-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.xml
448 lines (433 loc) · 124 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Guides by Gunther</title>
<link>https://gunther.link/</link>
<description>Guides by Gunther</description>
<generator>Hugo -- gohugo.io</generator>
<language>en-us</language>
<lastBuildDate>Mon, 19 Dec 2022 19:00:00 +0000</lastBuildDate>
<atom:link href="https://gunther.link/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Mastodon and the Fediverse: A Social Media Revolution</title>
<link>https://gunther.link/posts/fediverse/</link>
<pubDate>Mon, 19 Dec 2022 19:00:00 +0000</pubDate>
<guid>https://gunther.link/posts/fediverse/</guid>
<description><p>I discovered the Fediverse about a year ago and was blown away. &ldquo;The Fediverse&rdquo; is a network of federated social media platforms including Mastodon, Pleroma, Pixelfed, and others. I talked to people in my life about what a cool idea federated social media is and was disappointed when people seemed more confused than excited. For most of its existence, the Fediverse was virtually unknown compared to the more mainstream, centralized alternatives. Recently however, a certain Twitter CEO&rsquo;s determination to burn the social media platform he bought to the ground has led one of the platforms on the Fediverse, Mastodon, to rise dramatically in popularity. Mastodon&rsquo;s rise is very well-deserved and I want to take advantage of Mastodon&rsquo;s moment in the sun to explore what about Mastodon, and the Fediverse more broadly, excites me so much. I also plan to confront some of the obstacles the Fediverse faces on the road to being a true replacement, both technologically and culturally, for centralized social media.</p>
<h3 id="the-current-social-media-hellscape" >The Current Social Media Hellscape
<span>
<a href="#the-current-social-media-hellscape">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>In order to understand the potential that the Fediverse has, we have to understand the current state of social media. Luckily (or unluckily), pretty much everyone with an internet connection is already familiar with our current social media hellscape, so I should only need to cover the basics briefly. Social media as we know it is addictive, dominated by ads and &ldquo;promoted posts&rdquo;, tracks its users so it can target ads to them, sells that data so others can do the same, censors benign content while promoting the most outrageous misinformation and hate speech, dictates what we see based on an unknowable algorithm, and much more, all to feed the social media companies&rsquo; bottom lines. Despite how crazy that list sounds, I don&rsquo;t think I know anyone who would say it isn&rsquo;t true. Yet, when confronted with the question of why we continue to use such toxic platforms, we all (myself included) have our answers. Whether its for our jobs, buying and selling goods, keeping up with the news, or even staying in touch with friends and family, the vast majority of people get enough utility from social media (or at least think they do) that they are willing to put up with the immense amount of garbage that inevitably comes with it. Like victims in an abusive relationship, we stay on these social media sites despite all the harm we admit they cause us, perhaps hoping things will improve, or just because we can&rsquo;t imagine ourselves living any other way. But what if there was a way to keep the benefits social media provides while getting rid of some, if not most, of the toxicity we have come to associate with it? This is the promise that the Fediverse offers.</p>
<h3 id="federation-and-why-it-is-good" >Federation and Why it is Good
<span>
<a href="#federation-and-why-it-is-good">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Federation as a communications technology concept is not new. Email uses it, telephones use it, old chat protocols like IRC and XMPP use it, as well as newer chat protocols like Matrix. Federated communications is really just the ability to communicate with someone else even if you have different communication providers. Gmail users can send emails to ProtonMail users, Verizon phones can talk with AT&amp;T phones, etc. That&rsquo;s all there is to it. Nevertheless, we are so used to social media being closed platforms controlled by a single, for-profit company, that the idea of federated social media is still mystifying to many of us.</p>
<p>Despite this, social media stands to gain so much from federation, which is a potential solution for many of the obvious problems that the the mainstream social media platforms struggle with. Social media moderation is an absolute nightmare on centralized platforms because you need to come up with a single set of rules that can be applied universally to users of different nationalities, ages, political beliefs, and cultural assumptions. Such a task is nearly impossible and usually ends in some users feeling that the platform is overmoderated, others feeling its undermoderated, and no one being happy. Most users either grumble and continue to use the platform despite its shortcomings or move to alternate platforms with minimal moderation, which often end up being cesspits and breeding grounds for radical ideologies.</p>
<p>Enter federation. By making a federated social media platform, each user can join an instance of their chosen social media platform (e.g. Mastodon) based on the type of moderation policy that instance has. This allows all users to join a platform with a moderation policy they agree with while not depriving them of the ability to speak to people who feel differently. Moderators can moderate as they like on their instance, and defederate with instances who they feel are beyond the pale. On the surface, this seems to return us to the exact same situation of different users being siloed into different platforms, but a closer look reveals this is not the case. On centralized platforms, you are either allowed or disallowed to participate on the platform, but federation allows for many more shades of gray. To take a (simplified and fictitious) political example, a far-left Mastodon instance might defederate from any instance that does not have leftist politics, a moderate left-leaning instance will defederate from far-right instances but remain federated with moderate right instances, while a centrist instance will remain federated with all instances. Now instead of a binary choice of users being either &ldquo;on&rdquo; or &ldquo;off&rdquo; the platform, there is a gradient of what type of instances are available and what type of interactions you will have based on the type of instance you choose to join. And the reality is even more nuanced, since instance moderators have a variety of different options at their disposal for how to federate with other instances besides &ldquo;yes&rdquo; or &ldquo;no&rdquo; and individual users also have the ability to mute or block entire instances on their own. And if the user decides they no longer like their instance, migrating to a new instance while keeping all of your followers can be done in just a few minutes.</p>
<p>Federation has other benefits too. Instead of being thrown into the sea of social media with millions of other users, federation allows users to start with a &ldquo;home base.&rdquo; It makes the task of creating community on social media so much easier. To be sure, other platforms have this as well. Servers on Discord, subreddits on Reddit, and even groups on Facebook can also provide this communal feeling. However, only the Fediverse holds the promise of each user choosing who moderates their entire instance, as well as who is in charge of protecting the data they generate while using the platform and determining how it is used. That is a choice that no one on Discord or Reddit gets to make. In addition, only the Fediverse offers to possibility of different platforms being able to communicate with one another. You can follow a Pleroma or Pixelfed account with your Mastodon account easily, try following a Facebook account on Twitter and you&rsquo;ll have a much harder time.</p>
<h3 id="open-source-and-non-profit" >Open Source and Non-Profit
<span>
<a href="#open-source-and-non-profit">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Another benefit of the Fediverse is that all of its platforms are open source and non-profit. Open source means that anyone can view and fork the source code for any of the platforms on the Fediverse. You have an idea for a Mastodon feature that the developers refuse to add? Fork the source code and add the feature yourself. The AcitivityPub protocol which powers the Fediverse will ensure that you can still communicate with instances using the &ldquo;official&rdquo; fork. There&rsquo;s simply no way to do that with centralized social media. The Fediverse&rsquo;s platforms&rsquo; non-profit nature also makes them markedly different from mainstream platforms. No ads? No promoted posts? No algorithm determining which posts you can see? All of this makes perfect sense if the platform isn&rsquo;t trying to squeeze every cent it can out of its users. This is likely the same reason why Mastodon has other excellent features that Twitter lacks, like the ability to automatically delete old posts or the ability to follow hashtags.</p>
<h3 id="isnt-it-complicated" >Isn&rsquo;t it Complicated?
<span>
<a href="#isnt-it-complicated">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>If you&rsquo;ve managed to read this far into this post, you likely have at least somewhat of an idea of how Mastodon and the Fediverse work. And yet, so many people who are interested in trying Mastodon insist that it is too hard to understand. For those who are technically knowledgeable and understand how the internet functions, the idea of federation is very intuitive. But for the vast majority of internet users, understanding how email works well enough to use it does not translate to the ability to map that understanding onto an entirely different context like social media. For most, understanding Mastodon is not intuitive and requires a real learning curve. That being said, the internet as a whole (including centralized social media platforms) required a learning curve for almost all of us. We&rsquo;ve lived with centralized social media for well over a decade now and have gotten used to how it functions, departures from that norm seem strange and confusing. But for those willing to put in a bit of effort into opening a new door, there&rsquo;s a real treasure waiting for them on the other side. Hopefully, the problems of centralized social media becoming more and more blatant will motivate more people to open that door. Understanding how Mastodon works can be a bit confusing, but once you actually start using it, you&rsquo;ll likely find that it is far more intuitive than you think.</p>
<h3 id="federation-cant-completely-kill-toxicity" >Federation Can&rsquo;t Completely Kill Toxicity
<span>
<a href="#federation-cant-completely-kill-toxicity">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Mastodon is a much less toxic place than Twitter. The benefits of federation I outlined above as well as very deliberate design choices (like lack of a quote Tweet analogue) make it that way. But you&rsquo;ll <a href="https://drewdevault.com/2022/07/09/Fediverse-toxicity.html">still encounter toxicity there</a>. Perhaps it&rsquo;s just a part of how people are, perhaps its the feeling of anonymity that the internet provides, but a certain amount of toxicity seems baked into social media. Anyone expecting the Fediverse to completely kill social media toxicity might be waiting a while, I&rsquo;m afraid.</p>
<h3 id="what-about-the-money" >What About the Money?
