![](https://lemmy.dbzer0.com/pictrs/image/cf061b83-a216-4b7c-8434-8924a3a71f14.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
The default on android is to give every wifi network its own random but static mac.
Keyoxide: aspe:keyoxide.org:KI5WYVI3WGWSIGMOKOOOGF4JAE (think PGP key but modern and easier to use)
The default on android is to give every wifi network its own random but static mac.
What is the threat szenario?
If you are smart about parallelization and have access to custom hardware, couldn’t you turn 5 days into 1 hour or less?
Firefox+PlasmaWayland+SystemD+portage+GNU+Linux
Default linux works too ofc, I didn’t know they took that route.
Most other browsers have very specific useragents, so the main pool of same useragents will be hardened browsers anyway.
Thank you for checking
edit:
https://github.com/TheTorProject/tor-messenger-build/blob/581ba7d2f5f9c22d9c9182a45c12bcf8c1f57e6e/projects/instantbird/0001-Set-Tor-Messenger-preferences.patch#L354 would indicate it should be Windows, Ill check later.
Try it with high security settings in tor, it might be something like canvas. Did you enable any permissions for the website?
That would be a fail of the fingerprinting protection. A properly set up TOR browser for example should not allow that detection by any means. If you know how to detect it, please report it as a critical vulnerability.
I could think of maybe some edge case behavior in webrenderer or js cavas etc., which would mainly expose info on the specific browser and underlying hardware, but that is all of course blocked of or fixed in hardened browsers.
Further, if you have a reliable method, you could sell it off to for example Netflix, who are trying to block higher resolutions for Linux browsers but are currently foiled by changing the useragent (if you have widevine set up).
That can’t have been the reason, rather the fact it could tell.
Your browser sends information about its version and the os in the useragent string. It is supposed to lie and say it is a very commonly used useragent, specifically for purposes of fingerprinting. That would be windows, default configuration, firefox version something not you firefox version
All oleds do it at lower brightnesses. They can’t dim very far, so they need to flicker to get a usable color-depth
you can physically wire A into C, it’s the same protocol. This won’t be broken like other adapters because neither device even knows about it
ssds are a really cheap upgrade, and have been for a while. My systems of similsr age have had ssd upgrades for about 5 years now. It’ll likely be limited to sata speeds though.
I built it 6 months ago on a 3700x, took 3h. Where firefox took 20 minutes
The missing number is drive speed, because 4GB ram are not nearly enough, swapping is necessary. But with fast moder drives (were pcie ssds a thing back then?) expect half a day
For reference my modern system sits well below 20 minutes without pgo, and below 40 with.
I would not say that necessarily.
I asked the Gentoo people and they had similar setups with 12h. At 4GB ram it’ll mainly come down to swapping, so disk speed.
If the 5 days were you experience, was it using a slow hdd?
Edit: remember to disable pgo, wherever you see it. It can double your compile times
It appears they just did, as of a few minutes ago while I was looking into it
Here is the now open private components repo under the CC BY-NC-SA 4.0 license
And I forked it just to be sure
On lineageOS 20 it records the exact android build string as the Software for me, so “Android lineage_pdx215-userdebug 13 TQ3A.230901.001 b30079afa2”. Which is probably enough to uniquely identify me, and you if you have a less common phone or are on an older or uncommon version.
Needless to say I am pissed.
Even with OCR, couldn’t your copy at least in theory be laced with strategically placed minor word changes? Say throughout the book you pick 30 spots to change a word without changing the meaning of the text, or you introduce a typo. If every copy gets a different set of those that would be a unique identifier.
I think I have heard that being done with imperceptable changes in films sent for showings in theaters.
There are tvs that wait a month before giving you a big manually dismissed popup about not being connected to the internet.
TPM isn’t all that reliable. You will have people upgrading their pc, or windows update updating their bios, or any number of other reasons reset their tpm keys, and currently nothing will happen. In effect people would see Signal completely break and loose all their data, often seemingly for no reason.
Talking to windows or through it to the TPM also seems sketchy.
In the current state of Windows, the sensible choice is to leave hardware-based encryption to the OS in the form of disk encryption, unfortunate as it is. The great number of people who loose data or have to recover their backup disk encryption key from their Microsoft account tells how easily that system is disturbed (And that Microsoft has the decryption keys for your encrypted date).