Side Of Burritos - blogHi, I'm Josh I host the Side Of Burritos YouTube channel. This is where I post everything that doesn't fit in the video description box.Zola2023-07-24T10:00:00+00:00https://sideofburritos.com/blog/atom.xmlHow to install GrapheneOS on Google Pixel Tablet GPT + Setup for new users2023-07-24T10:00:00+00:002023-07-24T10:00:00+00:00https://sideofburritos.com/blog/how-to-install-grapheneos-on-pixel-tablet/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/zcHhzf-agSk" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://grapheneos.org/install/web' target="_blank">https://grapheneos.org/install/web</a> - GrapheneOS Web installer</li>
<li><a class="text-break" href='https://grapheneos.org/donate' target="_blank">https://grapheneos.org/donate</a> - GrapheneOS donation page</li>
<li><a class="text-break" href='https://grapheneos.org/features#sandboxed-google-play' target="_blank">https://grapheneos.org/features#sandboxed-google-play</a> - Sandboxed Google Play details</li>
<li><a class="text-break" href='https://sideofburritos.com/docs/setup-guides/mobile-privacy/' target="_blank">https://sideofburritos.com/docs/setup-guides/mobile-privacy/</a> - Mobile Privacy & Security Guide</li>
<li><a class="text-break" href='https://youtu.be/SZ0PKtiXTSs' target="_blank">https://youtu.be/SZ0PKtiXTSs</a> - How to install Sandboxed Google Play in a separate User Profile</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong></p>
<p>In today's video, I'm going to cover step by step how to install Graphene OS on the newly released Google Pixel tablet. I'm going to be using the web installer, which makes it nearly impossible to break your device. There are some hiccups you might run into during the installation, and I'll cover those at the relevant points in the video.</p>
<p>So, to begin the installation, we're going to head on over to grapheneos.org. Once you get there, select "Install Graphene OS." Like I said, I'll be using the web installer, so go ahead and click the "Web USB-based installer."</p>
<p>Once we get here, go ahead and read through the prerequisites. You must be using a supported OS, which they do list here. I'll be using macOS for the installation today. It's also worth noting that if you have an existing Graphene OS device, you can use that for the installation, along with another Android device running stock Pixel OS or another certified Android variant. Make sure your operating system is up to date before proceeding, and then lastly, you must make sure you're using a supported browser. In this video, I'll be using Brave, but make sure that you are using one of the browsers listed above.</p>
<p>There are a couple of other notes below that I want to mention. If you are using Linux, avoid flat pack and snap versions of the browser as they're known to cause issues during the installation process. Do not use incognito mode or other private browsing modes. The reasons why are listed here. There's also an important note here; I don't really think this applies to the tablet, but to make sure that the device can be unlocked to install Graphene OS, avoid carrier variants of the devices. So with the phones, they'll have a Sprint or Verizon version, and those will usually have issues and you can't unlock them. So if you do buy a device, make sure it's OEM unlockable. I also suggest reading the rest of the information here, but I'm not going to read that to you.</p>
<p>The first step in the process is to enable OEM unlocking. One thing I want to mention is always go to the source for documentation and guides. Be hesitant to follow some random YouTuber or blog post that claims they have their own method or knows the process better. That's why I'm following the official guide in this video. You'll always get the most up-to-date instructions and information.</p>
<p>So, I just took this tablet out of the box and turned it on, which means we're going to have to walk through the initial setup before we can actually enable OEM unlocking. If you've already gone through the setup on your device, feel free to skip this part in the video.</p>
<p>So, I'm going to select "Get started." I'm going to set up offline, continue. I'm going to leave that set to the default. I'm going to uncheck these options, accept the limited warranty. Next, you should always set a secure PIN on your device, but since I'm going to be erasing the OS in five minutes, I'm just going to set "12345" for mine. I'm going to skip fingerprint unlock because we're erasing the OS, so select "No thanks." Swipe navigation, skip. That's just a guide on how to use it, so if you need to follow that, otherwise skip it. We'll swipe up to go home.</p>
<p>So, we are now at the home screen. Let's go back to the instructions. Enable the developer options menu by going to Settings > About phone and pressing the "Build number" menu entry until developer mode is enabled. So, to do that, we're going to swipe up, we're going to scroll down and go to Settings, scroll down again, go to About tablet. Scroll down to the bottom, and you'll see this labeled "Build number." That's what you want to tap until you see "Developer options" show up. You're going to have to enter your PIN code to enable this. And then you'll see the pop-up that says, "You are now a developer" on the bottom.</p>
<p>So, the next step is to go to Settings > System > Developer options and toggle the OEM unlock settings. So, we'll go to System, we can see Developer options, select that, scroll down to OEM unlocking, which we can see is grayed out here. So, I did purchase this device brand new from Google, and it is unlocked. But, in order to enable OEM unlocking, you need to connect the device to the internet for the first time. If you bought your device used and someone has previously enabled OEM unlocking, you don't need to worry about this step. But if you did buy this brand new, like me, you're going to have to connect to the internet for this to be available. So, go ahead and connect to Wi-Fi. So, you can scroll up, tap "Network and internet," select "Internet," to your Wi-Fi network.</p>
<p>So, once your device is successfully connected to the internet, let's go back to the Developer options, System > Developer options, and we can now see OEM unlocking is no longer grayed out, and we can now enable it. So, we'll go ahead and tap the toggle. You'll have to enter your PIN code again. You'll see a pop-up for "Allow OEM unlocking," select "Enable," and OEM unlocking is now enabled.</p>
<p>So now, back to the instructions. The next step is flashing is non-root (this is for Linux, so if you're on Linux, follow these instructions; if you're not, skip ahead). The next step is booting into the bootloader interface. You need to boot your phone into the bootloader interface. To do this, you need to hold the volume down button while the phone boots (or, in this case, a tablet). It's also worth mentioning that I'm making this video about 12 hours after the initial release of Graphene OS for the Pixel tablet, so some things on some wording may change in the future, but the overall general process will be the same.</p>
