abrahambelch
Fühle mich nach jedem Auslandsaufenthalt so, als wäre ich 20 Jahre in die Zukunft gereist lol
Here in Europe there are a lot of country-specific instances (e.g. feddit.de or feddit.nl). I can confirm the German one has quite a lot of members and some large German subreddits moved to Lemmy when the blackout happened. Germans are quite privacy focused in general with a generally higher Firefox market share and a lot of shops only accepting cash (not proud of the latter haha)
First of all:
You can always copy storage if you're able to physically access it. The only way to prevent this is to secure the chip in a way it destroys itself if physically tampered with (like some TPM chips).
You should instead opt for a passphrase that is practically impossible to bruteforce on current hardware due to its complexity. Also, try not to disclose the encryption algorithm or software used as this information opens the possibility of exploiting known vulnerabilities.
VeraCrypt for example is able to completely hide its presence on a volume and the only way to know if a device is encrypted with it is trying to decrypt it using VeraCrypt with the correct passphrase.
Trying to answer your questions:
-
Most modern smartphones encrypt their data by default nowadays. The rest depends on the phone itself. Mostly they just delete the encryption keys from the TPM when formatted so this still enables an authority to copy your storage and bruteforce.
-
No. Encryption does never prevent you from copying the encrypted information. Those are two completely different things.
-
No. You cannot encrypt the SD card with say Bitlocker and use it on a phone afaik.
-
Yes, some Androids allow you to encrypt the SD card from within the storage settings.
Sometimes you have to learn the hard way...
Even if degoogled, Chromium still does a poor job at protecting your privacy.
Thanks for sharing, actually this very project inspired me to do it myself. It is an incredible resource when it comes to certain aspects of the database format!
Imho it has some deeper architectural issues though which I wanted to avoid in my implementation. I'm also using an entirely different tech stack I wanted to train myself in.
My implementation is not as feature complete as osxphotos but I'm sure I will be able to contribute back to the project with the occasional bug fix.
I reverse engineered the Apple Photos library file on my Mac as a side project and can confirm that hidden assets are not actually encrypted or otherwise protected. The respective assets are just not shown in the apps and can be accessed via Finder on macOS.
I didn't know they were visible when you connect your phone to your PC but I guess it makes sense.
Maybe it's the wrong person if they can't be with someone who doesn't use Instagram ;)
Don't make the same mistake as our generation and fall for TikTok, Instagram and that shit.
Almost everything is better without it, from concerts to weekend trips to relationships.
Hetzner covers all of the above except the Monero payment option. Would a prepaid Mastercard do the job for you? I think you can buy them in cash without identification.