I’m the Never Ending Pie Throwing Robot, aka NEPTR.

Linux enthusiast, programmer, and privacy advocate. I’m nearly done with an IT Security degree.

TL;DR I am a nerd.

  • 4 Posts
  • 222 Comments
Joined 4 months ago
cake
Cake day: November 20th, 2024

help-circle


  • I personally like flatpak and its build system. Flatpak applications are sandboxed by default and don’t require root during any part of installation, reducing the risk of malicious/broken software damaging the host. They also are available for basically any base distro, meaning i can use the same apps if a ever distrohop and i can even just copy over the config folders as if nothing happened.





  • It seems like an interesting setup. I don’t really have too much to say other than nitpicks.

    Why not use Mullvad browser for both scenarios. Mullvad with security level safest should block all JS. You could create a 2nd profile for safest only mode.

    Using Linux .desktop launcher scripts, you could:

    • Create a .desktop launcher (in ~/.local/share/applications/) for each profile
    • Edit default desktop launcher to always prompt to choice profile on start (using the launch option -P)
    • Edit the default launcher to offer a menu option for each profile.

    Related to your choice of host OS, I personally avoid Debian for desktop because it is slow to adapt (cus its Debian). I know it isnt directly applicable to situation since your main concern seems to be anti-fingerprinting, but a secure base is important. I’d like to know your reason for picking it. I don’t dislike Debian and I still use it for different things (mostly VMs and some dev work).


  • Thanks for the rant, I liked your write-up.

    I think it may also help some people to create simple decision flowcharts to help with acting consistent and avoid making simple mistakes with a complex threat model. Basically a scenario and the decision tree. Say for example someone is using QubesOS and needs to keep consistent what each qube is for and why.

    Of course creating charts that show your strategy and make your decision predictable is itself just even more privileged information you now need to protect.

    Also, any effective threat model also requires consistent reevaluation to assess the effectiveness of your methods and adjust with the evolution of threats.













  • To a slightly lesser extent, Id also suggest avoiding noscript for the same reason. uBlock Origin can do everything that NoScript can and NoScript contributes as a metric to create your overall fingerprint. If need strong protection against fingerprinting, use Mullvad or Tor Browser. Use Librewolf if you need to customize, or want to change the defaults.