@georgia@dickkickextremist.xyz download your TWRP version to the computer. Boot to temporary TWRP, factory reset, mount as external drive and copy TWRP to your phone (this gets rid of /media encryption). Flash TWRP, then copy your ROM, kernel, Magisk and whatever else you're flashing to /media and flash. Then you're done.
@Wetrix lol I can already do that its called a web site.
@swaggboi I don't mind paying per gigabyte, so long as that's what's being sold to me. I'd actually prefer it, at any reasonable price it would probably be cheaper. But that's not how it is presented and sold to me. It only becomes that after the fact.
Dealing with a network connection while living mobile is such a pain in the ass. Carriers place tethering restrictions like it is 2010 (people probably use less data from a PC than their phone nowadays), wifi is usually worse than mobile data if available, having a local network is essentially impossible. Starlink couldn't come soon enough.
@nikolal I'm hoping (and thinking it is very likely) that key generation is done client side in the browser, or in the mullvad app, and only the public key is sent to them.
@jonah alright, so you sign packets with your private key, send them to the peer, the peer decrypts them with the public key. If the peer has your private key, they can sign packets from you and "prove" that those packets came from you. If I had your PGP key I could sign messages from you and cryptographically prove that you created those messages. Same concept. Assymetric cryptography is just as much about establishing authenticity as it is protecting information.
@jonah yes but then they can sign messages as you when they are not from you. I trust Mullvad when they say they don't log traffic, but that is *trust*. If they're lying, and they can fake traffic from you, that is potentially very bad. The protocol was designed for each peer to *never* exchange private keys, only public keys. Yet here we have a private key being potentially shared. You don't think it is a security vulnerability that the VPN provider can potentially impersonate you?
@jonah in Wireguard, your peer (which would be the VPN provider) *only* needs your public key to decrypt your packets and verify your identity. None should generate your private key for you or require you to provide it to them. This is asymmetric cryptography 101. Would you met an email service generate your PGP key for you?
https://www.invidio.us/watch?v=y-BG8rD3FuI
A 100% real PSA from China explaining to people why they should not eat Pangolins.
Next they should do one with rino horn and sewer oil.
@jonah Wireguard is absolutely excellent, you should look into it.
They can see your traffic with just the public key, but they would have no way to imitate you (or allow others to imitate you) without the private key. It is not a deal breaker as long as it is fixed in the long run, I assume they built the keygen tool this way to make it easy to use, but it is not ideal and is a security vulnerability.
09F911029D74E35BD84156C5635688C0
I do not recognize anyone’s right to one minute of my life. Nor to any part of my energy. Nor to any achievement of mine. No matter who makes the claim, how large their number or how great their need.