• 28 Posts
  • 179 Comments
Joined 7 months ago
cake
Cake day: February 25th, 2024

help-circle

  • Hi, lovely app. Good job attaching apk files to your releases. However, this is neither OTP encryption nor secure in a cryptographic context. The One Time Pad creates a randomly generated pad on its own and uses the XOR function to combine the pad and plaintext together.

    Instead, this app forces you to create the pad yourself, and only allows the pad to contain the ASCII characters 0-9. This means you cannot get the full 8 bit entropy for each byte. Because of this, if the character in the ciphertext is “q”, for example, you have only 10 options for the plaintext:

    q xor 0 = A

    q xor 1 = @

    q xor 2 = C

    q xor 3 = B

    q xor 4 = E

    q xor 5 = D

    q xor 6 = G

    q xor 7 = F

    q xor 8 = I

    q xor 9 = H









  • Hi! Glad you’re deciding to switch. Carrier locked devices tend to disable OEM Unlocking, which is a feature that allows you to unlock the phone’s bootloader and install a custom ROM such as GrapheneOS. There is no way to determine this for sure unless it is mentioned as “OEM unlocked” or “bootloader unlockable” in the listing, or by asking the seller to check in Developer Options. Good luck!








  • I will say this: I have used iOS my entire life up until now. Before I used GrapheneOS I made sure to make a list of every app I would be using (although my list did change after trying, which is ok). I also learned as much as I could about the Android and GrapheneOS ecosystem as I could before switching, since there are a few quirks. I was lucky to be able to try out a few cheap Android devices to familiarize myself.

    I’m not saying any of this is required, you really will see that it’s just an OS and the usability is pretty much the same, but I did my preparation for about a year and was on my feet in a few days (keep in mind I am a niche user). For a normal iOS user who has never used Android, I’m certain they’ll be able to use it just fine as long as they have some basic privacy knowledge.

    Part of why I made this post is to ease the worries of any iOS users who are hesitant. It really is a smooth transition, but it can be hard if you make it hard. I am a tinkerer and power user with a higher threat model, so of course I had lots more bumps than an average user. Try it out and see what you think!

    P.S. If you do ever decide to switch, DM me if you want some help :)








  • Hi! Back in high school, me and a few close friends formed a small hacking group aimed at hacking the school WiFi. We succeeded, and reported the vulnerabilities we found along the way to the school. Our school had a policy where students who managed to hack something would be let off the hook if they reported exactly how they did it. I managed to land a job for the school district as a result of our fiasco. I don’t recommend anyone do that, but I managed to get lucky.

    Anyways, once we had access to the WiFi we wanted to get around the network wide filter. Proton VPN worked for a while, but quickly got blocked. Dual booting into Tails on school computers didn’t work until the 6.0 update. To my knowledge, it still works.

    However, for our phones, the thing that worked was changing the DNS. We found out the network wide filter the school boasted so highly about was only a DNS filter that resolved hostnames to a “blocked” page. Find a good PRNS and change your device’s DNS to match. If you want a search engine, try to find an unblocked SearXNG instance.

    Good luck!

    P.S. Don’t forget: Tor is portable on Windows devices :)