<span>
<a href="#what-about-the-money">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>The lack of a for-profit company behind Mastodon and the Fediverse means a lack of, well&hellip; profit. Mastodon depends on the largess its volunteer developers and/or donors. Despite this, Mastodon is an excellent and professional-looking piece of software; it really is impressive. But not all Fediverse platforms can say the same. Many are quite janky compared to the relatively polished feel of their mainstream competitors and even Mastodon has some rough edges when compared to Twitter. It&rsquo;s hard to compete with companies that have millions if not billions of dollars at their disposal. The question of how to fund development is an open one in the FOSS community and I&rsquo;m not going to solve it here. My impression is that Mastodon&rsquo;s new influx of user have been quite generous in financially supporting their instances and I hope that will continue. But centralized social media platforms offering us their services for &ldquo;free&rdquo; all these years have made most of us reluctant to part with even a small amount of money in exchange for a similar service. Hopefully, smart people will come up with a business model for the Fediverse that doesn&rsquo;t compromise on its values moving forward, but in the meantime I can only encourage those who enjoy the Fediverse to donate to their instances!</p>
<h3 id="lack-of-originality" >Lack of Originality
<span>
<a href="#lack-of-originality">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>While the Fediverse solves many problems with centralized social media, it has yet to introduce a platform that is truly <em>original</em> beyond the innovation of federation. Mastodon is essentially Twitter plus federation, Pixelfed is Instagram, Lemmy is Reddit, Friendica is Facebook, etc. This isn&rsquo;t to say that these platforms don&rsquo;t feel substantially different from their centralized counterparts, they do, but for the Fediverse to truly succeed, creative thinkers will have to think of new social media ideas that synergize with federation and aren&rsquo;t just derivatives of already extant platforms with federation added on top. Despite being heavily based off of Twitter, Mastodon works very well with federation, while other platforms, like Lemmy, benefit from federation, but not to the same extent. I&rsquo;m excited to see the first truly original social media concept on the Fediverse and the even greater growth the Fediverse can achieve once that happens.</p>
<h3 id="try-it-for-yourself" >Try it for Yourself
<span>
<a href="#try-it-for-yourself">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>I hope I&rsquo;ve been able to convey some of the excitement I have for the Fediverse while still being able to give an honest assessment of the shortcomings and where I think there&rsquo;s room to improve. If you&rsquo;re not already on the Fediverse, I urge you to give it a try. I really think you&rsquo;ll like it! <a href="https://joinmastodon.org/">joinmastodon.org</a> is a great place to start.</p>
</description>
</item>
<item>
<title>GrapheneOS: User Impressions</title>
<link>https://gunther.link/posts/grapheneos/</link>
<pubDate>Thu, 06 Oct 2022 10:00:00 +0000</pubDate>
<guid>https://gunther.link/posts/grapheneos/</guid>
<description><p>When I first started focusing on moving toward more privacy-friendly software and services, I knew that at some point I would want to install a custom OS on my phone. I&rsquo;ve always used Android as my mobile OS, and Android, being a Google product, is of course used to gather data on its users. While I was not as privacy-conscious when I bought my current phone a few years ago, by good fortune the model I purchased was a Google Pixel 3a, which is compatible with some top-tier custom OSes, including CalyxOS and GrapheneOS. The phone is getting somewhat old at this point (though it still runs pretty smoothly) and the Pixel 3a reaching end-of-life and no longer receiving software updates (including security updates) from Google was extra motivation for me to consider installing a custom OS. Even so, I was a bit nervous to install a new OS on the phone since doing so involves formatting the phone and entails a chance of bricking the device. I spent quite a while tinkering with various non-Google backup solutions for my phone so that I could import all my data to the formatted device without needing to rely on Google (<a href="https://syncthing.net/">Syncthing</a> was very useful for this). After I felt comfortable with my backups, I finally made the plunge and installed GrapheneOS on my device. I thought my experiences could potentially be useful to others who are considering a custom mobile OS and decided to write a post about it. This will not be a full review of GrapheneOS, but merely my impressions installing and using the software. I will be writing about GrapheneOS from the perspective of a layman/user, as I&rsquo;m not qualified to evaluate GrapheneOS from a technical standpoint.</p>
<h3 id="choosing-the-os" >Choosing the OS
<span>
<a href="#choosing-the-os">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>While there are quite a number of &ldquo;deGoogled&rdquo; and/or privacy-focused custom OSes that were available for my phone, the two that were most often recommended for Google Pixels were CalyxOS and GrapheneOS. Both are based on AOSP (Android Open-Source Project) and are focused on making Android a more privacy-friendly OS and limiting Google&rsquo;s control over the data stored on and generated from the device. Both also preserve <a href="https://source.android.com/docs/security/features/verifiedboot">Android&rsquo;s verified boot feature</a>, a security feature which is often not preserved in custom OSes.</p>
<p>While I was leaning more toward CalyxOS at first, the more I researched, the more I felt that GrapheneOS was the better option. While CalyxOS does preserve the security features of stock Android well (unlike other custom AOSP-based OSes which do not), GrapheneOS not only preserves the security features in stock Android, but <a href="https://grapheneos.org/features#grapheneos">improves on them in a variety of ways</a>. Additonally, GrapheneOS has a better track record than CalyxOS of <a href="https://www.privacyguides.org/android/grapheneos-vs-calyxos/#update-frequency">merging upstream updates on time</a>, which is also important for device security.</p>
<p>There were two factors that continued to pull me toward CalyxOS, however. The first was CalyxOS&rsquo; support for MicroG, which mimics Google Play Services and allows many apps that rely on Google Play Services to run on the phone even without Google Play Services installed. While having a phone without Google Play Services installed on it at all sounds nice in theory, in practice many of the apps I need day-to-day require Google Play Services to function properly. However, somewhat recently GrapheneOS added support for sandboxed Google Play Services, which allows Google Play Services to be installed on the phone while limiting its permissions and general access as compared to Google Play Services on stock Android. MicroG and sandboxed Google Play Services are two different models of attempting to limit Google&rsquo;s control over the device while preserving compatibility. MicroG is an open-source reimplementation of Google Play Services, which spoofs stock Google Play Services, requiring all the same elevated permissions that Google Play Services does and communicating with Google&rsquo;s servers. Sandboxed Google Play Services on the other hand, uses the standard, proprietary Google Play Services software, but treats it as a user app and denies many of the elevated permissions that stock Google Play Services and MicroG both require in order to work. Both solutions still send some information to Google and provide imperfect compatibility with apps that require Google Play Services. Nevertheless, by all reports sandboxed Google Play Services provides at least as much compatibility as MicroG and <a href="https://www.privacyguides.org/android/grapheneos-vs-calyxos/#sandboxed-google-play-vs-privileged-microg">seems to be a more secure implementation as well</a>.</p>
<p>The second factor that pulled me toward CalyxOS was the drama surrounding GrapheneOS and its founder and lead developer, Daniel Micay. GrapheneOS started its life as CopperheadOS, but after a feud between Micay and James Donaldson, Copperhead&rsquo;s CEO, Micay left Copperhead and started GrapheneOS. Both Micay and Donaldson claim that they have the rights to the CopperheadOS source code and are <a href="https://en.wikipedia.org/wiki/CopperheadOS#License_change_and_departure_of_Daniel_Micay">currently in a legal dispute over these rights</a>. Given that Micay was clearly the technical brains behind CopperheadOS and the fact that <a href="https://mamushi.io/2021/04/12/departing-from-copperhead/">other of Donaldson&rsquo;s former business associates aren&rsquo;t very complimentary of him</a>, this dispute alone is not very concerning. However, Micay, and by extension the GrapheneOS project and community, have gotten in feuds with a number of other privacy-focused and FOSS projects. The list includes but is not limited to: <a href="https://youtu.be/Dx7CZ-2Bajg">Techlore</a>, <a href="https://twitter.com/DanielMicay/status/1512254304006119427">CalyxOS</a>, <a href="https://forum.f-droid.org/t/what-are-the-issues-fdroid-have-about-security/17520">F-Droid</a>, <a href="https://web.archive.org/web/20210613225002/https://sethsimmons.me/posts/community-drama-and-mobile-os/">Seth For Privacy</a>, and <a href="https://github.com/bromite/bromite/issues/2141">Bromite</a>.</p>
<p>Now, is it possible that all of these projects are in cahoots against Micay and GrapheneOS and have organized misinformation and harassment campaigns against the project as Micay claims? I haven&rsquo;t seen any evidence of these campaigns myself, but sure, it&rsquo;s possible. Is it also possible and perhaps more likely that Micay is simply a little paranoid, maybe because of his bad experiences at Copperhead? Absolutely. However, while Micay has been somewhat acrimonious toward many of these projects, he seems genuine in believing that these other projects are looking to damage GrapheneOS and his behavior toward them generally seems to be better characterized as unprofessional rather than abusive. While that is still unfortunate, I don&rsquo;t think it&rsquo;s a good reason not to use and even support the GrapheneOS project, especially when many of the projects that GrapheneOS feuds with admit that GrapheneOS is an excellent OS and that Micay is a genius developer. It is still concerning that GrapheneOS has such poor relationships with other FOSS projects since the success and longevity of FOSS projects is often dependent on incorporating code from other projects. However, GrapehenOS has a whole team of talented developers and contributors, so perhaps they can continue making a successful product even without collaboration with other prominent FOSS projects. Ultimately, this drama, while somewhat concerning, did not seem like a good reason for me to choose an alternative custom OS over Graphene.</p>
<h3 id="installation" >Installation
<span>
<a href="#installation">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>While I have never installed a custom OS on my phone before, I do have some experience installing custom firmware on video game consoles and by comparison, installing GrapheneOS is an absolute breeze. I used the <a href="https://grapheneos.org/install/web">web installer</a> for the installation process and doing so was very straightforward. Once you have your phone connected to your PC, the process is basically just pressing a few buttons while the web installer does all the hard work for you. I did run into problems when trying to use UnGoogled Chromium as the browser for the install, but the good folks the GrapheneOS Matrix room informed me that while vanilla Chromium is compatible with the web installer, UnGoogled Chromium is not. I ended up using Brave for the install, which worked very well and I didn&rsquo;t hit any other snags in the installation process. Even if you have minimal technical expertise, using the web installer should be no problem.</p>
<h3 id="ux" >UX
<span>
