

MicroG actually works on DivestOS. It is “unsupported”, as-in the Dev doesnt want to put any significant time into development for Gapps support.


MicroG actually works on DivestOS. It is “unsupported”, as-in the Dev doesnt want to put any significant time into development for Gapps support.


I would avoid /e/os (and iode) because they are frequently behind on Android security patches. More information here: https://divestos.org/pages/patch_history


If you liked LineageOS without gapps, than I highly recommend DivestOS. It is a soft-fork of LineageOS with significant security hardening and removal of proprietary binary blobs.
AMD is easier to use with Linux. Get a rx6700xt or greater.
I didn’t watch the video, it may be a good one idk.
I want to spread the word, exurb1a is a sexual abuser. Through on unethical/illegal psychological “experiment”, Alex (exurb1a) manipulated an autistic woman named Pieke and SA her. The details of the experiments is awful. He has tried hard to silence the Pieke, other victims, and their supporters.
Here is some info:
https://reddit.com/r/photurb1acontroversia/
www.photoandgrime.com/blog-1/2020/11/25/pieke-roelofs/youtuber-exurb1a-exposed-sickening-truth-about-an-abuser
https://youtube.com/watch?v=CqIujvFf1rs
Firefox resistant fingerprinting does the first 2 things, the last one is mobile partial letterboxing. All are anti fingerprinting techniques, but i understand how they may be restrictive. Maybe just add dark reader to have dark mode forced on websites, which technically can be fingerprinted but has a large userbase so idk.
Nope, you should set up site exception. Site exceptions are much better than just leaving cookies persistent. Cookies both function as a method to track and an easy way for a hacker to steal session tokens.
Because Mull is hardened Firefox without telemetry. Brave is Chromium based and the company is shady.
Cookies are partitioned in Firefox strict mode IIRC.
Just setup links to open in private browsing mode, and clear cookies on browser exit.
Mull works the same as Fennec, except it is hardended with patches from Tor and Arkenfox user.js. No real reason IMO to use fennec over Mull, whose developers also contribute to Fennec. Ghostery also changes your fingerprint, acting as one more data point. Mull has a whole bunch of configured flags to reduce fingerprinting, and many more to help with security (like disabling JIT).
Check here for some comparisons:


Very cool. I was literally think about such a project yesterday lol.


Memory stores more data than just when you used tor, like websites visited (like resources downloaded on page load through GETs). Your ISP should only be able to tell what the first node you are using is, and if you use an unlisted bridge it should be much harder to even try to correlate, which if your smart should be near impossible anyways.
Magic Earth is proprietary FYI. Good privacy policy and good service, only real problem I have is its not FOSS.
Iirc Manifest v3 effect extensions. Chromium mobile doesnt support extensions in the first place (except kiwi which isnt great for privacy). Cromite uses imported blocklists in the settings and therefore should be alright.
Add cromite (the main bromite fork) which is on Windows and Android, and Mull by DivestOS (like arkenfox for Android). If you want to make a mobile section I would recommend Mull, Cromite, Fenix (fdroid). The thing with privacy browsers is they differ from security centric browsers. Vandium and Mulch are chromium security browsers for Graphene and Divest respectively, Cromite is a privacy chromium browser with good security as well. Ungoogled is designed as a drop in replacement for vanilla Chromium, and has custom flags for hardenning that must be enabled manually.


Maybe Cromite (the main bromite fork) would be better. Vivaldi isn’t great, but it also isn’t brave. It allows for blocklist importing and user scripts, and is on desktop Windows as well.


Desktop linux isn’t the same as Android, which is why I said the “Android security model”. Android is a mobile operating system and must protect against the fact that it will be in unknown environments all the time. It must protect against physical attacks, software attacks, and partially sandbox apps. Root breaks app sandboxing and allows for modifying system files and reading internal app storage. The system image is immutable and modifications/settings are made on top.
Linux desktop isn’t more secure out of the box. The general user account shouldnt be a sudoer. Immutable OSes are more secure and help pervent rootkits and other attacks. PCs are most often stationary and stored in a private location. Laptops are weak against attacks because you can boot to a different OS from usb without passworded BIOS. Desktop OSes are the geared for the same kinds of protections.
There is good reason why Android is far more secure than Linux mobile.
As I said, DivestOS supports microg. It signature spoofs the latest microg release, enabled with a toggle in the settings.