With GPU passthrough you can get almost native performance. This requires 2 GPUs though (iGPU as second one should suffice), dunno about the input lag and stability though as I only have one GPU
Without it though? Not even worth trying
With GPU passthrough you can get almost native performance. This requires 2 GPUs though (iGPU as second one should suffice), dunno about the input lag and stability though as I only have one GPU
Without it though? Not even worth trying
They won’t because it works exactly as they want it to
Just fyi, adb authorization resets like every 7 days by default. So if you hope to use your home PC to fix this you should not wait to long
For the future maybe get Termux, make it boot with your system, give it root access and setup ssh in there
And also please, for the love of good never download random TWRP images and install them to your phone. Same goes for Magisk and pretty much anything you do with root/in fastboot/in your recovery. This could open up a HUGE vulnerability in your phone which will not be fixable for you unless you’re willing to spend a lot of time
Lmao, women are literally streaming in mini bikinis but VTubers must cover their fucking hips
Fuck Twitch and Amazon for their inhuman work conditions
Fucking ad for a Spyware infested piece of shit
My parents use some, they spam my PCs fucking firewall logs like hell. They also regulary get silent updates which make them slower and slower and slower (which shouldn’t be possible because it’s freezing all the time)
BCR needs root but works on most roms
XPL-EX can do that and much more. Needs root though
ReVanced if you want the original Youtube app
Otherwise there are dozens of apps which don’t show ads, just look arround F-Droid
SmartTubeNext for AndroidTV
The Ars article seems to suggest that they were able to crack his phones pretty easily
Android uses data at rest encryption, which isn’t really useful without a lockscreen PIN/password since data gets decrypted after you unlock your screen the first time after each boot
Although it doesn’t appear he was actually using any encryption apps to store material; rather, he used a fake calculator app as password protection. Obviously not the brightest bulb in the drawer.
Agreed, he probably felt safe enough “hiding” the files. Definitely not the sharpest tool in the shed, which is great because fuck this guy
deleted by creator
Or use a RAM disk with something like Profile sync daemon
I’m ootl, mind explainig?
That’s exactly what my setup does. But like I said, this could in theory lead to you being more trackable
Thanks :)
Mate thx for the wall post, I did learn a lot.
You are in fact an expert even if there’s people you look up to. Keep sharing and keep being awesome.
Oh wow, I really didn’t expect such a kind response. I appreciate it, a lot actually. Now I know it was 100% worth it to write this 30 minute essay :D
Glad to help you mate and thank you
You are in fact an expert even if there’s people you look up to
I don’t wanna say you’re right/wrong with this. Although I definitely agree that it’s always a matter of perspective
I heard about generating unique IDs from harvesting PC data since the days that Adobe flash version were pretty telling, but no idea browsers today leaked so much semi identifying info.
Yeah, it’s honestly scary. These huge tracking companies can easily tell who you are, where you live, with whom and also deeply analyze your psyche and psychological state. That’s why I went so deep into the privacy rabbit hole
It’s also really scary that most people are okay with this
Thank you so much for such a great write-up
Don’t worry, I kinda nerd out over this so it was fun to share some of my knowledge
What field are you in?
Nothing specific sadly, as I messed up school because I didn’t care enough. I started learning to program at 11 years old though, got into reverse engineering by 12 and so much more stuff by now because it’s all so fascinating I just can’t stop researching and messing arround with things
Also, do you find CreepJS more powerful than Fingerprint.com?
Haven’t seen that one yet, I’ll play arround with it the next time I’m at my PC
Edit: It’s not, my android setup was enough to fool it automatically. CreepJS is insane though, it even kept track of me on Tor!
My guess? This is just PR from their politicians to say “they are saving the country” or whatever bullshit without actually doing anything useful
My guess? They’re trying to suck up to Google
Well, this is a way to vast topic to explain everything here but I’ll try and summarize the most important things:
Let me first explain how websites are able to “fingerprint” you: It’s basically just collecting as much data as possible about your device. Simple things like your browsers size (in pixels), your screen size, your CPU’s core count an many, many more. Having all this data makes it possible for websites to create a profile that only matches one of your specific devices (world wide!). Some websites/fingerprinters even go as far as scanning your local network for other devices, which could even tell them where you live, with whom etc. This wouldn’ be such a big deal if every website had their own database, but almost every page uses ads from Amazon, Meta or Google which makes these companies able to reliably track most of your internet usage even across different devices
So fingerprinters can be very intrusive nowadays, the best way to be anonymous is for everyone to share the same fingerprint which is what the tor browser tries to attempt. Obviously this needs everyone to conform to some predefined norms to work, otherwise you’ll become an outlier which can be tracked again
Tor browser sadly is very slow and by definition not very customizable, so I chose to forsake it in favor of Librewolf in combination with uBlock Origin in Strict Mode, all filterlists and all privacy settings enabled. Additionally I use JShelter to restrict websites Javascript usage and spoof some of the data which can be fingerprinted. Also for Android I use Firefox with some settings from the Arkenfox user.js (Librewolf uses this by default, I mostly use DNS over TLS and Resist Fingerprinting) and Firefox’s own Enhanced Tracking Protection in Strict mode. Additionally I like LibRedirect to access Reddit when I need to without having to login.
This setup stops most fingerprinters from even being loaded, those that still get loaded won’t run most of the time. It also sadly doesn’t work very well with pages behind Cloudflare, so you sadly need to (temporarily) disable some protections to get arround cloudflares captcha (or alternatively delete the webpages cookies each time you request another page from the same domain, this can be automated with addons/Firefox)
Keep in mind though that my setup might be considered pretty overkill by most and that privacy is a spectrum. It’s possible to block all tracking, but that would make almost the whole web unusable so keep that in mind. Your goal should be to limit the data that can be harvested from you to an acceptable degree, not to eliminate it. Most of the time this is a tradeoff of convenience vs privacy
If you wanna learn more look arround uBlock Origin Wiki, the Arkenfox user.js Wiki and the JShelter webpage
Additionally here’s some websites to test your overall fingerprintability:
Shoutout to LibreJS as well, sadly it breaks wayyy to many websites without doing endless tweaking for me to consider it usable and also LocalCDN
Also to finish this I should tell you that I’m by no means an expert and that you should do your own research. Having a semi random fingerprint can itself be a trackable vector but atleast I feel safe enough doing it this way
Feel free to ask more if something’s unclear/you want to know some more about privacy outside of your browser
That’s definitely possible but would make the host OS unusable while the VM is running afaik. Why not dual boot at that point?