I didn’t know this app existed. Anyway, the project was discontinued.
I didn’t know this app existed. Anyway, the project was discontinued.
That’s true, all devices are hackable, there’s no 100% protection.
No tool is perfect, but if that’s a security improvement, it might be worth enabling.
I know of at least one instance where lockdown mode protected a user from NSO spyware.
A Citizen Lab’s research confirmed it:
For a brief period, targets that had enabled iOS 16’s Lockdown Mode feature received real-time warnings when PWNYOURHOME exploitation was attempted against their devices. Although NSO Group may have later devised a workaround for this real-time warning, we have not seen PWNYOURHOME successfully used against any devices on which Lockdown Mode is enabled.
It is encouraging to see that Apple’s Lockdown Mode notified targets of in-the-wild attacks. While any one security measure is unlikely to blunt all targeted spyware attacks, and security is a multi-faceted problem, we believe this case highlights the value of enabling this feature for high-risk users that may be targeted because of who they are or what they do.
Can any of them prevent a Pegasus-style attack?
If I understand correctly, Apple does it by disabling common attack vectors, remote fonts for example.
The update seems to be bugged. I tried to upgrade version 0.0.57 to 0.0.58, and it seems like nothing have changed. I’m still on 0.0.57 after a “successful” install.
If an app on one device connects to an app on another via Veilid, it shouldn’t be possible for either client to know the other’s IP address or location from that connectivity, which is good for privacy, for instance. The app makers can’t get that info, either.
Is that considered a new thing? I don’t think I’ve ever encountered a P2P service/protocol that also masks IP addresses.
When you hide read posts, are my own posts hidden? Is there a distinction between read posts on my feed versus read posts on a specific community page? Or maybe it just hides everything?
Well, you use Linux, maybe Win11 is screwing me in that case.
deleted by creator
IMHO that’s a highly requested feature.
I did that, several times. I tried it natively on Tor Browser for Windows 11. I also tried it in a virtual machine on Tor browser for TailsOS.
On Tails, only resetting the VM did manage to prevent fingerprint(dot)com from tracking the browser, just closing and opening the browser up did not.
What if the site was even able to fingerprint my Tor browser?
I didn’t change anything in the browser settings menu. Only thing I did after loading the site for the first time was to click “block canvas fingerprinting”.
I’m on Windows 11 BTW.
Did you get any spam calls?
Use FreeTube?