• 0 Posts
  • 158 Comments
Joined 1 year ago
cake
Cake day: July 22nd, 2024

help-circle

  • Tbh I had no issues with synapse.

    The problems that persist: Very rare issues with decrypting (as I rarely encounter it, while being in encrypted chats with 150+ users, it’s not an issue for me), apart from after you changed clients, slow image loading (a bit annoying, but ok if you multitask anyway) and clients all having different feature sets (some of which you can also hackily make work in others).








    1. Thunderbird Stable on Desktop (want to figure out nightly tho), TB Beta on Android.
    2. Hard to say, as I only ever used gmail as “alternative”. On that, the TB search on a gmail is worse than gmail’s own client’s search.
    3. Compared to gmail, that it’s much less corpo and much more customizable.
    4. My provider (me) has no password reset flow. I have to manually generate a new pw for an account with doveadm (postfix uses saslauth with dovecot for auth) and edit /etc/dovecot/users.
    5. Basically, I’m the most privacy preserving and flexible provider you can think of. Except that the gov and pigs now just have to question my domain to get my address for any email I send. But oh well.
    6. Skins. So it can eg. look like Outlook. Would help me switch my grandparents from M$ to FOSS. My grandpa is of the “it doesn’t work, so an immediate screaming meltdown follows”-type, and my grandma survives solely on knowing which button is where, because she’s almost blind.
    7. All services have their own address, so I can block whole services and default others to eg. spam. Helps me keep the traffic low, and know where an email slipped to spammers/scammers. Though, that never happened in the 1-2 years I’m using it. The only spam is PayPal and Twitch (will change that) telling me that one of my 10 or so subscriptions is going to renew soon.









  • While unlocking the bootloader […] unleashes the full potential of the bootloader, it also poses a security risk. Even with your lockscreen protected with a pattern/PIN/password, not having flashed a custom recovery, having an anti-theft app installed (maybe even converted/installed as a system app) your phone’s data is easily accessible for a knowledgeable thief.

    All the thief needs to do is reboot into the bootloader and boot or flash a custom recovery such as ClockWorkMod or TWRP. It’s then possible to boot into recovery and use ADB commands to gain access to the phone’s data on the internal memory (unless you have it encrypted) and copy/remove files at will.

    Granted, the risk seems low. The thief would not only require knowledge of fastboot, he would have to turn off the phone before you have issued a wipe command using an anti-theft app. You could of course flash back the stock recovery & relock the bootloader after being done with flashing stuff, but that would require you to unlock it again if needed which will erase your userdata.

    Of course, a thief can/is also the government.

    But, most phones can be unlocked by the pigs regardless, with eg. Cellebrite. The best bet is probably a pixel, as it can be relocked easily, with graphene. Or no phone at all.
    Also, I’d guess many Cellebrite tricks work with (weak?) pins/patterns. Use a password, and no fingerprint. And on eg. graphene, the emergency wipe after 10 wrong pws etc.