a credit card.
3. Don't buy your burner anywhere you normally shop. Seriously, take the bus or a bicycle to some Walmart that you have never been to in your life or some such.
4. Don't ever turn on your burner near your house or your normal phone.

But I tend to agree. If I don't need a phone I'd use my Linux laptop. Possibly through a pile of VPN/Tor/etc. Possibly booted up to a Kali thumb-drive or some such and with a USB wifi adapter that I don't normally use AND a random MAC connected to a network at a library/etc that I did not drive my car to. Automatic license plate readers and all.

But, obviously I can't do that for all of my computing. So I'm not sure that it is relevant to the OPs question.

cool7hand

  • Handlebar Stache
  • *****
  • Posts: 1321
Re: Computer and smartphone privacy thread
« Reply #13 on: May 29, 2022, 10:54:19 AM »
Out of curiosity, what are the primary risks those with the technical know-how believe they are avoiding? How? Why?
I'm assuming you're asking in relation to VPNs. I think one of the bigger risks with VPNs, particularly with how hard they are advertised these days, is overconfidence in the security/privacy they provide. Someone with technical know-how is in a better position to understand what additional measures need to be taken to actually be anonymous and/or protect the contents of their internet traffic. They are also probably better equipped to evaluate the trustworthiness of the various VPN offerings.

There are a lot of good reasons to use a VPN. The purpose of a VPN is to connect to a remote private network securely. I actually set up my own personal VPN using WireGuard on my pfSense router so that I would have access to all my files while traveling. That your IP address changes (assuming full tunnel and not split tunnel) is more of a side-effect than an original goal of VPN. But because your IP address is often used for location data this side-effect is useful for getting around region blocks.

But in the context of privacy and security a VPN is not a panacea. In a lot of ways it is just moving the problem. A tracking profile will just be built for your VPN persona instead of your home IP persona, which may end up equating to the same thing if you just switch all your internet usage to a VPN. If you want to do something actually anonymous on the internet then it needs to appear to be a brand new user to trackers. Private browsing with fingerprint resisting enabled, extensions disabled, don't log-in to anything unnecessary for the session, and using a VPN is probably sufficient (if you can trust the VPN). For security it's only as good as the VPN provider. If the encryption is weak/broken or they are susceptible to government meddling then it's basically the same as no VPN at all. Using a VPN is like putting a letter in a locked box and mailing it to a third-party with the key who promises to forward it to the intended recipient unlocked (and then will take any responses and lock it back up before returning it to you).

Wow. Thanks!

Daley

  • Walrus Stache
  • *******
  • Posts: 5425
  • Location: Cow country. Moo.
  • Where there's a will...
Re: Computer and smartphone privacy thread
« Reply #14 on: May 29, 2022, 12:14:31 PM »
EDITED TO ADD: Philosophical navel gazing is above the horizontal rule. Practical stuff is below it.

But, obviously I can't do that for all of my computing. So I'm not sure that it is relevant to the OPs question.

Frankly, not much of anything thus far is. This is an intersection where philosophy is just as important as the mechanics, and everyone thus far is pretending there's no elephant in the room, or if they do acknowledge it, they think throwing more of the same thing at the problem like some cockamamie arms race will make it go away or minimize it. Unfortunately, the solution is regulation and legislation for the sake of public interest and good, something the powers that be have no stomach to do... which is why we're in a situation where people feel it necessary to ask these sorts of questions to begin with. But that's outside of OP's scope.

The big thing that nobody seems to be willing to talk about and everyone is trying to rail against with this topic is the bleeding obvious fact that we're talking about devices that connect to a globally duplexed communications network. This 'aint radio or television, kids. You're literally paying money to carry and use devices designed to know who and where you are.

Crackhead security should be your litmus with this stuff. Is it good enough to protect against some random yahoo off the street and broad targeted exploits? Then it's good enough.

The fundamental concept of security and privacy on a global, two-way public network? Impossible. Shit's working as intended at the most basic level... from your cell phone to your computer. That's the nature of the beast. No matter what operating system you install/use and pretend makes you somehow magically safer. Remember, the Internet is DARPA's baby raised to maturity by unregulated capitalism. The very effort of trying to make yourself more private and secure makes you just that much easier to find through fingerprinting on the internet given how few people go to these extremes of circus clown levels of privacy, especially given how a lack of metadata is identifiable information in and of itself. There is something to be said about blending into the noise without faking it through spoofing, and doing so in a way that you don't have to be in a state of perpetual vigilance to achieve.

Bottom line is, either you make peace with how the technology works in the first place, or you stop using it. And if you aren't physically rich enough to have the luxury of not using it in order to survive? There's your answer. When you get so paranoid that you're walking around pulling batteries out of your phone when you talk with someone, or buying burner phones that you walked 30 miles in a balaclava to pick up from a 7-11 paying cash in another county, or using a Linux distro that compartmentalizes EVERYTHING to the point that all apps run in their own virtual machine while overlooking the fact that they're still all sharing the same hardware... the problem ceases to be the technology. The problem is you.

If you know you're doing the right thing in the eyes of your creator, you should have no fear of the tyranny of man. If you're living in fear of man to the point that you've amassed a small fortune and gone to be holed up on a farm in the middle of nowhere trying to fall off the grid and withdraw from society, while turning somersaults trying to justify your technolust with near impossible to use novelties that can barely do what you want it to while you're still dependent upon the Googleplex, and yet continue to be equally paranoid about everyone from bad men with black hats to the government to the financially largest tech company that you feel somehow betrayed your trust despite being built into the massive conglomerate it is on decades of anti-consumer behavior? You're lying to yourself. Just unplug already, and stop thinking your feedback helps anyone just blend if they want to keep using the technology without drawing undue attention to themselves.

Why? Because you're looking for perfect, and perfect is the enemy of good enough. What matters more is your attitude towards your devices and what you use them for than the devices themselves. There's fudging room on that spectrum when dealing with corporations that aren't actually hardware or software companies so much as advertising companies, but when that advertising company is basically setting operational policy on how the basics of the web itself works and distracting from that reality by financially propping up the only other significant web browser available? Kind of a moot point. Doesn't mean you can't use their own open sourced product against themselves to make it harder to advertise to you, but it doesn't mean you fundamentally can avoid being tracked at all while on the internet, no matter how little you use it. Your real choice is to either not use it at all or try to blend into the noise.

