@QuHno said in Worrying news about Startpage and DuckDuckGo:
@Dr-Flay I wonder why hidemysearches doesn't use POST but GET in their search form at the top of the about page and on their homepage ...
All search engine I use are put in POST, Startpage too
The mistake in the GUI is funny.
Having to "deceive" the tweaks is a strange way to do things. Hehe.
For extra help with choosing which options are worth setting, the Heimdal site has a useful guide.
Yay, it is fixed. From one of the original links, this update:
[Update on April 24]
We have confirmed that Google Chrome update 74.0.3729.108 has fixed the issue, please update your Chrome if you have concern about the issue.
My current V-SS = Vivaldi 2.5.1525.4 / Chrome 74.0.3729.113.
However, current Stable = Vivaldi 2.4.1488.38 / Chrome 73.0.3683.105, so the issue remains active there for now.
There is a new one that I am migrating to is CTemplar It's more secure than Protonmail is what I finding with my research and I like the simple interface as well. Another note Protonmail will make you pay for encrypted contacts, CTemplar includes that for free and 1GB storage.
Not sure this thread is the right one for DNSBench.
I have used it a few times, and suggested some changes in the news groups.
In this current world I think it should;
default to checking for DNSSec (many users will not spot the option)
Let you make a short list of only DNSSec capable resolvers
If you use Cloudflare, Quad9 or DNSCrypt you "should" get the fastest available resolver in the pool.
Depending on where you live it may not be the fastest possible, but it should be fast enough for most people.
Wrong forum section.
This is not a security/privacy issue, though depending on how any sites implement the laws, it may become a privacy issue.
The Register posted a good article yesterday pointing out the variety of ways it may or may not be rolled out. Upload filters are not a specific requirement (though likely unavoidable)
There are also exemptions for fair-use purposes.
I wouldn't trust a single one of those sites your google search brings up. Not even the first one, the malwaretips site might be OK, but from a quick browse, it seems to just give generic and pretty much useless information, the same so-called "solutions" copied over and over, at the same time pushing you to click their affiliate links to make money.
Sure, Malwarebytes is a good AV, but affiliate programs are also easy ways for unscrupulous individuals make money by praying on desperate people.
All the rest of them seem like total scams, badly machine-translated copy-paste sites with very generic and suspicious domains.
That's the problem with just sending people to Google to "solve" the problem. It will probably end with desperate people downloading another useless "virus cleaner". This is often how people get infected with malware in the first place.
That's why I advised the OP to get the proper tools (from reputable sites) in the first place to sort out the issue themselves, and maybe learn something in the process, since they seem like a technical-minded person.
That's also why I am curious in what they found out about the problem and how they solved it.
@raed That's exactly what I said:
@An_dz said in Vivaldi and the Tor network:
@greybeard And? The only good this adds is prevent Facebook from sending you emails about "strange behaviour" in your account.
But nothing more, the existence of a Tor address for Facebook does not improve your privacy, it just prevents an annoying flag/email. But such flag is irrelevant of address used from the technical side, they just coded it that when using the Tor address it doesn't flag, but they could have coded that through the normal web address doesn't flag as well.
@raed @Pathduck All use of Windows mess up the bit settings to keep connections alive by "KEEPALIVE" and "DONTLINGER" - bit 12 and 14. This is the first violation that allows others to walk in and some other code take over a connection. The "lingering" is used to share connections. But these things are not considered in any standardisation efforts, they are considered "Solved" in the first definition. Frem a WEB server, these should always start without these settings, it is the Windows at the other end that reset and keep the connections.
Things has since been changed and other software expect things to behave as for Windows, so expect that my Mac can set / reset and muck around.
But it is nothing that stops an application like Vivaldi to "read" sockets in use, and modify them so that connections are not just closed but wiped out and made unusable. We keep the application alive and these bit will restrict other apps from being able to use the leftover connections. You will find these connections in "IOWAIT" in "netstat -a". I had my consultants monitor connections, and we had to kill and wipe out to make sure that the servers did not run out of ip resources. "The other side" sets "our side" drivers.
@LonM The impression of being caught in a pincer on one side by Internet giants who track all personal data and on the other side censorship which is more and more self-censorship, according to the panoptic architectural model.
Vivaldi is this essential link in the chain, to which a search engine that scrupulously respects privacy must be added. It seems particularly problematic to me that Qwant's Ethics & Legal Affairs Officer, in his private capacity, thinks exactly the opposite.
I knew that this "service" has received public support from French investment banker and current Macron administration, but I had not perceived the content of this junction.
@urfausto said in kaspersky internet security free marketing leaker!:
@Catweazle avg is another bloatware hoax, to unistall is a nightmare.
avira also beats panda in speed and lightwight by the benchmarks.
When I used Windows, I tried several AV and certainly AVG was quite annoying in its operation although it was not so difficult to remove. Avira, maybe in a benchmark list is faster than Panda, but this does not correlate to my experience, where Panda has never slowed down my system in the least and this having a laptop not exactly high performance. In cold boot with Avira I have always needed more than 1 minute, with Panda rarely more than 35-40 seconds until the system is connected to the network.
Regarding the detection rate, in the comparatives all current AV are quite similar, above 95%, some, like those mentioned, reaching 100%, with small differences in false positives, where the Win Defender is somewhat more hysterical .
The rest is a matter of personal tastes.
I am not sure what browser extensions would help that don't already exist.
You need to use a VPN.
A browser extension cannot stop a Government from blocking domain registrations or filters blocking uploads.
Here in the UK I am blocked from accessing many security related sites and even the web archive. I have to use a proxy extension or VPN to access many sites.
Try using encrypted and authenticated DNS lookups with DNSCrypt
A bunch of useful sites in this thread for countries and individuals at risk of communication tampering
A non ROOT android app that can change the DNS.
To be honest, when it comes to man-in-the-middle interception, even if you are using a good DNSSEC resolver, almost no sites are properly configured and no browsers know how to use the info available, so I am not even sure how much help that is.
@Yogini Go to vivaldi://inspect/#apps, click the first Inspect (under Vivaldi) and browse the browser How you can use your mods
Edit: you'll be maybe also interested in vivaldi://flags/#debug-packed-apps, which adds Inspect to context menu of all elements.
@Dr-Flay Unfortunately most browsers out there are becoming more and more intrusive as time goes by.
Being aware of various so called hidden settings helps the privacy and security conscious user in seeking ways to protect him/her self.
So far this feature's default setting is disabled, but from what the linked article says in future builds the default setting will be enabled.
@Gwen-Dragon I do not know for certain, but knowing how Google operates I would assume sending URLs to Google is part of the way it works.
There is no real panic as this collection is simply a collection of previous dumps.
If your details are in there they have been available for as long as the original breech.
The owner of the collection has been discovered