happeningtofry99158

joined 4 days ago

I sincerely hope you could improve your comprehension skill

[–] happeningtofry99158@lemmy.world 1 points 9 hours ago* (last edited 9 hours ago)

Oh but you do

I have made my point and clarified myself in my previous comment. If you are having trouble comprehending it you can ask nicely

You say Apple isn’t any better (or worse off) than Android when it comes to privacy. If that’s the case, you would then prove your claim with facts from reputable sources. Just saying something doesn’t make it true.

I would expect your apology for your misuse of language. I would also expect your gratitude in return for the time I spent enlightening you.

None can make a solid conclusion about which one is better because both stock google and apple are closed source. YOU CAN ONLY GUESS

[–] happeningtofry99158@lemmy.world 1 points 9 hours ago* (last edited 9 hours ago)

Oh but you do

I have made my point and clarified myself in my previous comment. If you are having trouble comprehending it you can ask nicely

You say Apple isn’t any better (or worse off) than Android when it comes to privacy. If that’s the case, you would then prove your claim with facts from reputable sources. Just saying something doesn’t make it true.

I would expect your apology for your misuse of language. I would also expect your gratitude in return for the time I spent enlightening you.

None can make a solid conclusion about which one is better because both stock google and apple are closed source. YOU CAN ONLY GUESS

this extension could help me use extensions that I don't trust but need their funcitonality

[–] happeningtofry99158@lemmy.world -1 points 18 hours ago (2 children)

as you didn't answer my question so I will ask you again

If you dont even care why paste your comment under my other cross post?

[–] happeningtofry99158@lemmy.world -1 points 18 hours ago (2 children)

The downvotes say otherwise.

The downvotes means nothing without coherent logic

The onus is on you to provide Apple is worse for privacy than android.

I don't have the responsibility to show you why you are wrong

good luck

[–] happeningtofry99158@lemmy.world -1 points 18 hours ago (2 children)

The downvotes say otherwise.

The downvotes means nothing without coherent logic

The onus is on you to provide Apple is worse for privacy than android.

I don't have the responsibility to show you why you are wrong

good luck

Thank you very much for the e

[–] happeningtofry99158@lemmy.world 1 points 19 hours ago (1 children)

thank you you seem to understand very much about windows and computer. May I ask

How to run something you don't trust without performance lost?

How to restrict software permission with open source software?

If you don't want to type please provide videos and articles you read before that address my question

I'm keen to read

Thank you

[–] happeningtofry99158@lemmy.world 3 points 21 hours ago (2 children)

thanks

does this mean software with admin privilege only have access to user folder not root folder of C drive?

[–] happeningtofry99158@lemmy.world 2 points 21 hours ago (2 children)

thank you for your information, would you say JShelter does everything Chameleon do (including spoofing) so that if I use JShelter I don't have to use Chameleon?

 

Could Windows and installed apps upload all my personal files?

Dear all

I have deleted Onedrive and disabled File system access in Privacy.

  1. I would like to know, which other ways that my personal files could be uploaded in a non-malicious non-hacker way?
  2. Just by using Windows, Microsoft could upload all my personal files to themselves if they would?
  3. Does every installed App / software have full access to my whole drive? How can I found out, how much access it has?

Thank you for your interest and reply

Best regards


@Rikudou_Sage@lemmy.world

Yes, every application has access to everything. The only exception are those weird apps that use the universal framework or whatever that thing is called, those need to ask for permissions. But most of the apps on your PC have full access to everything.

And Windows does collect and upload a lot of personal information and they could easily upload everything on your system. The same of course applies for the apps as well, they have access to everything except privileged folders (those usually don’t contain your personal data, but system files).

 

cross-posted from: https://lemmy.world/post/31889138

Please see the cross-post as it is updated.

Is there a firefox extension that disable the web connection of other extensions?

cross-posted from: https://lemmy.world/post/31889138

Please see the cross-post as it is updated.

 

What is the difference between Chameleon and JShelter?