If you still can't unplug despite having the supposed wealth to do so? I got bad news for you, Bucky. You're railing against the very machine that enabled you to amass and keep your physical wealth and luxury in the first place. You're just as much a slave to the machine as the rest of us... the only difference is you're rich enough to drop thousands of dollars and thousands of hours to pretend you're somehow able to obtain a greater privacy on a network that's fundamentally designed to identify who you are. As for that privacy gained, it's mostly just getting advertised at less - something equally achieved with an adblocker. Your security and privacy beyond that on a network you refuse to unplug from is still dependent upon how much you share with whom and how strong your passwords are while still being beholden to massive moving works with daily shifting vulnerabilities outside of your control. You're still visible to the people who want to find you... and if you're being targeted that closely by people you don't know? I don't know what to tell you. You're either a more interesting person than I am and the threat is real, or you're a schizophrenic or narcissist with a really over-inflated sense of self worth.



For those who want practical advice for the equivalent of "Linux on a smartphone" or a no-frills "feature phone" for the sake of barfing your habits into fewer databases and making the big data scrapers work harder for the scraps they get from you? Harder to do these days post Voice over LTE. The following stuff's being targeted at a North American audience, mostly US.

All the actual VoLTE capable feature phone operating systems are still beholden, dependent and phone home to Google, the poorly security updated and maintained KaiOS included.

Your best choice is one of the few Windows Phones that had VoLTE support for your network of choice. There's about four models, and none of them are VoLTE capable on more than one of the three networks. Windows Phone 8.1 and Windows 10 Mobile are very hardened operating systems, like the old WinCE predecessor. As far as end of line operating systems that don't get (or get very few if any) security updates, it's one of the few I'd trust, and you can set it up without a Microsoft account. (Can't say that about unpatched iOS or Android.) Unfortunately, they're not useful for much these days beyond calls and texting and terrible basic web browsing... but that's the feature phone experience in a nutshell. Bonus, it can still do more useful un-networked convenience things than a feature phone can.

If you want a smartphone that doesn't make regular calls back to the OS creator's mothership, you've got about a dozen phones to choose from on the Android end that support VoLTE calling under alternate firmware, half of them Google Pixel devices, the rest a mishmash of Motorola, OnePlus and Essential phones that are mostly network specific... and none of them are Samsung or LG devices. Some of them will require you to sacrifice a locked boot loader. Better an unlocked boot loader and mostly current patched OS than an elderly Android with unpatched vulnerabilities and a locked bootloader.

As for those firmwares with regular patched updates?

/e/OS
LineageOS for microG
GrapheneOS
CalyxOS

Turning off WiFi and Bluetooth on your device when you leave the house helps some, too... or if you can trust your device to actually go into true Airplane mode. Physically turning the phone off is no guarantee that it's off, and that's a consequence of phones being so expensive that people can't afford to lose them and want to find it if it's lost or stolen, even while off. Needless to say, you won't have this problem if you don't spend $1000 on a phone and store your life's data on it in the first place.

You can also refrain from signing into any Google accounts during setup and disable the Google Play Store and other core Google apps on your existing Android phone and install F-Droid and less privacy invasive app alternatives if you're inclined. It'll break stuff like banking and social media and (potentially) OS auto-updates, but do you want increased privacy or convenience?

To make sure what few apps you do use and install aren't narcing on you (even if you're using F-Droid for your app store), use Exodus. But remember, the more network required convenience, the less potential privacy.

Sadly, you can't do the previous mentioned with Apple's phones. The best you got there is just not signing into anything in the first place... which defeats the purpose of buying into such a ridiculously overpriced walled garden to begin with. Even the cheapest iPhone being relegated to the feature phone life that's still getting security updates is still considerably more expensive than the cheapest Microsoft Lumia with a user replaceable battery.

Also, last bit of advice with mobile phones: Calls and text messaging aren't encrypted. Some encrypted messaging services are better than others, and the larger the ad revenue with the provider of that service, the less privacy focused that app actually is... no matter how much they toot their encryption. After all, Metadata has value too. And remember, no matter how secure and privacy focused your email provider is, it's still only as good as the email provider on the other end with the people you contact... keep that in mind given Google's got their fingers in easily half the world's email traffic.

VPNs are security theater for the most part, and are mostly only used when you don't trust the primary network you're connected to in the first place, but that means trusting a secondary network in and industry that lies through its teeth about your privacy just to get you to spend money with them. You'd be better served with changing to an encrypted DNS provider from someone that blocks advertisers, like AdGuard as a means of limiting the number of databases your usage is pinging.

If you want "more secure" everything on any networked computer thingy, Privacytools.io can be useful. Just don't go to extremes. Extremes lead you to do poorly thought out things with deeply unintended consequences. Either learn to blend, learn to be okay not blending for the sake of principle if you don't want to feed the madison avenue monster, or don't use it at all which can be its own easily tracked signal flare in a digital panopticon unless you disappear into the Kentucky hollers for the rest of your natural born life.

Just working with what you got, and modifying how you use your equipment can go a long way on its own... or just don't use it in the first place if its got you that unnerved. My advice? Worry less. Losing hair or sleep over this shit isn't worth it, because most of the stuff you want to do to protect your privacy is either pissing into the ocean or a move few have the resolve and resources to actually do, and the stuff that needs to be done to meaningfully protect your privacy isn't something that is in many people's sphere of control anymore.
« Last Edit: May 29, 2022, 12:58:55 PM by Daley »

MustacheAndaHalf

  • Walrus Stache
  • *******
  • Posts: 7731
  • Location: U.S. expat
Re: Computer and smartphone privacy thread
« Reply #15 on: May 29, 2022, 08:52:21 PM »
VPNs are security theater for the most part, and are mostly only used when you don't trust the primary network you're connected to in the first place, but that means trusting a secondary network in and industry that lies through its teeth about your privacy just to get you to spend money with them. You'd be better served with changing to an encrypted DNS provider from someone that blocks advertisers, like AdGuard as a means of limiting the number of databases your usage is pinging.
Although Google switched from VPN a decade ago, to me that says VPNs were good enough for individual users - just not an entire company.
https://thenewstack.io/beyondcorp-google-ditched-virtual-private-networking-internal-applications/

When I connect to banks or brokers, I'd like an extra layer of encryption on top of SSL those websites normally use.  For me, VPN adds "OpenVPN ECC" on top.  I am not trying to avoid being tracked.  Given that goal, and the VPN.ac service I use, if I'm missing something and am fooling myself (security theater), I'd like to know more.

