Rep: (515)
yhnyhn11 @ 24.11.19, 20:59*
or you have to do it at the same time around the world and further "fertilize" propaganda.
Very close.
Though more and it will be made one attempt to ban all through, but the key countries are close to a consensus to make it a license (as a dangerous method).
Get respectable license (one of those who include encryption license in your product).
The rest will nezhelatnlnymi.
Become accomplices with direct or indirect intent.
They are excluded from the pre-installed software, they will have the status of a special restriction in stores.
Favorite people antivirus will alarm ...
For business it will be enough that would refuse or accept the new conditions.
For the same niche, and frikovyh products it will be insignificant, but they are not interested at this stage of the guardians.

,



Rep: (515)
* unknownanonymous, Yes, I understand you, understand ...
And what better than a closed iron os iron?
In addition to the price factor.
But if the price is the key factor, then this question is simply rhetorical.



Rep: (515)
I understand you.
Os iron is the safest iron.
No options.
For it os.



Rep: (515)
* unknownanonymous, Well Tipo, or still do not?
How do you define it? What are the criteria?
If the probe is open hardvarnogo registered, and right justified, then it ceases to be such?
Did you know that there is no prohibition for the manufacturer to embed anything in their iron, and arguing (legalizing) this functionality as you like.
Poi This iron will be your favorite os.



Rep: (515)
unknownanonymous @ 13.11.19, 12:38*
the main drawback is that modules are not opensorsnye,
and how to manifest this deficiency?
From any threat protect or exclude it, os modules?



Rep: (515)
how then to be? Humbly accept the terms? Or raise offspring absolutely clean in a different country, so that they will not flowed valuable data?
rastavte right priorities.
What is needed is that far-fetched than willing to sacrifice that would take a great benefit / convenience.
And the problem will go ..
A pure offspring grow anymore. It will inevitably be chipped.
But remains a possibility and Downshifting target, staying in the few countries where this is still achievable.
-----
waldr.asgun @ 08.11.19, 14:32*
Express clearly your to-noise ratio (big data).
in that post the referenced bd of any relationship is not expressed.
But I shall make it in this :)
More bd, good and different.
Diverse, large and small, with and without AI.
Governmental, commercial, academic.
But at the same time, that would be possible as long as they are not globalized.
Were scattered and separated legally and geographically.
Bd for the future.
They are cost-effective.
High margin.
Minimize costs, increase profits. Promote the development of companies.
Open up new lines of business.
They are beneficial to the state organization
Structures and optimizes costs.
Increase accuracy and extends the planning horizon.
Increases manageability and predictability of behavior of citizens.
Organizes and catalogs all that relates to the material world.
It reduces the number of management errors, and so on and so on and so on ..
Today still remain a means to counter this systematization and evaluation.
But it is a constant, systematic work (care). With regularly updated algorithm of actions.
Otherwise it is a profanation
And yet, still strictly based on the requirements (model risks).
Not far-fetched demands.
Otherwise, this game is the elusive Mr. Joe came to nothing. Just throw, because it is energy consuming and a little convenient.
As a whole, and the whole anonymous security.
waldr.asgun @ 08.11.19, 14:32*
concealing evidence via the noise (there was one, and displayed in another area).

This is achievable. But your promise did not seem to understand.
Using bd, to prove in court yet in its infancy.
Not fulfilled the law enforcement practice, procedural limitations on the admissibility is not removed in many cases (and for all the parties in the court).
But for the prompt action (including non-process) it is used in full.
Just as much as it allows the competence of employees.
And this is a threat (if it includes a model)
That is a threat to the state of your host country and its partner countries (which would make sense to put it is not).
And the threat from states which presents your interests, which may not be your partners, states, and on the other hand be antagonists ..
Bd collected States antagonizing your opinion, and where there is your interest, should be neglected.
Since the real harm is not possible (for the average citizen).
The same division applies to bd, collected by businesses and academics (not commercial).

waldr.asgun @ 08.11.19, 14:32*
Where you see the noise limits within which he bears no deliberate action against your purposeful intentions in a hypothetical (if average !?) person?
If I'm online, interactive, has no boundaries.
The impact is felt at all times.
Just is not all the information we have by virtue of their competence take for itself.
But without the participation of bd, the flow of information no longer exists.
At the same time, in this context, the impact of business bd think only positive.
And the fact that it is obtained from the company's profits by building me into myself, so this is a service fee. Well, or a side effect (depending on the threat model).
waldr.asgun @ 08.11.19, 14:32*
Noise in fact does just that, allowing you to create a circumstance for an individual object in the form of:
the object most open to investigation, and the subject is able to most study).

