• 2 Posts
  • 128 Comments
Joined 2 years ago
cake
Cake day: June 20th, 2023

help-circle














  • Fossify gallery, FreeOTP, Markor text editor, and maybe Jami if I can get it to work on other phones. FreeOTP might have been late 2023 when I got my current phone, but close enough. I’m not sure whether I used Termux before that, on my old phone. Oh yes, Flash Alert, I’m surprised if that isn’t standard in Android. It flashes the camera led when the phone rings. That makes it much easier to find the phone if you’re not sure where it is, and it is face down. It would be great if it also flashed the screen.



  • I don’t bother with a proxy host or with LetsEncrypt, though I guess you could use LetsEncrypt perfectly well. Back when I was doing this, LetsEncrypt didn’t exist and you had to actually pay for public certificates, so using locally generated free ones saved money. It also had a minor(?) security advantage in that if the private server key somehow leaked, it wouldn’t let people impersonate our internet domain.

    For the private CA I simply used the crappy CA.pl script that comes with OpenSSL or did at the time. There are much better ways to do it, especially at any kind of scale, but CA.pl sufficed dealing with a few development machines.



  • solrize@lemmy.worldtoPrivacy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    arrow-up
    2
    arrow-down
    2
    ·
    edit-2
    3 months ago

    The initial post is a somewhat incomprehensible rant but I think the objection is that any number of skeezy websites all have domains pointing to the same Cloudflare IP. So when a malware app opens a TLS connection to one of those domains, the shared IP doesn’t tel you anything, and the ECH prevents you from seeing with Wireshark just whose home the malware is phoning. You have to resort to more drastic methods like intercepting DNS. Better yet, don’t run malware.