"We provide a VPN service, but that is not what makes us a security company. Rather, what makes us a security company is much more than that, it is the fact that we carry out pentesting, do security audits, consulting, and the fact that we've been into the information security industry for over 15 years."
https://vpn.ac/about
(The above is a convenience - I actually checked them out more thoroughly years ago when selecting a VPN)

As to tracking, I've given up on that battle.  I've tried hiding my browser's "canvas", which provides unique graphical characteristics that websites can use to fingerprint your browser.  Ultimately I think it was a hopeless battle for an individual to fight.  I would recommend trying a cookie setting that drops cookies when your browser closes, but you'll need to add exceptions for websites you use regularly - the web relies on cookies.  I'm also vaguely aware of something with HTML5 and data saved outside cookies that could be used for tracking, but I haven't dug into it - so there could be ways around cookies, for big tech companies that can afford to implement it.
https://amiunique.org/

There was a period of time where Google had exited China, and had not reopened offices there.  During that window, Google uncovered a campaign originating out of China which had the goal of monitoring "Chinese political activists" among other groups.  You don't have to read very far between the lines on that one.  So that could be another area of concern for those seeking privacy.
https://googleblog.blogspot.com/2011/06/ensuring-your-information-is-safe.html
« Last Edit: May 29, 2022, 08:54:23 PM by MustacheAndaHalf »

RWD

  • Walrus Stache
  • *******
  • Posts: 7319
  • Location: Arizona
Re: Computer and smartphone privacy thread
« Reply #16 on: May 29, 2022, 09:18:18 PM »
I use Quad9 (9.9.9.9) for DNS.

Radagast

  • Magnum Stache
  • ******
  • Posts: 2800
  • One Does Not Simply Work Into Mordor
Re: Computer and smartphone privacy thread
« Reply #17 on: May 29, 2022, 11:18:55 PM »
I use an Apple phone (SE original), but I don't use anything else Apple including web services. I keep the bare minimum apps, turn all permissions to off except a bare handful, blue tooth off, no Microsoft or Google services used except through a browser. My browser is Firefox Focus which deletes all data regularly, built-in ad blocker, and only allows one tab at a time. I occasionally go through the privacy menu and make sure everything is right, because apps and Apple settings have a tendency to migrate towards lower privacy settings after software updates. I use Safari if I want to be tracked.

My computer(s) are all Windows 10 devices. For browsers I alternate between Firefox with Ghostery, and Chrome in incognito with AdBlockPlus and NoScript. I never accept cookies or history after I close the browser. Yes, I need to reenter my password and login every time for every website. I use Edge if I want to be tracked.

I use Google for email, Earth, and maps (except on my phone) so they know enough about me already.

And that's it. Not an expert. I sometimes look around for low level tips that don't take much effort. I like the tip of randomly turning off the phone for much of the day, and it seems like it would also improve my quality of life.
« Last Edit: May 29, 2022, 11:36:56 PM by Radagast »

ObviouslyNotAGolfer

  • Pencil Stache
  • ****
  • Posts: 518
Re: Computer and smartphone privacy thread
« Reply #18 on: May 29, 2022, 11:22:24 PM »
A very interesting thread, and one I'll have to read more thoroughly in the coming days.

As for me, I'm kind of a cellphone curmudgeon. I do have a smartphone but I have no data plan. I keep no long-ins or passwords stored; I do no financial transactions; I do no social media; and (amazingly!!!) I do not have a vast inventory of dick picks (or any dick picks or X-rated pics) among my few photos. I do not leave it turned on all the time. In fact, most of the time, it is OFF (especially while I'm sleeping!) I do browse the web--slightly--sometimes when I'm in the back yard (wi-fi), but only have a few bookmarks. I figure I have more than enough connectivity with my desktop (grandpa box) at home, work, and our laptop when we travel. I LIKE getting away from it!

Also, even though I have  PIN to unlock the phone (can a four digit PIN be hacked in a femtosecond or is it a picosecond?), I figure if I were ever to lose this thing, I could be potentially in a world of trouble.

That said, I have always wondered about cellphone Faraday cages, even before this little event:

My wife and I were on vacation at an AirBNB cottage. We like to listen to music with dinner and wine. I asked my wife what she wanted to her, to which she replied: "Something good!". I then said, "Wait, I wanted to hear something crappy. How about some Justin Bieber??" A second later, her cellphone (which does have a data plan) blared out: "Check out Justin Bieber's latest single blah-bitty-blah on Spotify!!!" It's always listening apparently. Testing it I screamed, "HEY I'M GONNA GO HAVE A LOOK AT THE NEW CHEVY SILVERADOS SOON!!! WHERE CAN I GET A GOOD DEAL ON A SILVERADO!?!?! (would never buy one of these, or any GM product, or any huge truck)...silence. Then I started blaring "HEY I NEED SOME NEW TIRES. WHERE CAN I GET A DEAL ON SOME NEW TIRES!?!?111??"...silence.

So, my question is--do cellphone Faraday cages work or are we completely screwed no matter what? Can you recommend one? Will I be labeled a terrorist (not true) or a socialist (mostly true) if I am found to have one??

OH WAIT!! Someone is knocking on my door!