<p>So, to boot into the bootloader interface, if you've never done this before, it can take you a few tries. But what you need to do is swipe down, swipe down again, tap the power icon in the bottom right-hand corner, and then select "Restart." And now, immediately hold the volume down, which is on the left side of the device on the bottom, then keep holding that. And if you are successful in booting into the bootloader interface, you'll reach a screen that looks like this. This is going to be a little bit difficult for the camera since this is so tiny (that's what she said). So here, you'll see this output, it'll have some information about your device, and also say "Device state is locked," we'll be changing that shortly. And for now, I'm going to set this down, and we'll proceed onto the next step.</p>
<p>So, the next step is connecting the phone, or in this case, our tablet. Again, the Pixel tablet was just released, so they haven't updated the wording yet, but this is referring to your tablet. So in the note here, if you are on Windows, you need to install a driver for Fastboot if you don't already have it. No driver is needed on other operating systems. There's a couple of ways you can install the Fastboot driver on Windows. The first and easiest way, you can obtain the driver from Windows update, which will detect it as an optional update when the device is booted into the bootloader interface, which is what we see on the screen now and connected to the computer. So that's the easiest way. So if you are on Windows, just follow the instructions here. The second way is you can manually install it with Device Manager. So if you feel up to that, you can also go ahead and do that, but I would recommend the first method as that's easier and more straightforward.</p>
<p>At this point, we can now connect our tablet to our computer. The typical recommendation is to use the USB cable that came with the device. The tablet does not come with one, so you're going to need to use one that you have lying around or purchase one. Your best option will be to use the stock cable that came with a Pixel phone if you purchased one in the past, or you can just use whatever cable you have lying around that you know is in good working condition. That's what I'm using. I just have a third-party cable here. As I mentioned in the beginning, there are a few things that could go wrong with the installation, and the USB cable is a big one that a lot of people have issues with. If you have any strange behavior during the installation, it's likely due to a faulty USB cable. It might work for powering a device, but data and power use different pins on a USB cable, so it's possible that the data pins are damaged, and it's not working so good. First troubleshooting step is to try a different cable, purchase a new one, and again, use that if you have any strange issues during the installation process.</p>
<p>So I'm going to go ahead and connect this to my tablet on the bottom. There's a USB-C port, plug in the cable there. So once you plug it in, we're going to move on to the next step, which is "Unlock Bootloader." So, one warning before unlocking the bootloader. This step will completely erase the device, so if you have any photos you took or maybe you have some contacts you saved, make sure you save those somewhere else first before moving on to this step. Again, this will completely erase the device and anything on there. So, we're going to select "Unlock Bootloader." We can see up here, "Pixel tablet" shows up on the screen, select that, press "Connect." We're going to see our screen change. We have a warning here, "If you unlock the bootloader, you will be able to install custom operating system software on this phone." That's why we're here. So in order to do this, we can see up at the top right, it says the current option is "Do not unlock the bootloader." We're going to press either volume up or down to change the selection. So when I press that, it now says "Unlock the bootloader," and then to select that, we need to press the power button. So I'm going to press the power button. Now that it says "Unlock the bootloader," the screen goes blank for a minute, and as I mentioned earlier, down here, we had "Device state," and it was green, and it said "Locked." At this point, since we unlocked the bootloader, our device is now unlocked, and it's red. You will also see the output on the screen that says "Bootloader unlocked."</p>
<p>So the next step is obtaining factory images. In order to do that, press "Download release." So depending on your internet speed, this can take a few minutes, but at this point, it's just downloading the factory image. It's not actually flashing it to our device yet. And while that's downloading, I want to mention that if you get any value from Graphene OS or after you install it, you really like it and use it on a regular basis, consider donating to the project. And like I said earlier, they had this tablet release initial release out within 12 hours of me actually receiving the device in the mail, so they do incredible work. They're a great resource for the privacy and security community. So any monetary contribution you can offer, I'm sure the project would appreciate.</p>
<p>So once the download has finished, you'll see this has changed to "Downloaded," doesn't say "Download" anymore. So the next step is flashing factory images. The initial install will be performed by flashing the factory images. This will replace the existing OS installation and wipe all the existing data. I do suggest you give this paragraph a read before clicking the button above. The most important part down here is avoid interacting with the device until the flashing script is finished and the device is back at the bootloader interface. So once you're ready, select "Flash release." You're going to see your screen flash and change. So just give it a few minutes for this process to complete.</p>
<p>So once the flashing has completed, the text on the screen will change to "Flashed," and we can now proceed onto the next step, which is "Locking the bootloader." Locking the bootloader is important as it enables full verified boot. It also prevents using fastboot to flash, format, or erase partitions. There's also some other interesting information here, so I suggest you give that a read, but similar to how we unlocked the bootloader, in order to lock it, we're going to select "Lock bootloader" in the corner. We now see "Do not unlock the bootloader." We're going to press the volume rocker either up or down, and it now has changed to "Lock the bootloader," and then to select that option, we're going to press the power button.</p>
<p>So I'm going to press the power button. Give it a second. And we can confirm the bootloader is locked as "Device state" is now green and "Locked." So at this point, we are ready to boot up the OS. There's a couple more steps we need to complete underneath the "Post-installation." You've now successfully installed Graphene OS and can boot it. Nice job! Pressing the power button with the default start option selected in the bootloader interface will boot the OS. We can see the default option right now is "Start," so select the power button, and our device will now start up.</p>