  • Chameleon – Get this Extension for 🦊 Firefox Android (en-US)
    • Chameleon is a WebExtension port of the popular Firefox addon Random Agent Spoofer.
  • JShelter – Get this Extension for 🦊 Firefox Android (en-US)
    • JShelter is a browser extension to give back control over what your browser is doing. A JavaScript-enabled web page can access much of the browser's functionality, with little control over this process available to the user: malicious websites can uniquely identify you through fingerprinting and use other tactics for tracking your activity. JShelter aims to improve the privacy and security of your web browsing.
    • Like a firewall that controls network connections, JShelter controls the APIs provided by the browser, restricting the data that they gather and send out to websites. JShelter adds a safety layer that allows the user to choose if a certain action should be forbidden on a site, or if it should be allowed with restrictions, such as reducing the precision of geolocation to the city area. This layer can also aid as a countermeasure against attacks targeting the browser, operating system or hardware.

JShelter seems to spoof info by controls the APIs provided by the browser? and Chameleon spoofs user agent and many other information.

To me both seems to serves the same purpose of spoofing. Is Chameleon spoofing without interfering with js and JShelter spoofing with interfering with js the main difference between them? In addition JShelter seems to be able to block malicious js

How JShelter and Chameleon achieves spoofing differently?

 

How can a site see what extensions you have?

One of the things I've seen mentioned before is that installing too many extensions can make you more unique, and thus have a negative influence on your fingerprint. This got me curious, how exactly do sites detect which extensions you have anyway? Can they outright read your list of extensions?

Furthermore, do all extensions make you more unique? I guess the answer would depend on the answer to the first question (surely, if they can just outright see your list, then the answer would be yes), but lets say you install something that seems rather innocuous, like Transparent Standalone Images, for example. Can a site see that this is installed / does it make your fingerprint more unique?


explanation

Web sites do not have any way to enumerate or query your installed extensions, and they cannot directly "see" the content scripts injected by extensions. However, some extensions do modify pages in a way that scripts in the page could recognize as being the work of a particular extension, assuming the owners of the site care to research and check for such things.

One particular issue is that an extension may insert a path into the document to a page or image in the extension itself. Firefox assigns a randomized UUID to the extension at install time, and the path uses this UUID. On the plus side, this may prevent the site from associating the URL with a specific extension. On the minus side, at least in theory, a site could detect this weird URL in the page and use that for fingerprinting. See: How to prevent fingerprinting via Add-on UUID?.

is there anything else that I should notice?

Thank you!

Answered by @listless@lemmy.cringecollective.io

Web pages are not allowed to list your extensions. They can indirectly surmise you have certain extensions based on how your requests differ from expectations. For example, if they have advertisements, but your browser never actually makes any requests to load the images, CSS, JS or HTML for the advertisements, they can deduce you have an ad-blocker. That’s a datapoint they now have to ID you: “has an ad-blocker”

Now let’s say they have an ad they know AdBlockPlus allows, but uBlock Origin doesn’t. They see your browser doesn’t load that ad. Another datapoint: “Not using AdBlockPlus”.

Based on what requests go back and forth between your browser and their servers, they map out a unique fingerprint.

 

As a security-conscious user, I've used NoScript since Firefox's early days, but its restrictive nature has become frustrating. I'm often forced to go unprotected just to access websites with multiple scripts running on different domains, which defeats the purpose of using NoScript and balances security and usability that it once provided.

Is there a way to block browser JavaScript from executing commands that retrieve sensitive information from my local machine, while still allowing JavaScript that is only used for rendering web pages?

by sensitive information I'm referring to

  • local machine time
  • local machine ram
  • local machine operating system + version
  • local machine hardware
  • Serial Number
  • Hardware ID
  • UUID
  • Windows Device ID
  • Windows Product ID
  • ...

greatly appreciate any insight


EDIT:

could be possible solution

https://discuss.grapheneos.org/d/16025-vanadium-and-what-to-use-on-desktop/19

  • ~~LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.~~
  • JShelter: Mitigates potential threats from JavaScript, including fingerprinting, tracking, and data collection. Slightly modifies the results of API calls, differently on different domains, so that the cross-site fingerprint is not stable. Applies security counter-measures that are likely not to break web pages. Allows fine-grained control over the restrictions and counter-measures applied to each domain.

