You’ll have to desolder the WiFi card inside. Check teardowns of TVs from now when deciding to buy a new one
You’ll have to desolder the WiFi card inside. Check teardowns of TVs from now when deciding to buy a new one
It’s a bit difficult, you’ll need be good with your solder.
I guess it doesn’t bother me much because when I’m using dongles I’m usually sitting down (work, home, in the train etc). YMMV
I can’t prevent capitalism. I’ll just do the best I can. Luckily, good dongles aren’t very expensive and I stay with the more budget IEMs. You might be different; I have seen plenty of Lotoo PAW Golds at CanJams, for example
The only headphone jacks worthy of good IEMs are Sony, old LGs and maybe DAPs. That Moondrop device might be an exception but I’d skip a dedicated device and instead buy something I can root and then attach my dongle to, to get around that pesky Android resampling.
What part of my suggestion would “get you shafted”?
Any cheap device with a bootloader that can be unlocked with a good dongle (check out the new SMSL dongle, looks cool)
You’re actually buying that Moondrop device? Let me know how it goes, seemed like a cool concept but I can’t trust them enough to get a mobile device done right
Use adb and see if you can flush those apps
Thank you
Adb time
To be safe: paper wallets.
The rest: YMMV
That’s exactly what I do
That is indeed a disadvantage of PGP. Unfortunately, it is the most portable method of encryption text at rest at the moment. The moment somebody manages to figure out a way to use the Diffie-Hellman algorithm in a portable manner, I’m sure a lot of people will consider that a viable alternative. Till then, learn about disk encryption to keep your keys safe
I2p states on there website that it has potentially serious weaknesses.
The only relevant pages I found are I2P’s threat model and the comparison between I2P and TOR:
Please cite your sources so everyone can understand the reasoning for your claims of I2P being weaker than TOR.
Oh, and A LOT of the attacks mentioned in the page on threat models is/was possible on TOR. The I2P project follows TOR carefully and implements some of their features/mitigations too.
If we’re talking specifically about brute-force DDOS, BOTH TOR and I2P faced these issues. The good thing about I2P is that it is more decentralized than TOR which can sometimes make it easier to mitigate.
Your points about I2P’s directory (not sure what you mean by DNS here) can be lumped together with your complaints about usability. This DOES NOT make TOR inherently more private, secure and anonymous than I2P, it just means that somebody on Windows can download the TBB and start browsing (in albeit a not-very-secure way). Unless you missed the news, I2P now has a slick Windows installer so people don’t have to fiddle too much with it.
You’re going to have to give me evidence for me to believe that using I2P makes a substantial dent in your available bandwidth. Yes you’re a router in the network but it doesn’t mean that you’re passing through traffic at GB/s speeds.
i2p is somehow a replacement for Tor
I never said that. Again, I’m not comparing I2P and TOR based on their usability (which has changed in the recent years), I’m comparing them in terms of anonymity on the wider internet when browsing using either protocol. Both TOR and I2P are great projects, the problem is that TOR is significantly more centralized.
However, if you are in a critical situation use Tor not i2p as today it is the best for bypassing censorship while still trying to stay safe.
Cite your sources for this. This is mere conjecture unless you have proof of metadata leakage on I2P but not on TOR/actual people getting caught using I2P but being safe on TOR. I’m sure the I2P Devs would be very interested too. If you’re in restrictive regimes like Iran and China where TOR/I2P traffic is flagged - use a bridge or a VPN disguised as HTTPS traffic and hope for the best (it’s a perpetual cat and mouse game).
Again, please cite your sources when making claims about technical shortcomings of I2P
Shared key??? PGP works on a public-private key-pair, and unless you’re giving out your private key, it’s not shared with anyone. This is blatant misinformation
And using these apps is not always an option. I like simplex, but sometimes email is one of the only options. PGP can be used agnostic of the technology used for transmission, and that’s exactly what we need to keep more people private instead of forcing them into a few select applications. If Diffie-Helman can’t be used in a transport-agnostic fashion then I do not see much progress in this direction.
OpenVPN -> I2P.
I2P has been around for 20 years, it is plenty battle-tested. I do not see why you’re wanting to put down I2P in favor of TOR, I still do not see how I2P is in anyway inferior in its privacy (and for the most part, anonymity) features compared to TOR. The OpenVPN addition solves your need for something akin to snowflake/TOR bridges. It is not what I2P was meant for but there’s a way if you want to use it.
If your complaint is about I2P needing some configuration and time to use properly; that’s a trade-off the end-user needs to decide. This doesn’t have any effect on its features regarding anonymity in the I2P network. Please give me technical reasons why you think TOR can preserve your anonymity better on the TOR network than I2P can do so on its network (I have arguments in favor of I2P that I would like TOR to implement but I don’t think they can)
This is a good read. I think it’s a good solution if it can be implemented properly. Are there applications you know of that allow you to personally (manually) encrypt text and communicate with another person like GPG does?
Why the downvotes?