Jump to content
Not connected, Your IP: 3.145.176.228

Leaderboard


Popular Content

Showing content with the highest reputation on 03/25/21 in all areas

  1. 1 point
    I have used Little Snitch for years. I use Mac computers, I suspect I will one day soon have to leave Apple for good and go totally over to Linux which is scary for me, not being too technically gifted! But the way Apple is going, it's a certainty now I think. I have recently started trying to block all the many Apple processes I don't damn well want and I don't damn well need! Photo Library "Analysis" daemon, icloud connections when I don't use Icloud, a million others! Does anyone know of a good little snitch ruleset I can copy or subscribe to? It would need to be from someone who blocks as much Apple stuff as possible
  2. 1 point
    I am also curious about the ultimate rule set. Also Linux can be nice and forgiving like linuxmint or ubuntu. Btw I "discovered" this nice website:https://sunknudsen.com/privacy-guides You can learn a lot and sometimes you can use it linux to ;-) GReetings,Casper
  3. 1 point
    Heads up: Last I heard, Apple robbed the system interfaces Little Snitch uses of its teeth. Some Apple services, including telemetry, are unblockable with this on Big Sur and up.
  4. 1 point
    OpenSourcerer

    Do I Need IPv6 on enabled?

    If Eddie detects a configuration error of IPv6, as in, it couldn't use native IPv6 to connect somewhere, it's completely blocked instead to rule out IPv6 address leaks. After all, it could be an intermittent error on Eddie's side while the system as a whole actually does have IPv6 connectivity. This option is ticked by default because, and it pains me to write this, most of the world's devices still don't use IPv6 whereas issues with IPv4 are practically nonexistent. You can say, the world is still running on IPv4.
  5. 1 point
    Staff

    Fowarded ports and Privacy

    Hello! No. No. However, remotely forwarded ports are kept in the database, otherwise it would be impossible to reserve them to the appropriate accounts and dynamically forward them according to the server the customer's client connects to. Ports are deleted when the user un-forward them from the control panel. By default no port is remotely forwarded. The database is not on the web site servers. The current e-mail address is stored (on the db servers, not on the web site servers). This is essential to guarantee some services such as password reset, but a user is not forced to associate a real e-mail address to an account. Of course the best solution is picking an e-mail address that can't be exploited to disclose an identity. No. No. Remotely forwarded ports, if not deleted, can indeed compromise privacy under certain conditions. Even if deleted, they can expose the customer to correlation attacks, if a customer forwards them both on the VPN and on his/her system physical network interface(s) or router(s) etc (as clearly underlined in the FAQ). Before we can answer completely, we need that you elaborate your question. In particular, what crimes in which legal framework would you commit in this hypothetical scenario, which government and which force do you refer to? As clearly stated in the Terms of Service, a direct or indirect violation of any fundamental right (as enshrined in the ECHR) and some other acts (described in ToS art. 4) are a violation of our Terms of Service, REGARDLESS of the fact that the infringement is a crime or not according to the legal framework of the country which the customer infringes the ECHR from. On the other hand, a fact that is considered a crime according to some out of jurisdiction country legal framework has no relevance for us/is not our concern, since we (quite obviously) do not recognize the authority of any entity or the validity of any law that are out of jurisdiction. That matter will have to be faced by that country authorities without any cooperation from Air owners. Kind regards
×
×
  • Create New...