Hi,
I am (very, very early) in the process of degoogling. I am definitely not a high risk as far as needing to be completely locked down. It’s more about trying to have a little more control over how my data is used.
I am looking at Graphene OS, but I am a little confused how certain apps (that rely on Google services) work. I have a Pixel 8 and will have it for the foreseeable future.
The apps I currently use that I would still need (or their equivalents) are:
- Clash Royale (Supercell)
- Notion (Notion Labs)
- Clickup (Mango Technologies)
- Business Calendar 2 (Appgenix)
-
If I installed these exact apps “sandboxed”, what exactly does that mean from a user standpoint? Will I have to use a separate account, reboot my phone, etc, or is it a quick process to use the app?
-
Is there a list of apps that I could browse to find equivalents to the above? Recommendations here are also ok.
-
I saw that Firefox isn’t exactly private(?) and that Vanadium is better in that aspect but I don’t understand why. Can someone ELI5, and help me see if this is a relevant concern for me?
Thank you! 😁
Maybe TOR uses FF because it’s easier to modify for their purposes.
Others would call that “insecure”
Tor Project has a whole page explaining why Chromium is inadequate and bad.
https://gitlab.torproject.org/legacy/trac/-/wikis/doc/ImportantGoogleChromeBugs
For a anonymous browser, but not for a secure browser. The paper is purely about privacy and anonymity. No security (sandboxing, mitigations) here.
Chromium sandboxing means nothing when it leaks so much data. Tor Project has fleshed that out pretty well.
The attacker can’t gain access to the host with javascript.
A browser that support javascript but doesn’t have sandboxing might not leak these data but when their are bug in their js implementation, the attacker can gain more access to the host.
Pretty sure that both Firefox and Chromium have sandboxing. What browser are you talking about? Also the only form of attack is not a direct browser script attack. It can also be used to extract metadata, which is used to attack someone in other ways or through other software or OS.
I think you need to learn to debate coherently on internet, and work on weird ideas you have formed in your head around security.
Threat model. Regular user aren’t attacked this way?