« Last Edit: May 29, 2022, 11:40:25 PM by ObviouslyNotAGolfer »

Fru-Gal

  • Handlebar Stache
  • *****
  • Posts: 2353
Re: Computer and smartphone privacy thread
« Reply #19 on: May 30, 2022, 12:01:14 AM »
PTF

ObviouslyNotAGolfer

  • Pencil Stache
  • ****
  • Posts: 518
« Last Edit: May 30, 2022, 12:50:04 AM by ObviouslyNotAGolfer »

Daley

  • Walrus Stache
  • *******
  • Posts: 5425
  • Location: Cow country. Moo.
  • Where there's a will...
Re: Computer and smartphone privacy thread
« Reply #21 on: May 30, 2022, 08:19:06 AM »
When I connect to banks or brokers, I'd like an extra layer of encryption on top of SSL those websites normally use.  For me, VPN adds "OpenVPN ECC" on top.  I am not trying to avoid being tracked.  Given that goal, and the VPN.ac service I use, if I'm missing something and am fooling myself (security theater), I'd like to know more.

Within the context of privacy and hiding traffic, it's mostly theater. VPN setup is easy to screw up and leak data, and traffic can still potentially be linked and paired on networks within certain jurisdictions.

As for elliptic curve cryptography specifically... look into the debates about spectral weakness and speculation about kleptographic backdoors. Feel free to reach your own conclusions, but if you don't like the theories you see, provided you understand it... you aren't gonna much care for the greater implications that come with that realization, either. But, it's what we have - like it or lump it, Sparky. You can either be pragmatic about it all and take a Bruce Schneier approach to it realizing that even under these hypothetical circumstances, the cryptography is rarely even remotely the weakest link in the security chain, or you can buckle up with a tinfoil hat and howl at the moon screaming nonsense like, "Good luck, I'm behind seven proxies!"

But as I and others have basically implied, VPNs when properly used are only really effective when you can somehow trust that third party company with your secure traffic more than your current internet provider. In an industry rife with opaque systems, doubletalk, ad money flowing like wine at a bacchanalia, and outright lying to convince people you need to spend more money for extra encryption on top of the military grade SSL encryption you already have between you and your destination... you can perhaps see where the pointless skepticism of what it truly adds can start creeping in. Otherwise it's just another failure point and false sense of security. You'd do better just using an encrypted third party DNS like AdGuard (mostly for the privacy anti-advertising filters), or others like Cloudflare, Quad9, NextDNS, or CleanBrowsing with their security filter lists in place... and making sure you check the SSL cert in the browser for your bank and don't have any stupid/pointless plugins in the browser riding shotgun on the session.

This isn't to say that a VPN can't have value or a purpose. But for the most part, in order to have that value and purpose, you have to trust yet another company with a black box that all your traffic is being passed through, you have to trust that they're not lying to you about what they do and do not do, and that trust has to be higher than the network you're currently connected to. Example: I would use a trusted VPN if I were connected to a public WiFi hotspot... but it'd take a lot of circumstances for me to connect to that hotspot in the first place.

Honestly, I think @RWD said it more elegantly than I did.

As for what VPN I'd feel less itchy potentially using? ProtonVPN isn't dropping tons of money to advertise everywhere, has independent audits, is one of the few providers that cares enough about user privacy in the first place to push a client to F-Droid, and is the same outfit that does ProtonMail.

Edited to be less specific in a couple spots and fix some bonehead early morning speeling mistakes.
« Last Edit: May 30, 2022, 08:47:37 AM by Daley »

Fru-Gal

  • Handlebar Stache
  • *****
  • Posts: 2353
Re: Computer and smartphone privacy thread
« Reply #22 on: May 30, 2022, 11:03:52 AM »
Quote
Quote from: Fru-Gal on Today at 12:01:14 AM
PTF


« Last Edit: Today at 12:50:04 AM by ObviouslyNotAGolfer »

FBI

MustacheAndaHalf

  • Walrus Stache
  • *******
  • Posts: 7731
  • Location: U.S. expat
Re: Computer and smartphone privacy thread
« Reply #23 on: May 30, 2022, 02:20:49 PM »
When I connect to banks or brokers, I'd like an extra layer of encryption on top of SSL those websites normally use.  For me, VPN adds "OpenVPN ECC" on top.  I am not trying to avoid being tracked.  Given that goal, and the VPN.ac service I use, if I'm missing something and am fooling myself (security theater), I'd like to know more.
As for elliptic curve cryptography specifically... look into the debates about spectral weakness and speculation about kleptographic backdoors. Feel free to reach your own conclusions, but if you don't like the theories you see, provided you understand it... you aren't gonna much care for the greater implications that come with that realization, either. But, it's what we have - like it or lump it, Sparky. You can either be pragmatic about it all and take a Bruce Schneier approach to it realizing that even under these hypothetical circumstances, the cryptography is rarely even remotely the weakest link in the security chain, or you can buckle up with a tinfoil hat and howl at the moon screaming nonsense like, "Good luck, I'm behind seven proxies!"

As for what VPN I'd feel less itchy potentially using? ProtonVPN isn't dropping tons of money to advertise everywhere, has independent audits, is one of the few providers that cares enough about user privacy in the first place to push a client to F-Droid, and is the same outfit that does ProtonMail.
That's interesting - I wonder what my VPN provider thinks of the "OpenVPN ECC" debate.  Computers can't generate truly random numbers, and apparently the method to generate random numbers for ECC might have a backdoor.  That was debated for years, and the NY Times has confirmed evidence the No-Such-Agency has a backdoor in the random number algorithm for ECC.  Given that, and not being aware of a similar problem with AES-256 bit, I've switched back to AES-256 bit.

With ProtonMail you can trust one company for both VPN and email, which is either a feature or a bug depending on your goals.  At a point in the past, I went past ProtonMail's initial interview, which at no point confirmed the job or skills required - their first round interview was a form of IQ/problem solving test.  They outsourced the first stages of their interview process!  Their second stage problem assumed I had various equipment and software, without saying anything in advance - at which point, I felt the poor communication was rampant, and stopped interviewing with them.  To me, that says something about ProtonMail, but it would also be fair to claim that says something about the third party hired to do the start of the interviewing process.  I believe a Mr Ed... Snow... also praised ProtonMail, which formed my initial positive impression of their service.