<a href="#ux">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>After installing GrapheneOS, the setup experience was very similar to stock Android with the obvious exception of not needing a Google account. By default the UI is very bare, but this is by design. The only apps that are installed by default include reskinned versions of some basic AOSP apps (Phone, Contacts, Messages, Settings, etc.), Vanadium (GrapheneOS&rsquo; hardened version of Chromium), and GrapheneOS&rsquo; &ldquo;app store&rdquo;. I put &ldquo;app store&rdquo; in quotes since it is only used for GrapheneOS&rsquo; first-party apps, most of which are system apps which come preinstalled. The app store also includes sandboxed Google Play Services, though I will discuss that more in-depth in a bit. The general UI of the phone is basically identical to stock Android and should be familiar to anyone who is used to the stock version of the OS. After adding some apps and a custom background, my phone with GrapheneOS looks mostly indistinguishable from when it was running stock Android.</p>
<h3 id="sandboxed-google-play-services" >Sandboxed Google Play Services
<span>
<a href="#sandboxed-google-play-services">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>While I could get some apps running on GrapheneOS as-is, the vast majority of apps require Google Play Services to work properly. Installing sandboxed Google Play Services from Graphene&rsquo;s app store is pretty simple and can be done in a few taps. While some basic Google Play Services functionality can work without being logged in to a Google account, most apps will need the full Google Play Services suite, which includes the Google Play Store and in order for the Play Store to function, you will need to log in to a Google account. You can of course make a &ldquo;throwaway&rdquo; account specifically for this purpose, though it would not surprise me if Google has ways of correlating accounts with each other, especially if you ever log in to your personal account on the same device. You can then use the Google Play Store to install apps, though you can of course also use F-Droid or Aurora Store. Once the full Google Play Services suite was installed and I was logged into my Google account, I was really impressed with the app compatibility. I did struggle a little bit with some apps at first, but after some experimenting and tweaking, I have yet to encounter a single app that I couldn&rsquo;t get working with sandboxed Google Play Services. This even includes some banking apps, which apparently don&rsquo;t always work well with sandboxed Google Play Services. You can further limit Google Play Services by installing it only in a specific user profile or a work profile, though I am currently just using it on the main user profile for the sake of convenience.</p>
<h3 id="security-features" >Security Features
<span>
<a href="#security-features">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Most of GrapheneOS&rsquo; security features are under the hood, but there are some that you will notice. First is the obvious lack of any proprietary Google apps on the phone by default, as I have already discussed. Second, is the expanded permissions capability. While stock Android allows you to control some permissions (such as camera or location access) for most apps, GrapheneOS allows you to control the sensors and network permissions as well. This network toggle in particular is a very powerful tool which can prevent any app you choose from connecting to the internet. This feature made me more comfortable installing some proprietary apps that I enjoy using but have no need for internet access. On stock Android, I have no choice but to allow them access anyway (and likely send data the app collects back to the developers) or else use an imperfect firewall solution like <a href="https://netguard.me/">Netguard</a>. GrapheneOS lets me deny these apps network access on the operating system level, which is a far more ideal solution.</p>
<p>These permission toggles are available for Google Play Services as well, meaning you can decide exactly what permissions Google&rsquo;s apps have on your phone even if you do choose to install them, which is simply impossible on stock Android. While this lessens some of the seamless experience of stock Android (I often have to manually approve requests for access from Google Play Services), the gain in privacy and security is definitely worth it. I can even install Google apps like GBoard on my phone and simply disallow them from using the internet, which they don&rsquo;t need anyway. I even denied the network permission to the Google Play Store (I either download my apps manually or get them from F-Droid or Aurora Store) and found that app compatibility still works just fine. While the basic Google Play Services apps continue to have network access, I have still greatly limited the number of avenues Google has to siphon data from my phone, which feels really great!</p>
<p>The other security feature you may notice is <a href="https://grapheneos.org/usage#exec-spawning">&ldquo;secure app spawning&rdquo;</a>, which will cause a slight delay when opening apps. This delay is noticeable, but still quite short and it didn&rsquo;t impact my usage of the phone at all. However, if you want to disable it, you can do so in the phone&rsquo;s security settings and apps will open without the delay.</p>
<h3 id="conclusion" >Conclusion
<span>
<a href="#conclusion">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Overall, I am quite happy with GrapheneOS. I did have to struggle a little bit with getting the sandboxed Google Play Services to work as I like, but at this point all the apps I need run smoothly and I haven&rsquo;t had any compatibility issues. While GrapheneOS&rsquo; web installer is very easy to use, I still don&rsquo;t think I can recommend the OS to my non-tech savvy friends and family. A fair bit of setup and tinkering with sandboxed Google Play Services was required for me to get it working smoothly and many of GrapheneOS&rsquo; best security features would likely go unused and/or unappreciated, while the usability sacrifices would still be noticeable. For me personally however, GrapheneOS is a great fit and when I get my next phone, installing GrapheneOS on it will likely be the first thing I do.</p>
</description>
</item>
<item>
<title>10 Basic Steps to Digital Privacy</title>
<link>https://gunther.link/posts/privacy-basics/</link>
<pubDate>Tue, 23 Aug 2022 19:30:00 +0000</pubDate>
<guid>https://gunther.link/posts/privacy-basics/</guid>
<description><h3 id="introduction" >Introduction
<span>
<a href="#introduction">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Though digital privacy is complex and achieving &ldquo;complete&rdquo; or &ldquo;100%&rdquo; privacy is virtually impossible, that doesn&rsquo;t mean there aren&rsquo;t simple steps you can take to improve. Most people&rsquo;s digital privacy practices are pretty poor, which may be disheartening, but it also means that there is a lot of low-hanging fruit to be picked from the metaphorical digital privacy tree. Even if you have already put all of the steps I&rsquo;m about to list into practice, consider sending this blog post to a friend or family member who may not have. And perhaps even digital privacy veterans will find one or two new ideas here. The following steps will go in order of those I consider to be relatively easy to actualize to ones I consider to be relatively difficult, but they should all be accessible to the technological layman. Additionally, this list focuses more on digital privacy than digital security and while the two often go hand-in-hand, your threat model may require you to focus more on security than privacy. Make sure to take your personal needs into account and fact check the information here before blindly following it. That said, I hope you find it useful!</p>
<h3 id="1-change-your-web-browser" >1. Change Your Web Browser
<span>
<a href="#1-change-your-web-browser">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>If you&rsquo;re like most people, statistically, you are using Google Chrome as your primary web browser. On top of the open-source Chromium browser base, Google adds a variety of <a href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">what can only be described as spyware</a> to track your every move on the web. Every website you visit and likely much more is meticulously logged and recorded by Google so they can use the data to target or &ldquo;personalize&rdquo; ads toward you. The good news is that there are plenty of privacy-respecting alternatives to Google Chrome. The two easiest desktop browsers to recommend are the <a href="https://brave.com/">Brave Browser</a> and <a href="https://www.mozilla.org/en-US/firefox/new/">Mozilla Firefox</a>. Both are miles ahead of Google Chrome in terms of privacy and also very user-friendly. <a href="https://privacytests.org/">Brave is the more private by default</a> and includes a built-in ad and tracker blocker. However, it also includes the somewhat annoying integration of its <a href="https://basicattentiontoken.org/">BAT cryptocurrency</a>, though this can be disabled. If you want a browser that can just be downloaded and used relatively privately as-is, Brave is not a bad choice. If you&rsquo;re willing to play with the settings, however, Firefox can become a powerfully private browser (using <a href="https://github.com/arkenfox/user.js">Arkenfox</a> is a great way to achieve this). There are other private browsers out there as well, though Brave and Firefox are the simplest to recommend as drop-in Chrome alternatives. If you want to look into other options a bit more deeply, <a href="https://unixsheikh.com/articles/choose-your-browser-carefully.html">this article</a> is not a bad place to start. The mobile browser landscape is a bit more complex than desktop browsers&rsquo;, but I would still continue to recommend Firefox and Brave as solid, private options for both iOS and Android (they are both certainly a step up from Chrome).</p>
<h3 id="2-switch-up-your-search-engine" >2. Switch Up Your Search Engine
<span>
<a href="#2-switch-up-your-search-engine">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Even though you&rsquo;ve changed your web browser, you are still, statistically, using Google as your search engine and this needs to change. Google of course records every search you make regardless of whether or not you use their browser. While Chrome&rsquo;s more private competitors are just as good as (if not better) than Chrome, the same can&rsquo;t quite be said for private Google search alternatives. While many of them are quite good, none of them are <em>quite</em> as feature-rich and intuitive as Google is, and their search results are often lower quality. Nonetheless, the drop in usability is relatively minor and a worthwhile price to pay for the privacy to be gained. The most commonly recommended private alternative to Google Search is <a href="https://duckduckgo.com/">DuckDuckGo</a>, which is not a bad search engine by any means, though its results (<a href="https://en.wikipedia.org/wiki/DuckDuckGo">mostly sourced from Microsoft&rsquo;s Bing</a>), are often not quite as good as Google&rsquo;s. If you want privately proxied Google results, then <a href="https://www.startpage.com/en/">StartPage</a> is a great option, since they simply pull from Google&rsquo;s results and pass them on to you without Google&rsquo;s personalization and tracking, but also without some of Google&rsquo;s fancier features. <a href="https://search.brave.com/">Brave Search</a> is also notable for having its own search index (rather than pulling from Google or Bing as Startpage and DuckDuckGo do) and its search results aren&rsquo;t half-bad, though not quite on par with Google&rsquo;s. There are other private alternatives as well (the self-hostable <a href="https://searx.space/">Searx</a> certainly deserves a mention), but any of the initial 3 I mentioned should serve just fine as a private Google search alternative. Feel free to try a few and use the one you like most.</p>
<h3 id="3-use-a-password-manager" >3. Use a Password Manager
<span>
