• 1 Post
  • 18 Comments
Joined 1 year ago
cake
Cake day: November 14th, 2023

help-circle


  • What is unprivate about brave software? Assuming all telemetry is turned off and the browser is configured for strictest of settings no crypto, no ads, no telemetry, no java, session cookie delete, ect ect. Do we have RCP happening phoning home? I have never set brave up behind traffic analysis to see what outbound traffic gets sent that was not from the user. This can be directed towards desktop and mobile.

    Besides the above the only off putting thing I’m aware they have done is installed their VPN software without permission on dekstop which I found myself before I seen the news about it. Edit wording.



  • Brave has been thoroughly tested from many privacy advocate organizations EFF and more known names using default settings and ranks as the highest overall rated fingerprint resistant and anti tracking protected browser, again at default settings I have ran many tests once configured and get even better results even against librewolf with and without extensions and vanilla Firefox with privacy badger and ublock ect as well as without. (I use librewolf on desktop for those who are gonna down vote this) Gecko based browsers are advised against on Graphene and is spoken in length about on reddit from one of their Devs. Chromium and google is a bad combo sure reliance on Google and all to begin with, but so is supporting Google to degoogle with a pixel device. Could brave be a honeypot? Sure and many other services. So could VPN providers and any service for that matter. The biggest advantage I see using Firefox is promoting a non google alternative and balancing the scale against googles monopoly. In some cases Tor adds risk due to it being a giant vacuum for govt or other malicious entities looking to snoop. Its like taping a sign to your traffic. I think it serves a purpose but that varies from each persons use case.

    Edit typo.



  • Its my understanding the metadata is only stored on the home server that runs for the clients, so under a self host scenario the hoster would be the only party that could access such metadata. One big con to Matrix is that it lacks ephemeral messaging so I’m not sure if chat history is stored on client side once the server goes offline? I cannot find an answer through browser search or documentation. Couldn’t the hosted server be restarted anytime and it would essentially delete the metadata generated each cycle and chat history as well because the chat room would be deleted? Or ran inside say persistent Tails and with a device shutdown or unplug all data would be wiped due to its ram only nature while persistence only keeps the base setup of matrix not a full carbon copy so a new chat would be generated each power cycle. Similar to VPN services running on ram. Thoughts anyone?



  • I hate relying on anything big corp for privacy. Thanks for the reply and I’ll keep this in mind. It seems so far matrix chat is the only e2e chat that can remove the conversation from an individuals device once their removed from a room. I will have to do deeper research into matrix to see it it fits my use cases. I’m just not sure how it stacks up against other big name chat platforms as far as security/privacy goes. I’ve heard of it before. Never deep dived into the data.



  • This is called ephemeral messaging. A good feature of many apps. But doesn’t serve the same purpose for which I am asking. Thanks for mentioning another option other than the usual messenger apps. This is the description for others copied from a basic browser search.

    Keybase is a key directory that maps social media identities to encryption keys (including, but not limited to PGP keys) in a publicly auditable manner. Additionally it offers an end-to-end encrypted chat and cloud storage system, called Keybase Chat and the Keybase Filesystem respectively.

    Website here for those interested in reading about it -> https://keybase.io


  • Using scifs is widely known and of course a good addition to certain threat models. But doesn’t account for distance of individuals. My post was inferring distance between parties. That is why I talked about messaging clients and their features. For times when parties cannot possible be in person, also this is for everyday use not one time, I’m asking about a messaging client and feature set. Otherwise very good info here for others to learn and read on. Good post! FYI its worth reading on Pegasus and their zero click infection capabilities and multiple zero day exploits.



  • Many replies here have misconstrued the total objective from my post… Of course someone could screenshot or disconnect their device. I am not looking for a foolproof feature or system. I understand compartmentalization. I do not need scenarios listed where this type of feature is useful. I understand my threat model and this is for a chat messenger not in person. You mention revokable access. But does that still leave the file on the lost,stolen device? Revoking access simply sounds like locking a file with encrypted keys. Thus it still exists on the stolen or lost device. Which means at some point or time future or otherwise a 3rd party could gain access. By all means correct me if I don’t understand.



  • Its my understanding through some quick reading briar doesn’t have a built in panic button. But briar can be configured inside ripple which is similar to what I am looking for. But ripple only triggered by the device user. I am looking for a panic button which can be triggered from outside the device. Brair is only for android as well. While I despise apple, everyone else is drinking the koolaid. When the owner doesn’t have their device, compromised, lost, stolen, ect the device user can’t possibly trigger ripple, its not designed that way. Ripple is very nice though. I’ve used it. But doesn’t fit for the use case I’m asking about.


  • I understand your point of view. I share that philosophy to some degree. However nothing is a guarantee. But a high degree of certainty is achievable. But that doesn’t answer my question. Is there a messaging platform with a panic button that deletes the chat log and call logs from all user involved which can be triggered from any member.

    Edit wording and update. This got downvoted because of a misinterpretation of what I was saying when I said high degree of certainty. All I meant was this isn’t supposed to a fool proof blanket feature and the world doesn’t run on absolutes of course. For instance signal works with a high degree of certainty that youll be secure. I was conveying its highly probable this feature under correct parameters would function correctly. Simply a step in the chain of failsafes. None the less. Thanks for your replies.



  • They have ephemeral messaging where one can set a timer to delete a message when it is read or from the time it was sent. But that isn’t always so easy to gauge with life. Often times a chat log is needed when people don’t check it often or right away. So the group must set a long timer like 24h ect ect. It’s customizable. But if a group members device gets lost or stolen ect. It is of no use. Signal by default stores all call logs in the app. Even if the ephemeral timer is short. Call logs require manual deletion and the group is still formed showing who was in that group but the chat will be empty. Edit was wording.