Daley

  • Walrus Stache
  • *******
  • Posts: 5425
  • Location: Cow country. Moo.
  • Where there's a will...
Re: Computer and smartphone privacy thread
« Reply #24 on: May 30, 2022, 02:58:06 PM »
When I connect to banks or brokers, I'd like an extra layer of encryption on top of SSL those websites normally use.  For me, VPN adds "OpenVPN ECC" on top.  I am not trying to avoid being tracked.  Given that goal, and the VPN.ac service I use, if I'm missing something and am fooling myself (security theater), I'd like to know more.
As for elliptic curve cryptography specifically... look into the debates about spectral weakness and speculation about kleptographic backdoors. Feel free to reach your own conclusions, but if you don't like the theories you see, provided you understand it... you aren't gonna much care for the greater implications that come with that realization, either. But, it's what we have - like it or lump it, Sparky. You can either be pragmatic about it all and take a Bruce Schneier approach to it realizing that even under these hypothetical circumstances, the cryptography is rarely even remotely the weakest link in the security chain, or you can buckle up with a tinfoil hat and howl at the moon screaming nonsense like, "Good luck, I'm behind seven proxies!"

As for what VPN I'd feel less itchy potentially using? ProtonVPN isn't dropping tons of money to advertise everywhere, has independent audits, is one of the few providers that cares enough about user privacy in the first place to push a client to F-Droid, and is the same outfit that does ProtonMail.
That's interesting - I wonder what my VPN provider thinks of the "OpenVPN ECC" debate.  Computers can't generate truly random numbers, and apparently the method to generate random numbers for ECC might have a backdoor.  That was debated for years, and the NY Times has confirmed evidence the No-Such-Agency has a backdoor in the random number algorithm for ECC.  Given that, and not being aware of a similar problem with AES-256 bit, I've switched back to AES-256 bit.
Heh. Wait til you find out about the weaknesses of Rijndael, and the fact that it's technically easier to brute force 192/256 keys than 128. Although still computationally impossible at the moment, it still speaks to certain weaknesses to the design itself. There are some of the crinkly metallic hat set inclined to trust nothing that gets the NIST kiss of approval. I can't imagine why.

This is why my recommended litmus is crackhead security, blending into the noise, and just embracing the golden rule about how you treat others and yourself in love and compassion.

Sleep well!

Syonyk

  • Magnum Stache
  • ******
  • Posts: 4610
    • Syonyk's Project Blog
Re: Computer and smartphone privacy thread
« Reply #25 on: May 30, 2022, 05:32:17 PM »
Unfortunately, the solution is regulation and legislation for the sake of public interest and good, something the powers that be have no stomach to do... which is why we're in a situation where people feel it necessary to ask these sorts of questions to begin with.

Agreed.  Though I'm seeing signs that the legislation may be coming.  In the past 4 years or so, the tech industry has gone from "Can do no wrong!" to "Can do no right."  And I think that's progress on this front.

Quote
You're literally paying money to carry and use devices designed to know who and where you are.

Correct.  However, some are worse than others, as is being discussed.

Quote
The very effort of trying to make yourself more private and secure makes you just that much easier to find through fingerprinting on the internet given how few people go to these extremes of circus clown levels of privacy, especially given how a lack of metadata is identifiable information in and of itself. There is something to be said about blending into the noise without faking it through spoofing, and doing so in a way that you don't have to be in a state of perpetual vigilance to achieve.

The flip side of this argument would be, "The more people do these weird things, the more noise there is to extract signal from."  This is literally the history of Tor - various government groups wanted unattributed access, and the only way to achieve that is to have a lot of other people using the network.  Hence my willingness to use it for casual browsing and help increase the noise on it.  There is zero reason for my personal blog to have Tor support - yet, it does.  Because I think it's useful and a tiny bit neat.

Quote
When you get so paranoid that you're walking around pulling batteries out of your phone when you talk with someone...

Oh, that's performantive and I know it.  I don't have the phone near me if I actually care, but "pop the battery" demonstrates that both I've thought about it, prefer phones that have the capability, and it makes a good conversation point.  I would, personally, like to stop seeing cell phones at church in their entirety.  And I can help influence the direction of conversation in my spheres.  But it's also a habit that has been professionally relevant at various points in the past.

Quote
...or using a Linux distro that compartmentalizes EVERYTHING to the point that all apps run in their own virtual machine while overlooking the fact that they're still all sharing the same hardware... the problem ceases to be the technology. The problem is you.

Hey, you can run more than one application per Qube if you care!  It provides tools for you to use as you see fit.

Hardware sharing is a problem, though I also think Qubes does a decent job with trying to mitigate the bulk of the cross-core attacks.  You can also, if you care, simply not have two VMs running at the same time.  Run one VM, do something.  Shut it down, do something sensitive on a different VM.  Etc.  Again, it's a tool that you can fit to your particular requirements.

Quote
If you know you're doing the right thing in the eyes of your creator, you should have no fear of the tyranny of man. If you're living in fear of man to the point that you've amassed a small fortune and gone to be holed up on a farm in the middle of nowhere trying to fall off the grid and withdraw from society, while turning somersaults trying to justify your technolust with near impossible to use novelties that can barely do what you want it to while you're still dependent upon the Googleplex, and yet continue to be equally paranoid about everyone from bad men with black hats to the government to the financially largest tech company that you feel somehow betrayed your trust despite being built into the massive conglomerate it is on decades of anti-consumer behavior? You're lying to yourself. Just unplug already, and stop thinking your feedback helps anyone just blend if they want to keep using the technology without drawing undue attention to themselves.

Well pointed, and not wrong.  You've hit at the core of something I've been trying to ponder through for some while now, which is, "Should one work to try and make the system less-horrid, or, at least, improve alternatives that are less-toxic to use, or simply opt out of the system entirely?"  And I don't know the best answer to that.  I can do plenty of debugging and work on lower power, non-x86 machines - kernel hacking is nothing novel to me.  Doing early bringup on ARM boards and providing detailed feedback is entirely in scope - I'm more likely than not to have a USB UART just permanently attached to my machines than the average bear.  And by doing this work, I increase the number of alternatives that are usable by people with less technical skill.  The Raspberry Pi foundation has done a great job of making ARM SBCs "generally usable."  I wish they'd put more effort in to AArch64, but that's coming.  The reality remains that I do make a living in the deep weeds of tech, so I can either use that to try and improve the public state of affairs, or just spend time on the old tractors and do nothing with tech personally.  Right now, I'm willing to put the effort in, work with improving the ARM SBCs, Qubes, etc.  And I think there's value to be had there, obviously.