I agree.
Exactly what you allow.
And it does not matter how you qualify (and search is on all occasions).
And like struggling with business bd (stupidly closing them), the user still gets to him, but under other marks, with the worst, and more makes it stand out from the masses like.
A key to success in this struggle lies elsewhere.
The mimicry. The conformism.
It acts shovels principle. - the main thing is not to stand out.
At the same time juggling with the information that feeds bd ...
Those elements that I use myself (by my model):
Separation, always, in all things.
Soup for the job, confidant device, entertainment, family.
Yes, they still can be connected, but it will fit only for operational work, and evidence of this is not to build. And it's an important difference.
Antidetekt system (there are monolingual ready sets in the network), they have to be customized for your needs
System to restrict access to data confidant.
Constant additional traffic zashumlivanie both automated and manual.
Relate your browser and is brauznerny merge print.
They should korregirovat together.
And of course, all the other measures taken within the framework of my model which indirectly help to solve the problem with bd.

True result of this struggle can be considered as passing all tests for screening resources to results opposite of uniqueness and secrecy. There should be still and your axis and the device, and ip and lack tor, but it is not yours.
And you have to go through all (most) antifraud protection including bank in the net.
But at the same time and not be completely so anyone filing.
waldr.asgun @ 08.11.19, 14:32*
What is the cost of failure?

It is impossible to answer, not enough input data.
What mistake is corrected as a threat to the model.
Correctable it?



Rep: (515)
Drakonknayt @ 07.11.19, 21:43*
When a similar threat model (close you do not know, SIM cards do not use, anywhere where you need to show a passport, and the spirit of your present, in investigations and TP was not, fingerprints and sechatki not present in the database), but with the fact that the organization knows what you able to (let's say you are under the category of "possibly dangerous" of the 4 categories: (1) The dangerous
a model of the user who you mean, was originally formulation of a right. There was a significant and clearly appreciable threat.
That's why I became its detail, that would pick up the scheme, but further it all slid to the standard false paranoia of the total.
But at least he was able to formulate the beginning.
In your post, I unfortunately did not find the threat.
But it's just I'm stupid, because try to flesh out, and I'll be able to possibly understand ...
If possible, remove the hazard category that you enter (special services, they are not known), and set out whether this kind of spice known your real activity and your level of knowledge of it?
Narrow for what purposes need a smartphone (online / offline operation).
Are there any other Soup you ..
Of the measures that you list
the phone should not be a base mtk and speadtrum ....
really effective and useful not.
This is a set of myths and simply erroneous methods.
Yes, their performance can help in some point in time in a certain situation.
But it's for good luck.
It is fragmentary, and creates a false illusion of security.
I repeat my promise here the dubbed regularly:
No formulated perceived threat (decomposition into components), which really brings you the material, reputational or other damage, then you anything and are not threatened.
And then quite adhere to standard hygiene measures of digital ...
------
About biometrics:
First World countries have visa protection and biometrics which included mandatory.
Your refusal to biometrics, is tantamount to a denial of entry.
No options.
Do not give fingerprints can only be for medical reasons (no hands). Burns, plaster, transplatatsiya can ride on those rare occasions when you eat for emergency treatment, or you are invited to a solid organization that you know.
Biometrics is updated every 5 years
But may each serve.
Total burning brush (not just fingers), abrasive removal of the epidermis does not help.
In fact still remains and biometric photo (which is needed if quality prosthetics) with the informal to the personal profile and snag your video, and voice recorded at the point of delivery of biometrics).
Even the burns on the hands or smooth skin (and it will not be a perfectly smooth) after the abrasive well suited for identification, as also these tracks are unique.
You simply select themselves with a party even more.
Become an oak tree in the birch forest ...
All Schengen visa (your data) is stored in a single database - vis.
Available and synchronized to state bodies of the EU.
And as for the countries of the partners associated sootvetstvuyushaya agreements, such as the USA, England.
INTERPOL (on request).
The Chinese have their own local base, as in most other countries.
But the data are issued to friendly countries (but not automatically).
That is, you must first fly somewhere, cause a reasonable suspicion that you have become punching demands on bilateral channels, in compliance with the procedure ..
retinal scan is not yet ubiquitous.
Bypass is possible, but expensive, and without warranties.
In this case, because you want to sync, and from the rest of biometrics that would converge under a fictitious personality you.
And if
(You are pure man, no criminal history, supervision and etc.
all these manipulations are meaningless.
And if all the same and implemented, it is already at the level of the clinical manifestations of a true paranoia.
Because it makes sense to hide a spoiled person.
A vezzhaet with pure bio bekgraund in, but with the invented as clean pathology.
Beat it will still not on the passport, and in the face.
In other words, a little comfort if you will be put under the name Erickson instead zhidkodrisch.
-----
In all the countries you listed apply biometrics. And it is in a single database.
And also organized and other information exchange interaction of foreign nationals.
As well as joint operations carried out by predotvrasheniyu illegal movement across the common borders.
This including spot checks on additional identification and validation checkpoints visiting claimed route.
And control sots.setey and other of your online activity.
----
Drakonknayt @ 07.11.19, 21:43*
how valuable this information, and how much they should cherish (man - clean, but paranoid with any possible future

