eclic.ro is an exclusive Cloudflare site just like change.org is. Exclusivity is obviously quite lousy for democracy. Better alternatives are here:
eclic.ro is an exclusive Cloudflare site just like change.org is. Exclusivity is obviously quite lousy for democracy. Better alternatives are here:
privacytools.io always was shit show even before the infighting. They put their own endorsement site on Cloudflare. Despite a collossal pile of dirt emerging on #Signal:
https://github.com/privacytools/privacytools.io/issues/779
PTIO continued endorsing Signal non-stop, refusing to disclose the issues. That was also before the breakup. Dirt was routinely exposed on PTIO endorsements and it never changed their endorsement nor did they reveal the findings on their website.
Now both factions are hypocrits just as they were when they were united. The original PTIO site is back to being Cloudflared (nothing like tossing people coming to you for privacy advice into the walled garden of one of the most harmful privacy offenders), and Privacy Guides has setup on a CF’d Lemmy node. The hypocrisy has no end with these people.
Interesting, but that does not help because Mint jails all their docs in Cloudflare.
Also worth noting that #Ubuntu and #Mint both moved substantial amounts of documentation into Cloudflare (the antithisis of the values swiso claims to support). I have been moving people off those platforms.
BTW, prism-break is a disasterous project too. You know they don’t have a clue when they moved their repo from Github.com to Gitlab.com, an access-restricted Cloudflare site. There are tens if not hundreds of decent forges to choose from and PRISM Break moved from the 2nd worst to the one that most defeats the purpose of their constitution.
It might be useful to find dirt on various tech at prism-break, but none of these sites can be trusted for endorsements.
The prism-break website is timing out for me right now. I would not be surprised if they were dropping Tor packets since they have a history of hypocrisy.
If you look in their bug tracker, it actually reveals that they ignore dirt that has been dug up on their suggestions.
As others have mentioned there is little in the way of justification for these suggestions, and while I happen to agree with plenty of them, I’d personally like to see more reasoning, if not to appease people that already have opinions then to help newer users understand their options.
Indeed. In fact it’s actually worse than you describe. Swiso witholds negative information. They don’t want to inform people. They want to steer people. For example, swiso’s endorsements for donation platforms have some quite serious problems:
https://codeberg.org/swiso/website/issues/141
swiso is also aware of the serious issues with Qwant and the serious issues with DuckDuckGo. Not only failing to remove them but also failing to inform. Qwant and DDG are both Microsoft syndicates!
(if anyone is interested, one of the most privacy-respecting search services is Ombrelo¹, which is largely unknown to the world because PTIO, swiso, and prism-break don’t do the job they claim to do)
And swiso is aware because that’s their bug tracker.
/cc @Imprint9816@lemmy.dbzer0.com
¹ https://ombrelo.im5wixghmfmt7gf7wb4xrgdm6byx2gj26zn47da6nwo7xvybgxnqryid.onion/
There are a few good alternatives and swiso has been aware of them for ~4+ years:
StreetComplete shows me no map, just quests on a blank canvas. OSMand shows my offline maps just fine, but apparently StreetComplete has no way to reach the offline maps. I suppose that’s down to Android security – each app has it’s own storage space secure from other apps.
In principle, we should be able to put the maps on shared SD card space and both apps should access it. But StreetComplete gives no way in the settings of specifying the map location. And apparently it fails to fetch an extra copy of the maps as well in my case.
Protonmail failed to satisfy F-Droid’s inclusion criteria because it requires gms (playstore framework) and because it uses Firebase messaging.
Since I’ve disabled gms in my device I’m not sure how Protonmail would work for me. Someone tells me I might simply lose push notifications capability. But I am confused because Snikket pushes notifications just fine on my device.
it’s worth noting that protonmail has an onion and their clearnet server also accepts tor connections. So users can control the leakage of their IP… but only if they’re willing to solve countless CAPTCHAs.
I’m on the edge of quitting protonmail. The issues:
I would say mostly true.
I moved to a region where my lifestyle (accounting for wages, tax, cost of living) was effectively cut in half. Yet it was still the right move. My initial thinking was I will live anywhere for a year to get a different experience - I can always bounce back if I don’t like it… if the pay reduction bothered me. I ended up staying ~10 years.
