Show more

@georgia@dickkickextremist.xyz what's the model number? I'll try to find something if there's anything to be done.

@georgia@dickkickextremist.xyz wait, so you skipped that step and switched slots?

@georgia@dickkickextremist.xyz slide up in my DMs and I will try to help you. It might be soft bricked, but if you unlocked the bootloader it is very unlikely that you hard bricked it. What's the model number?

@georgia@dickkickextremist.xyz unless something else happened after what I'm responding to lol but I've dealt with dozens of these and never hard bricked a thing. It is very difficult to hard brick a device with an unlockable bootloader.

@georgia@dickkickextremist.xyz nah. Your home directory (/media) is encrypted. If you factory reset from inside TWRP then copy all the shit you need to flash over from your PC you can recover it.

@georgia@dickkickextremist.xyz download your TWRP version to the computer. Boot to temporary TWRP, factory reset, mount as external drive and copy TWRP to your phone (this gets rid of /media encryption). Flash TWRP, then copy your ROM, kernel, Magisk and whatever else you're flashing to /media and flash. Then you're done.

@georgia@dickkickextremist.xyz yes, for phones with SD card slots that's pretty standard. Some of those SD card slots double as a second sim slot (you can either use an SD card or have 2 sim cards).

@georgia@dickkickextremist.xyz time to spend 3 days hacking the fuck out of that thing. That's probably my favorite part of getting any new electronic thing, especially a phone.

@swaggboi I don't mind paying per gigabyte, so long as that's what's being sold to me. I'd actually prefer it, at any reasonable price it would probably be cheaper. But that's not how it is presented and sold to me. It only becomes that after the fact.

@georgia@dickkickextremist.xyz why don't you just back up the folder to a PC?

@georgia@dickkickextremist.xyz yes, but sometimes you gotta be bad.

thinking about how software companies slowly chip away at the idea of consent by turning every "no" into "not right now," every "stop this" into "do this less often," every "i don't want that" into "maybe later"

Dealing with a network connection while living mobile is such a pain in the ass. Carriers place tethering restrictions like it is 2010 (people probably use less data from a PC than their phone nowadays), wifi is usually worse than mobile data if available, having a local network is essentially impossible. Starlink couldn't come soon enough.

@nikolal I'm hoping (and thinking it is very likely) that key generation is done client side in the browser, or in the mullvad app, and only the public key is sent to them.

@jonah alright, so you sign packets with your private key, send them to the peer, the peer decrypts them with the public key. If the peer has your private key, they can sign packets from you and "prove" that those packets came from you. If I had your PGP key I could sign messages from you and cryptographically prove that you created those messages. Same concept. Assymetric cryptography is just as much about establishing authenticity as it is protecting information.

@jonah yes but then they can sign messages as you when they are not from you. I trust Mullvad when they say they don't log traffic, but that is *trust*. If they're lying, and they can fake traffic from you, that is potentially very bad. The protocol was designed for each peer to *never* exchange private keys, only public keys. Yet here we have a private key being potentially shared. You don't think it is a security vulnerability that the VPN provider can potentially impersonate you?

@jonah in Wireguard, your peer (which would be the VPN provider) *only* needs your public key to decrypt your packets and verify your identity. None should generate your private key for you or require you to provide it to them. This is asymmetric cryptography 101. Would you met an email service generate your PGP key for you?

invidio.us/watch?v=y-BG8rD3FuI

A 100% real PSA from China explaining to people why they should not eat Pangolins.

Next they should do one with rino horn and sewer oil.

@jonah Wireguard is absolutely excellent, you should look into it.

They can see your traffic with just the public key, but they would have no way to imitate you (or allow others to imitate you) without the private key. It is not a deal breaker as long as it is fixed in the long run, I assume they built the keygen tool this way to make it easy to use, but it is not ideal and is a security vulnerability.

Show more
Mastodon 🔐 privacytools.io

Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance.

Website: privacytools.io
Matrix Chat: chat.privacytools.io
Support us on OpenCollective, many contributions are tax deductible!