@bjoern_tantau@swg-empire.de

Most of those things cannot be collected through JavaScript.

Local time can.

RAM can only be approximated to protect user privacy. Edit: And it’s not available on Firefox.

OS+version are already in your browser’s user-agent string that is sent out with every request you make.

Machine hardware cannot be enumerated. JavaScript can try to guess your GPU based on what it can do with WebGL.

There is no way to get a serial number or similar.

To spoof timezone/OS+version/browser+version ... and disable WebGL, use https://sereneblue.github.io/chameleon/

 

https://kevinboone.me/lineageos-degoogled.html

In an earlier article I wrote about my attempts to remove all trace of Google from my life. Part of that process, which is still ongoing, was to install Lineage OS on all my Android cellphones and tablets, replacing the original, vendor firmware. Doing this removes the egregious Google Play Services although, of course, this severely limits my ability to run Android apps. That’s a sacrifice I’m willing to make, although not without some regrets.

I’ve subsequently learned that hard-core de-Googlers eschew Lineage OS, because it remains too close to the stock configuration of the Android Open-Source Project (AOSP) on which it is based. There are certainly smartphone ROMs, like GrapheneOS, that are even more Google-free.

But I’ve grown to like Lineage. I don’t know what kind of future it has, but it works well for me, and it’s easy – as easy as can be expected – to install on all the devices I own. Installing and setting up Lineage is fiddly enough; I don’t want to make my life even more complicated, if I don’t have to.

Those of us who are divorcing Google worry most, I think, about Google’s intrusive data collection. Of course, Google is by no means the only business that engages in such practices – “surveillance capitalism” is big business. But Google presents a unique challenge because, not only does it collect a lot of data, it has a lot of clever ways to process it, and find connections between disparate data elements. Before my Google separation, it always amazed me how Google seemed to know where I was all the time, even with location services disabled on my smartphone. And Google’s advertisers seem to know what I’ve been shopping for, even when I’ve been doing my shopping in person at retail outlets. How Google does this, I don’t know; but I do want to reduce their opportunities to do so.

So I need to know what information my cellphone is sending to Google, even having removed all proprietary Google stuff.

I have to point out that I’m not talking about additional, 3rd-party apps that I might have installed on a Lineage OS device – all apps have the potential to create privacy problems, but I’m free not to use them. Here I’m just thinking about the platform itself.

Note
I run Lineage with no Google apps or services of any kind. If you do run Google services, you have to accept that absolutely everything you do with an Android device will be known to Google. There’s simply no point worrying about the trivial privacy breaches in this article – that would be like taking a cyanide pill and then worrying about your ingrown toenail.

In this article I’ll be describing various data leaks of which Lineage OS has frequently been accused, reporting which ones seem still to be present, and suggesting (well, guessing) how serious they might be.

The captive portal test

“Captive portals” are often found in hotels and entertainment venues. In a captive portal, all Internet traffic gets directed to the venue’s network filter, which ensures that the user has paid for a service or, at least, consented to some usage agreement.

Android performs a captive portal test every time the device enables a network connection. This test is a simple HTTP or HTTPS request on some publicly-accessible webserver. The request is expected to return a success (2XX) code if the server is reachable. In a captive portal, the service-providing organization will capture the HTTP(S) request, and return a redirection code to its own webserver. This server will provide a web page with further instructions.

By default Lineage OS uses Google’s webservers for the captive portal test. This means that Google knows every time a device raises a network connection.

Is this a problem? Google doesn’t get to find out anything except the IP number of the device, some limited information about the type of device, and the time of day. I’ve looked at the source code, and I don’t see any information other than this being sent – the code just uses the standard Java HTTP support to make the request. It’s plausible that, with a wide-area connection, the carrier might add additional information to the request, and Google might be able to infer your location from the IP number.