A big factor is where you are in life. Fresh out of university, it’s important to gain ground right away and perhaps get the house paid for, or nearly so. But once you’re a senior dev and at a point of calling yourself “privileged class" with a decent sized 401k built up (which is great to convert to a Roth while abroad), you’re only cheating yourself out of life experiences by continuing to chase the money. Some research concluded around ~10 yrs ago that people’s overall happiness improves as income increases up until the $55k/year mark. Beyond that, income doesn’t matter much. Of course that would be a little higher now with inflation but I guess the OP has cleared that figure.
I think it was around 15 years ago I started researching typical incomes around the world and I noticed that Japan paid SWEs double the US average. Cost of living was about 50% higher in Japan but it still worked out that a US→Japan move would have been a lifestyle upgrade. So there are some rare exceptions.
I think you would benefit most by moving abroad. Staying in one country your whole life is very one-dimensional. If you move to another country, esp. overseas, you will look back on your current boredom as wasting your life and you will regret not having done it sooner. Go for just one year. You can always return if you don’t like it. You might be someone who says “I went for 1 year, but stayed 5”.
But first move to a purple swing state like GA or PA for just a month or two, then move your stuff into mini storage. Two reasons: you get to experience a different part of the US, briefly, and you can register to vote in a place where your future votes will count the most. Because that’s the state you will vote in while abroad. OTOH, isn’t Texas on the edge of being a swing state? It’s probably not a bad place to vote from.
It’s a good article but warning to those on limited connections: that page buffers videos automatically.
that fixed it. Thanks!
I agree, but this list is pinned which made me think there’s an attempt to maintain it.
Some of these take an ethical step backwards. I see the pattern: lemmy.ml on the left-hand side, which is generally a good idea because lemmy.ml is centralized by disproportionate numbers. But when you have another quite large node on the RHS which is rendered strictly centralized by Cloudflare, you have a downgrade. E.g. the nodes lemmy.ca and lemmy.one should appear on the LHS, and for transparency I suggest tagging them with a lightening cloud (🌩).
How many websites can handle the amount of traffic that CF can handle? It’s not just about configuring your firewall, it’s about having the bandwidth. Otherwise it’s not much of a DDoS protection.
That’s what I’ve been saying throughout this thread. The only significant DDoS protection offered by Cloudflare requires CF seeing the traffic (and holding the keys) so it can treat the high-volume traffic. If CF cannot see the payloads, it cannot process it other than to pass it all through to the original host (thus defeating the DDoS protection purpose).
As I don’t have an account there I can’t see which requests containing credentials use which cert.
Why would you need an account? Why wouldn’t bogus creds take the same path?
If it’s true that this is unverifiable, that’s good cause to avoid Cloudflared banks. It’s a bad idea for customers to rely on blind trust. Customers need to know who the creds are shared with /before/ they make use of them – ideally even before they make the effort of opening an account.
And also, just because the cert is verified by cloudflare does not mean they have the private key.
This uncertainty is indeed good cause to avoid using a Cloudflared bank.
UPDATE: I’ve spoken to some others on this who assert that it is impossible for a bank customer to know for certain if a bank uses their own key to prevent disclosure to CF.
It seems like a lot of your points hinges on this being true, but it simply isn’t.
“AFAICT” expands to “as far as I know”, which means the text that follows not an assertion. It’s an intuitive expectation that is open to be proved or disproved. The pins are all set up for you to simply knock down.
There is a massive benefit to preventing DDoS attacks, and that does not require keys.
This is unexplained. I’ve explained how CF uses its own keys to offer DDoS protection (they directly treat the traffic because they can see the request). I’ve also explained why CFs other (payload-blind) techniques are not useful. You’ve simply asserted the contrary with no explanation. HOW does CF prevent DDoS in the absence of treatment of the traffic? Obviously it’s not merely CFs crude IP reputation config because any website can trivially configure their own firewall in the same way without CF. So I’m just waiting for you to support your own point.
There is no indication that banks are handing over client ctedentials to CF.
This is trivially verifiable. E.g. if you get the SSL cert for eagleone.ns3web.org, what do you see? I see CF keys. That means they’re not using the premium option to use their own keys. Thus CF sees the payloads. I’m open to being disproven so feel free to elaborate on your claim.
Wish I could see it. www.onem.be seems to be dropping my packets.