The 8232 Project

“Unjust laws only burden the just, as the lawless will not heed them.” - 8232

  • 33 Posts
  • 184 Comments
Joined 10 months ago
cake
Cake day: February 25th, 2024

help-circle







  • This is meant to help you with ideas, not a strict guideline. You’ll notice I mentioned the following for the Google Pixel phones, for example, since I knew not everyone would be happy with it:

    Other phones exist for this category, but the Google Pixel is a good baseline.

    These gift ideas may not be for you, but plenty of other people would be happy with them.



  • I would add to the conversation with the questions;

    I love fostering discussions, and I’m glad to see you do too!

    Should all information be known?

    Obviously nothing good can come if we all turn into the Borg. However, the question becomes more interesting when you consider different people. Should all of your information be known? No, obviously not. Should all of the CIA’s information (besides the personal information of others) be known?

    Is all information equal in value?

    My previous counter question assumes that no, not all information is of equal value. However, even if the value of information differs, your ability to control if that information is shared should not be diminished.

    I had a boss that would remember everything you told to them, and would make incomplete assumptions about it. If you told them you liked dogs, they would assume dogs are your favorite animal. If you told them you got scratched by a cat, they would assume you absolutely hate cats. In this context, “mundane” information such as my personal preferences (favorite animal, etc.) is not something I would want to share with my boss, since nothing good comes from it. Even though the information has “less value,” the value of it was raised depending on who I told.

    Your social security number is high value to say, your neighbor, but not necessarily the DMV. CIA documents may be high value against other countries, but it might be worth making it available to national citizens. So, information itself does not have a set value above any other piece of information, but it does have differing value depending on who you share it with.


  • The issue that arises from this approach, as I’ve found, is that people have something to hide from you, but not the government/large corporations. When they feel as if they are in a pool, they feel less important compared to being singled out by you.

    You could instead do something similar: “Why does the FBI need to know what color of underwear you wear?” etc. to help them realize that surveillance goes much deeper than they realize, and not everything is relevant information.


  • seems to advocate for what’s conventionally called Security Through Obscurity

    I was trying to avoid making it sound like iOS was more secure in that because it’s proprietary. The claim I was trying to make is that open source software isn’t necessarily more secure than proprietary software and being open source can make it easier to craft an attack compared to if it were proprietary. I also mentioned that there are, of course, more variables at play, such as sideloading.

    In my eyes, security via obscurity is a deterrent, not a solution. It can help prevent attacks or make attacks harder, but it doesn’t fix the underlying issues.

    Also, iOS has public kernel source code.

    I actually didn’t know this! Thank you, I learned something new today :)



  • rewrites never end well.

    NewPipe seems to acknowledge this: “Anyone who’s been in the FOSS community for long has come across at least one or two failed rewrites or refactors, and we don’t want to repeat such tragic history.”

    It’s been a year and a half since they made their post. I’m fairly certain they plan to take as long as they need in order to make sure not to repeat other’s mistakes. Plenty of rewrites do end well. Once NewPipe finishes their rewrite, I have no doubt that it will be a bit bumpy for a while. It’s a drastic change, so issues are bound to crop up. I have faith in them.







  • These are very valid points, thank you! I have some thoughts of my own, as well:

    The IP address a VPN assigns is no more random than the IP address your ISP assigns

    I probably should have clarified this. Free versions of VPNs change your IP with nearly every time you disconnect and reconnect, often finding the fastest one. Paid versions may allow you to select one yourself, or choose truly randomly.

    Last I knew ISPs still charged for static IP address, so most would be dynamic.

    I heard the opposite. If you find out any information about this, please let me know!

    I don’t know if the denial of service attacks of old are still relevant.

    Technically yes, but not from just spamming the ping command.

    Thanks!



  • making the introduction about the topic itself

    This is not necessary for what I am trying to achieve.

    today, all traffic is encrypted. You do not need a vpn for that. Even if you wouldn’t use TLS, using a vpn wouldn’t make it much more secure.

    You’ll find that a lot of it is not encrypted, namely DNS and background calls. Windows especially is bad about this. MITM attacks aren’t hard, either. I worked as a penetration tester in network security.

    just address that IPs can be static or dynamic. There are many different cases and you exclude them.

    I am trying to be as informative as possible, and it is a relevant and interesting issue.

    just because the ip is hidden, you may still reveal your location by other means.

    I never claimed otherwise.

    i am still in charge of my privacy, vpn only hide ip. All other personal identification methods are still valid.

    I never claimed otherwise. A VPN does more than just hide your IP address, though.

    if you need to be anonymuous vpns aren’t the best tool for it which is the controversal part about vpns. If you just want to torrent, you have to use vpns in many locations. Vpns are useless if you log in to services.

    VPNs can help with anonymity, but don’t on their own make you completely anonymous. VPNs are also still valid, even when you log into services, if you haven’t tied those services to any real data.

    If you would like me to go into more detail about any of these, I am happy to. Otherwise, you are free to write your own post about VPNs.

    Cheers!