stupid_asshole69 [none/use name]

  • 0 Posts
  • 10 Comments
Joined 2 months ago
cake
Cake day: March 3rd, 2025

help-circle
  • I think that argument made in a vacuum, devoid of any analysis about the companies, software and their history could apply equally to any phone (including graphene and fdroid and calyx and postmarket and etc).

    So it’s not useful to bring up when someone is asking about specifically ios, since it’s a hypothetical problem that applies equally to all phones and their software and the solution to it is putting the onus on the user to audit their software, operating systems, microcode, hardware and everything else or to determine whose audit of those systems to trust.

    I think it’s especially not worth considering under a material analysis of the interests of the company that makes rich people phones and advertises their system as secure and private and generally has longer time to exploit for the different law enforcement processes and provides bare minimum compliance and isn’t primarily selling user data.

    On some level we have to acknowledge the tremendous logical leap required to compare apple and pretty much any other major manufacturer and say “they could have backdoored it and they could be listening right now”. Yeah, I guess they could have done that. They have less incentive and more to lose than any other company and it would take a massive internal conspiracy, but I guess it’s possible.

    I want to just take a line or two and make it clear that I’m basing all the above on the material circumstances of the company, not on any misplaced love for them or their products. I have android, ios, windows, linux and macos computers and use them equally.


  • I clicked the little rainbow star to see what people not federated with my instance are saying.

    You’re getting a ton of bad input and inaccurate or irrelevant information.

    Do not rely on community consensus to establish proper use guidelines.

    As another person stated: signal chats don’t go to icloud. You have nothing in the slightest to worry about on that front.

    People are bringing up prism and push notifications. It is mandatory for companies operating in the us to comply with us government prism spying requirements. Turn on ADP. Read past the slide presented as supposedly damning evidence against one or another company if you want to understand better law enforcements processes over a decade ago. Push notifications are plaintext and represent cause in some cases. This is not unique to apple. If you think you are one of those people, turn them off.

    Turn on lockdown mode. Update your phone. Turn on automatic updates. The ways people physically and remotely compromise ios are often stopped by those three things.

    If you don’t already, restart your phone daily. It puts the phone in a restricted state called before first unlock that requires that non resident programs have to reload and in almost all cases have to reestablish themselves to the host os.

    If you’re worried about your signal chats getting recorded, turn on the disappearing feature. The other person is the weakest link, not the technology. Do contact verification. Assume your chats are infiltrated and talk to people about illegal stuff in person like the scions of American industry do. This is not unique to apple.

    Be safe out there.


  • That makes a lot of sense.

    TBH, I would go with a cloud service in your situation. You’re using icloud now and if you can avoid changing away from it you should. Theres a snap (ugh) that purports to do this natively, but even on a nearly 15 year old thinkpad I can spare the clock cycles and memory to bring osx up in a vm and do it normal style.

    I say a service, and you said you’re interested in syncthing (which is very useful) but I’d stick with icloud or something more like it.

    I was in a disaster we never thought would happen. My self hosted server was rendered inoperable by it. My offsite backup on the other side of the county was completely destroyed. If it weren’t for cloud backups I’d have lost data. Connectivity was sparse and if I had been privacy focused in the immediate hours I would have recognized then that it was entirely provided by spare bits of dubious infrastructure brought in by the government.

    Cloud services like bitwarden and icloud saved by butt. They were prepared for this unimaginable situation to a degree I couldnt have been. When I had a dead phone battery and no laptop, both were able to be accessed securely on other people’s computers and public terminals.

    I wouldn’t worry too much about the privacy aspect. Once you have ADP on in iCloud you’re safe from lawful orders and interception is handled by transport encryption like tls, wireguard or whatever. Your pc is a concern but open source versus closed source isn’t the security panacea people make it out to be.

    An open source package called winring0 -yes really, it says it in the name- that was abandoned by its developer 15 years or so ago for being a terrible security nightmare was found recently to be in lots of windows rgb drivers shipped by manufacturers today.

    That is to say, you can’t really protect yourself from manufacturer and maintainer error or maliciousness. You choose to trust them and have to accept what you get until it’s too spicy and the whole system needs to be ripped out and replaced.

    What I would do for privacy is audit my behavior and set up key (or password!) rotation. It’s easy to make sure your secrets are isolated from each other and regularly changed.

    If you’re really concerned then make sure you have whole disk encryption (and understand how to recover data from the encrypted disk when the computer it’s attached to fails!). If that doesn’t feel like enough, store your db and any flat files encrypted as well.

    In short, don’t change your working system. Change the way you interact with that system to meet your new needs.


  • What’s your current note taking process? Like do you pull out your phone and type stuff into it or do dictation or what?

    I went the other direction and have a composition book or two a year worth of notes. If I want to give one to someone I just tear out a page. If I want to send one in email or a message I just take a picture of it.

    I keep a little pocket notebook in my pocket and a big composition book in my computer bag.

    What got me to that point, and the reason I asked about your current note taking, is trying to find what you’re talking about and realizing that it’s a pain in the ass, I don’t really use it or want to use it, it’s too ungainly to draw or scribble in, I don’t like it and it’s never at hand when I need it.

    A little pad of paper in my back pocket, a pen and a sharpie in some other pocket and taking a few minutes a day to copy (manually sync lol) what gets jotted down in the moment to the composition book is easier and more manageable for me than a complex system that requires a computer.

    I was just in a major natural disaster last year and while there were lots of things I didn’t prepare for and couldn’t have imagined, paper notes kept me sane and worked phenomenally.


  • They’re reputable. Don’t give anyone any data you aren’t comfortable being leaked. Eventually it all comes out.

    The only complaint people have is that the devices are expensive and phone home which they should. You’re buying a piece of internet facing technology, you should want it to check in and make sure it’s up to date etc.

    Seriously, make sure you turn on automatic updates and change default passwords.




  • Some third party headphones and stuff show up like this.

    Go ahead and shut down the apps you have open, restart the phone and once it finishes restarting, turn on lockdown mode, install any updates asap and then do the privacy check up.

    You want to restart to get before first unlock security back on, then turn on lockdown mode because a lot of device and inter process communication gets disabled and if the problem keeps coming back you’ll know to start looking somewhere else. You want to check for and install updates because updates contain security fixes. The privacy check up will tell you what stuff you’ve given access to various ins and outs of the phone and that may tell you something useful.


  • You’re thinking about this wrong.

    Instead of trying to pick the one that will handle a fail state best, you can more effectively assume a fail state and take steps to mitigate it. That is to say: implement key (in your case, password) rotation.

    Just establish a trusted system, log in and change your passwords periodically.

    You can even do rolling rotation where you only change a few each week.

    If that doesn’t seem like the right choice to you, then consider this: you’re thinking about an unconfirmed or possibly even uninvestigated situation where your secrets have been compromised. The solution isn’t to find the secret handling software that deals with this situation in the best way possible, it’s to change secrets.


  • If you scroll down to where this reply will end up:

    Iphone is the right place to start. The parental controls are well thought out and have enough granularity for almost anyone and “find my” works great along with location sharing.

    They have a bunch of built in privacy, mental health and use monitoring stuff so the person with the phone can use that themselves too.

    It’s the most normal person phone there is so no chance they’ll be embarrassed or feel left out and because the platform is so common (assuming USA because “grades”) you’ll have an easy time coordinating with other parents and sharing how you’re dealing with stuff as they grow.

    Good luck.