missfrizzle

joined 1 month ago
[–] missfrizzle@discuss.tchncs.de 0 points 2 weeks ago (2 children)

or maybe the amount of research I could be fucked to do on my phone on a Saturday to reply to some snide lemming topped out at not adding up subranges by hand.

I'm also skeptical of the RCE tallies, the more I look at them, given two JS sandbox escapes for FF were reported just days ago: https://www.mozilla.org/en-US/security/advisories/mfsa2025-73/

I don't understand why so many people on this site take every opportunity to attack each other, rather than extending the principle of charity.

[–] missfrizzle@discuss.tchncs.de 3 points 2 weeks ago (4 children)

Firefox CVEs

Chrome CVEs

93 code execution vulns in Chrome since 2015, 135 in FF. 975 memory corruption + 267 overflow for Chrome in that same time, while 142 + 536 respectively for FF, so in raw terms Chrome is higher, but A) most of the Chrome vulns are classified as DoS rather than RCE, which indicates their mitigations seem to work, and B) Chrome has way more market share, hence way more people finding vulns. Ladybird has like, 2 CVEs, but that doesn't mean it's way more secure than FF/Chrome, it means nobody's using it.

Opzero.Ru (the quickest exploit market I could find) will pay $200k for Firefox RCE but $500K for Chrome RCE. Lower prices either mean less demand (low browser market share) or high supply (more vulns already in their inventory.)

So no, I am not fear mongering. You may disagree with my conclusions but I'm trying to be objective.

[–] missfrizzle@discuss.tchncs.de 7 points 2 weeks ago (3 children)

it was created by @dessalines@lemmy.ml maybe they're a Russian troll? I don't think they are, but you could ask them :)

I'd trust an iPhone more than a random Samsung full of carrier bloatware, but I trust my Pixel running GrapheneOS more than either.

I have the USB-C port disabled for anything but charging, a duress pin, and reboots after 8 hours without a login. I'm honestly not sure if GrayKey could unlock it. I have memory tagging and a bunch of other hardening enabled, running only open-source apps I've verified the signatures of, running with minimal permissions. It would be hard to hack.

Yes, of course the NSA could almost certainly break it, but it would probably cost them time, money and vulns. If everyone uses GOS it will make their job very, very annoying :)

[–] missfrizzle@discuss.tchncs.de 14 points 2 weeks ago (2 children)

I'm trans and I very much care about not ending up in a concentration camp, please. (And yes I voted for Harris, but for the love of God can we take over the primaries next time, so the neoliberals are the ones holding their nose and voting?)

[–] missfrizzle@discuss.tchncs.de 14 points 2 weeks ago (6 children)

Lemmy is not really big enough yet to attract Russian trolls.

[–] missfrizzle@discuss.tchncs.de -1 points 2 weeks ago (6 children)

I disagree on dropping Chromium-based browsers. drop Chrome/Edge/etc. certainly, but Firefox is kept alive by a skeleton crew at this point, and almost certainly has more vulnerabilities than Chromium browsers. the sandboxing and process isolation, the defense in depth, it just isn't there.

I use Vanadium, which has all telemetry disabled, JIT off by default, and blocks ads.

[–] missfrizzle@discuss.tchncs.de -1 points 2 weeks ago

I don't trust corporations. I trust math, and code, and systems design. I trust AES-256, even though the NSA picked it, because 20 years of cryptography research has revealed nothing close to a break. I trust SELinux, even though NSA invented it, because hundreds of kernel devs from around the world have audited it and touch that code regularly. I trust even proprietary systems which have been extensively independently audited and reverse engineered by security researchers, though I do trust them less.

[–] missfrizzle@discuss.tchncs.de 8 points 2 weeks ago (2 children)

wtf? didn't Scrooge McDuck get drafted into the US Navy?

[–] missfrizzle@discuss.tchncs.de 1 points 2 weeks ago (13 children)

nope, neither of your sources says they can decrypt your content. in particular, from your first:

Data transmitted to Google and Apple includes metadata "detailing which app received a notification and when, as well as the phone and associated Apple or Google account to which that notification was intended to be delivered," Wyden wrote. Sometimes data shared may include "unencrypted content, which could range from backend directives for the app to the actual text displayed to a user in an app notification," Wyden warned.

as for your second, that's for unencrypted iCloud backups. you have to turn Advanced Data Protection on: https://www.macworld.com/article/2606947/icloud-encryption-how-secure-is-your-data.html

note that iCloud Calendar, Contacts and Mail can't be e2e encrypted, for fundamental reasons (notifications, discovery, SMTP.) but you don't have to use those.

[–] missfrizzle@discuss.tchncs.de 39 points 2 weeks ago (2 children)

they went after a Jewish sexologist who studied and advocated for trans people, so the Nazis really killed two birds with one stone. :|

view more: ‹ prev next ›