They are valuable.
Treasure necessary.
For it can not be changed, unlike a password.
And if the data will flow away (and they flow away, or they want to use some spets.sluzhb poimevshaya their legal), then you will have a double (both digital and very real), with all the consequences.
Just your prints can be used for tampering with evidence, the substitution of a video or photo. Including the purpose of your compromise a.
Remember as in supplements and your signature sample to give.
And about your true biography of the already-reported. Or false, but which then no longer be changed in the desired direction.
These data are sufficient to carry out that most of the operations / actions on your behalf.
And if these risks are minimal today.
Really minimal.
For the near future is no such certainty.
But these data will remain somewhere at least until the end of your life.
But more dangerous for unauthorized access, consider biometric passports (chip).
They hacked. Including the distance (albeit small).
Only to my country made the right biometric passport, it is the United States.
In contrast to the other they did not save on safety.
The cover vshili metal as a protection against reading and on the chip have no information other than a reference to a single server, with its profile.
But this link can go only certified and authorized employee with the same device.



Rep: (515)
* A500,
I understand you
Water pouring stop.



Rep: (515)
* A500,
Let's particularize.
Detractors know who you are, what you do presumably, the level of your training in it (as a user, or professional). Whether it is high (in their view)?
They proceed from the fact that they need evidence there is on a device.
Or is it as follows from written by you, these are secondary?
And one of the key factors - your assessment of what will be (should be expected) level of those. training and access to forensic resources of your country of residence.
Conventionally, the lower / middle / higher link.
It is not necessary in this case to overestimate their own importance, that would be later when building protection algorithm, not to produce excessive nature.
A500 @ 07/11/19, 13:16*
my method is better than the stock phone out of the box

It fragments poorly connected, do not lead to the exclusion of the threat sounded
Only under certain (narrow conditions)which can give effect.
A500 @ 07/11/19, 13:16 *
Explain please.
independently (on the script malware) or remotely without your participation or without your kind, express your actions can not be activated fingerprinting, to catch the moment when you do not specifically apply finger to perform a cast (which is not a single file, and it is not jpeg) and send it someone. Specifically your detractors from of government bodies.
After all, we're still about your specific model of threat.
But even if this were to happen, then why do they need your imprint? If you are here it is, in front of them near the device. And there are fingerprints on it once, and you as the holder
A500 @ 07/11/19, 13:16*
That you are all mixed up in a heap.

I specifically listed only what you have designated.
By including them in your model.
And that I'll try to explain that while your model is still blurred and everything.



