Simplifying w/Digital Minimalism: What's on My Phone
tilvids.com
external-link
Here's how I've implemented digital minimalism into one of my phones to give you all an idea of how I keep my technology simple, focused, minimal, and working for me. NextDNS Affiliate Link: https://nextdns.io/?from=5v4be7mt NextDNS Standard Link: https://nextdns.io/ How To Clear Homescreen: https://www.idownloadblog.com/2022/02/21/how-to-create-iphone-home-screen-with-no-apps/ Punkt Review That Inspired This Video: https://youtu.be/QdYrBpBJRI4 🔐 Our Website: https://techlore.tech 🕵 Go Incognito Course - to learn about privacy: https://techlore.tech/goincognito 🏫 Techlore Coaching - to get direct support: https://techlore.tech/coaching 💻 Techlore Forum - to connect with other advocates: https://discuss.techlore.tech 🦣 Mastodon - to stay updated: https://social.lol/@techlore We cannot provide our content without our Patrons, huge thanks to: Afonso, Boori, BRIGHTSIDE, Casper, Clark, Cyclops, Eldarix, JohnnyO, Jon, kevin, Larry, love your content, NotSure, Poaclu, x 🧡 Join them on Patreon: https://www.patreon.com/techlore 💚 To see our production gear, privacy tools we use, and other affiliates: https://techlore.tech/affiliates 💖 All Techlore Support Methods: https://techlore.tech/support 00:00 Intro to digital minimalism 00:50 Phone choices 01:52 Delete unused applications 02:37 Clean your homescreen 04:32 Changing your navigation 06:48 Screentime/downtime and other controls 08:22 DNS Filtering 09:46 The little things 11:10 The mentality 13:02 Summarizing things #minimal #minimalist #techlore

cross-posted from: https://monero.town/post/462856

Looking for an answer more detailed than just switch to pixel and use graphene or calyx.

What are the recommended changes to use in the Settings App to make Apple more secure and private? Should I just use the Safari browser due to all the browsers being the same as they all use WebKit

I’m looking for suggested changes to staying minimal but increasing privacy and security on iPhone

Em Adespoton
link
fedilink
English
11Y

E2E refers to data in transit: the data will be encrypted between its source and destination. It says nothing about how that data is protected once it has arrived.

E2E iCloud means a third party won’t be able to snoop on the data while you are reading from iCloud or writing to iCloud. But Apple employees can still log into your account and decrypt the data at rest on iCloud in many circumstances because the data at rest is encrypted against a key held by Apple.

A recent example of how this can go wrong was seen with Azure (which hosts some of iCloud) where a Microsoft dev key leaked and attackers were able to use it to generate a working decryption key for the US Government Azure service (a different product) and read terabytes of government data off the cloud services.

The attackers could have targeted iCloud hosting services instead of the US government and done the same thing for all data in all iCloud accounts not specifically encrypted against a personal key held only in your personal keychain.

And if you use iCloud Keychain of course, the same technique can be used to attack your keychain by pretending to be Apple Support and “recover” the contents of the keychain.

NaN
link
fedilink
English
5
edit-2
1Y

According to Apple they do not have the keys when you enable Advanced Data Protection, which is why they force you to have your own backup recovery methods (recovery key, recovery contacts). When they talk about E2E the endpoints they are referring to are user-owned devices.

iCloud Keychain recovery is also much more complex than you are describing.

Create a post

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more…


Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don’t ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don’t repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

  • 1 user online
  • 5 users / day
  • 30 users / week
  • 72 users / month
  • 413 users / 6 months
  • 1 subscriber
  • 679 Posts
  • 11.2K Comments
  • Modlog