Quote
If you still can't unplug despite having the supposed wealth to do so? I got bad news for you, Bucky. You're railing against the very machine that enabled you to amass and keep your physical wealth and luxury in the first place. You're just as much a slave to the machine as the rest of us... the only difference is you're rich enough to drop thousands of dollars and thousands of hours to pretend you're somehow able to obtain a greater privacy on a network that's fundamentally designed to identify who you are.

The community of low level weeds developers and security types is that of people who have put the time and effort in to deeply understand modern systems, and who almost universally dislike them as a result.  I don't think it's unreasonable to recognize mid-career that the way things have gone is insane, and to try and correct it, with an understanding of the problems.  People make fun of politicians who try to regulate something they clearly know nothing about (see... well, really, a lot of things, but tech and guns come to mind as some of the most comical), but yet, if one understands something and dislikes it, we shouldn't try to improve the state of it?

And, again, I'm somewhat picking an adversarial view for debate purposes, because there are plenty of days I want nothing to do with tech in my personal life.

Quote
You're still visible to the people who want to find you... and if you're being targeted that closely by people you don't know? I don't know what to tell you. You're either a more interesting person than I am and the threat is real, or you're a schizophrenic or narcissist with a really over-inflated sense of self worth.

It's somewhat hard to tell which until it's far, far too late, isn't it?  By the time you'd actually know if someone is after you specifically, it's more than a bit too late to close the doors to keep the horse in.  So a sane default would to ride the more paranoid side of things.  And if by doing this, one normalizes "don't trust the networks" in ones peer group, so much the better. 

Quote
...the poorly security updated and maintained KaiOS included.

I won't argue, though I will say that KaiOS at least makes adding more than "some basic contacts" really difficult, and comes with cheap phones in the deal.  If I'm going to have a limited, low capability device, I may as well do that for $60, vs several hundred, and I get week+ battery life as a bonus.

When I connect to banks or brokers, I'd like an extra layer of encryption on top of SSL those websites normally use.  For me, VPN adds "OpenVPN ECC" on top.  I am not trying to avoid being tracked.  Given that goal, and the VPN.ac service I use, if I'm missing something and am fooling myself (security theater), I'd like to know more.

Why?  If SSL using a modern crypto suite isn't strong enough, then neither is the VPN you're overlaying.  If I don't trust the AES128 and SHA256 primitives used to secure my connection to this forum, why would using those in a VPN over the top add anything useful?

I don't think you're adding anything meaningful but some complexity.

In an industry rife with opaque systems, doubletalk, ad money flowing like wine at a bacchanalia, and outright lying to convince people you need to spend more money for extra encryption on top of the military grade SSL encryption you already have between you and your destination... you can perhaps see where the pointless skepticism of what it truly adds can start creeping in.

They're useful if you need an encrypted tunnel from A to B - say, if you want to securely access resources on your home network while out and about.  They're also useful if you don't trust the first hop.  Outside that... they're really exactly what's described above.  A low cost service with a lot of affiliate links running around, and a neutral-to-negative actual benefit.  Being the kind of person who subscribes to UltraMegaSecureBlastDoorVPN is, of course, useful knowledge to advertisers.

Computers can't generate truly random numbers...

Yes, they can.  There are a wide variety of hardware random number generator techniques that allow for proper random values.  Use one.

===========

However, Daley is probably right as well, and one simply ought not use computers as much.

Daley

  • Walrus Stache
  • *******
  • Posts: 5425
  • Location: Cow country. Moo.
  • Where there's a will...
Re: Computer and smartphone privacy thread
« Reply #26 on: May 30, 2022, 08:18:15 PM »
Quote
You're literally paying money to carry and use devices designed to know who and where you are.

Correct.  However, some are worse than others, as is being discussed.
[...]
Quote
...the poorly security updated and maintained KaiOS included.

I won't argue, though I will say that KaiOS at least makes adding more than "some basic contacts" really difficult, and comes with cheap phones in the deal.  If I'm going to have a limited, low capability device, I may as well do that for $60, vs several hundred, and I get week+ battery life as a bonus.

Here's the thing about VoLTE devices and KaiOS. KaiOS is wholly supported by Google, like Firefox is. Still phones home to Google. Still has all the same telemetry and environmental sensors that smartphones have. It has fewer privacy features than actual Android. And here's the thing with VoLTE's spec - that's by design for the sake of E911 support. Your precious feature phones leak the exact same type of data as a smartphone, because the VoLTE spec wants X/Y/Z axis location data. On top of that, it's a platform that gets even less security support and updates. It's literally everything you claim to hate about smartphones and insecure unpatched operating systems, yet you flex on it like it's somehow superior. It's not. It's an extreme position reached from going too far thinking one can still eat their cake and have it, too. Like your battery removal, it's performative... all virtue signalling with very little substance.

I tout Windows Phones still to the people like you who don't have the self control to not handle a regular smartphone due to addiction, the luxury to claim they can live without communications channels that the average working stiff can't, and get too freaked out about "technology bad" - but not bad enough to actually set it down, because they're inherently more secure despite the EOL status, and still provides more fine grained security and privacy features than KaiOS or the stripped Android builds get in the T9 jobbies, wrapped in a package with more useful peripherals, software, and a removable battery pack... all without generating even more new electronics waste demand at a fraction of the price of your alternative. But carrying that doesn't exactly jive with your Unfrozen Caveman Lawyer, "Black mirror bad!" speeches.

I tried telling you this last year, too. You listening yet?

Quote
You're still visible to the people who want to find you... and if you're being targeted that closely by people you don't know? I don't know what to tell you. You're either a more interesting person than I am and the threat is real, or you're a schizophrenic or narcissist with a really over-inflated sense of self worth.

It's somewhat hard to tell which until it's far, far too late, isn't it?  By the time you'd actually know if someone is after you specifically, it's more than a bit too late to close the doors to keep the horse in.  So a sane default would to ride the more paranoid side of things.  And if by doing this, one normalizes "don't trust the networks" in ones peer group, so much the better.