Rep: (515)
A500 @ 11/07/19, 11:48*
more than 5 seconds
if your calculation is as follows. And it is based.
That time is enough, but what about the
A500 @ 11/07/19, 11:48*
I do not rule out

After all, if your method fail.
At best, inadequate.
And you did not answer one goal, you or data. This is a significant factor.
A500 @ 11/07/19, 11:48*
Removable battery needed for safe shutdown.
as it is correlated with the designated threatened you?
You also have the data there only needs to be destroyed.
Well, as we know, you do not have the same sensors and gsm.
Nothing to write.
A500 @ 11/07/19, 11:48*
To soothe the internal paranoid need to be physically damage the scanner.
you surely represents the capabilities of the scanner?
Explain how it can bring you harm if it is not your fingerprint or other biometrics, and it is programmatically disabled, and the identification of the same is not activated?
A500 @ 11/07/19, 11:48*
Removing cameras and microphones need to program that can somehow get access to them have not been able to write me.
And just so you can safely talk in the presence of the phone.

A500 @ 11/07/19, 11:48*
Sensors. The information from the sensors can access any site.
Since we can understand what the buttons are pressed using the gyroscope or accelerometer.

A500 @ 11/07/19, 11:48*
Turn off cell module need to phone shone on cell ....

And all this to the pile.
And again in the standard model is empty - from everything and just ...
Or reformulate the purpose of recognizing the way to transfer data on a flash drive and eating only a subsidiary



Rep: (515)
A500 @ 11/06/19, 23:16*
threat model.
the possibility of detaining a phone search.

In this model should be divided - the data from your devaysa a key target or secondary / secondary for those who will linger.
And you yourself, random object, or being in the development of the target ...
-------
A500 @ 11/06/19, 23:16*
necessarily removable battery
why is it in your model? What gives?
A500 @ 11/06/19, 23:16*
physically disconnect the finger scanner
and software not enough for you, if it was not originally create the impression?
A500 @ 11/06/19, 23:16*
removal of all cameras and microphones
Again, why?
A500 @ 11/06/19, 23:16*
Physical disabling all the sensors, in addition to lighting and proximity
And again, why?
A500 @ 11/06/19, 23:16*
nat. off cell module or bring it inoperable by damaging the antenna
what for?
Let's put aside until the feasibility of your proposed methods in the articulated model.
And will understand that he would remain on the functionality of your devices?
Gsm communication you do not, there is no internet on opsosa only wifi, or other possibilities of a connection binds you to any particular place.
Just remain only an external microphone, which means + additional element to your kit.
So its main purpose is not to permanently stable connection and work offline with what data it?
And if it suits you, then go ahead.
A500 @ 11/06/19, 23:16*
It is necessary in case the door will knock: broken stick and swallowed.
how long will knock in relation to the time required for the specified stick unichtozhegiya
Your way?
Do you exclude an attempt to rip device in any other place where there is a door separating you from ill-wishers?
Does the (will carry out) the proposed algorithm you (as a single action protocol) your contacts, if any?
Do aki exclude that the rest of your device, or your loved ones, there is no nebylo even fragmentary information about the data you have to save?



Rep: (515)
okomand @ 03.11.19, 15:47*
Superstructure or is it own version of WebView?
Well, stauntner sees this as an option for your web browser.
But looks like superstructure.
Using a base that is mounted in the device.
Although it is already like and do not.
He plans and their methods / calls to add.
And the latest news is already looking like a fork full.
------
okomand @ 03.11.19, 15:47*
modern kriptoprotokoly threatened

Yes.
As a couple of years ago, I wrote here about the impending quantum threat.
And on certain grounds the two countries are already close to the practical application.
Not to the calculation of a narrow one-way mathematical problem.
And for example to the sorting values.
And today it is feasible as the formulated algorithm to perform.
----
Great quantum confrontation we still stun you.



Rep: (515)
tweed_man @ 02.11.19, 19:10*
outside competition
It will be the fourth edition when fasten your privacy webwiew, as he calls it.
add-on filter base ..
Let's wait a bit.
----
Happiness is palpable, and embodied in the right size.
https://m.phys.org/new...er-current-setups.html