<p>So, this is the first screen you're going to see. I'm going to press the power button quick to pause the display or to pause the boot process. So, this is normal to see if you have a different operating system other than stock Android OS installed on your device. We can see here, "Your device is loading a different operating system." And on these post-installation instructions, there's one step you can do here, which is "Verified Boot Key Hash." So, we pause the screen by pressing the power button, and we can now see the hash listed out down there below. And what you want to do is look at that hash that's listed next to "ID" and make sure that matches the, in this case, Pixel tablet. I'm going to read that quick, and it does match. So it's just one other way to verify the integrity of the installation we just performed. If that matches, we can proceed. You don't need to do this every time; this is just after the initial installation. I think it's good practice. So once you've verified that, we can now press the power button to resume. So I'm going to select that. The next screen you're going to see is the Google splash screen. That's normal. Don't be worried. And then we will see the Graphene OS screen. I'm going to let this complete the first boot, but we are now successfully booting Graphene OS. Once that finishes, we're going to walk through the initial setup. I'm going to press "Start" next.</p>
<p>Change to your time zone.</p>
<p>Enable Wi-Fi if you want. I'm going to skip that for now.</p>
<p>I'm going to uncheck location services.</p>
<p>I'm going to skip the fingerprint setup.</p>
<p>I'm going to set up a PIN code, though. Don't make your PIN code "12345." I'm going to be wiping this device shortly.</p>
<p>Once you confirm that, I'm going to skip restore apps and data, and then we can press "Start."</p>
<p>So I'm pretty excited. This is the first time I've ever booted Graphene OS on a tablet. I've been waiting for the larger display for a long time, so this is pretty awesome.</p>
<p>So if we go back to the post-installation instructions, we can see "Disabling OEM unlocking." So we want to complete that step, so we're going to go into Settings, scroll down to "About phone," we're going to tap "Build number." Once we see this screen, enter your PIN code.</p>
<p>We are now developers. We can see on the bottom. Go to System, and then back to Developer options, and then disable OEM unlocking. Please restart the device to enable the device protection feature. So I'm going to hold down the power button and then select "Restart."</p>
<p>So my camera is saying it's going to overheat. Let's hope it doesn't overheat.</p>
<p>There's more information under "Verifying installation" and some other details down below regarding hardware-based attestation. I would suggest you give that a read-through. I'm not going to cover that in this tutorial.</p>
<p>And so once your device boots up, we can swipe up, enter our PIN code.</p>
<p>And you are now ready to start using Graphene OS on your Pixel tablet. So if you're looking for an easy way to get started and to start downloading apps, Graphene OS offers sandbox Google Play services. They are very easy to install. I'm going to run through that quick. First step is we need to connect to Wi-Fi, so I'm going to go into Settings > Network and internet, select my Wi-Fi network.</p>
<p>So once you're connected to Wi-Fi, we can swipe up again, go back into the app drawer. We're going to go into the Apps app. You can then go to Google Play services, tap "Install." This will take a few minutes depending on your internet connection. You'll see a few pop-ups. Tap "Install."</p>
<p>So once that finishes, you can swipe up to go to your home screen. Going to swipe up again, we can now see Play Store is installed. If you've ever used Android OS before, this is going to be very similar to the Google Play Store. There's a lot more information on the sandboxed Google Play services on grapheneos.org, which I'll link down below. But I'm not going to cover that in this video.</p>
<p>So again, this is just a basic setup if you're just getting started, want to experiment, and mess around. You can make a fake Google account and sign in with that just on your tablet to use. And if you don't like having Google Play services on your device, you can always erase your device and set it up however you prefer.</p>
<p>So, if you made it this far and are not tired of hearing me talk yet, I do have a monthly newsletter that I send out. You can sign up for that at sideofburritos.com. I send out random text stuff and non-text stuff. You might like it or you might not, but you can always unsubscribe.</p>
<p>So, my camera just shut off that was recording the tablet, but we've reached the end of the installation process. If you're looking for a good resource on Graphene OS-related information, check out the forum that they host. You can go to that at discuss.grapheneos.org. And if you enjoyed this video, I think you might like the top one listed here, and the YouTube algorithm thinks you might like the bottom one.</p>
Pixel Tablet Unboxing and Initial Impressions | GrapheneOS2023-06-26T10:00:00+00:002023-06-26T10:00:00+00:00https://sideofburritos.com/blog/grapheneos-pixel-tablet-initial-impressions/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/jfbz1RzSJh4">Video Link</a></h2>
<hr />
<h2 id="links-referenced-in-for-video">Links referenced in/for video</h2>
<ul>
<li><a class="text-break" href='https://store.google.com/product/pixel_tablet' target="_blank">https://store.google.com/product/pixel_tablet</a> - Google Store - Pixel Tablet</li>
<li><a class="text-break" href='https://youtu.be/aTf7AMVOoDY' target="_blank">https://youtu.be/aTf7AMVOoDY</a> - MKBHD Pixel Tablet Overview</li>
<li><a class="text-break" href='https://grapheneos.org/' target="_blank">https://grapheneos.org/</a> - GrapheneOS</li>
<li><a class="text-break" href='https://nitter.net/GrapheneOS/status/1671432517285552128' target="_blank">https://nitter.net/GrapheneOS/status/1671432517285552128</a> - GrapheneOS tweet about initial release for tablet</li>
<li><a class="text-break" href='https://hhkeyboard.us/hhkb/Pro-HYBRID-Type-S' target="_blank">https://hhkeyboard.us/hhkb/Pro-HYBRID-Type-S</a> - HHKB Professional Hybrid Type-S (Mechanical keyboard)</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong></p>
<p>I have been waiting a while for this product to be released. This is the Google Pixel tablet. I was initially going to make this an unboxing video, along with a few first impressions. But 12 hours after receiving this tablet in the mail, I saw this tweet from the Graphene OS team that they had an initial build ready. So, I thought I would test it out. This is not going to be an installation guide video; that will be coming out shortly after this one, and I will link it down below once it's ready.</p>
<p>So, as we can see in the box, this is the Pixel tablet with charging speaker dock. So, that's kind of cool to include that for free. I went with the 128-gigabyte version; that's what I normally get whenever I buy a Pixel device.</p>