<a href="#3-use-a-password-manager">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Using the same, easy-to-remember password for every online account you have is easy, but it&rsquo;s also a terrible idea. It&rsquo;s not a matter of <em>if</em> a service you use will get breached, but <em>when</em> (check <a href="https://haveibeenpwned.com/">haveibeenpwned.com</a> to see if your information was already leaked). The most viable solution to this is to use a strong (preferably randomized) and unique password for each of your accounts. The only way to have access to all these different passwords while storing them securely is to use a password manager. A dedicated password manager is far more secure than writing the password down or storing them in a spreadsheet and is even <a href="https://www.howtogeek.com/447345/why-you-shouldnt-use-your-web-browsers-password-manager/">more secure than using the in-browser password manager</a>. There are a lot of password managers out there and using almost any of the well-known ones is better than using the same password everywhere, but the two generally best options are <a href="https://bitwarden.com/">Bitwarden</a> and <a href="https://keepassxc.org/">KeePassXC</a>. Bitwarden is a cloud-based solution and is probably more convenient for most people, while KeePassXC will store your passwords encrypted on your desktop. Both of these password managers also have the ability to generate strong, random passwords for you as well as browser extensions which automatically fill those passwords into the login pages of each website you visit. While transitioning to using a password manager can be difficult at first, it will make your life much easier once you get used to it, and make your online accounts much safer as well! To further secure your online accounts, you may also want to consider adding <a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">two-factor authentication</a> to the accounts that support it.</p>
<h3 id="4-get-a-better-messenger" >4. Get a Better Messenger
<span>
<a href="#4-get-a-better-messenger">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Messages between our friends and family contain some of the most sensitive information about our personal lives, so it is important to choose a private and secure tool for sending and receiving those messages. SMS in an unencrypted protocol and your SMS messages can easily be <a href="https://www.howtogeek.com/709373/why-sms-text-messages-arent-private-or-secure/">read by your cell service provider</a> or by a <a href="https://krebsonsecurity.com/2021/03/can-we-stop-pretending-sms-is-secure-now/">intercepted by a bad actor</a>. Some proprietary messengers, such as WhatsApp and iMessage are end-to-end encrypted by default, which means that only the sender and receiver of a message can read its contents. However, these services can use the metadata of your conversations (such as who you message and when) to build your advertising profile. Additionally, both WhatsApp and iMessage back up all your messages unencrypted to the cloud (either Google Drive or iCloud) by default, undermining much of the privacy provided by their end-to-end encryption. While there are a few options out there for private and secure messengers, the easiest to recommend by far is <a href="https://signal.org/en/">Signal</a>. Signal&rsquo;s features are on par with competing messenger apps and its privacy and security are top-notch as well. It&rsquo;s also free to use. While Signal may not be perfect (it requires a phone number to register and is a centralized service), it is <a href="https://en.wikipedia.org/wiki/Signal_(software)#Security">extremely well-vetted in terms of its security</a> and in addition to being end-to-end encrypted by default, <a href="https://signal.org/bigbrother/">stores close to zero metadata on its users</a>. While there are other private messaging options out there like <a href="https://getsession.org/">Session</a> and <a href="https://threema.ch/en">Threema</a>, Signal strikes the best balance between privacy, security, and usability. Usability is far more important for a messenger than it is for a browser or search engine, since not only do you have to be convinced that the privacy and security gains are worth any usability losses, but you have to convince your friends and family too or you won&rsquo;t have anyone to message with!</p>
<h3 id="5-minimize-and-scrutinize-apps-and-browser-extensions" >5. Minimize and Scrutinize Apps and Browser Extensions
<span>
<a href="#5-minimize-and-scrutinize-apps-and-browser-extensions">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Every program you install on your computer, every app you install on your phone, and every extension you install in your browser is a potential security and privacy risk. These programs, apps, and extensions all have privileged access to your device and a compromised device can undo any progress you have made in your digital privacy by sending your personal data directly to bad actors. Even if the app or extension is not inherently malicious, it can provide an attack surface that can be exploited by malware. A simple step you can take to greatly mitigate this risk is to be very selective when installing computer programs, apps, and extensions. The fewer you have, the lower the chances that one of them will be turned into a backdoor into your device. Many mobile apps and PC programs can be replaced with a <a href="https://www.pcmag.com/how-to/how-to-use-progressive-web-apps">progressive web application</a>, which is essentially a browser shortcut icon on your phone or desktop homescreen that can provide much of the same functionality as a fully-fledged application with significantly less of a security risk since it runs through your browser rather than as an independent program. While many browser extensions can be deleted without losing much, you should strongly consider using a tracker-blocking extension like <a href="https://ublockorigin.com/">uBlock Origin</a>. For the remaining programs and apps that you do need, consider looking for an open-source alternative to the more likely more popular proprietary options. While open source software isn&rsquo;t necessarily guaranteed to be any more private and secure, developers who make privacy-friendly software tend to make that software open source so that the source code can be reviewed and shown to be as privacy-friendly as its developers claim. All of the programs that have been suggested in this guide so far, like Firefox and Signal, are open source software!</p>
<h3 id="6-sign-up-for-a-privacy-respecting-email-service" >6. Sign Up for a Privacy-Respecting Email Service
<span>
<a href="#6-sign-up-for-a-privacy-respecting-email-service">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>The email protocol is relatively old and not very secure or private by design, but virtually everyone nowadays needs an email address. So while all of your personal and sensitive communications should go through a private and secure messenger like Signal, using a privacy-friendly email provider is still an important step toward digital privacy. Email providers like Gmail can and do <a href="https://www.theguardian.com/technology/2017/jun/26/google-will-stop-scanning-content-of-personal-emails">read your emails and use their metadata to build your advertising profile</a>. If you&rsquo;re looking for an in-depth discussion of different privacy-respecting email providers, you should check out <a href="https://gunther.link/posts/email/">my review</a>. In short however, the easiest free, drop-in replacement for Gmail I can recommend is <a href="https://proton.me/mail">ProtonMail</a>.</p>
<h3 id="7-eschew-iot-devices" >7. Eschew IoT Devices
<span>
<a href="#7-eschew-iot-devices">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>The <a href="https://en.wikipedia.org/wiki/Internet_of_things">&ldquo;internet of things&rdquo;</a> describes the growing number of household devices that can be connected to the internet. Once upon a time, only desktop computers were able to connect. Then, our cell phones graduated to &ldquo;smart phones&rdquo; with internet connectivity. Nowadays, almost every personal and household device has a &ldquo;smart&rdquo; version. Smart TVs, smart thermostats, smart watches, smart vacuums, smart beds, smart doorbells, and smart refrigerators, in addition to home media centers, video game consoles, and ebooks, just to name a few. But the internet of things is not good for your privacy. It is an open secret that companies use these devices to <a href="https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data">spy on their users</a>, gathering more personal data for their advertising profiles. IoT devices often have weak security and can be prime targets for cybercriminals looking to <a href="https://blog.radware.com/uncategorized/2018/03/history-of-iot-botnets/">build botnets</a> or gain a foothold in your home network. To top it off, many of these &ldquo;smart&rdquo; devices don&rsquo;t even provide much utility beyond the device&rsquo;s basic, offline functions anyway. Consider buying devices and gadgets that do not connect to the internet and if you do buy a smart device, consider leaving it offline. If you do require an IoT device, make sure to change any default security credentials and to opt out of any analytics and tracking that you can in the device or account settings.</p>
<h3 id="8-limit-social-media-usage" >8. Limit Social Media Usage
<span>
<a href="#8-limit-social-media-usage">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Social media is a ubiquitous part of modern life, but in addition to its <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4183915/">deleterious effects on mental health</a>, it is also bad for privacy. Social media companies are some of the most privacy-violating and Facebook (which also owns Instagram), is particularly infamous for its <a href="https://www.techrepublic.com/article/facebook-data-privacy-scandal-a-cheat-sheet/">invasive data collection from its users</a>. But even if social media companies didn&rsquo;t so nakedly violate their users&rsquo; privacy, most social media sites center around posting your personal information on the public internet and trying to get as many people to see and interact with it as possible! The best advice to prevent this is to simply delete your social media profiles altogether, though this is impractical for many of us for either social or professional reasons. If you do decide to keep your social media accounts, make sure you&rsquo;re not leaking any more private information than you need to. Consider deleting social media apps from your phone and only accessing the services via your browser (this is good for preventing late-night doomscrolling as well). Go through your accounts&rsquo; privacy settings and make sure your information isn&rsquo;t being shared more widely than it needs to be (checking your account privacy settings is also a good idea for your other privacy-invasive services you may have as well, like Google). Finally, think carefully before posting information or adding information to your social media profiles. Make sure the information really needs to be there and check whether it contains any personal details you would prefer to not be public knowledge. You may also want to consider using social media pseudonymously where possible. While keeping your real-life identity and a social media pseudonym completely disconnected can be quite difficult, that&rsquo;s no reason to add more personal information about yourself that will show up with a simple internet search of your real name. <a href="https://en.wikipedia.org/wiki/Fediverse">The Fediverse</a> can also be a good alternative to proprietary social media services since many instances of fediverse platforms are open source and relatively privacy-respecting, but even these upsides don&rsquo;t change the need to be cautious with what information you post!</p>
<h3 id="9-change-your-dns-provider-andor-use-a-vpn" >9. Change Your DNS Provider and/or Use a VPN
<span>