If you consider this to be too much of a risk, you can change the captive portal connectivity checker. Lineage provides no simple interface for this, but you can do it at the command line (e.g., by running a terminal app, or adb shell). You don’t need to root the phone to do this.

$ settings put global captive_portal_http_url http://my_server 
$ settings put global captive_portal_https_url https://my_server 

Unless you want to disable the captive portal check completely, you’ll need to identify a public webserver that can provide the appropriate response. There are many such servers; some Android replacements that focus more on de-Googling, like GrapheneOS, default to using one of these rather than Google. Even then, they usually have Google’s servers as a fall-back, because an outage of the conectivity check server could otherwise cause serious disruption.

On the whole, I regard this (captive portal check) a relatively harmless breach of privacy. It isn’t telling Google anything they’re not going to find out about in other ways.

DNS

Every time you use a hostname to identify a remote server, there’s going to be a DNS lookup. This lookup translates the hostname into a numeric ID for use with the TCP/IP protocol.

Internet service providers and mobile carriers operate DNS servers, but so does Google. DNS is potentially a privacy problem because the DNS server gets to learn every site you visit. It won’t see the actual URL of a web request – just the hostname. Still, that’s enough information to be concerned about. But it’s worth thinking about who the “you” is in “every site you visit”. To track you, personally, as an individual, the DNS server needs a way to relate your IP number to something that identifies you. There’s no definitive way for Google (or anybody) to do that; but there are statistical methods that can be very effective. They are particularly effective if you happen to use Google’s other services, because these will link a small number of personal Google accounts to an IP number.

Is this a problem for Lineage OS? While it might have been in the past, I don’t think Lineage now uses Google’s DNS, except perhaps as a fallback. Both WiFi and carrier Internet connections are initiated using protocols that can supply a DNS server. On my Lineage devices, I’m sure that these are the DNS servers that are being used. Still, there are references to Google’s DNS server – 8.8.8.8 – in the AOSP source code. So I can’t prove that Google’s DNS will never be used.

If you want, you can supply your own DNS server in the network configuration in the Settings app. But, unless you run your own DNS in the public Internet, you’ll be putting your trust in one mega-corporation or another. I suspect most are less worrying than Google, but perhaps not by much.

By the way – Lineage OS supports encrypted DNS. While that will prevent third-parties from snooping on your DNS traffic – including your mobile carrier or ISP – this won’t protect you from snooping at the DNS server itself. So encrypted DNS is no protection against Google, if you’re using Google’s DNS.

Assisted GPS

It takes a long time for a mobile device to get a robust fix on GPS satellites – a minute in good conditions, or several minutes in a weak signal area. Assisted GPS (A-GPS) primes the satellite fix using environmental data. This data might including a coarse location from a cellular network. With A-GPS, a satellite fix might take only a few seconds.

A-GPS data is processed by a remote server, that has the storage capacity to handle the large amounts of data involved. The main operator of such servers is, again, Google.

What can Google learn about a device using Assisted GPS? As in any Internet operation, it will find the device’s IP number, and it might find the coarse location. The Internet traffic associated with A-GPS can be encrypted but this, again, won’t protect it from Google. To determine the location of a specific individual, Google has to be able to relate the IP number to the individual. As discussed above, that can be done with a reasonable degree of confidence.

On recent Lineage versions, A-GPS is disabled by default. If enabled, it uses Google’s servers – so far as I know there are no widely-available alternatives. I just keep it disabled, and live with the disadvantage of longer GPS start-up times.

Time synchronization, NTP

At one time, Lineage OS used Googles’ time servers to set the time on the device. So far as I know, this is no longer the case – a general pool of NTP servers is used. Even if that were not the case, I can’t worry too much about leaking time synchronizing data.

WebView

I believe that WebView is the most troubling source of privacy concerns for Lineage OS, and the one whose ramifications are the least well-understood.

WebView is a component of Android that renders web pages. Of course, a web browser will do this, but many Android apps and services have a need to render pages without actually being a browser. The ‘captive portal’ support I described above is an example: the device needs to render a page for user to log in or purchase Internet access, even if no web browser is installed.