<p>So, we have two strips on the bottom. First, we have the tablet. Let's get that out of the way. I'm going to set that aside for now. And then underneath the tablet, we have some instruction pamphlets. It tells you how to use the dock, tells you how to get startedβpress the power button, follow the instructions. Thank you, Google.</p>
<p>Here we have the dock that comes with it, and then we have a charging cable just for the dock. This wall adapter is just meant to be plugged into the dock directly; it doesn't have a USB-C connection, so you can't use it with a tablet. But the dock does charge the tablet, so you can always charge it that way. So, let's get this box out of the way.</p>
<p>So, this is the dock for the tablet. I believe it's also a speaker, has a nice fabric finish to it.</p>
<p>So, this is everything in the box: you have the tablet, the dock, and the power adapter. Pretty simple, nothing much. So, let's take a look at the tablet.</p>
<p>On the back, it's plain, kind of has a soft finish to it. I believe it's metal, but there's some kind of coding on here which feels kind of nice. We have the reflective Google logo in the center, along with the four pins that correspond to the four magnetic pins on the dock as well.</p>
<p>So, the actual tablet is a 10.95-inch screen. The resolution is 1600 by 2560. It has an 8-megapixel camera, and it also has the Google Tensor G2, which is the same as the Google Pixel 7. So, just for a quick size comparison, my camera can focus on the front screen. Here is a Google Pixel 6A laying on top of the tablet. So, as you can see, it is much larger, as is to be expected from a tablet.</p>
<p>On the bottom, we have a couple speaker holes along with the USB-C port. On this side, there are some rubber bumpers here, and on the other side, we have what looks pretty similar to a Pixel phone. We have a power button, which is recessed into the actual body of the device, and then we have a rocker, which I'm assuming is for volume.</p>
<p>On the front, it might be tough to see, but we do have a circle there, and that is where the front web camera is. And on the back is the rear camera. So, let's go ahead and turn this on. Hold down the power button.</p>
<p>So, usually these devices come charged, but it looks like this one is... up there it goes. I'll give this a minute to start up. This currently just has stock Android OS on it. I've never turned this on before, so this is the first boot. We have the standard walkthrough screens.</p>
<p>I'm going to set up offline. I'm just going to walk through this quick.</p>
<p>So, here we are at the home screen. Let's go find the one part that actually matters, which is OEM unlocking.</p>
<p>So, this looks like it's similar to mobile devices where you need to connect to the internet to enable OEM unlocking. But for now, I'm going to take a break from this video. I'm going to go ahead and make the installation video, and I will be back here shortly.</p>
<p>So, after I finished filming the installation video, I ran out of time. So, here we are, the next day after I completed the installation. I just powered off the tablet. So, let's turn this on and take a look.</p>
<p>We have our standard screens you expect to see with Graphene OS and an alternate operating system installed.</p>
<p>One of the most shocking things, I think, so far is just how large this screen is. After using Graphene OS on a handheld device for the past two years, it's very odd to see it in such a large form factor.</p>
<p>I didn't realize yesterday, but the buttons are actually on the left side of the device, unlike the mobile devices where the buttons are on the right side.</p>
<p>Don't make your passcode one, two, three, four, five. So, here we are, Graphene OS on the Google Pixel tablet. If you've ever installed and used Graphene OS before, then you might be familiar with the bare screen that you are presented with, which is a reminder of just how minimal this operating system is. We just have the default apps you expect to see.</p>
<p>Like I mentioned in the intro, there's not going to be much to go into in this video. I just kind of wanted to show that it works, what it looks like, my initial first impressions, which there's not much going on, so not much really to tell. I will have a much more in-depth video in the coming weeks, so stay tuned for that one.</p>
<p>But if we just poke around again, it's great having such a larger display.</p>
<p>Now, since I don't have much to actually talk about the user experience in this video, I did want to talk about why I bought this tablet and what use case I think it can offer. For me, at least, this is much easier to travel around with, the larger display. It's not annoying to use. If I need to do something technical with terminal, it's easy on this display, especially with landscape mode.</p>
<p>You get the full experience. It's like a full-screen computer, and at a 10-inch screen versus the smaller mobile device. And one of the things I recently purchased to use with this, I was actually looking at upgrading the mechanical keyboard I had to something that's a little bit easier to travel with. So, thank you to my friend who recommended this, the HHKB. So, this is a Bluetooth keyboard. It does not have a dongle. That's important to note. So, I wanted to make sure that this would actually work with it. So, I'm going to test that out now and see if I can pair it with the device, because to me, if you can get this on a stand and have a keyboard paired with it, at that point you have a nearly fully functional computer, at least for my use cases. That can work, and it's compact, easy to travel with. So, let me pair this quick.</p>
<p>There's the keyboard. Looks like it has paired successfully. So, let's just test out this text box up here.</p>
<p>That looks abysmal on camera. Let's try something else.</p>
<p>So, the keyboard does work. That's pretty awesome. I did order the case for this that comes with a kickstand for it. So, at that point, you kind of have a computer display that you can use.</p>
<p>The other reason I was very excited for this device is that this retails for $499 in the US, and I'm not aware of anything else you can get that is as secure and private as the default installation of Graphene OS for that price point. Yes, you can throw Linux on a laptop and have a high level of privacy, but there's nothing at this price point, especially in this form factor, that offers this level of security and privacy combined. So, at this point, I think this is one of the most secure and private devices you could purchase. And with a larger screen, it's extremely usable.</p>
<p>The other thing I really like about this device is it's Wi-Fi only. I've been in the tech industry for over 10 years, and from everything I've seen about cellular technologies, I still don't think there's a great way to use them in a secure and private manner. You're always triangulated when you're connected. And yes, some services exist to help anonymize you or to spoof some of the data that's used when you are connecting to those services. But at the end of the day, I think it's a broken technology.</p>