<a href="#9-change-your-dns-provider-andor-use-a-vpn">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Believe it or not, your ISP is another company that is likely <a href="https://arstechnica.com/tech-policy/2017/03/senate-votes-to-let-isps-sell-your-web-browsing-history-to-advertisers/">mining your internet activity to sell to data brokers</a>. However, there are some simple steps you can take to mitigate this risk. Firstly, you can change your DNS provider. DNS is the protocol by which domain names (like example.com) are translated to IP addresses, which computers use to connect to other servers. By default, you are likely using your ISP&rsquo;s default DNS resolver, but you can do better. Go into your internet router&rsquo;s settings and change the DNS resolver servers to a more private provider like <a href="https://www.quad9.net/">Quad9</a> or <a href="https://adguard-dns.io/en/public-dns.html">AdGuard</a>. Both of these DNS resolvers block domains associated with malware and AdGuard blocks domains associated with advertisements and tracking as well. In addition to changing your DNS resolver in your router settings, you can also change it in your PC or phone device settings or in your browser settings. This has the advantage of working even when not connected to your home network and can take advantage of <a href="https://www.cloudflare.com/learning/dns/dns-over-tls/">encrypted DNS lookup protocols</a>. If you&rsquo;d like to set up a custom ruleset for your DNS resolver to block any domain you&rsquo;d like, <a href="https://adguard-dns.io/en/welcome.html">Adguard can do that for you</a> and so can <a href="https://nextdns.io/">NextDNS</a>. Of course, hiding your DNS queries from your ISP still allows them to see every IP address you connect to. This can be prevented by using a trustworthy VPN provider. Many VPN providers will claim a variety of benefits that come from using a VPN but these are often exaggerated and the main privacy benefits are (1) hiding the servers you connect to from your ISP and (2) hiding your own IP address from the servers you connect to. Of course, by using a VPN service to achieve these goals, you are simply shifting your trust from your ISP to the VPN provider, so make sure the VPN provider you use is trustworthy! Almost all free VPNs, and even many paid VPNs, are collecting and selling your data. The most-trusted VPN services as of this writing are <a href="https://protonvpn.com/">ProtonVPN</a>, <a href="https://mullvad.net/en/">MullVad</a>, and <a href="https://www.ivpn.net/">IVPN</a>. There are a few free and trustworthy VPN options, such as <a href="https://protonvpn.com/plans/">ProtonVPN&rsquo;s free tier</a>, <a href="https://riseup.net/en/vpn">RiseUp VPN</a>, and <a href="https://www.calyx.net/">CalyxVPN</a>, but these often have throttled speeds and as a general rule you should expect to pay for a trustworthy VPN service. Another free option that provides the privacy benefits of a VPN (and a lot more as well) is the <a href="https://www.torproject.org/download/">Tor Browser</a>. Unlike VPNs, the Tor Browser <a href="https://www.techradar.com/vpn/what-is-tor-and-how-does-it-work">distributes trust amongst multiple third parties</a> and does its best to allow you to browse the web anonymously. However, your browsing speeds using Tor will be quite slow compared to using a standard web browser with a quality VPN, so it may not always be the best solution.</p>
<h3 id="10-remove-your-data-from-people-search-sites" >10. Remove Your Data from People-Search Sites
<span>
<a href="#10-remove-your-data-from-people-search-sites">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>Believe it or not, there are many sites out there which are <a href="https://www.theverge.com/2017/3/21/14945884/people-search-sites-history-privacy-regulation">designed just to collect information about you and sell it to anyone interested</a>. Creepy, right? Well, luckily many of these sites have the option to opt-out and remove your data from the site, but this is a slow and arduous process by design. The potential upside of removing this (sometimes very invasive) data about yourself from the web is high, but will require significant amounts of either your time or money to achieve, which is why it is the last step on this list. If you&rsquo;d like to request removal of your information from each of these sites manually, you can find a pretty good guide for doing that <a href="https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List">here</a>. There are also paid services which will do this grueling task for you like <a href="https://joindeleteme.com/">DeleteMe</a> (some other paid services are reviewed in <a href="https://yewtu.be/watch?v=ts6fqahljPE">this video</a>).</p>
<h3 id="conclusion" >Conclusion
<span>
<a href="#conclusion">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h3><p>This is hardly an exhaustive list of steps that can be taken to improve your digital privacy, but the steps that are listed should be relatively accessible to a wide audience and have a large positive impact in proportion to how much effort they require. If you&rsquo;d like to learn more about how to improve your digital privacy, <a href="https://www.privacyguides.org/">Privacy Guides</a> is probably the best online resource currently out there, but it&rsquo;s certainly not the only one! I hope the steps I have listed here will help at least a few people start working toward making their digital lives a bit more private as big tech companies work tirelessly to make sure they are anything but.</p>
</description>
</item>
<item>
<title>Tracking Opacity and the Cause of Consumer Indifference</title>
<link>https://gunther.link/posts/tracking_opacity/</link>
<pubDate>Wed, 27 Jul 2022 00:00:00 +0000</pubDate>
<guid>https://gunther.link/posts/tracking_opacity/</guid>
<description><p>People who care about privacy online are often frustrated by the inability of the masses, often including their friends and family, to see the importance of using privacy-preserving online services. But companies like Google and Facebook work very hard to make sure people reach the conclusion that online privacy simply isn&rsquo;t that important. The first and most obvious way they do this is by offering genuinely good services. Millions if not billions of dollars are used to develop Google&rsquo;s and Facebook&rsquo;s products to make them as seamless and user-friendly as possible. A FOSS, privacy-preserving alternative to Gmail for example, will often have trouble raising even a fraction of the funds available to Gmail to develop their product. While some dedicated and talented developers can make up for some of the lack of funding, even FOSS developers need to eat and they are competing against Google&rsquo;s engineers and developers, who are well-paid, well-organized, and well-funded. Meanwhile, Google funds its services from selling its users&rsquo; data, meaning it can offer these services to them at no (monetary) cost. The FOSS developer has to therefore find a way to fund their project without charging the user at risk of being even a less attractive alternative to Google. Sure, they can proudly claim that they don&rsquo;t sell user data, but to the average user, that&rsquo;s likely not enough of a reason to sacrifice features and usability and perhaps having to pay a fee to boot. Many privacy-preserving FOSS products and services overcome these challenges and manage to use innovative monetization to build a niche market for themselves, but these are relatively few and far-between and are constantly fighting an uphill battle in an attempt to compete with big tech.</p>
<p>Big companies also rely heavily on the network effect. How can a FOSS, privacy-preserving messenger beat out WhatsApp or iMessage when choosing the alternative messaging service will mean being unable communicate with the vast majority of people who still use the mainstream services? The <a href="https://en.wikipedia.org/wiki/XMPP#Decentralization">decentralized nature of something like XMPP</a> is certainly more the exception than the rule when it comes to modern messengers and even an open-source, private messenger like Signal locks its users into using its servers to communicate. Google&rsquo;s integration into Android devices is another permutation of the same principle. Why should a user bother looking for a different cloud storage provider or local backup solution that they will then have to configure when Google Drive is already integrated with their Android device, no setup required?</p>
<p>So convenience and price are clearly big motivators when it comes to why people ignore the privacy-invasive practices of big tech. But perhaps the most common reason people give is that they simply don&rsquo;t care. <a href="https://www.theguardian.com/technology/2010/jan/11/facebook-privacy">Mark Zuckerberg infamously said in 2010 that &ldquo;privacy is no longer a social norm.&rdquo;</a> And many people are quick to agree. &ldquo;I have nothing to hide.&rdquo; &ldquo;It&rsquo;s impossible to be private nowadays anyway.&rdquo; &ldquo;I don&rsquo;t really care if Google reads my search history.&rdquo; These are refrains familiar to anyone who has tried to convince their friends and family of the value of digital privacy.</p>
<p>However, I would argue that most people do care about their privacy. Claiming they do not is only possible because of the siren song of convenient services that big tech offers and the ignorance of what digital privacy really means. One of the strongest weapons that Google and other surveillance companies have in their arsenal is tracking opacity, the opposite of transparency. My impression is that most people are aware that Google stores and sells their &ldquo;data,&rdquo; but very few people have a concrete idea of what that means. And that is just how Google likes it. It is very easy to use Google services and forget that they are observing everything you do. They don&rsquo;t announce it, it happens silently. Even when you open Google Maps and see a list of all of the locations you previously searched for, it is easy to see that information as only available to you. It is only available on your device after all, or only when logged into your account. Google never openly <em>claims</em> that this information is only available to you, but it works very hard to make you <em>feel</em> that way. In the early days of tech, almost all of our personal data was stored locally. This very much habituated us to the idea that only we had access to our data. In the decades since, almost everything has moved to the cloud, but our mindsets have not changed. The obvious differences between writing a digital diary on Microsoft Word in 1995 and on Google Docs in 2022 are the better features Google Drive provides and the convenience of being able to access the file on almost any device. The fact that in 2022 the data is stored on Google&rsquo;s servers where they are freely able to do what they wish with it doesn&rsquo;t come to mind. giving its users the illusion of data sovereignty is very much a deliberate design choice on Google&rsquo;s part.</p>
<p>Tracking opacity generally manifests in two ways: (1) opacity of what data is collected and (2) opacity of how that data is used. Most people don&rsquo;t realize that their <a href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/">Android phones are nearly constantly sending their physical location to Google</a> because Google makes it very difficult to see that they are in fact doing that. Occasionally, Google or <a href="https://en.wikipedia.org/wiki/Lane_v._Facebook,_Inc.">Facebook will slip up and reveal to their users just how invasive their tracking is</a>, but at any hint of outcry, they will <a href="https://www.cnbc.com/2018/04/04/mark-zuckerberg-facebook-user-privacy-issues-my-mistake.html">claim it was a &ldquo;mistake&rdquo;</a> and make <a href="https://apnews.com/article/828aefab64d4411bac257a07c1af0ecb">superficial changes which make the tracking harder to see without actually getting rid of it</a>. Even if you do realize that your location data is being sent to Google, you have no idea what its being used for. Google and other companies make sure to have long terms of service agreements and privacy policies filled with legalese that most people will not have the time or energy to read and would not be able to understand even if they did. Even after reading and understanding these policies, the exact way Google uses to data is still incredibly vague. Phrases like &ldquo;improve services&rdquo; and &ldquo;shared with our partners&rdquo; are extremely general and tells the user almost nothing about what their data will actually be used for.</p>
<p>Is it any wonder that so many people claim to not care about their privacy when companies like Google make it so hard to understand what data is being collected and how it&rsquo;s used? As long as this is unclear, people have plausible deniability. Paranoid, privacy-conscious people will assume Google is collecting all the data it can and using it for whatever purposes make it the most money, while less paranoid people won&rsquo;t pay the issue much mind at all. Google has specifically designed a system so that they don&rsquo;t have to.</p>
