If you want to try ECH (Encrypted ClientHello), the next generation of #TLS, you can use #Firefox nightlies and our test fork of #FDroid that forces an ECH connection to a mirror of f-droid.org hosted on Cloudflare: https://f-droid.org/packages/ie.defo.ech_apps/
If you are a developer who has posted on public mailing lists, watch out for spearphishing replies to your posts https://guardianproject.info/2022/02/23/spearphishing-for-developers/
For anyone looking to run a full fledged circumvention system, we're working to bring #Greatfire's proven software to any context, starting with https://github.com/greatfire/envoy
User accounts are so often a method of tracking users, yet they are not a requirement for running most internet services. #FDroid #Jitsi #CleanInsights #Wikipedia #Briar #FirefoxFocus all provide shining examples of working without accounts. https://f-droid.org/2022/02/28/no-user-accounts-by-design.html
"EU data protection authorities find that the consent popups that plagued Europeans for years are illegal. All data collected through them must be deleted. This decision impact Google's, Amazon's and Microsoft's online advertising businesses."
https://www.iccl.ie/news/gdpr-enforcer-rules-that-iab-europes-consent-popups-are-unlawful/
#Munich regional court finds embedding Google Fonts in a website violates #GDPR, "legitimate interest" did not apply since the fonts can easily be directly integrated into their website, thereby avoiding sending IP addresses to #Google.
https://thehackernews.com/2022/01/german-court-rules-websites-embedding.html
Some of the #GuardianProject team will be at #IETF 113 in Vienna, it'll be good to see people in person again!
Registration for #IETF113 (19-24 March 2022) is now open. Sign up to participate in and read all the details about the first-ever hybrid IETF meeting: https://ietf.org/blog/113-registration-open/
Like many problems with targeted ads, both Naviance, the platform, and college officials who use the platform to target applicants by race, are at fault. Children aren't products. https://themarkup.org/machine-learning/2022/01/11/this-private-equity-firm-is-amassing-companies-that-collect-data-on-americas-children
The US State Dept's "Global Internet Freedom" funds (#OpenTechFund #StateDRL #USAGM and more) now require #OpenSource: section 7050, "Funds... may only be made available to support open-source technologies that undergo comprehensive security audits...".
The #Debian #Android Tools Team now has a blog, including news about packaging #Gradle #Kotlin sdkmanager and related #FreeSoftware issues https://android-tools-team.pages.debian.net/blog/
With #Debian, it is now possible to get all updates from official HTTPS sources. In combination with other work from the apt developers, this improves privacy and provides backup security https://guardianproject.info/2021/12/08/debian-over-https/
The FBI produced this nice chart comparing what kinds of privacy leaks the various messaging apps have.
Our first build of Conscrypt which includes the next version of #TLS known as #ECH (Encrypted ClientHello) is now available for Android and Java:
implementation 'info.guardianproject.conscrypt:conscrypt-android:2.6.alpha1638179154.job1828169525'
https://github.com/google/conscrypt/issues/730
Yet another of the many ways that #Cloudflare breaks the open #internet: connecting without a User Agent gives 403 Forbidden with an obscure "error code 1010". My #TLS #ECH test suite works fine on all the other sites, only Cloudflare does this.
One of the hazards of #TLS #ECH is that a deployment could end up leaking as much information as a non-ECH TLS connection if the ECH Config in DNS is only associated with a given domain. https://blog.cloudflare.com/handshake-encryption-endgame-an-ech-update/#focusing-on-deployability
#Android apps can track users based on their wallpaper: https://lwn.net/Articles/873921/ https://fingerprintjs.com/blog/how-android-wallpaper-images-threaten-privacy/
#CalyxOS is leading the charge to deliver a truly #private mobile device, it is also #FreeSoftware. Since it is based on #AOSP, you can port it to lots of devices, even if they do not support a locked bootloader.
#Debian created an ecosystem where the software available there is reviewed and trusted, so the system can prioritize flexibility over security. In #Google Play, there are many apps we feel forced to use, despite knowing they are unethical or are tracking us. Google responds by locking down #Android to reduce data leaks, which also reduces the system's flexibility. #FreeSoftware puts the user in control so we can build user-friendly systems without being forced into bad decisions.
I'd love to see data on what verified boot actually stops. The ideal malware implants itself at the lowest level possible. Is there good public data on these kinds of exploits on #Android #Debian #Windows #iOS etc? Does standard spyware do that? Writing to /system requires a root exploit, lots of malware never gets root. How often there are vulns in #VerifiedBoot itself. Here's a real world full #exploit of verified boot:
https://threatpost.com/multiple-vulnerabilities-found-in-nvidia-qualcomm-huawei-bootloaders/127833/
Does anyone know how to query the system for information about Trichrome Libraries https://chromium.googlesource.com/chromium/src.git/+/refs/heads/main/docs/android_native_libraries.md#Trichrome? They seem to be installed as APKs, but the regular way of querying for app metadata does not work. For example, is there a separate concept of "Version Code" for Trichrome libraries?
People, apps and code you can trust