<p>So, now when it comes to Wi-Fi and Ethernet, those technologies I understand, and there are good ways to remain private and secure while using them. So, there's no need to disable cellular connectivity because it does not exist on the tablet.</p>
<p>So, one last thing I want to cover is I did read there might be some initial issues with the dock if you didn't first set up the dock using stock Android OS. So, I just want to test that quick. From what I understand, the smart features of the dock don't work on Graphene OS because those require system-level Play services, and on Graphene OS, sandboxed Play services are installed as normal apps. Therefore, it will not function. But again, it's still too early to tell, but that's what the initial feedback was I saw from the developers on Twitter.</p>
<p>So, the audio works on the tablet, as to be expected.</p>
<p>Here's a YouTube ad, of course.</p>
<p>So, the dock should also function as a speaker when you plug it in. So, I want to test that out quick. Let me plug in the dock.</p>
<p>So, there's nothing indicating the dock is plugged in once you do plug it in. So, I guess it's just on. So, there's a sound that does come out of the dock when you plug it in. So, I guess it's booting up or turning on. And now we can dock the tablet with the four corresponding magnets.</p>
<p>Those are extremely strong magnets. So, if we look here, we can see the tablet is charging. So, the charging functionality works. Let's see if the audio works.</p>
<p>And so, I can confirm that just by doing that, the audio on the speaker is working on the dock. So, it seems like that does work. There's no initial setup needed on the stock Android OS.</p>
<p>As to the other smart features of the dock, like I said, those probably or likely will not work in the future. At least they don't work at this time.</p>
<p>So, to sum up my five minutes of usage with this tablet, I'm extremely impressed that within 12 hours after its release, the Graphene OS team had the initial build out there. So far, from my basic usage, it works well. It's also worth noting this is technically a first-generation device. So, if you're looking for something that's perfect from a hardware perspective, this is not that. But at the end of the day, I think the software is more important. And with Graphene OS, we know that it's going to be a secure and private device. And I think, in that regard, it's going to be a really good device for people who are looking for something at this price point.</p>
<p>So, if you're interested in more videos about this tablet, let me know down below. I think in the future I will be making a video about that custom stand I got, as well as any other use cases I find for this device. So, let me know if you're interested in that. I'll have a lot more coming out shortly, so stay tuned.</p>
Obtainium overview | My favorite way to track Open Source apps2023-03-20T10:00:00+00:002023-03-20T10:00:00+00:00https://sideofburritos.com/blog/obtainium-overview/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/JiN37bn0OE8">Video Link</a></h2>
<hr />
<h2 id="links-referenced-in-for-video">Links referenced in/for video</h2>
<ul>
<li><a class="text-break" href='https://github.com/ImranR98/Obtainium/issues/25' target="_blank">https://github.com/ImranR98/Obtainium/issues/25</a> - Obtainium Issue 25 | <strong>Help wanted</strong></li>
<li><a class="text-break" href='https://youtu.be/IzpVI4zaso0' target="_blank">https://youtu.be/IzpVI4zaso0</a> - You should uninstall F-Droid - Part 1</li>
<li><a class="text-break" href='https://youtu.be/lAbgeJau3eE' target="_blank">https://youtu.be/lAbgeJau3eE</a> - You should uninstall F-Droid - Part 2</li>
<li><a class="text-break" href='https://youtu.be/FFz57zNR_M0' target="_blank">https://youtu.be/FFz57zNR_M0</a> - You should use this instead of F-Droid | How to use app RSS feed</li>
<li><a class="text-break" href='https://github.com/ImranR98/Obtainium' target="_blank">https://github.com/ImranR98/Obtainium</a> - Obtainium GitHub</li>
<li><a class="text-break" href='https://github.com/TeamNewPipe/NewPipe' target="_blank">https://github.com/TeamNewPipe/NewPipe</a> - NewPipe GitHub</li>
<li><a class="text-break" href='https://github.com/bitfireAT/davx5-ose' target="_blank">https://github.com/bitfireAT/davx5-ose
</a> - DAVxβ΅ GitHub</li>
<li><a class="text-break" href='https://f-droid.org/' target="_blank">https://f-droid.org/
</a> - F-Droid homepage</li>
<li><a class="text-break" href='https://github.com/adrcotfas/Goodtime' target="_blank">https://github.com/adrcotfas/Goodtime
</a> - Goodtime Productivity GitHub</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong> βοΈ</p>
<p>Six months ago, I made a few videos on F-Droid and why you should stop using it. Shortly after the release of those videos, someone sent me a project on GitHub that says in the readme it was motivated by one of those videos. I didn't start using it then, but I kept an eye on the project.</p>
<p>Now, just over six months later, the project has over 900 stars on GitHub, and it has come a long way, to say the least.</p>
<p>In my original video, I covered how you could manually add the source for APKs you wanted to track and download to an RSS reader. While this method did work, it was cumbersome.</p>
<p>The app I'm talking about today is Obtainium, and it aims to automate the process of tracking and updating apps. While it doesn't solve the inherent problem with F-Droid and third-party app repositories, I do think it provides some viable alternatives to help reduce or even eliminate some of those concerns. As always, you should use my advice and experience as a starting point for your own research. Make sure to test and validate everything you hear, especially if you are considering using it.</p>
<p>I'm going to cover a few use cases and then talk about my experience the last two weeks using Obtainium on my main device, a Pixel 7. The demo you see today will be from my testing device, which is a Pixel 6A.</p>
<p>So, to obtain Obtainium, we're going to head on over to the official GitHub page. All links will be down below in the description box.</p>
<p>So, we're going to open up our browser and search for Obtainium GitHub. And this first one here is the one we want. And if you scroll down, we're going to select the "Get it on GitHub" under installation. We're going to expand the assets, and the one we want to select for the Google Pixel is the "app-arm64-v8a."</p>
<p>Select that, download anyway. Once that finishes, select "Open." If you've never used your browser to install an app before, you'll have to allow this permission. Once you see the install window pop up, select "Install."</p>
<p>Done, and we have now obtained Obtainium. You should now see it on your home screen, or if you swipe up, it should be in your app drawer. Ignore the X Recorder; I've had some issues with the built-in Android screen recorder, so I'm trying a different one.</p>
<p>You can now open the app, allow notifications. Notifications are done locally, so there's no need for Google Play services for notifications to work.</p>