Rep: (515)
Heknows @ 30.10.19, 18:28*
This screencap and screenrecord or more some?
only these.
If you find in the bin directory, which is still associated with the removal of the screen, it will be a foreign agent
The Chinese example podpihivayut his three lovely unit, usually called them to tls (and then the letters are different).
Heknows @ 30.10.19, 18:28*
What third-party skrinshotery / recorders can advise?
recorderhttps://gitlab.com/vijai/screenrecorder
Skrinshoter - screencap (. The inclusion of a script with delayed timing Again, Off)
* Lemus
So alternative sites uncensored sufficient quantity.
But they did not become trendy for the majority.
For sterilization with content are sterilized and its consumers.
Mass PEOPLE easily accepts prohibitions properly filed,
By varying feed.
And self-censorship is already significant.
And he begins to prevail, even in the young ..
Yes, part of the (small) remains at his (her head) and uses the alternative.
But it is still a small part, retains the ability to critically analyze, and opposes the introduced klipovoy thinking.
---
The Internet as we know - anarchic, chaotic, diverse, effectively ceased to exist.
Now, this is a business and public policy.
His adopted and built into the system itself.



Rep: (515)
* Drakonknayt
Exclusive no.
But in terms of freedoms, I note that it is only good for its citizens. All non-citizens are not protected above evrosyuzovmkogo level. And give out physically, and attract and give access to the server. And will cooperate. Including and ugolovnyi crimes (not it).
But you nsdi legal person is actually how the rights of the citizen will apply the law ...
--
TheGatekeeper @ 24.10.19, 23:02*
Systemui.I thumbnails makes the creation of these "screenshots" it is impossible to fix the program,
and record possible and can disable, and for security reasons from the access to them is possible.
It features the work of providing snapshots recent applications.
As soon as you switch to another application, once you take a picture of the current state (at the time of focus). What would you, including can go when you return to the AIC exactly to that on what stopped there.
And these pictures are stored / updated on the path / data / system_ce / 0 / snapshots /.
A configuring their component parts in neighboring folders recent_images and recent_tasks.
These snapshots notable hole. And not even in terms of remote access to, or drain them.
But also in direct unauthorized access (as it would seem, and you come out of the messengers, and passwords are not stored on a device, and in quite a snapshot is if switched at the time of entry, etc.)
A considerable number of banking applications is not protected against the removal of the screen, instant messengers, browsers.
Telegram is protected in the way sek.chatah. and from snapshots and screenshots from sistemuishnogo.
and if you are there still saw a notice of the screenshot, it is quite a bad sign ...
Ways to deal with them fairly. But it is for each APK individually.
Offer the most simple, allow you to store and functionality of recent applications during the session.
And prevent access to the snapshot files.
Folder delete snapshots and create a dummy file undelete the same name. A recent_tasks purify and disqualified.
As a result, all the snapshots (for any challenge, and their window manager almost every sneeze) are only in memory.
But at restart and naturally samounichtozhatsya.
---
Along the way, I recommend to turn off and the possibility of taking screenshots and video base means
The service is disabled in systemui takescreenrecordservice takescreenshotservice.
You can and associated receivers in the same place.
A cut-off for other encroachments remove from system / bin / corresponding binaries.
This does not prevent you from using third-party skrinshotery / Recorders using their tools.



Rep: (515)
okomand @ 26.10.19, 14:56*
What is meant by this?

Paranoid clearly formed without the threat model.
Clear them.
And carrying them a real tangible harm
Which can be estimated in the public values ​​/ criteria
If not, then it is false paranoid, in which one "model" - from all / just in case. As an option - from the Google / NSA / FSB.
For them, it's a fetish, fun, multiplied by the lower competence ...
And tell me, rub paranoid and W are compatible?
--
okomand @ 26.10.19, 14:56*
It depends on the threat model)
preserve the integrity of the original files in order to avoid injections with minimal effort on the part of not advanced user.
okomand @ 26.10.19, 14:56*
There telepathic projections?)
so long as the leader of more than died.
Yet even at the zenith he was not included in your niche.
But I think that has not formed different, in the foreseeable future.
No request.
A non-public server and dnscrypt keep a steady tendency to expand.



Rep: (515)
okomand @ 25.10.19, 13:46*
and I'm getting to that.

