As I said, DivestOS supports microg. It signature spoofs the latest microg release, enabled with a toggle in the settings.
As I said, DivestOS supports microg. It signature spoofs the latest microg release, enabled with a toggle in the settings.
MicroG actually works on DivestOS. It is “unsupported”, as-in the Dev doesnt want to put any significant time into development for Gapps support.
I would avoid /e/os (and iode) because they are frequently behind on Android security patches. More information here: https://divestos.org/pages/patch_history
Stop paying the CEO so much!
Firefox could by now have:
If you liked LineageOS without gapps, than I highly recommend DivestOS. It is a soft-fork of LineageOS with significant security hardening and removal of proprietary binary blobs.
Avoid installing extensions as they break browser site isolation (bad for security). Extensions have a lot more access than a website does in the browser.
VPNs are illegal in China.
You can disable that. Here are two links that disable that. Add it to Firefox or Chromium through the settings.
Simple, only disables AI answers: https://duckduckgo.com/?kbe=0&q=%s
Long, disables AI answers and ads: https://duckduckgo.com/?kak=-1&kax=-1&kbe=0&k1=-1&q=%s
Steps to create a custom DDG search config:
https://duckduckgo.com/?kae=d
&q=%s
to the end, which acts as a placeholder for the browser to replace with your actual search query. Using my example https://duckduckgo.com/?kae=d&q=%s
I like to judge software based on its actually merit and not on the theoretical possibility it is vulnerable. It very well could be vulnerable, but without auditing it we are just speculating, which in the real world means nothing. Every project starts somewhere, without community, followers, and “5 years of support”. I am not saying I would trust this software in a security critical situation, just that your speculation means nothing.
And? It lowers the attack surface of Immich. Attack surface is about the surface, whatever an attacker can use to get leverage. This acts as an intermediate between Immich and a public viewer, controlling how a threat actor can access a private Immich server. It helps reduce external attack surface while increasing overall system complexity. Since the project is small, it is easy to audit the code.
Magic Earth isnt FOSS though, which was specifically requested by OP
It would be easy. Just install Waydroid and install an android app on the Android system. Look at Waydroid official install guide and maybe watch a video.
It shouldn’t be too taxing on the Pi 4 or 5, Waydroid runs an LXC container with x86_64 LineageOS. It works well, but requires Wayland.
It does not use adblock plus lists directly. The lists are hosted by Cromite. uBlock Origin is not available for any android chromium browser (other than kiwi I guess). The adblocker works well from my tests. I recommend adding filterlists from https://divested.dev/pages/dnsbl
It is not security hardened from what I can tell. Most of Librewolf’s patches could be applied to build Zen with security hardening. Alternatively, patch Zen browser with Arkenfox user.js (upstream project to Librewolf’s security hardened default profile)
Use Cromite. Fully open source, adblocking, and security hardened. See this browser table for conparisons: https://divestos.org/pages/browsers
The only problem with not deleting all cookies with some automatic tool is it will make it easier to fingerprint you. Anything difference with your browser’s behaviour is fingerprintable.
Also, check your this section from the Arkenfox wiki (made by experts on browser fingerprinting):