<p>Unfortunately, I have no real solutions to offer here. The best solution would likely be some sort of privacy transparency law which would require companies to simply, clearly, and explicitly outline what data is collected and how it is used. This would be far better than the current system of dense and opaque privacy policies which are designed to be impossible to understand and impossible to opt out of. Given big tech&rsquo;s lobbying power, this is a far-fetched solution and would require real thought to implement properly in any event. Many FOSS projects do have simple and easy-to-read privacy policies, but perhaps some kind of standard short-hand for letting users know what data is collected and how it is used could be developed in the FOSS world? At the very least this could provide a template for any potential future data tracking transparency law to use. In the meantime though, we are stuck with using our best guess for how tech companies track us and use our data, which is just how they like it.</p>
</description>
</item>
<item>
<title>Finding a Privacy-Friendly Email Provider</title>
<link>https://gunther.link/posts/email/</link>
<pubDate>Thu, 21 Jul 2022 00:00:00 +0000</pubDate>
<guid>https://gunther.link/posts/email/</guid>
<description><p><em>Disclaimer: The following is my opinion based on personal experience and does not constitute expert advice or guidance. I am not sponsored by, supported by, or otherwise financially biased toward any of the services mentioned.</em></p>
<h2 id="the-problem-with-gmail" >The Problem with Gmail
<span>
<a href="#the-problem-with-gmail">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>Like most people, I used to rely on Google heavily for basically all of the core online services I used. When I realized what an invasive and anti-privacy company Google is, it was pretty simple for me to ditch Google Chrome for one of the more privacy-friendly alternatives and switch my default search engine to something like DuckDuckGo. It took me much longer to start looking for a better email provider. Downloading a new browser and switching the default search engine is free, only takes a few minutes and the end result is a user experience that is about as good as Chrome+Google. Email is another beast entirely. Gmail&rsquo;s features are really quite good and you can get a Gmail account for free. Well, for &ldquo;free&rdquo; I suppose, since you are paying with your data and your privacy. Google openly admits that it was <a href="https://www.theguardian.com/technology/2017/jun/26/google-will-stop-scanning-content-of-personal-emails">reading its&rsquo; customers emails to build their ad profiles until 2017</a> and even now there is really nothing stopping Google (or a rogue Google employee) from reading your emails if they wish. And you better believe that Gmail is still using all of your email metadata (like who you email and how often) to serve you more personalized ads regardless of whether or not they read the emails themselves.</p>
<p>The problem is that privacy-friendly alternatives to Gmail are either paid, lacking features when compared to Gmail, or both. That being said, if you want to take your digital privacy seriously, Gmail and other free email providers like Yahoo! or Outlook are not real options so you will have to get comfortable with either paying for your email service with cash instead of with your data or with losing some of Gmail&rsquo;s functionality. In my quest to find a Gmail alternative, I looked into quite a few different email providers and tried out 4 myself: ProtonMail, Tutanota, Mailbox.org, and Posteo. Most of the other providers I looked into were either not privacy-friendly, too expensive, or lacking sufficient reputation.</p>
<h2 id="protonmail" >ProtonMail
<span>
<a href="#protonmail">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p><a href="https://proton.me/mail">ProtonMail</a> is probably the first suggestion you will hear when asking for a privacy-friendly alternative to Gmail and with good reason. The service has been around for a while and has a good reputation (despite the more paranoid side of the digital privacy community insisting it&rsquo;s a honeypot, most of the so-called &ldquo;scandals&rdquo; boil down to Proton turning over data to the authorities when required by local law). ProtonMail&rsquo;s interface is very user-friendly and is somewhat reminiscent of Gmail&rsquo;s. ProtonMail also encrypts all emails by default using PGP (though see disclaimers below), while also providing the option for users to use their own PGP keys. ProtonMail&rsquo;s free tier is quite generous and includes 1 GB of storage.</p>
<p>Now for the downsides. The main concern I had with ProtonMail was its pricing. While the free tier is very generous, it is restricted to only 150 messages per day (more than most personal accounts need, to be fair) and does not offer custom domain support, alias addresses, or IMAP support. IMAP support essentially allows you to use 3rd-party email clients and I personally consider it to be a pretty essential feature. I like having a copy of my emails stored on my local machine and I don&rsquo;t like being locked in to my email provider&rsquo;s email client. While I think it is perfectly fair to lock these features behind a paywall (they do need to make money after all), <a href="https://proton.me/pricing?product=mail">the lowest paid tier (as of this writing) is €4.99/month</a>! While they do offer slight discounts for yearly/biyearly subscriptions, this is way too much to charge for an email service. I assume the high price is trying to push people toward the &ldquo;Proton Unlimited&rdquo; package, which also includes access to Proton&rsquo;s VPN and cloud storage services. And while Proton Unlimited may be reasonably priced for what it offers, that doesn&rsquo;t much help users who are <em>just</em> looking for an email service. Additionally, even with a paid plan, IMAP support is only offered through the ProtonMail Bridge. The Bridge is not available for mobile however, meaning you&rsquo;re stuck with the ProtonMail client on Android/iOS.</p>
<p>The reason why ProtonMail requires the Bridge in order to support IMAP is because ProtonMail end-to-end encrypts all of its messages by default. This is one of the major draws of ProtonMail&rsquo;s service from a privacy perspective, but is also not all that it&rsquo;s cracked up to be. While ProtonMail does end-to-end encrypt all emails sent between ProtonMail accounts (as well as emails which are &ldquo;at rest&rdquo; on their servers), any emails sent to non-ProtonMail accounts are not encrypted by default while in transit. This is not ProtonMail&rsquo;s fault, but is a simple consequence of email&rsquo;s decentralized nature. That being said, the idea of ProtonMail end-to-end encrypting all emails by default loses a lot of its appeal when you realize that &ldquo;all&rdquo; really only includes a small percentage of the emails most people will be sending/receiving. While ProtonMail does offer PGP support to encrypt emails sent to other servers, PGP support has been a standard feature of basically any email client worth discussing for a long time now and supporting it hardly makes ProtonMail unique.</p>
<p>With all that being said, ProtonMail is still a very good option as a Gmail alternative. Its free tier is great if you want a semi-disposable account or if you have modest needs from your email provider. While I can&rsquo;t recommend the expensive, mail-only paid tier, if you&rsquo;re interested in going all-in on Proton&rsquo;s larger ecosystem, Proton Unlimited could be a really good option.</p>
<h2 id="tutanota" >Tutanota
<span>
<a href="#tutanota">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p><a href="https://tutanota.com/">Tutanota</a> is probably the most well-known privacy-friendly email provider after ProtonMail. Like ProtonMail, they place their emphasis on end-to-end encryption and open-source in their attempt to build a trustworthy and privacy-friendly email platform. Tutanota&rsquo;s encryption is very robust and <a href="https://tutanota.com/blog/posts/innovative-encryption">has some advantages over ProtonMail&rsquo;s and over PGP in general</a>. Tutanota also offers a free plan, which while not as generous as ProtonMail&rsquo;s, is pretty decent and is likely serviceable for many users. It includes 1 GB of storage while paywalling features like email aliases and custom domain support. The other feature that is paywalled is &ldquo;unlimited search.&rdquo; Essentially, Tutanota allows free users to only search for recent emails. Older emails will have to be found manually and not using the search function. While this does seem like a pretty basic feature to keep paywalled, I suppose they need something to push users toward paid plans, so I can&rsquo;t really blame them.</p>
<p>Unlike ProtonMail, Tutanota&rsquo;s lowest paid tier is priced at a reasonable <a href="https://tutanota.com/pricing">€1.20/month (or €1/month for a yearly plan)</a> and includes unlimited search, custom domain support and 5 aliases. Other features such as extra email aliases and extra storage are offered à la carte. The major feature that is missing from both Tutanota&rsquo;s free and paid plans is IMAP support, meaning you are locked in to Tutanota&rsquo;s (open source) email clients. Like ProtonMail, the reasoning for this is Tutanota&rsquo;s encryption implementation. Unlike ProtonMail however, Tutanota&rsquo;s email client is pretty basic. Honestly, it worked just fine for my needs, but it is relatively feature-poor and has a few unintuitive UI choices which could alienate some users.</p>
<p>Also like ProtonMail, Tutanota end-to-end encrypts emails between Tutanota accounts by default, but this comes with many of the same caveats. Tutanota&rsquo;s end-to-end encryption will not work for external email address unless you set a password for the email message. This is cumbersome to do and poses the problem of how to securely share the password to the email recipient. You could send it over a secure messenger like Signal, but if you already have a secure communication channel, why would you need Tutanota&rsquo;s password-encrypted emails? PGP solves this problem by using public/private key pairs, and while Tutanota&rsquo;s encryption is stronger than PGP&rsquo;s (they claim it&rsquo;s quantum-resistant) and encrypts metadata like the subject line (which PGP does not), its benefits don&rsquo;t really seem to outweigh the downside of abandoning public/private key pairs for a password. Not only that, but you have no option to integrate PGP with Tutanota even if you want to, meaning that you are stuck using their encryption or nothing (I suppose you could encrypt the message yourself and then put the encrypted text in the email, but that seems like a lot of extra work). While you can of course just insist that any correspondents also use a Tutanota account, a program like Signal seems a lot more suited to that use case since one of the major advantages of email is its wide adoption decentralized nature. <a href="https://proton.me/support/password-protected-emails">ProtonMail also offers password-protected emails</a> and many of these points apply to ProtonMail as well, but they at least give you option of using desktop email clients and/or your own PGP keys, so these problems are all the more glaring with Tutanota.</p>
<p>Despite its shortcomings, Tutanota still has a strong use case. I could particularly imagine its end-to-end encryption implementation being put to good use in a team setting where there would be a lot of sensitive, internal email communications. If you are aware of and comfortable with Tutanota&rsquo;s shortcomings, its paid tier is reasonably priced and not a bad option overall and its free tier is a slightly inferior but still noteworthy alternative to ProtonMail&rsquo;s.</p>
<h2 id="mailboxorg" >Mailbox.org
<span>
<a href="#mailboxorg">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>While not as well-known as ProtonMail and Tutanota, <a href="https://mailbox.org/en/">Mailbox.org</a> is another common name you&rsquo;ll hear tossed around when privacy-friendly email services are discussed. Mailbox.org doesn&rsquo;t claim to end-to-end encrypt all its emails like ProtonMail and Tutanota do, but instead offers a more &ldquo;basic&rdquo; email functionality free of the mailbox snooping and analytics shenanigans Google is known for.</p>
<p>One of the most underrated advantages of Mailbox.org is the fact that it has normal name. While this may sound like a silly consideration, if you&rsquo;ve ever had to read out your email address to a customer service representative on the phone or a casual acquaintance in real life, you&rsquo;ll know that having an email address like coolguy69<span>@cock.</span>haha may have seemed like a great idea when you were just typing it online but suddenly becomes a bit of an embarrassment. Even a relatively more normal email address like yourname<span>@tutanota.</span>com