Lineage OS uses the WebView implementation from the AOSP, which is based on Chromium. Chromium is Google Chrome without the proprietary Google stuff, and it’s undoubtedly less of a privacy concern than Chrome would be. But Chromium, even though it’s open-source, is still primarily a Google product.

There are many known instances where Chromium will provide some user data to Google servers. For example, we know that Chromium downloads lists of ‘unsafe’ websites to support its ‘safe browsing’ feature. This will happen however Chromium is used. When used as a regular web browser, Chromium might send data to Google for its ‘hot word’ detection, for example.

When Chromium is only used to provide a WebView implementation, I’m not convinced that these minor privacy breaches are significant. It’s worth bearing in mind that the Jelly browser that is shipped with Lineage OS is just a wrapper around the Chromium WebView – if you use this browser, you’ll have the same privacy concerns as if you use Chromium itself.

There are a number of Google-free WebView implementations, like Chromite. GrapheneOS uses a WebView implementation called Vanadium, which is essentially a de-Googled Chromium. Installing one of these implementations on Lineage OS is not straightforward, or so it seems to me.

I don’t use Jelly or Chromium itself as a web browser – I install a browser that is not based on Google code, like Firefox. This limits my exposure to Chromium to occasions where WebView is used other than as a browser. In my normal usage, I don’t think there are many of those occasions, so I’m not too worried about WebView.

Nevertheless, it remains a slight concern and, if I could replace it without a lot of effort, I would.

Are we in tinfoil hat territory now?

I don’t like Google knowing so much about me, but I don’t believe Google’s data collection is directly harmful to me. My disapproval of Google’s activities (and I know Google is not the only culprit) is mainly one of principle. I don’t want to be a source of revenue for Google, or to legitimize their behaviour by my own inaction. I don’t want Google to make the Internet more of a hellscape that it currently is.

But I’m not paranoid. I don’t think Google is out to get me, or is in league with people who are. My rejection of Google falls short of doing things that will make my life hugely more difficult.

I am aware, all the same, that I have one foot in tinfoil hat country.

I know a few people – some in my own family – who eschew smartphones because they create time-wasting distractions. I certainly know people who don’t give smartphones to their kids, because of the well-known risks that social media poses to their mental health. But almost nobody avoids Google because they believe, as I do, that the surveillance economy is detrimental to society in the long term. Even those few who do believe this are mostly not willing to take action, because they believe (or convince themselves) that the benefits of a connected world outweigh the costs of a total lack of privacy. For me that’s like understanding the risks of climate change, and yet choosing to run two or three gas-guzzling cars because it’s a half-mile walk to the shops.

The few people who do believe as I do, and are willing to act on their beliefs, tend to be people who also believe that they’re being monitored by the CIA, or that Covid vaccines are implanting mind-control receivers. That’s not a gang that I want to run with.

On the whole, I’m satisfied that Lineage OS, as I use it, is preventing nearly all of Google’s data collection. I don’t install or use any Google services, I don’t enable A-GPS, I don’t use Chromium or the built-in browser. I could eliminate more arcane aspects of data collection – like the Internet connectivity check – if I wanted to take the trouble.

I don’t think that taking reasonable precautions to avoid becoming part of Google’s data collection economy makes me a tinfoil-hatter. Nevertheless, I would probably use GrapheneOS instead, if I had devices that supported it. Ironically, if I wanted to use GrapheneOS, I’d have to buy Google-branded mobile devices, which is an irony that really stings.

 

cross-posted from: https://lemmy.world/post/31808224

Please see the cross-post as it is updated.

What is the best degoogled tablet for an artist

what is the best tablet for iodeOS, GrapheneOS and LineageOS

  • with smooth stylus support that is as good as apple pen
    • palm rejection
    • pressure sensitive stylus
    • works well for krita / excalidraw / xournalapp
    • latency
  • at least 16GB RAM and 256GB storage

For iodeOS, it doesn't seem to support any tablet device officially


For GrapheneOS, the only choice is google pixel tablet (or maybe pixel fold). However


For LineageOS

  • What tablet+stylus+LineageOS has the best performance?
  • What tablet+stylus+LineageOS has the best balance between price and performance?
  • Can someone share their stylus experience on krita / excalidraw / xournalapp?