But the BIOS (as the precursor) has exhausted itself.
A major minus for me it can not be maintained multiterabaytnye wheels
Stay on it and on the Seven individuals with low demands. And false paranoid.
okomand @ 25.10.19, 13:46*
if each UIFI has support for custom certificates, and so easy to re-sign system ...
so is it bad?
Though there are no more mass ...
But the ability to disable sb, as well as change other basic settings, plus the boot process standardization and has led to this new decision.
Standard users need to ensure a greater degree of protection of the box.
Well, as usual advanced everything.
And still remain the choice for them, even if they sit on w (but hopefully not at work (core) devices).
okomand @ 25.10.19, 13:46*
True to what tasks
to ensure greater consistency in the corporate environment, in the context of security
This reduces operating costs.
And minimizes the excess of the (over-advanced)
For private users, this decline in the share indestructible botnet.
Nnvozmozhnost change OSes disadvantage is not.
If you are advanced, and the variability is required, you will never buy such a device.
The rest did not even know about it. But even if it is a red font on every boot, wrote what they before?
Podnimum Housewives wave of discontent with the owner about the dominance of W? Let us L, will require?
No, this will not happen. And this is good.
okomand @ 26.10.19, 00:57*
However, the process is completely natural
they exhibit stability.
Alternative stability.
It then required for any firmware.
But how will the masses PEOPLE associate with those whom they have become an alternative, an alternative will be a new leader / trend.



Rep: (515)
* okomand,
The BIOS invasion less.
Based on the data that have (I do not pretend to be global) in times less.
Due to which in uefi easier to carry out an injection?
By uefi have full remote access over the network.
And instead of the code it uses efi utility.
Yes, it was added in secure bottles, which would neutralize the expanded opportunities for infection (as a side effect of extended functionality), but as we see it is not saved.
And I had to go now on the hardware and software control.
The final separation occurs and hardware vendors now. M / W / L .. and this is the right move.
Remains as much universal solutions.
Not only China.
If we believe the strategy of public amd cross-platform they leave.



Rep: (515)
okomand @ 12.10.19, 19:24*
And it is very important?

Yes.
For:
The main thing - the behavior of the system as a whole with a particular action.
. And sending intent is standardized action in response to the removal of the APC.
She behaves so regardless pm. Just after the fact.
And no wine or feature it in pm.
because
okomand @ 12.10.19, 13:31*
Another feature of the hide, which is worth knowing about: This list is intent PACKAGE_REMOVED.
is not her trait.
But exactly the opposite, pm line uses the system to their advantage. It is thanks to her other agribusiness and lose sight of the hidden way apk.
okomand @ 12.10.19, 19:24*
That is why when you reboot and nepereimenovanii apk back data and may be automatically deleted.

On the contrary.
In many of drain / branded firmware "remote" AIC is impeccably from the store of the vendor version, which is sewn up this test.
A broken automatic removal system ank and vanilla data not included.
But of course for all the Chinese / branded not answer.
okomand @ 12.10.19, 19:24*
But everything else, and hid far away.
Well, in other words it is the same -
wernow @ 11.10.19, 20:23*
But something went wrong



Rep: (515)
* yhnyhn11,
Yes, for the system, is another possibility.
okomand @ 12.10.19, 13:31*
There is another feature of the hide, which is worth knowing about: This list is intent PACKAGE_REMOVED.
I do not remember this in the pm. Although the code does not have long watched
This manager does.
Since a disable etc
Or saw exports in the pm?
okomand @ 12.10.19, 13:31*
depending on the curvature of the firmware case may well end and automatic cleaning of data and sending of other intents.
such curves are not met.
It is also necessary to separate the tool to create ...
In the second sentence me the way, after the reverse APC renaming is only triggered after a reboot. since the lists it is not marked, and removed. This plus, who needs a hide.
In the first embodiment, permissions, all without feedback reboot triggered. And AIC is also completely inoperable. You can see for example in which a type of mat, application for such permits deprived APK, it will all be empty.
It assumes that nothing is impossible.
Like it to someone or turn.
okomand @ 12.10.19, 13:31*
And why not?

And for whom now this functionality?
Where he was fastened to the drain interface firmware?
Explained by the point?
That's how I remember, there was a discussion to provide a trip to third-party fake system (Chinese, neguglovskih) apk.
---
Ank offline via hide remains in the common list.
And it is still visible in the installed
But even for those APK who want to see it.
Such as bank customers.
Porobuyte pm list packages -u and you will see.

Full version

Help     rules

Time is now: 28/11/19, 10:41