Skip Navigation

Posts
4
Comments
11
Joined
2 yr. ago

  • Yes, just create an empty room with only you inside

  • I Made This @lemmy.zip

    Tenacity edit of the hardcore track: DRS & Korsakoff - We'll Never Die

  • Couldn't you use HMAC with shared secret key to authenticate messages while keeping plausible deniability? Since the key is only supposed to be known to the 2 parties, the recipient can deduce that a message was actually sent by the sender if he did not create it himself. I think that's what OTR was using.

  • Gocryptfs or CryFS. Many GUI available (Vaults, SiriKali, Plasma Vaults). Android compatibility with DroidFS.

  • DroidFS does not have Internet permission so any data exfiltration is prevented at the OS level.

  • F-Droid is like package maintainers for Linux distributions. You have to trust them if you want to use their pre-built binary. However, some app builds are reproducible. Check the doc for more info.

  • Of course, but v1.x only supported gocryptfs. Also, new encrypted file systems may be added in the future.

  • Security @programming.dev

    DroidFS v2.2.0

    Open Source @lemmy.ml

    DroidFS v2.2.0

  • DroidFS can open existing volumes. Just click on the "+" button in the bottom right corner, then on the folder icon, and then select the volume directory.

  • To type with only one finger, there's 8Vim.

  •  
        
    :help i_CTRL-H
    
      
     
        
     or CTRL-H  Delete the character before the cursor (see i_backspacing                                                       about joining lines).
    
      
  • Privacy @lemmy.ml

    Arkensys: Privacy and Security consulting services