The horse is already running free in the meadow and the barn is a pile of ash for every last person in this country, and has been since we ignored Eisenhower more than 60 years ago... and you're wringing your hands like the horse is still in his stall. And frankly, the world's been broken for a whole lot longer than that. It would be adorable if it wasn't so exhausting. It is what it is.

However, Daley is probably right as well, and one simply ought not use computers as much.

That's not what I'm saying at all. I'm saying make peace with the tool you're using, or don't if you can't. If you can't, talk is cheap. Both paths come with its own price.

Radagast

  • Magnum Stache
  • ******
  • Posts: 2800
  • One Does Not Simply Work Into Mordor
Re: Computer and smartphone privacy thread
« Reply #27 on: May 30, 2022, 10:51:50 PM »
Related to fingerprinting, you should install a canvas blocker. There's an EFF (?) tool out there that'll tell you how unique your browser and machine is.

I use CanvasBlocker on Firefox, which returns a spoofed canvas signature.

https://en.wikipedia.org/wiki/Canvas_fingerprinting


Edit: Here it is: https://coveryourtracks.eff.org/
Does CanvasBlocker add utility if already using AdBlockPlus, or even NoScript?

MustacheAndaHalf

  • Walrus Stache
  • *******
  • Posts: 7731
  • Location: U.S. expat
Re: Computer and smartphone privacy thread
« Reply #28 on: May 31, 2022, 02:59:56 AM »
When I connect to banks or brokers, I'd like an extra layer of encryption on top of SSL those websites normally use.  For me, VPN adds "OpenVPN ECC" on top.  I am not trying to avoid being tracked.  Given that goal, and the VPN.ac service I use, if I'm missing something and am fooling myself (security theater), I'd like to know more.
Why?  If SSL using a modern crypto suite isn't strong enough, then neither is the VPN you're overlaying.  If I don't trust the AES128 and SHA256 primitives used to secure my connection to this forum, why would using those in a VPN over the top add anything useful?

I don't think you're adding anything meaningful but some complexity.
My VPN auto starts at boot up - it's not meaningful complexity for me.

Some websites don't even use https, and VPN ensures that lack of security still gets encrypted.  I'd also rather check my VPN provider out very carefully than check up on every website I use.


Computers can't generate truly random numbers...
Yes, they can.  There are a wide variety of hardware random number generator techniques that allow for proper random values.  Use one.
I have the impression it's a controversy, but it seems like you're not aware of it:

"... many people questioning whether Intel’s built-in hardware random number generator chip is trustworthy."
https://www.howtogeek.com/183051/htg-explains-how-computers-generate-random-numbers/

RWD

  • Walrus Stache
  • *******
  • Posts: 7319
  • Location: Arizona
Re: Computer and smartphone privacy thread
« Reply #29 on: May 31, 2022, 07:42:55 AM »
I don't think you're adding anything meaningful but some complexity.
My VPN auto starts at boot up - it's not meaningful complexity for me.
The complexity being added that matters is not for the user. If you mail a package via FedEx and they give it to UPS who then gives it to USPS who then delivers it that wasn't any more complex for you but there was still added complexity that could be problematic.

Some websites don't even use https, and VPN ensures that lack of security still gets encrypted.
Except for the part between the VPN and the website...

Computers can't generate truly random numbers...
Yes, they can.  There are a wide variety of hardware random number generator techniques that allow for proper random values.  Use one.
I have the impression it's a controversy, but it seems like you're not aware of it:

"... many people questioning whether Intel’s built-in hardware random number generator chip is trustworthy."
https://www.howtogeek.com/183051/htg-explains-how-computers-generate-random-numbers/
There are other options. See: Lavarand for an example.

Syonyk

  • Magnum Stache
  • ******
  • Posts: 4610
    • Syonyk's Project Blog
Re: Computer and smartphone privacy thread
« Reply #30 on: May 31, 2022, 09:42:36 AM »
Still has all the same telemetry and environmental sensors that smartphones have.

I've seen no evidence of gyros, accelerometers, pressure sensors, etc.  The only "sensor" I can find listed on mine is a Hall effect sensor that's used for lid position detection.  It takes phone calls and sends/receives texts, and that's all I either want or ask of it.

Quote
And here's the thing with VoLTE's spec - that's by design for the sake of E911 support. Your precious feature phones leak the exact same type of data as a smartphone, because the VoLTE spec wants X/Y/Z axis location data.

Do you have any good resources you're pulling from?  I've looked for data flow analysis out of KaiOS and I can't find much, though there's also not much to send out.  You're making plenty of strong claims about KaiOS, and I haven't been able to find any backing for them.  So, please share?

I'm aware that a cell provider will have general locational data for a smartphone, and that this is unavoidable due to both E911 rules and the general technical nature of TDMA protocols.  However, I also have talked about leaving my phone at home and powered off extensively, at which point I have some reasonable confidence that the phone isn't online and talking to cell towers where I am.

Quote
On top of that, it's a platform that gets even less security support and updates. It's literally everything you claim to hate about smartphones and insecure unpatched operating systems, yet you flex on it like it's somehow superior. It's not. It's an extreme position reached from going too far thinking one can still eat their cake and have it, too. Like your battery removal, it's performative... all virtue signalling with very little substance.

The state of security updates matters less when there is nothing of interest on the device in the first place, with no reasonable avenues of attack.  And it's a bit of a chance of stance from the past, yes, based on some long discussions with a range of people and reasoning through attack paths.  If literally all I do on a device is calls and texts, the attack paths are far fewer than a device running a range of general purpose applications, browsers, etc.

Quote
I tout Windows Phones still to the people like you who don't have the self control to not handle a regular smartphone due to addiction...

Oh, knock it off.  My screen time on iOS devices was quite low, Apple just managed to piss me off enough with the whole on-device content scanning debacle that I decided I was no longer going to use their products, and have done so.  Had they not decided to burn all their built up privacy capital in a glorious and nonsensical bonfire (as they seem to not have actually shipped the feature...), I'd be happily still using an iOS device about as infrequently as I use the KaiOS device (though the camera would be better).  KaiOS is an experiment in what can be done without the mainline Android/iOS devices, roughly along the lines of what you've been doing with older Windows phones.

Quote
the luxury to claim they can live without communications channels that the average working stiff can't,

o.O  I've got plenty of stuff bridged into my self-hosted Matrix instance.