<p>And I first want to start off by saying how refreshing it is to use an open source app that took design into consideration. I've noticed a lot of times that aesthetics is an afterthought, which is fine, but I think it hurts long-term adoption. I personally have motivation from a security and privacy perspective to use an app, even if the interface is less than ideal. Others who might not have as strong of a motivation to use an app could get quickly turned off by its looks.</p>
<p>So when I first opened Obtainium, I was pleasantly surprised by the design. The developer is very active on this project, so what you see on my screen right now might not be what you see if you're watching this video in the future, but the general overall concept should be the same.</p>
<p>Going through the interface, the first option is the apps. This is our apps list that we're tracking. Obtainium is added here by default so it can track and update itself, so that's pretty handy. We have add app, which we'll come back to shortly. Then we have import/export. If you're currently using an RSS reader like I talked about in my previous videos, there's an option here to import from URLs and file like OPML. The Repla app, the main export type that I had was OPML for its backups, so you could perform an export from that and import it to Obtainium. I didn't test this functionality; I just manually added the apps that I wanted. You can also perform an Obtainium export, so once you get everything set up, that's handy. You can export it, save it, and then if you switch devices or your phone gets lost or stolen, you can always import that backup so you don't need to set it up all over again.</p>
<p>The last option on the bottom is settings. I just left this set to the default, but feel free to change anything you might want.</p>
<p>Now let's add our first app. So select add app. We can see down here listed are the supported sources, and if we look next to GitHub and Codeberg, those are labeled as searchable. So in the second box here, we can search for an app. In this case, I'm going to search for NewPipe because that's on GitHub. Search, so you're going to be presented with a lot of results, especially for a project that's popular. But this first one here is the official one, Team NewPipe. Just to be safe, I always suggest that you check first to validate that it is the correct one. So let's go to that repo. We can see here, this is the correct one, the official NewPipe. So once you validate that, we're going to go back, select the first one, and then press pick.</p>
<p>There's a separate section for additional options for GitHub. The first one is to include pre-releases. By default, you should leave this unchecked.</p>
<p>Prereleases technically aren't releases that you should be using, so that's why it's left unchecked by default. The next option is fallback to older releases, and that is enabled by default. This option is for when developers on GitHub do not do the releases correctly, and they might have one release for iPhone and one for Android. If they are listed in different releases, when Obtainium goes to check what the latest version is, if the iPhone one was released latest, it will see that there's no Android APK available to install. Therefore, this option lets it fall back to an older release, which would be the Android version, and you can then update that.</p>
<p>Probably sounds confusing, so just leave that enabled like it is. There's another option here for filter release titles by regular expression. Again, this is for edge cases. I haven't needed this yet for any of the apps I'm tracking on my main device. The last option down here is for track only, and what this will do is it will just track it and will not actually try to download the updates and let you install them. I leave this disabled because I want Obtainium to download the APKs for me so I can install them, and then standard version detection, I just leave that set to the default. So those are the options that are listed.</p>
<p>We can now select Add. Obtainium needs permission to install unknown apps, a lot from this source. Let's go back. You'll see this screen next. We can see latest version 0.25.0 installed, a version none. I want to install it. Install done. And now if we go back to our apps list, we can see New Pipe is now here and being tracked. Latest version 0.25 installed version 0.25. Nice clean interface, and as expected, New Pipe is installed.</p>
<p>So, I know that took a few minutes to go through and talk about, but in reality, it only takes 30 seconds to add an app, and now in the future, Obtainium will check for updates in the background and notify you when they are available. As always, you should be skeptical of anything open source or any app for that matter, especially something that will be installing apps on your behalf or for you. So one extra precaution that you can take is to install the app manually first from the source, and then add it to Obtainium. When you install an app, Android pins the certificate and enforces signature checks for app updates, so even if something malicious was happening with Obtainium, it wouldn't be able to install a malicious app update because the signature check would fail.</p>
<p>So as an example, let's go ahead and install Dev X5. I know their source code is on GitHub, so I'm going to search for that. I know this is the official repo for it. I'm going to go to the releases and download the latest one. Let's open and install that.</p>
<p>So now at this point, Dev X5 has been installed. We downloaded it from the trusted source that we know; therefore, the certificate has been pinned by the OS. So any updates that are installed either manually by us or using Obtainium must pass the signature check, which means that the APK is signed by the developers. We can see Dev X5 was installed. Let's now add it to Obtainium. We just copy this URL, go back to Obtainium, add app, paste in the URL, select add. We can see that it found that Dev X5 is installed, latest version 4.3, installed version 4.3.</p>
<p>There's no updates to install. So now, if we go back, then go back to the apps list, we can now see that DAV X5 is listed there. We installed it from a trusted source, and now we're going to let Obtainium handle any future updates.</p>
<p>There are a few other caveats or features that I want to go over. So, going back to the "add app" option, we can see here that Malvad and Signal are both listed as sources. If we select one of those, Malvad publishes their APK on their website, so we can just copy this, and Obtainium on our behalf will find the APK for us and download it.</p>
<p>Select "add," and we can see in the background downloading Malvadvpn. So it's pretty handy that the developer went ahead and built in this functionality for us already. Even though we're not actually adding the exact page the APK is on for the apps listed there. In this case, Malvad and Signal, the app automatically knows where to look. It's a good minute to finish.</p>
