Jerry on PieFed

Just a techie guy running feddit.online to allow people to communicate, make friends and acquaintances. Odd coming from a happy introvert, right? (https://jerry.hear-me.blog/about)

I also own these publicly available applications:
Mastodon: https://hear-me.social/
Alternative Mastodon UI: https://phanpy.hear-me.social/
Peertube: https://my-sunshine.video/
Friendica: https://my-place.social/
Matrix: https://element.secure-channel.net/
XMPP/Jabber: https://between-us.online/
Bluesky PDS: https://blue-ocean.social/ (jerry.blue-ocean.social) Mobilizon (Facebook Events Alt): https://my-group.events/
and more…

  • 2 Posts
  • 12 Comments
Joined 1 year ago
cake
Cake day: September 29th, 2024

help-circle

  • You have to trust someone. There’s no way around this. But trusting some app written by some unknown person that has nobody overseeing it is probably the worst place to put your trust.

    So, decide. You either trust some unknown app developer, your ISP, or a VPN provider. You must choose one. Which one do you choose? Choosing none means you are off the Internet.

    I have more trust in Proton VPN, Mullvad VPN, Mozilla VPN, and some other reputable VPN providers than I do in my ISP, some cheap VPN run by unknown people, or some app making crazy claims. I strongly doubt that a reputable VPN provider is doing any tracking of user traffic. But I bet MockTraffic is telling someone all the websites you’re visiting.

    I think if you are worried about your traffic being tracked, you are safest with a reputable VPN provider.


  • I see so much wrong in these claims.

    1. Anyone analyzing your traffic is not just doing so based on DNS queries. They use Deep Packet Inspection (DPI) and they track packets across the Internet to find out what you’re doing. A fake request won’t fool them.
    2. Similarly, they use machine learning and behavioral analysis, which won’t be fooled either by a bunch of DNS queries.
    3. The increased noise could be detected as malicious activity, like a DDOS attack. You can find yourself rate limited, and your network performance can drop substantially.
    4. If the fake requests are real websites, your IP address can become associated with a wider range of interests, leading to more targeted advertising.
    5. Instead of using a simpleton’s approach that won’t work, use real protection. Use a paid-for VPN, or at least a reputable free one (not many) with built-in ad and tracker blocking to bypass your ISP.

    **The App sounds fishy, actually. ** Many apps come out claiming to provide some unique security, and they eventually turn rogue and start stealing information. This one sounds ripe to go rogue, especially since it can’t make it into the standard store. I expect to read about MockTraffic someday being caught stealing information.

    I wouldn’t go near it.








  • This tells me that you’d be in a lot of trouble if you lost your phone or had to wipe it because someone got into it. It’s probably good then that you’re now thinking about this so you can prepare for a time when you won’t have your phone for other reasons.

    All sites supporting 2FA usually allow you to use a second method. Email is usually an alternative. Assuming that your email is your universal second OTP method, you just need to make sure you will always have access to your email account and you’ll be fine. So just solve for the OTP problem for your email account.

    Pre-buy your burner phone and make it a second OTP device for your email account. For more assurance, buy a couple of physical keys (like Yubikey) that can be used with your email account. These can also be set up for some of your other accounts that support it, which may be more convenient than email when accessing them.



  • Yes, it’s worth it. I own mine for just the reason you give. You can take it to any other provider. And there’s no danger of the email provider deciding to close your account or cutting you off unexpectedly. Imagine losing your email access. At least with your own domain, you can switch it that same day to someone else.

    Unsure about whois lookup privacy. My registrar hides my details as an option. Anyone looking up the domain just sees them as the contact for the domain.