Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
@linuxxx you need your own podcast or something, for real. You shed some light on some pretty serious shit. 😅
Dare, I say, you could save lives with this info?..yes - yes I do dare. -
C0D4681387yWhen 3rd party keyboards emerged on IOS they all wanted full access which gives them the ability, ultimately to become key loggers.
So sure enjoy your privacy apps, but these companies could still work out what’s in those messages. -
@C0D4 of course keyboards could become key loggers. They have all your key presses!
-
What would be your alternative to the GBoard? I have yet to find a keyboard that is privacy friendly and usable.
-
@JustKidding I use Fleksy which I entirely block from network access through an android root firewall :)
-
@kvsjxd A short search told me that they're the exact same keyboard. I also couldn't find the AOSP keyboard as single app or zip file.
-
@linuxxx I currently don't have root so that's not an option and won't fix the actual problem. Feature wise I'm totally fine with the GBoard.
-
@JustKidding Tbh I don't use it due to a strong disliking for Google but let me search a little :)
Edit: hackers keyboard doesn't connect to the Internet appearantly! -
h4xx3r17167yI use GBoard because I can't find better alternatives with good swipe and customisability.
-
Is privacy very important to you?
1. Cancel Internet
2. Sell your computer, cellphone and smart tv
3. Sell your house
4. Move to central Africa
5. Look up and wave for NSA -
Only if there's a keyboard that has the same (if not better) gesture input than GBoard, I'll be glad to switch.
-
Can I trust the stock keyboard? We can't even trust smartphones. I block unecessary apps that access the internet using the NoRoot Firewall app. Helpful against apps that fetch ad data constantly.
-
@Noob True, especially since whatsapp isn't open source so you can't really check much (as in what the application actually does)
-
@QueenMorgana As far as I read the. Hackers keyboard doesn't. Except for that everyone I think but some just upload the general libraries I think instead of uploading EVERYTHING you type.
-
magis22817yDigital Forensic Investigator here, WhatsApp may encrypt your messages but it stores enough data to get _everything_
-
@runfrodorun Signal is also free. So is DuckDuckGo. We know that they don't track anything. So you can't really say that android being free == android being spyware. Also, OEM's pay Google for Android.
-
@magis I have questions for you. So many that I don't know where to start. But you do what I want to do. Would you mind helping me figure out how to get started?
-
magis22817y@QueenMorgana hahaha of course I'll answer any questions. The first step is to be certain it's actually a path you want to follow. For example, my main focus is helping with litigation and deciding whether a copyright has been breached programmatically, but I also do a lot of general pc investigation (like an employee left and took data with them). There are a few sub fields as well; code, illicit images, general pc investigation, and a few more, but they're much smaller fields 😊 generally a company will focus on a sub field, rather than a company having all fields
-
@magis I think "illicit" images is the nicer way of saying what I want to focus on. My experience so far has been limited but concentrated on sex crimes and homicides, going through computers and phones to determine whether or not a person was innocent or guilty, and even if any crime actually took place, as we had a few where the only crime was maliciously accusing someone of a felony.
-
magis22817y@QueenMorgana my company frequently does quite a few jobs like that, and personally I've done a few.
It's a very emotional field; probably the most emotionally driven off them all. It really does effect you in a personal way when you're doing it all day and don't get a positive result, but know deep that the person is guilty. I'd say 7/10 of the jobs I do in that area, the person is guilty but I can't prove it. You have to really be ready to deal with taking work home, so to speak -
@magis yes. Very emotional. I've been lucky and have not had too many emotional days.
-
magis22817y@QueenMorgana well it's something that needs to really be taken into consideration, not to mention the actual material you could be exposed to, that stuff sticks with you.
-
@magis without getting too personal on here, I'm now able to turn emotions off when necessary. Which is probably why I'm able to consider the field at all
-
magis22817y@QueenMorgana the same can be said of every person in the field, myself included. But it doesn't change that it will indefinitely hit you at one point, it just has to be something you're ready to live with. But the rewards are phenomenal, the sense of satisfaction, that makes it worth it
-
edensg7787y@JustKidding I'm a fan of AnySoftKeyboard myself. aside from not connecting to the internet at all, it's also open source and available on f-droid.
-
@runfrodorun What about an AOSP rom without google frameworks/apps on it? I mean I get that iOS has a better privacy model but I won't trust it until they release their source code :)
-
Well talking about privacy...
Yesterday when I got home my phone (goggle) was asking if I was in X place...
Location was turned off
Internet also (turns off when screen is off
How did Google know I passed by a strip club? -
@RodrigoF Background WiFi scanning and passive background Internet connection even when disabled :)
-
@RodrigoF you might be helping @Linuxxx prove his point about why security is important lol
-
@RodrigoF Because if you've got stock android with all Google shit, Google basically owns you 😉
-
Bah... I've been using windows for years... Google has a lot of catching to do to get as much as Microsoft
-
elazar10307yYou are using an OS built by Google, so you trust Google. And don't tell me "open source".
You are using a device built by multiple HW manufacturers, that went through a long IT supply chain, so you trust them all.
Denying internet access is not enough, theoretically, since you simply can't avoid having covert channels.
You must trust someone. You should only be aware to this fact and choose them consciously. -
elazar10307y@Condor nobody has time for this. And malicious code is by definition not something you simply find by going through code.
Besides, do you scrutinize your hardware? Compile it from scratch using your own homegrown compiler on a trusted machine? -
elazar10307y@Condor one takes hardware description and produce a working machine. There are several ways of doing this, obviously.
-
elazar10307y@Condor terms such as "logic synthesis" are more commonly used, but "compilation" is just as valid.
You say you are monitoring your system; it's nice to do, but won't catch the more sophisticated malicious software / hardware.
Of course no ome expects you to catch everything, which is my point: you must choose whom to trust, and what is your threat model. If your threat model is Google or NSA, you pretty much lost the battle - if they are after you they will win.
On the other hand, if you simply don't want give Google your personal details, then denying access to internet from your keyboard is enough. -
elazar10307y@Condor if trust equals naivety then you are naive, as is everyone else. You must trust someone and something in order to be able to do anything at all.
The question whom to trust (and to what extent) is an important one, but the answer "nobody" is not an answer at all. -
elazar10307y@Condor I did not say that last part. You're saying that trust is naivety, and I claimed that trust is essential to function.
You are talking as if you are reading the entire source code of everything you are using, but of course you don't; nobody can read this amount of code, and nobody can comprehend even one thousandth of it.
So you want the _ability_ to read it, and until then you trust other people to do so. People unknown to you. Some of them are probably employed by governments. I'm not saying that's naive - this trust makes sense, but it *is* blind trust you put in others.
So, generally distrusting everyone is not naive but the exact opposite: it is impossible. Society is based on trust, and the open source community is yet another society.
This does not mean that your demand from Nvidia to open their source is misjudged or something. It is a legitimate demand to put their code to the scrutiny of a community you trust.
I'm definitely not saying "trust everyone".
Related Rants
-
linuxxx65This guy at my last internship. A windows fanboy to the fucking max! He was saying how he'd never use anythi...
-
linuxxx68So, someone submitted a 'bug' to Mozilla. As some of you may know, in the next year, the new mass surveillanc...
-
linuxxx97It was between me and another guy. I fucking won! I GOT THE FUCKING JOB!! I'll be a junior Linux Support...
When someone explains to me that they really care about their privacy and use WhatsApp or signal or other encrypted messaging services and then you see then typing stuff through the GOOGLE KEYBOARD.
Yeah i think they're not understanding something 😆
undefined
damn
google keyboard
right
linuxxx