<p>Once it finishes, we're prompted to install. Now, if we go back to the apps list and refresh, we can now see Malvad is shown here and being tracked.</p>
<p>Just to show an example of what updates look like, I went ahead and installed an older version of New Pipe. You'll receive a notification, and then when you go inside the app, you'll see a notification next to the app that needs to be updated. In this case, New Pipe. Select the purple download icon, and you can see the download. So Obtainium went ahead and downloaded the APK for us. We now select "update," and now New Pipe was successfully updated.</p>
<p>One of the easiest ways to find where the source code for an open-source app is hosted is to use the F-Droid website. So if we go to f-droid.org in our browser and then scroll down and let's search for New Pipe as an example, the second one is the one we want.</p>
<p>To access the source code for the application, we need to scroll down to the section above the donate button and click on the link to the source code. By examining the URL, we can see that the source code is hosted on GitHub. If we scroll down further to the releases section, we can see that NewPipe publishes their APK on GitHub, which means Obtainium can download it from there.</p>
<p>Returning to fdroid.org, we can find that some developers only publish the APK on F-Droid, even if they have already published the source code on GitHub. As an example, let's search for a productivity app that starts with "Good Time," which is the fifth one down. Looking at the source code, we can see that it is also hosted on GitHub. However, when we scroll down to the releases section, we notice that they do not publish the APK on GitHub; only the source code is available. In this scenario, our only option is to return to F-Droid, copy the F-Droid link, and paste it inside Obtainium.</p>
<p>After adding the app and pasting the F-Droid URL, we can see that Obtainium found the app and we can proceed to install it. Upon returning to our list of apps, we can see that Productivity is now installed, and it shows that it is signed by F-Droid.</p>
<p>Using Obtainium is still a better option than the official F-Droid app because it avoids some of the shortcomings mentioned in the previous video, such as targeting out-of-date SDKs. Although the process might seem complicated, it is relatively simple once you go through the steps yourself. It has made the process of downloading, installing, and updating apps much more accessible for the past two weeks, and the update functionality and tracking have worked flawlessly. The experience so far has been enjoyable, and the plan is to continue using it.</p>
<p>However, there are a few limitations to be aware of that are listed on the GitHub readme. The first one is that app installs occur asynchronously, and the success or failure of an install cannot be determined directly. This results in install statuses and versions sometimes being out of sync with the OS until the next launch or until the problem is manually corrected. If you notice any unusual behavior, close the app and relaunch it.</p>
<p>The second limitation, which will be revisited later, is that auto unattended updates are unsupported due to the lack of a capable Flutter plugin. Also, for some sources, data is gathered using web scraping, which can easily break due to changes in website design. In such cases, more reliable methods may be unavailable, and scraping is an unreliable method to gather data. If you have ever used NewPipe and noticed that it broke randomly because YouTube changed its layout one day, that is a similar situation to what the developer is describing here. It is not the app developer's fault, but rather the nature of web scraping.</p>
<p>Regarding the second limitation mentioned above, before making this video, the app developer was contacted to see if there was anything specific they wanted to mention. They requested that any Android developers watching the video take a look at issue number 25, linked below, to help complete the auto-update feature before releasing version one of Obtainium. Contributions to help with that would be greatly appreciated.</p>
<p>Overall, using Obtainium has been a great improvement and has made the manual tracking process much more efficient. Although it is not a solution to the underlying problems that still exist, it is a step in the right direction. The plan is to continue using it, and there are no plans to go back to the RSS reader method.</p>
<p>And while it's not a solution to the underlying problems that still exist, which I covered in my previous videos, it is a great improvement and makes the manual tracking process much more efficient. So, I hope you enjoyed this video. If you did, check out this top one here, and the bottom one has been automatically selected for you.</p>
Thieves are stealing iPhone pin codes | GrapheneOS settings and protections2023-03-13T10:00:00+00:002023-03-13T10:00:00+00:00https://sideofburritos.com/blog/pin-code-thefts/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/LV6lqQrzqEE">Video Link</a></h2>
<hr />
<h2 id="links-referenced-in-for-video">Links referenced in/for video</h2>
<ul>
<li><a class="text-break" href='https://www.youtube.com/watch?v=KlQFyVF8oW0' target="_blank">https://www.youtube.com/watch?v=KlQFyVF8oW0</a> - Wall Stree Journal YouTube video</li>
<li><a class="text-break" href='https://www.karltarvas.com/2023/02/25/protecting-your-iphone-against-shoulder-surfing-password-theft.html' target="_blank">https://www.karltarvas.com/2023/02/25/protecting-your-iphone-against-shoulder-surfing-password-theft.html</a> - How to protect your iPhone from password theft.</li>
<li><a class="text-break" href='https://support.apple.com/en-us/HT201355' target="_blank">https://support.apple.com/en-us/HT201355
</a> - How to Change your Apple ID password</li>
<li><a class="text-break" href='https://www.intego.com/mac-security-blog/if-hackers-crack-a-six-digit-iphone-passcode-they-can-get-all-your-passwords/' target="_blank">https://www.intego.com/mac-security-blog/if-hackers-crack-a-six-digit-iphone-passcode-they-can-get-all-your-passwords/
</a> - If Hackers Crack a Six-Digit iPhone Passcode, They Can Get All Your Passwords</li>
<li><a class="text-break" href='https://grapheneos.org/features#auto-reboot' target="_blank">https://grapheneos.org/features#auto-reboot
</a> - GrapheneOS Auto reboot</li>
<li><a class="text-break" href='https://grapheneos.org/features#pin-scrambling' target="_blank">https://grapheneos.org/features#pin-scrambling
</a> - GrapheneOS PIN scrambling</li>
<li><a class="text-break" href='https://grapheneos.org/features#improved-user-profiles' target="_blank">https://grapheneos.org/features#improved-user-profiles
</a> - GrapheneOS Improved user profiles</li>
<li><a class="text-break" href='https://grapheneos.org/features#more-secure-fingerprint-unlock' target="_blank">https://grapheneos.org/features#more-secure-fingerprint-unlock
</a> - GrapheneOS fingerprint unlock</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong> βοΈ</p>
