Clark

joined 6 days ago
[–] Clark@lemmy.ml 1 points 18 hours ago

I have LineageOS installed on my phone. Without the app InviZible Pro from F-Droid, my phone connects to Google servers for connectivity checks, system webview and time adjustments. The disadvantage in terms of privacy of /e/OS would be the default presence of micro g, which is proprietary. In LineageOS it's not present by default.

[–] Clark@lemmy.ml 4 points 19 hours ago* (last edited 19 hours ago)

Sonalder explained it very well. I just want to emphasize that it's much more private than any other vpn because its impossible for Nym to keep logs.

I also want to add to his comment that it's like Tor network but a decentralized one. As there aren't as many and as fast nodes as in Tor, it's slower. Here is the owners conversation with the Youtuber The Hated One: https://www.youtube.com/watch?v=dVtw-4Eox2E

[–] Clark@lemmy.ml 8 points 3 days ago* (last edited 3 days ago) (1 children)

LineageOS sends connectivity checks, time adjustment requests and system webview (chromium by default and not easy to change) data to google servers as far as I know. Are you sure it doesn't send anything to google? On the other hand, there is an app Invizible Pro on FDroid, which is perfect to prevent such connections. Maybe you assume the user will install it?

[–] Clark@lemmy.ml 2 points 6 days ago

I will try it, thank you :)

[–] Clark@lemmy.ml 1 points 6 days ago

No, it wasn't at the time of recording. It was a confirmation later on that tor and network manager were the only apps using the ports with brave opened.

[–] Clark@lemmy.ml 3 points 6 days ago* (last edited 6 days ago) (1 children)

Does also your computer connect to Amazon, Hetzner, 1337 Services GmbH, Evanzo GmbH and ThomasFamilyInvestments without a reason?

[–] Clark@lemmy.ml 4 points 6 days ago (4 children)

Thank you for the informations. There were nothing in the foreground but tor was apparently running in the background. But I'm still not sure if these services were all due to Tor. I need to run another record I guess

[–] Clark@lemmy.ml 2 points 6 days ago* (last edited 6 days ago)

Thanks for the informations. This clarifies a lot.

[–] Clark@lemmy.ml 1 points 6 days ago* (last edited 6 days ago) (4 children)

i only have these over long term but brave was closed when recording:

Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port Process
udp ESTAB 0 0 192.168.1.100%wlan0:68 192.168.1.1:67 users:(("NetworkManager",pid=1065,fd=27))
tcp ESTAB 0 0 192.168.1.100:57728 185.246.86.175:9001 users:(("tor",pid=1143,fd=16))
tcp ESTAB 0 0 192.168.1.100:60406 54.36.178.108:443 users:(("brave",pid=5153,fd=27))
tcp ESTAB 0 0 192.168.1.100:40606 89.58.56.112:587 users:(("tor",pid=1143,fd=12))

[–] Clark@lemmy.ml 4 points 6 days ago (1 children)

so am i running a relay in the background although tor browser is closed?

70
submitted 6 days ago* (last edited 6 days ago) by Clark@lemmy.ml to c/privacy@lemmy.ml
 

Hello all,

According to the Wireshark record my computer connects to various services often, including Amazon, Hetzner, 1337 Services GmbH, Evanzo GmbH and ThomasFamilyInvestments. The most often were the connections to mail.my-mail.rocks which is a part of Netcup GmbH. I have a somewhat minimal distro and the attached recordings were made when no app was open including no browser. I can send the other screenshots showing other connections too. I'm suspecting of malware since some time ago but can you help me clarify these connections please?