Open source developer & privacy advocate.
https://github.com/WardPearce/paaster
Cough cough might be bias
no history log, but happy to take PRs
model f77 from model f labs
capy.life creator here, incredible tool
Certbot is great when using Nginx (or Apache2), but if you can use a different engine. Its worthwhile checking out Caddy!
Thanks for mentioning this! Always wanted a foss material ui weather app
Per-site process isolation is a powerful security feature that seeks to limit exposure of a malicious website/script abusing a security vulnerability. Firefox calls per-site process isolation Fission and is enabled by default on desktop. Fission is not yet enabled by default on Android, and when manually enabled it results in a severely degraded/broken experience. Furthermore Firefox on Android does not take advantage of Android’s isolatedProcess flag for completely sandboxing application services.
Obviously Firefox has it own data isolation, but this doesn’t matter if someone can execute bad actiing code due to lack of process isolation.
As I said I not a fan of Brave (mostly because of the crypto stuff), calling it spyware you could say is hhmmmm “misinformation”. Yes security and privacy are different concepts but they are closely linked. If your browser fails to stop malicious code from being executed, you might find this impacts your privacy.
Matter of facts is, Android Firefox lacks site isolation. Yes you can enable a highly experimental version of site isolation what will break your browser (admitted by your source) and may even fail to isolate sites altogether. Android Firefox doesn’t use isolated processes, a functionality what can’t be enabled.
I’m not sure what your goal is with this discussion, but obviously you don’t have any regard for privacy or security. Your arguments over semantics are obviously in bad fair (and not even accurate to the original discussion).
To reiterate for the millionth time, feel free to use Firefox on Android, I’m avoiding using Firefox due to large security concerns. Once Mozilla finishes implementing site isolation and process isolation, I’ll be the 1st one to move off Brave and into Firefox.
But for your own future reference, actually source articles what support your statements. Otherwise don’t get upset when someone points that out.
Oohh I know what must be happening, the highly experimental features you’ve enabled on Android Firefox must of messed up the pages. Explains why you can’t read.
Enjoy using your insecure browser 😘
haha cope harder friend, by default Firefox lacks site isolation. Enabling it is highly experimental 🤣 Before linking something and claiming I’m spreading misinformation (quite a serious claim to me because i spend my days coding foss privacy focused software) read the entire article 1st and when someone points out your wrong, learn how to take a loss. Also Android Firefox doesn’t take advantage of Android isolated processes, what Android chrome based browser’s do
From the article you linked yourself
Firefox calls per-site process isolation Fission and is enabled by default on desktop. Fission is not yet enabled by default on Android, and when manually enabled it results in a severely degraded/broken experience. Furthermore Firefox on Android does not take advantage of Android’s isolatedProcess flag for completely sandboxing application services.
Read before you send :)
I use Firefox on my PC, but as I stated Firefox on Android is lacking basic security features.
Don’t like Brave or their products. But only decent & safe browser on Android with site isolation etc.
Worthwhile plugging Obtainium what is helpful for pulling prebuilt apks off Git
Organic maps 😍
Yea but obviously he has a office 365 plan, so a alternative to the office suite for word processing etc is relevant.
Check out onlyoffice. Open source MS 365 alternative and yet to find any issues with it.
Not sure if this is entirely true, it is possible Proton mail is encrypting everything at rest (with the users public key) and only following PGP mail limitations during transit.
Like for example plaintext emails are encrypted at rest on Proton mail, what isn’t ideally (compared to e2ee) but still minimizes the attack surface.
Actually for reference this is exactly the case
Message storage All messages in your Proton Mail mailbox are stored with zero-access encryption. This means we cannot read any of your messages or hand them over to third parties. This includes messages sent to you by non-Proton Mail users, although keep in mind if an email is sent to you from Gmail, Gmail likely retains a copy of that message as well. Password-protected Emails are also stored end-to-end encrypted. Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted.
Thought this comment he made was odd about Proton mail.
The site is filled by beautiful black screen without JavaScript enabled.
Like yes, its a bit difficult implementing local encryption or decryption without js enabled.
Has some good messaging, I’d say most of his comments are pretty widely known concerns or limitations.
Like obviously web apps still rely on trust from the host, but it minimizes the attack surface massively.
yea considering its FOSS it was good enough compared to a lot of the other clients for me to move away from Symfonium