←back to thread

1034 points deryilz | 9 comments | | HN request time: 0.001s | source | bottom
Show context
krackers ◴[] No.44544544[source]
>They decided it wasn't a security issue, and honestly, I agree, because it didn't give extensions access to data they didn't already have.

So they admit that MV3 isn't actually any more secure than MV2?

replies(4): >>44544732 #>>44547024 #>>44548392 #>>44548589 #
Neywiny ◴[] No.44544732[source]
I'd be shocked if anyone actually believes them. This article starts with the obvious conflict of interest. Of course letting an extension know what websites you visit and what requests are made is an insecure lifestyle. But I still do it because I trust uBO more than I trust the ad companies and their data harvesters.
replies(6): >>44544764 #>>44544794 #>>44544922 #>>44546339 #>>44547722 #>>44548288 #
1. Barbing ◴[] No.44544794[source]
I wish I could browse the web kinda like this but minus the human:

Make Signal video call to someone in front of a laptop, provide verbal instructions on what to click on, read to my liking, and hang up to be connected with someone else next time.

(EFF’s Cover Your Tracks seems to suggest fresh private tabs w/iCloud Private Relay & AdGuard is ineffective. VMs/Cloud Desktops exist but there are apparently telltale signs when those are used, though not sure how easily linkable back to acting user. Human-in-the-loop proxy via encrypted video calls seems to solve _most_ things, except it’s stupid and would be really annoying even with an enthusiastic pool of volunteers. VM + TOR/I2P should be fine for almost anybody though I guess, just frustrated the simple commercial stuff is ostensibly partially privacy theater.)

replies(2): >>44545177 #>>44547118 #
2. jowea ◴[] No.44545177[source]
https://stallman.org/stallman-computing.html section "How I use the internet" ?
replies(3): >>44545587 #>>44546102 #>>44557072 #
3. ycombinatrix ◴[] No.44545587[source]
Hey Richard Stallman uses Invidious
4. Spooky23 ◴[] No.44546102[source]
It must be exhausting to be Stallman!
5. thaumasiotes ◴[] No.44547118[source]
So... you want to use a shared VPN?
replies(1): >>44549352 #
6. Barbing ◴[] No.44549352[source]
Maybe more I want to have a library computer at my house that somehow doesn’t use my ISP or, to go real paranoid, even click/type the way I always do.

I should already be sharing iCloud Private Relay nodes with thousands upon thousands of people. Yet:

“Your browser fingerprint appears to be unique among the [~240k] tested in the past 45 days.

Currently, we estimate that your browser has a fingerprint that conveys at least [over a dozen] bits of identifying information.”

-Cover Your Tracks results

Apparently VPN is one thing, but then sites will analyze “operating system, graphics card, firmware version, graphics driver version, installed fonts”, and more. Creepy even though I’m quite vanilla.

replies(1): >>44550014 #
7. magicalhippo ◴[] No.44550014{3}[source]
> Maybe more I want to have a library computer at my house that somehow doesn’t use my ISP or, to go real paranoid, even click/type the way I always do.

You could build this yourself with relative ease[1], just add some software in the mix to tweak the typing and cursor movements. Have the "controller" connect via mobile network, Starlink or similar if you really want to separate concerns.

[1]: https://pikvm.org/diy/

replies(1): >>44556984 #
8. Barbing ◴[] No.44556984{4}[source]
Oh very interesting thank you!

Uhg making reasonable-cost investments to protect my privacy before it costs me more in other ways, what a drag. (I know myself here… need to motivate myself to at least try to do better than a cheap VPN and a private tab… will come back to this sometime)

Also did you see the post about North Korean IT workers? Mini KVMs cited in the thread, shown in “The first time I was visited by the FBI” by ‘Level 2 Jeff’ on YT. May severely hamper my efforts to find takers on who’ll put spare laptops behind their residential IPs “but just so I can meme more privately I swear!”

9. Barbing ◴[] No.44557072[source]
Sometimes IceCat + LibreJS over Tor but primarily wget-ish software via email and into Lynx (text-based, 33 y/o browser). Wow. Thanks for sharing, didn't read enough of the page last time I saw it!

Downloading on a remote machine is great for read-only needs!