can earn you weird looks and questions like &ldquo;how do you spell that?&rdquo; when trying to do something simple like share your email address.</p>
<p>In terms of features, Mailbox.org is nothing special but does everything you could reasonably want an email provider to do. Its webmail client is perfectly functional and IMAP support is an included feature with all plans so you&rsquo;re not forced to use it anyway. Mailbox.org also claims to be <a href="https://mailbox.org/en/company#our-responsibility">fully powered by green energy</a>. It is nice to see services like Mailbox.org that seem committed to social progress generally beyond the narrow (though important) area of digital privacy.</p>
<p>One point of note about Mailbox.org that may be a dealbreaker for some is that it has no free tier. However, if you already planned on paying cash for your email provider, <a href="https://mailbox.org/en/services">Mailbox.org&rsquo;s plans start at €1/month</a>, which is quite competitive. Although you can only credit your account with a minimum of €12, they do offer refund options if you with to cancel your account before you&rsquo;ve used up your balance. The lowest tier includes 3 email alises and 2 GB of storage. The higher tiers (€3/month and €9/month) offer more storage and aliases, custom domain support, as well as cloud storage and an office suite if that&rsquo;s something you&rsquo;d want from your email provider. In my opinion, everything but the lowest tier is overpriced and its a shame that custom domain support is not available on the lowest tier. The custom domain support and 25 alias addresses in addition to disposable email addresses do make the €3/month tier somewhat attractive, but it&rsquo;s still a bit much to pay for an email service in my opinion, especially since there&rsquo;s no option to purchase these features separately à la carte like there is with Tutanota.</p>
<p>The major concerns I had with Mailbox.org related to security and usability rather than to price. When I went to enable TOTP 2FA on my account, I found that I needed to <a href="https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa">set a PIN and that I would then enter that PIN followed by the TOTP code into the password box in lieu of my password</a>. This seems totally ridiculous to me. What&rsquo;s the point of 2FA when you&rsquo;re basically decimating the security of one of the factors by reducing its complexity to a numeric PIN? I ended up feeling more comfortable leaving 2FA off and simply using my randomly generated password. I&rsquo;ve never seen TOTP 2FA implemented this way before and it did not instill a ton of confidence in Mailbox.org&rsquo;s security practices.</p>
<p>The second security-related concern I had was with Mailbox.org&rsquo;s encryption implementation. Mailbox.org doesn&rsquo;t claim to end-to-end encrypt all of the emails it sends like ProtonMail and Tutanota do, which is fine from my perspective. As I discussed above, the end-to-end encrypted email claim comes with a lot of caveats anyway. That being said, my emails being encrypted while at rest on my provider&rsquo;s servers is a worthwhile feature and doesn&rsquo;t impact email&rsquo;s usability as a decentralized service. Mailbox.org doesn&rsquo;t do this by default and finding the setting was a real pain. In general, while Mailbox.org&rsquo;s webmail client is perfectly serviceable, its settings panel is a huge mess and its documentation doesn&rsquo;t do a ton to help out. Eventually I did find the setting to encrypt emails at rest, which required <a href="https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox">inputting a public PGP key to encrypt the emails with</a>. While I guess this is fine, I would have really preferred a toggle where I could simply encrypt my at-rest emails using my password. There was also a totally separate setting called <a href="https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard">&ldquo;mailbox.org Guard,&rdquo; which seems to be used to encrypt emails sent from the account</a>, but the functionality seemed a little overlapping and finding the proper documentation explaining what each setting was for was a bit of a pain. Even now, I&rsquo;m a little unsure how to implement each of these features and how they overlap. I suppose this is more of a usability concern than a security concern, but it was still disheartening to see what should be a core security feature made so opaque and complicated.</p>
<p>Mailbox.org certainly gets points for its relative simplicity and IMAP support even on its cheapest plans. However, some of its security practices certainly seem like red flags (or at least yellow flags) to me and so I&rsquo;m afraid I can&rsquo;t recommend the service in confidence. If you&rsquo;re not looking for anything fancy security-wise and just want a simple email provider who won&rsquo;t mine your data (and has a normal-sounding domain name to boot) or need both IMAP and custom domain support and don&rsquo;t mind paying a little extra, perhaps Mailbox.org is worth looking into.</p>
<h2 id="posteo" >Posteo
<span>
<a href="#posteo">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p><a href="https://posteo.de/en">Posteo</a> is probably the email service on this list which I hear about the least and it&rsquo;s a bit of a hidden gem in my opinion. I first heard about it from <a href="https://digdeeper.neocities.org/ghost/email.html">DigDeeper&rsquo;s article on choosing an email provider</a>. I&rsquo;m a little hesitant to reference the article here since the author is a bit of a conspiracy nut, but I haven&rsquo;t found a comparable overview of email providers from a privacy standpoint that has the same breadth and depth. DigDeeper actually seems to have bothered reading (or at least skimming) the privacy policy and terms of service for each provider they reviewed. If you give the article a look though, make sure to take the author&rsquo;s claims of what qualifies an email provider as and disqualifies it from being private and secure with a few grains of salt.</p>
<p>Posteo is very similar to Mailbox.org on its surface. Both services are hosted in Germany (as is Tutanota, by the way), both lack free tiers but offer subscriptions with IMAP support from as low as €1/month, and both have similar-looking, green-colored web interfaces and <a href="https://posteo.de/en/site/sustainability">use green energy</a>. Part of me suspects that one project was a breakaway from the other, but I have no proof of that either way.</p>
<p>So what makes Posteo unique? Well, Posteo properly implements TOTP 2FA for one thing. Even with 2FA enabled, IMAP is still accessible with your password alone (this is more of an IMAP limitation than a Posteo limitation as best as I can tell), but you do have the option to turn off IMAP access for your account if you wish. The settings in general are also much simpler to navigate than Mailbox.org&rsquo;s (even I did stumble across a German phrase here or there where English probably should have been). While Posteo does not offer end-to-end encryption by default between Posteo users like ProtonMail and Tutanota, they do have <a href="https://posteo.de/en/help/how-do-i-activate-posteo-crypto-mail-storage">a simple option for encrypting your emails at rest with your password</a> and they also have <a href="https://posteo.de/en/help/how-do-i-activate-inbound-encryption-with-my-public-pgp-key">support for encrypting them with your public PGP key</a> if you&rsquo;d prefer. While the encryption is disabled by default, this is somewhat understandable since enabling the encryption prevents you from being able to recover your previous emails if you lose your password, which might not be something the average user wants. But it is good that it&rsquo;s there and good that it&rsquo;s pretty simple to activate. There is also the option of <a href="https://posteo.de/en/help/activating-tls-sending-guarantee">mandating TLS for sent</a> and <a href="https://posteo.de/en/help/activate-tls-receiving-guarantee">received</a> emails (not sure how useful this actually is, but it&rsquo;s an option if you want it).</p>
<p>Posteo&rsquo;s pricing consists of a single tier costing €1/month for basic email access with IMAP support, 2 GB of storage and 2 alias addresses included. You can pay extra for additional alias addresses (€0.10/address) or storage space. While all of the providers on this list accept some form of anonymous payment (either cash by mail, cryptocurrency or both), Posteo is the only one that I noticed claimed that your payment info will be kept anonymous from your account if you choose to pay by credit card. Not sure how realistic that claim is, so make what you will of it.</p>
<p>So what&rsquo;s not to like? The biggest shortcoming is a lack of support for custom domains. Posteo claims that this is because <a href="https://posteo.de/en/site/faq">allowing custom domains would sacrifice their users&rsquo; privacy</a>, but if that is really the reason, I don&rsquo;t see why they make that decision unilaterally instead of letting their users decide. Additionally, aliases are capped at 20 per account. This is admittedly more than most people need, but it&rsquo;s curious why they would put a cap on alias addresses per account at all if you pay for each one. And while Posteo does have <a href="https://posteo.de/en/help/which-domains-are-available-to-use-as-a-posteo-alias-address">a variety of domains available for their aliases</a>, there is no .com option (though they do have .org and .net). Finally, their webmail interface works just fine but is nothing special, though this is a moot point if you&rsquo;re planning to use an IMAP-based email client anyway.</p>
<p>Posteo is a great choice overall and probably the best, cheap option if IMAP support is a must for you as it is for me. It is basically superior to Mailbox.org&rsquo;s lowest tier in every conceivable way (other than the domain name, I suppose) and has quite a few advantages over ProtonMail and Tutanota as well, even if the overall advantage there isn&rsquo;t clear-cut.</p>
<h2 id="conclusion" >Conclusion
<span>
<a href="#conclusion">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>Unfortunately, there&rsquo;s really no &ldquo;gold standard&rdquo; for a privacy-respecting email service at this point. Each service I looked into was lacking in some way. That doesn&rsquo;t mean that there are no good options though, just that you will have to make some sacrifices in either price or features to find a privacy-respecting email provider that works for you. I ultimately decided to go with Posteo as I felt it had the best balance of price and features. I did seriously consider Tutanota as well, but its lack of IMAP and PGP support didn&rsquo;t overcome its other advantages (like custom domain support) for me. If I ever decide to sign up for Proton&rsquo;s full suite of products I could perhaps see myself moving to ProtonMail, but the price of their email service alone is just too high for it to be a consideration for me at this point. I hope this provided some useful information if you&rsquo;re looking for a privacy-respecting email provider yourself (or perhaps encouraged you to start looking). Don&rsquo;t rely on my conclusions though. Try out a few services, do your own research and don&rsquo;t be afraid to share your conclusions with others when you&rsquo;re done.</p>
</description>
</item>
<item>
<title>Nintendo Switch Ban Essentials: Q&A</title>
<link>https://gunther.link/posts/nxban/</link>
<pubDate>Thu, 30 Jul 2020 00:00:00 +0000</pubDate>
<guid>https://gunther.link/posts/nxban/</guid>
<description><p><em>Disclaimer: This guide has not been meaningfully updated since 2020 and may be out of date. Use at your own risk. A (more) updated version can be found on <a href="https://nx.eiphax.tech/ban">Eip&rsquo;s website</a>.</em></p>
<p>Bans are scary and Nintendo hasn’t been shy about banning hacked Switch consoles. However, educated hackers know that bans are avoidable and they know how to avoid them. The Q&amp;A below should answer any questions you may have on how bans work and how to avoid getting your console banned.</p>
<p>If you have any further questions after reading this page, you can ask them on the <a href="https://discord.gg/C29hYvh">Nintendo Homebrew Discord server</a>.</p>
<h2 id="1-what-is-a-ban-and-how-does-it-happen" >1. What is a ban and how does it happen?