Quote
I tried telling you this last year, too. You listening yet?

I've no particular interest in a touch screen device at this point, so... not really.  KaiOS is a current optimum, and will remain as a primary device until such point as something kicks it out of that spot.  I should probably do some PinePhone hacking, as I was gifted one,

I have the impression it's a controversy, but it seems like you're not aware of it:

Oh for fuck's sake.  Yes, I'm aware of the controversy around Intel's RNG, and have read and reviewed some of the papers on how to trojan it: https://sharps.org/wp-content/uploads/BECKER-CHES.pdf remains relevant.

At no point did I say, "Use the Intel Random Number Generator as the only source of random values!"

I said that there were a variety of methods to generate hardware random for a computer.  One can use the free running oscillator technique Intel does (though I'm far happier with RDSEED over RDRAND - as Intel recommends for anything that needs cryptographically solid values), shot noise from diodes, extract atmospheric noise and whiten it through various algorithms as random.org did for many years, and I can think of a range of other bits of non-determinism one can use.  And when all these are merged into a random pool, as the Linux kernel does, you can deal with a range of flawed RNGs and still generate good quality output.

Anyway, it's clear I'm in the minority opinion here, so... have fun.

Daley

  • Walrus Stache
  • *******
  • Posts: 5425
  • Location: Cow country. Moo.
  • Where there's a will...
Re: Computer and smartphone privacy thread
« Reply #31 on: May 31, 2022, 10:28:38 AM »
Quote
the luxury to claim they can live without communications channels that the average working stiff can't,

o.O  I've got plenty of stuff bridged into my self-hosted Matrix instance.

Like I said, all hat and no cattle.

scottish

  • Magnum Stache
  • ******
  • Posts: 2837
  • Location: Ottawa
Re: Computer and smartphone privacy thread
« Reply #32 on: May 31, 2022, 05:48:24 PM »
When I connect to banks or brokers, I'd like an extra layer of encryption on top of SSL those websites normally use.  For me, VPN adds "OpenVPN ECC" on top.  I am not trying to avoid being tracked.  Given that goal, and the VPN.ac service I use, if I'm missing something and am fooling myself (security theater), I'd like to know more.
Why?  If SSL using a modern crypto suite isn't strong enough, then neither is the VPN you're overlaying.  If I don't trust the AES128 and SHA256 primitives used to secure my connection to this forum, why would using those in a VPN over the top add anything useful?

I don't think you're adding anything meaningful but some complexity.
My VPN auto starts at boot up - it's not meaningful complexity for me.

Some websites don't even use https, and VPN ensures that lack of security still gets encrypted.  I'd also rather check my VPN provider out very carefully than check up on every website I use.


Computers can't generate truly random numbers...
Yes, they can.  There are a wide variety of hardware random number generator techniques that allow for proper random values.  Use one.
I have the impression it's a controversy, but it seems like you're not aware of it:

"... many people questioning whether Intel’s built-in hardware random number generator chip is trustworthy."
https://www.howtogeek.com/183051/htg-explains-how-computers-generate-random-numbers/

Interesting.   When I connect to banks or brokers, I prefer to *not* have a third party involved (eg a VPN provider).    You know, one less opportunity for a MITM...

FireLane

  • Handlebar Stache
  • *****
  • Posts: 1708
  • Age: 43
  • Location: NYC
Re: Computer and smartphone privacy thread
« Reply #33 on: June 27, 2022, 12:21:38 PM »
Good suggestions in this thread. I downloaded NetGuard and I'm trying it out.

I agree with those who say that if you're carrying an internet-connected, GPS-enabled smartphone in your pocket, you can't expect 100% privacy. It's all about the threat model: what, realistically, do you have to be concerned about? Who might come after you, and what harm would they be able to do?

If the NSA comes for me, I doubt there's much that I as an individual can do to protect myself. Ad tracking is annoying, and I block ads and tracking cookies where I can, but it's not going to be the foundation of a 1984-style totalitarian surveillance state. (As Mustachians, we don't do that much shopping anyways, am I right?)

I think the biggest threat that an ordinary web user is likely to encounter is the garden-variety scammers and criminals who want to steal your bank logins or infect your computer with ransomware. Here's what I do to protect myself.

I have MalwareBytes and Spybot Search & Destroy on my computer, and I scan at regular intervals. I also have an automatic daily backup of my important files to an external hard drive, plus an internet-enabled backup service (iDrive is pretty cheap) for extra redundancy.

For normal web browsing, I use Chrome with uBlock Origin and NoScript, whitelisting only sites I trust. Also, I don't stay logged in to Twitter or Facebook all the time. When I use social media, it's only in a private browsing window which clears all cookies when I close it. This also means I have to log back on every time I want to check social media. That's a good thing, because that small extra obstacle discourages me from wasting too much time on there.

As an extra layer of security beyond that, I have an entirely different browser - not Chrome - with privacy settings on maximum. The accounts which hold the majority of my investments (e.g., Vanguard, my 401(k)), I access only from that browser, and I don't visit any other sites with that browser. Chrome doesn't have my passwords for those sites saved. That way, even if I get hacked by some 0-day exploit running wild on the web, the attacker won't be able to steal my login information or siphon off my investments.

For the same reason, I have a Gmail account which I use for day-to-day correspondence, and a ProtonMail account which is the one linked to all my financial accounts and logins, and which I don't use for anything else. Again, it's just about not keeping all your eggs in one basket.

And the biggest, simplest, best thing: For the love of God, don't use the same password for every account, especially not the important ones! If you use the same password everywhere, anyone who hacks even one of the sites you use will have your whole life in their hands.

I have a different, strong password for every one of my e-mail accounts, financial accounts, and other important stuff, and I keep them in all in an encrypted master file on my computer so I don't have to remember them.

Other apps I've used or experimented with:

* Signal (encrypted texts and calls - surprised it didn't already get a mention in this thread)

* Alfred (if you have an old smartphone lying around, this turns it into an internet-connected security camera that you can watch from your current phone)

* AirGuard (Bluetooth app to scan for tracking tags, for non-Apple users)

 

Wow, a phone plan for fifteen bucks!