can’t go online if your webcam is off
I think spoofing a webcam should be pretty easy.
can’t go online if your webcam is off
I think spoofing a webcam should be pretty easy.
I wonder if Tor and I2P's other hops could eventually be obfuscated like bridges are now, so that a network could entirely exist within plain sight without being as blatant.
Thus this feature is a "nice-to-have" that should not be relied on.
No. That's why I wouldn't trust protections that depend on something serverside, like encryption in the web client.
...Yes, I just said that.
The comments below say "local transit app", but I don't get it - those could be proprietary and pretty invasive. So instead, I use the "undesired" maps in the browser. Both for when public transit arrives and for more up-to-date information on businesses.
Doesn't seem to work on my phone, even thouvgh I have given it the permissions it asked...
First - I'm not sure Sealed Sender would help against the server being changed to be actively malicious and trying to build social graphs. Second - even metadata concerns aside, a centralized system is just not resilient. Proposals like Chat Control are A LOT more easily enforceable with them than with tiny selfhosted servers.
I checked that (together with the clearnet link) a few times recently, got a nondescript error like "sorry something went wrong" every time.
TBH I feel like so many project leaders are wackos that I don't even judge the products by those, just by things they do. I still have hope in Simplex, but there were a couple of red flags, such as content scanning proposals, including clientside. Sure, it can probably be relatively easily forked to remove that specific thing, or you can choose the servers that don't do that, but it's still alarming that they try.
I feel like people like you and me end up helping people who actually need anonymity - by creating a larger crowd :)