Sincere thanks

cross-posted from: https://lemmy.world/post/31808224

Please see the cross-post as it is updated.

 

cross-posted from: https://lemmy.world/post/31808224

Please see the cross-post as it is updated.

What is the best degoogled tablet for an artist

what is the best tablet for iodeOS, GrapheneOS and LineageOS

  • with smooth stylus support that is as good as apple pen
    • palm rejection
    • pressure sensitive stylus
    • works well for krita / excalidraw / xournalapp
    • latency
  • at least 16GB RAM and 256GB storage

For iodeOS, it doesn't seem to support any tablet device officially


For GrapheneOS, the only choice is google pixel tablet (or maybe pixel fold). However


For LineageOS

  • What tablet+stylus+LineageOS has the best performance?
  • What tablet+stylus+LineageOS has the best balance between price and performance?
  • Can someone share their stylus experience on krita / excalidraw / xournalapp?

Sincere thanks

cross-posted from: https://lemmy.world/post/31808224

Please see the cross-post as it is updated.

 

cross-posted from: https://lemmy.world/post/31808224 Please see the cross-post as it is updated.

What is the best degoogled tablet for an artist

what is the best tablet for iodeOS, GrapheneOS and LineageOS

  • with smooth stylus support that is as good as apple pen
    • palm rejection
    • pressure sensitive stylus
    • works well for krita / excalidraw / xournalapp
    • latency
  • at least 16GB RAM and 256GB storage

For iodeOS, it doesn't seem to support any tablet device officially


For GrapheneOS, the only choice is google pixel tablet (or maybe pixel fold). However


For LineageOS

  • What tablet+stylus+LineageOS has the best performance?
  • What tablet+stylus+LineageOS has the best balance between price and performance?
  • Can someone share their stylus experience on krita / excalidraw / xournalapp?

Sincere thanks

cross-posted from: https://lemmy.world/post/31808224 Please see the cross-post as it is updated.

 

What is the best degoogled tablet for an artist

what is the best tablet for iodeOS, GrapheneOS and LineageOS

  • with smooth stylus support that is as good as apple pen
    • palm rejection
    • pressure sensitive stylus
    • works well for krita / excalidraw / xournalapp
    • latency
  • at least 16GB RAM and 256GB storage

For iodeOS, it doesn't seem to support any tablet device officially


For GrapheneOS, the only choice is google pixel tablet (or maybe pixel fold). However


For LineageOS

  • What tablet+stylus+LineageOS has the best performance?
  • What tablet+stylus+LineageOS has the best balance between price and performance?
  • Can someone share their stylus experience on krita / excalidraw / xournalapp?

Sincere thanks

EDIT:

  • ipad
    • I realize my title is confusing, when I say degoogle I really meant completely Open Source and private.
    • ipad with network disabled?
      • not feasible in my use case
      • apple backdoor is highly likely in my opnion
      • Of course I don't have any proof, but I would assume it runs camera and microphone without us knowing even when the network is disabled. The data is collected and processed locally and send to apple server when network is enabled
        • speech recognition is integrated in many app and sold to advertiser
        • I doubt apple could resist the temptation of money and the threat from government not to activate microphone and camera without us knowing
    • apple is as disgusting as google
  • but of course if this is the only choice ...
 

cross-posted from: https://lemmy.world/post/31800014 Please see the cross-post as it is updated.

According to a post online, Thunderbird email client makes connections to sites that have nothing to do with sending and receiving email, for "telemetry" and other questionable reasons

Is this something we should be concerned about? Is there a good alternative to Thunderbird given that it seems to have telemetry implemented inside it?

I use Thunderbird heavily and I'm really worried about this problem. Can someone clarify whether if thunderbird is trustworthy?