<span>
<a href="#1-what-is-a-ban-and-how-does-it-happen">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>Put simply, a ban is when Nintendo decides not to let a specific console or Nintendo account use its online services. Most bans associated with hacking are console bans, meaning that the specific console that Nintendo has banned will be unable to use Nintendo’s online services, including the eshop, game updates, and online play. Nintendo reserves the right to withhold these services per their <a href="https://accounts.nintendo.com/term/eula/US?lang=en-US">user agreement</a>.</p>
<h2 id="2-what-does-nintendo-ban-consoles-for" >2. What does Nintendo ban consoles for?
<span>
<a href="#2-what-does-nintendo-ban-consoles-for">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>The following actions will cause an immediate ban of your Nintendo Switch:</p>
<ul>
<li>Piracy of any sort</li>
<li>Homebrew NSPs (installed to the home menu)</li>
<li>Changing user icon through Homebrew</li>
<li>Sketchy eShop behavior</li>
</ul>
<p>The following actions will not result in an immediate ban, but will still result in a ban:</p>
<ul>
<li>Modding online games</li></li>
<li>Cheating in online games</li></li>
<li>Clearing error logs after they’ve been uploaded to Nintendo (this may extend to using both emuMMC and sysMMC online, due to mismatched logs)</li>
</ul>
<p>The following actions have not resulted in a ban (so far):</p>
<ul>
<li>Atmosphere itself</li>
<li>Homebrew (via title takeover)</li>
<li>Custom themes</li>
<li>Custom sysmodules</li>
<li>Mods/cheating in offline games</li>
<li>Overclocking with sys-clk</li>
<li>EmuMMC</li>
</ul>
<p>(Thanks to Val on the ReSwitched Discord server for this list)</p>
<h2 id="3-how-does-nintendo-know-i-did-any-of-the-things-they-ban-for" >3. How does Nintendo know I did any of the things they ban for?
<span>
<a href="#3-how-does-nintendo-know-i-did-any-of-the-things-they-ban-for">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>Nintendo filled the Switch with telemetry systems. Telemetry systems basically monitor what the user does on the console, including what games they install, what games they play, and a bunch of other data too. The Nintendo Switch stores this data constantly, even while offline, and will send these data logs to Nintendo as soon as it connects to the internet and Nintendo’s servers. This means that if a bannable action is performed on the Switch (even while offline) and the console connects to the internet at any point afterward, even briefly, Nintendo will receive the telemetry log and ban the console.</p>
<h2 id="4-how-do-i-prevent-getting-banned" >4. How do I prevent getting banned?
<span>
<a href="#4-how-do-i-prevent-getting-banned">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>There are essentially two ways to prevent getting banned. The first is to avoid performing any of the actions that Nintendo bans for on your Switch. The second is to keep your console permanently offline so that even if you take a bannable action, Nintendo will never be sent the telemetry log and will never find out about it.</p>
<h2 id="5what-is-an-emunandemummc-can-it-prevent-me-from-getting-banned" >5.What is an emuNAND/emuMMC? Can it prevent me from getting banned?
<span>
<a href="#5what-is-an-emunandemummc-can-it-prevent-me-from-getting-banned">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>NAND is simply a type of data storage that is used in a variety of electronic devices. eMMC is the type of NAND that is used in the Switch as its internal data storage. All of the Switch’s data is stored on its eMMC, which is an internal component of the Switch. This internal storage is sometimes referred to as the system NAND/eMMC or sysNAND/sysMMC. An emuNAND or emuMMC (emulated NAND or emulated eMMC) is a copy of the SysNAND stored on the SD card.</p>
<p>Since the telemetry logs are stored in the Switch’s NAND, an emuNAND is useful because it allows you to have two copies of the Switch’s internal storage. Your sysNAND can be used for online play and eshop purchases while your emuNAND can be used for CFW and hacking and be kept permanently offline. This lets you have the best of both worlds! If you followed the recommended CFW setup on <a href="https://nh-server.github.io/switch-guide/">Nintendo Homebrew’s guide</a>, you should already have an emuNAND set up.</p>
<h2 id="6-so-i-cant-get-banned-if-i-use-an-emunand-right" >6. So I can’t get banned if I use an emuNAND, right?
<span>
<a href="#6-so-i-cant-get-banned-if-i-use-an-emunand-right">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>Wrong.</p>
<p>An emuNAND is a tool to help prevent bans, it is not a silver bullet. You have to keep your emuNAND permanently offline or it won’t help you very much. It is also important to note that even though the internal storage of your sysNAND and emuNAND are separate, they are still copies of the same system with the same unique identifiers. If Nintendo bans your emuNAND then your sysNAND gets banned too and vice versa.</p>
<h2 id="7-but-what-if-i-want-to-use-online-homebrew-tools-like-ftp-or-the-homebrew-store" >7. But what if I want to use online homebrew tools like FTP or the Homebrew Store?
<span>
<a href="#7-but-what-if-i-want-to-use-online-homebrew-tools-like-ftp-or-the-homebrew-store">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>If you still want to use your internet connection on your always-offline console (or emuNAND), there is a way to do so. You just need to make sure that even though your console may be connected to the internet, it won’t be able to connect to Nintendo’s servers and therefore won’t be able to send the telemetry logs.</p>
<p>The recommended way to do this is 90DNS, which are custom DNS servers that allow connection to the internet, but block Nintendo’s servers. You can find instructions on setting up 90DNS <a href="https://nh-server.github.io/switch-guide/extras/blocking_updates/">here</a>.</p>
<h2 id="8-what-about-incognito" >8. What about Incognito?
<span>
<a href="#8-what-about-incognito">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>Incognito is not recommended for a variety of reasons. It functions by blanking your console’s PRODINFO, which is console-unique data that your console requires to boot. If Incognito goes wrong, it can result in damage to your console, even an unrecoverable brick. Additionally, Incognito is less reliable than 90DNS as it depends on Nintendo rejecting telemetry logs from consoles with blanked PRODINFO and while that is currently true, Nintendo may change this in the future.</p>
<p>As of Atmosphere 0.12.0, a virtual PRODINFO blanking feature was included, which is safer than Incognito, but still not a viable replacement for 90DNS.</p>
<p>(Thanks to noirscape on the Nintendo Homebrew Discord server for the explanation of why Incognito is bad)</p>
<h2 id="9-my-console-is-banned-how-can-i-unban-it" >9. My console is banned. How can I unban it?
<span>
<a href="#9-my-console-is-banned-how-can-i-unban-it">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>You can’t. Sorry.</p>
<h2 id="10-i-performed-a-bannable-action-on-my-offline-sysnand-but-now-i-want-to-go-online-what-do-i-do" >10. I performed a bannable action on my offline sysNAND but now I want to go online. What do I do?
<span>
<a href="#10-i-performed-a-bannable-action-on-my-offline-sysnand-but-now-i-want-to-go-online-what-do-i-do">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>Restore a “clean” NAND backup of the system from before you performed the bannable action. You can find instructions for doing that <a href="https://nh-server.github.io/switch-guide/extras/nandrestore/">here</a>.</p>
<p>Using the Switch’s stock “factory format” feature does not erase telemetry logs and will not protect you from a ban.</p>
<h2 id="11-what-if-i-lost-my-nand-backup-or-never-made-one" >11. What if I lost my NAND backup or never made one?
<span>
<a href="#11-what-if-i-lost-my-nand-backup-or-never-made-one">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>You messed up. Make sure to make a NAND backup for the future.</p>
<p>There is <a href="https://suchmememanyskill.github.io/guides/unbrick/#system-wipe">a method for manually resetting the NAND’s data</a>, but it is not as reliable as restoring a NAND backup and should not be your preferred option.</p>
<h2 id="12-so-if-i-follow-the-advice-here-im-guaranteed-not-to-get-banned" >12. So if I follow the advice here I’m guaranteed not to get banned?
<span>
<a href="#12-so-if-i-follow-the-advice-here-im-guaranteed-not-to-get-banned">
<svg viewBox="0 0 28 23" height="100%" width="19" xmlns="http://www.w3.org/2000/svg"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71" fill="none" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2"/></svg>
</a>
</span>
</h2><p>Nothing in life is guaranteed. The information here is based on quite a lot of experience, but Nintendo can always decide to change what actions they consider bannable or add new ways of gathering telemetry. Part of hacking your console means accepting a little risk and taking responsibility for your decisions.</p>
</description>
</item>
</channel>
</rss>