The 8232 Project

I trust code more than politics.

  • 45 Posts
  • 253 Comments
Joined 1 year ago
cake
Cake day: February 25th, 2024

help-circle







  • I would be very interested to here what those other ways are.

    I’ve thought a lot about the many places governments can get funding from. The most obvious would be donations, if you can build a culture that is strongly oriented around donations. Housing, land, and school costs are sources we have today. Some more creative funding sources include: taxing companies (since companies are transparent this can be enforced), adding a wealth cap (and any extra income once that cap is hit goes towards the government), and heavy legal fines (currently legal fines are pretty small, especially for big corporations). The best way for a government to make money is to spend it responsibly to avoid useless costs or overspending. There’s plenty of other sources of income, but if done correctly they should cover the cost of no taxes and free healthcare.






  • I edit notes using vim or vscodium.

    You should probably try moving away from this practice. First, this leaves your notes vulnerable as they are not encrypted at rest. Second, those programs are not designed for private notes, meaning there is the potential for various leaks to happen that you may not even be able to catch (temporary system files, etc.). Using a dedicated notes editor (like Joplin) means you are using something designed to keep your notes confidential.

    Disclaimer: In the case of Joplin specifically, the developers take issue with implementing encryption at rest. Their philosophy is “If your computer’s disk is encrypted, then all your notes are already encrypted at rest.” This is flawed thinking for many reasons that I won’t get into here.



  • I would recommend Joplin, for these reasons:

    1. It’s digital (of course)
    2. It’s cross platform: iOS, Linux, Windows, macOS, and Android
    3. It’s fully open source
    4. It supports end-to-end encrypted syncing with different providers: Joplin Cloud, Dropbox, OneDrive, File system (for things like Syncthing), Nextcloud, WebDAV, S3 (Beta), and Joplin Server (Beta)
    5. It supports markdown editing

    When looking for software in general, write down what you are looking for and what your requirements are. Then, consider if there are any conflicting requirements (e.g. “I want my handwritten notes to be transcribed, but I don’t want any kind of handwriting recognition”). From there, you can make tough decisions or find a compromise. Then, think about any problems that may arise in the future. Do you plan to switch operating systems to something like GrapheneOS? Do you want to move away from cloud storage altogether? From there, you can get a good idea of what to look for. Good luck!






  • Sharing privacy and security setups, the digital equivalent of leaving a detailed map to your treasure chest and then wondering why pirates are interested.

    There’s actually two distinct ideas here:

    1. “Sharing your setup leads to insecurity” If this were true, then software being open source would make it insecure. It simply isn’t true, most of the time. While yes, making your setup public can lead to spotted flaws that can be exploited, in general it has no effect so long as you can trust the system you use. For example, I could give you my encrypted KeePass database file, and feel relatively certain that my passwords are safe. It isn’t a good idea for me to do that, because it leads to an increased attack surface, but until you manage to brute force the password for it or a zero day is found in how the database is stored, my passwords are still safe.

    2. “Sharing your setup makes you a target” To a degree, this can be true. The Streisand effect is evidence that this can happen. Again, though, as long as you anonymize some specific portions of your setup that can directly be used to exploit you, you will remain safe. I’ve shared my setup in the past (although it’s quite outdated by now), because I trust the way it is set up.


  • Hello there!

    First off, good for you for looking out for the privacy of others!

    Unfortunately, you can’t force privacy onto someone. That has to be a choice the person makes for themself. If you want your teen to live a private life, talk to them about it. Explain the dangers of social media, and don’t try to sidestep the issue, just be honest. Avoid trying to “trick” someone into privacy, because that leads to bad outcomes down the road.

    Using GrapheneOS is your best bet for a private phone. If you want to maintain some control over the device, have your teen use a secondary profile and restrict which apps can be installed using the owner profile that only you have access to. This also adds the benefit of being able to restrict access to the device (if that’s your thing) just by restarting it, since the teen won’t be able to unlock it. I’m not here to tell you how to be a parent.

    Social media I’m not sure if fediverse stuff is the right path especially for lemmy, since it’s just tech nerd stuff and politics which isn’t interesting really unless they go out of their way to find smaller communities.

    I agree with this, and it’s currently a downside to less mainstream social media. It will always be tailored to a specific community until it grows or becomes mainstream. If you really want your teen to use only open source apps, Bluesky is a good open source option while still being mainstream.

    My parents probably want tracking features so it’ll probably be Find My or a 3rd party app like life360

    You can talk with them about alternatives, such as an Airtag or other similar devices, or having no tracking at all. One point you can bring up is that it’s quite easy to trick those tracking apps (turning off the device, turning off location, turning on Airplane Mode, using a mock location app, leaving the device at home, etc.) so they aren’t very useful. Again, I’m not here to tell you how to parent.

    It’s just kinda hard trying to blend being a functional member of society and maintain your mental well being and privacy.

    This is why privacy is a choice. It’s up to the person how private they want to be, but the most you can do is educate about privacy and raise some alternatives.

    In general, it depends on how much control you want to have over the digital life of your teen. The more control you have, the less autonomy the teen has and the more likely it is that the teen will resent the practices you put in place. However, the less control you have, the higher the risk of bad things happening. It’s up to you which path to take. Something I learned is that you can never have total control, because people are crafty, but people are also very understanding and can adapt to their environment.

    Hope this helps!


  • Even tho some privacy respecting search engines like brave and startpage too showing me captchas.

    I’ve never had a captcha with DuckDuckGo, if you want to give that a try. Otherwise, metasearch engines like SearXNG act as a proxy between you and other search engines.

    From my search i finded that adguard or any other dns servers establish dnsotls-ds.metric.gstatic.com this connection in order to check the status of the private dns enabled or not. To block this i have to use a no-google blocklist which leads to inconvinience.

    Good to know. It’s up to you whether you want to trade privacy for convenience.

    No gecko based android browsers provide option to change dns provider.

    GrapheneOS’s browser Vanadium is a good option if you want to move away from Firefox-based browsers, but it’s not easy to install anywhere other than GrapheneOS. If you’re up to try, here’s how.

    Brave is making too much background connections which is annoying.

    Brave can be hardened to minimize most of those, but I agree it is annoying that there are still background connections.

    Also it would be nice to know leaking my location to dnsotls-ds.metric.gstatic.com leads to any consequences. Or is it just a private dns current status checking url ?

    Besides Google being able to see every time you ping the domain, there’s not much else going on. It’s unlikely that it’s leaking any private data, so it’s relatively harmless. It’s not ideal that it connects to it, but it doesn’t pose too large of a threat.