Below is the post https://support.mozilla.org/en-US/questions/1381543

In case it gets taken down, a user asked this:

I would like to know why, when Thunderbird first starts up or shortly thereafter, it attempts to connect to the following sites:

detectportal.firefox.com

status.geotrust.com

thunderbird-settings.thunderbird.net

It does not need to connect to any of these to send or receive email, so I would like to know why it's attempting to connect to those addresses. Little Snitch is blocking them for now but if one of them is important I can remove that block.

Also, at some point every day, Thunderbird complains that it can't get the latest version, and every day I have to dismiss that popup. I bring this up because it may be related to me blocking the connections but until I know what they are for I'd like to know if it is possible to make Thunderbird stop checking for updates.

They all concern me but the one that really concerns me is thunderbird-settings.thunderbird.net, first because it is listed as a bad address on one of the malware sites, and second because I don't want my settings being sent off my computer. Really the only reason I want Thunderbird to connect to the Internet is to send and receive mail, and maybe to check for updates if it can do ONLY that, and not send any other data from my computer back to the mothership.


And this was the response, from a "Top 10 Contributor"/"Moderator" (emphasis added):

Firefox.com is owned by Mozilla corporation.

Thunderbird.net is owned by the Thunderbird project / Mzla technologies

GeoTrust is an Audited encryption certificate purveyor with a huge web presence that is a subsidiary of DigiCert, a larger certificate and PKI company.

If you have software identifying either an malware sites or some other imagined bad sites then I suggest you get rid of it. This is course unless you suspect Thunderbird or Mozilla of nefarious intentions in which case you probably want to remove their products and use another mail client and browser.

Why does Thunderbird try and connect to the web? Because significant part off it are web pages. That is why there are so many external preferences loaded in the defaults.

Another response on this site states https://support.mozilla.org/en-US/questions/1251590 detectportal.firefox.com is used to detect captive portals on public wifi networks to be able to redirect you to their logon screen, so you don't just get page loading errors in firefox (set network.captive-portal-service.enabled to false in about:config in order to disable that feature). Thunderbird ises the Fireofx code base and will be doing the same of web pages.

I would guess without trying that status.geostruct.com is an attempt to verify the legitimacy of a geotrust SSL/TLS certificate issued by probably your mail server as Thunderbird.net uses lets encrypt and Firefox uses Amazon. I assume your connections are encrypted. Probably prompted by the setting Query OSCP responder servers to confirm the current validity of certificates.

I clicked the link you posted to thunderbird-settings.thunderbird.net which gave me a link to https://docs.kinto-storage.org/en/stable/overview.html where I read

At Mozilla, Kinto is used in Firefox for global synchronization of frequently changed settings like blocklists, experimentation, A/B testing, list of search engines, or delivering extra assets like fonts or hyphenation dictionaries.

Given Thunderbird is built on the Mozilla platform, I think we have an answer.

All I can say is in this day and age, software calls home extensively to report telemetry, load web pages and download settings appropriate for certain actions like configuring an account. TRying to prevent that is really limiting the software ability to function as a fairly basic level.

You have listed three of perhaps twice that number of sites Thunderbird will regularly connect to.

On startup it will load a web page from

https://live.thunderbird.net/

Opening the addon page will load Thunderbird.net pages as will viewing the release notes, or any of the entries on the help menu except about. Some open in a browser window, others open internally to Thunderbird. I have no idea what exact connections are made and I am not aware of any list or page that monitors them.

Checking for updates is not optional, The team do not want folk using old versions of the software as it exposes them to increased security risks as each version contains security enhancements. Updates can be managed in corporate situation using group policies. Otherwise stand alone users are limited in their options options to automatic install or not.

I won't post the user's reply to that (it is a bit lengthy) but he's not happy with the response. He just wants an email client that will connect to Google' email service using oAuth. As he says, he already has several web browsers and doesn't need another. He just wants his email program to do email and that's all, apparently.

I think maybe the Thunderbird developers have some explaining to do, particularly with regard to why they are forcing telemetry on users and giving them no way to opt out.

cross-posted from: https://lemmy.world/post/31800014 Please see the cross-post as it is updated.

view more: next ›