“secure alternative”? Others are not secure?
“secure alternative”? Others are not secure?
replaced it myself - it’s not actually that difficult to do
I actually replaced the display twice already (got a replacement from Aliexpress for around $16) - first time because the touchscreen failed and second time because I smashed it.
Sony z3c with FirefoxOS and a Samsung A5 with Tizen
I use them as IMAP storage for a few mailing lists I am subscribed to (but not for my main emails), but they do reject legitimate emails from time to time (not often, but it does happen - and those emails don’t show up in “Spam” or any logs).
I have had pretty good experience with hosting an email server on AlphaVPS, InceptionHosting and just now GreenCloudVPS.
GreenCloudVPS currently have a promotion until Sunday, and there are usually promotions around Black Friday on LowEndSpirit and LowEndTalk
Only public keys get exchanged via Meta’s servers, those keys don’t help you with trying to decrypt any messages (you need the corresponding private key to decrypt - and that private key stays on the device).
Sure, they could just do a man in the middle, but that can be detected by verifying the keys (once, via another channel).
Maybe so, but in this case the point was that the protocol used by WhatsApp hasn’t changed in that time and it’s still what they describe in their security whitepaper. If you want to use that software as is or maybe reimplement it based on that is up to you.
Governments, if they want, can decrypt any chat
Any source for that claim?
In a subpoena case in India, that turned out to be not true.
Source please.
WhatsApp admins hold keys to being able to do that under law pressure.
How do they get the keys?
They only guarantee it for 1-1 messages and statuses, and against “generic” actors for group chats…
Who is “they”?
Group chats are also end-to-end encrypted in WhatsApp (so any monitoring would need to be done in cooperation with one of the participants’ devices before encryption or after decryption)
declassified internal FBI document I just linked
don’t see any such link
It still works (with a few minor updates).
yowsup is an Open Source implementation of the WhatsApp protocol. So there is proper end-to-end encryption on the protocol level - that would only leave the possibility of having a backdoor in the “official” WhatsApp client, but none has been found so far. BTW, people do actually (try to) decompile the WhatsApp client (or the WhatsApp Web client which implements the same protocol and functionality) and look what it is doing.
For anyone really curious, it’s not too difficult to hook into the WhatsApp Web client with your web browsers Javascript debugger and see what messages are sent.
It’s no secret that WhatsApp adopted Signal’s encryption protocol just before Meta acquired them, but since it’s all closed source we don’t know if they’ve changed anything since the announcement in 2016 that all forms of communications on WhatsApp are now encrypted and rolled out.
There is an Open Source implementation of the WhatsApp protocol: yowsup
At least for memory usage the hypervisor wouldn’t be able to tell the difference between memory merely used as cache vs. memory actually used by the software running on the machine (and OSes will usually just use any otherwise unused memory as cache, so you will likely see some inflated memory usage)
How do they actually get that information (particularly memory utilization)? Do they rely on their agent that’s pre-installed (but can be uninstalled)? At least in their web interface it doesn’t show any of that utilization for my instances (one is Ubuntu with their agent uninstalled and the other one is NetBSD).
I am actually using a OrangePiPC as:
Been using phpwiki for the past 20 years or so.
deleted by creator