I don’t use Arch , btw

  • 1 Post
  • 20 Comments
Joined 1 year ago
cake
Cake day: July 28th, 2024

help-circle











  • Thank you, I didn’t mean I’ll rush and install all of the mentioned things in the post, but it motivates me to learn

    actually I have two problems: 1- I don’t know where to start 2- I’m too lazdy to search for resources so I start

    And please don’t mention that VS code piece of shit in front of me even as an example, I can only use Windows as OS , one product by Microsoft is enough to tortue me


  • A chromium user here , though so far I couldn’t find the “perfect” Android browser, I always end up using a chromium fork …

    I’ll give it a try, from provided description by OP , I won’t end up cursing Geco like every time I use a Firefox fork , hope that’s the case

    Edit: I tried it:

    • didn’t find any bugs so far, even though it’s in alpha stage
    • what I didn’t like about it is that its design sometimes remind me of very old Android browser, but that’s not something I’ll ditch the browser for
    • a good thing about it is that I found no connections to google server when I checked DNS logs of it , I don’t know about all connections but most of it is to mozilla extensions server and to provided search engine , which is okay to me






  • It depends on how you use your phone and what the physical attacker aims

    • if you use a custom ROM with decrypted /data partition by default and no way to encrypt it, the attacker can get access to all of your data from recovery even if you’ve set a lock (like password/PIN/pattern) in the ROM, but if your custom ROM is encrypted and protected with a lock, the attacker must know your password to decrypt /data partition in recovery
    • if the attacker aims to replace a part of your phone with a sus one (like a boot partition for example), he must be a developer who knows how to build things designed for your exact phone model, otherwise your phone will get bricked
    • if your phone is rooted and you give root permission to sus modules and apps, it’s possible to install malware and do shady things in it without physical access

    My recommendations:

    • only use trusted ROMs
    • only use an encrypted ROM ( official LineageOS is encrypted if I’m not wrong) , encrypted ROMs are slightly slower than unencrypted ones, but safer
    • set a lock to the ROM
    • avoid giving ROOT access to untrusted modules and apps
    • (if you’re paranoid) clean flash every time you update or switch ROMs, as this will replace any sus partition flashed by an attacker
    • (if you’re using decrypted ROM and custom recovery) set a password to the recovery, BUT if it’s orangefox make sure to remove the password before updating the recovery, otherwise you’ll get troubles