<p>The other day, someone sent me this video from The Wall Street Journal. It was a good video, so if you have some time, you might enjoy watching it. The video covered a situation that's occurring where someone will be at a bar. An individual or a group of individuals will either observe or befriend a Target to determine what their pin code is as they enter it into their device. As it's normal for someone to enter their pin code multiple times while they are out for the evening, they have various chances to figure out what it is.</p>
<p>Once they figure out what the PIN code is, they either swipe the iPhone when the suspect is distracted or they forcefully take it. Now, what happens after that is quick and calculated. The thieves using the PIN code are able to change the victim's password associated with their Apple ID, thus locking them out of their account and rendering finding my iPhone unusable. Once that step is completed, the thieves start draining any Financial accounts on the user's device that uses the PIN code to authenticate. In addition, if the victim uses the iCloud keychain chain, the PIN code can also be used to gain access to that which would then allow them access to any accounts stored in there.</p>
<p>The video goes over in more detail, and if anyone you care about uses an iPhone, consider sending them the video to make them aware of the situation so they can be more cautious. I will also link a post below that has some advice for iPhone owners on steps they can take to protect themselves.</p>
<p>In today's video, I wanted to cover some settings and suggestions you can implement on graphene OS to help with these kinds of attacks. While it's not the exact same scenario, I do think these are useful options. So, the example scenario is that you have a Google pixel running graphene OS, and either you or you and your friends decided to go out and grab a bite to eat or some drinks at a local bar.</p>
<p>The first suggestion I want to make for this type of scenario is to use biometric authentication, which is a fancy way of saying to use your fingerprint. To access that setting, you can go into Settings > Security > Fingerprint unlock. Enter your passcode and you can then set up a new fingerprint to authenticate with. I know some people don't like the idea of using biometric authentication, but the main advantage that using your fingerprint has for authentication is that you can't shoulder surf a fingerprint. Someone can't observe you and gain access to your fingerprint. So in a social setting where others might see you enter a PIN code on your device, using your fingerprint can avoid this altogether.</p>
<p>Graphene OS also has a quick option to disable the fingerprint reader. So let's say you're going through TSA at the airport or a police officer pulls you over, you can press and hold down the power button and then select "Lockdown." At this point, biometric authentication is disabled and you need to enter your PIN code to access your device. If you aren't comfortable using biometric authentication, another useful feature is pin scrambling. To access that, go into Settings > Security > Pin scrambling. Go ahead and enable that. What that does is, on your lock screen, the PIN code will be scrambled every time you go to enter it. This means that someone observing you can't determine your PIN code based on the physical location of your finger on the screen when entering your PIN code. And while it's not guaranteed that they can't determine what your PIN code is, it will make it much more difficult and hopefully deter them enough that they pick an easier target.</p>
<p>And while we are on the topic of PIN codes, the longer the PIN code, the better. It's going to be much more difficult to determine a 10-digit PIN code compared to a four-digit PIN code. My next suggestion is to use a separate user profile with a different PIN code from your main owner profile, specifically for situations where you're in a public setting with a large amount of individuals around who could watch you enter your PIN code into your device.</p>
<p>To do that, we're going to go into Settings > System > Multiple users > Enable "Allow multiple users" > Add user > Set a name for your new user profile. For this example, on this restricted user profile, I'm going to leave phone calls and SMS disabled, but as far as apps go, I do think it would be helpful to have NewPipe installed in case I need to look up a video to show someone. Other than that, I won't install any other apps. The "Install available apps" feature is a convenient feature to install apps on separate user profiles so that you don't need to install a separate App Store on the other user profile.</p>
<p>Separate user profiles are a great way to keep your sensitive apps like banking apps separate from a profile you'll be using in a public setting. So now that we have our new user profile created, you can switch to that by either tapping "Switch to" and your profile name or you can swipe down, pull down again, tap the user icon in the bottom right, and then select your new user profile.</p>
<p>So you won't be able to see it in the screen recording because it stopped recording when I switched, but all I did was go through the initial profile setup and set a different pin code for my main owner profile. So now here we are in the new user profile. If we swipe up, we can see NewPipe was installed, but Signal was not installed. So now at this point, we have a separate user profile created with a different pin code from our main owner profile that we can use in public settings so that in a worst-case scenario, if someone does get our pin code, they won't have access to our main owner profile with our sensitive data.</p>
<p>I also want to note that every user profile has separate settings, so you will need to enable pin scrambling on this new user profile we just created. The last setting I want to talk about is auto reboot, and this setting is only accessible from the main owner profile. So make sure you switch back to that user profile. To access that, go into Settings > Security > Auto reboot. I like the 12 hours option. What this setting does is it will reboot the phone if there hasn't been any successful unlock within the timeframe selected. This puts the device fully at rest in a pre-first unlock state, which is the most secure state for your data.</p>
<p>The reason this is useful for us is if we're logged into that separate user profile, worst-case scenario someone finds out our pin code, they swipe our device, they now have access to that restricted user profile. Once there is no successful authentication within 12 hours, the device will reboot itself. And now at that point, they need to enter the main owner pin code, which is required to unlock any separate user profiles. The entire device is now inaccessible to them since they don't know the main owner PIN code, and therefore they cannot access that separate user profile we created. For all intents and purposes, your device is a brick to them.</p>
<p>Probably the best protection, at least in the United States, is the fact that you are using an Android device. Most thieves target Apple devices because they have a great resale value and just how connected they are to everything else on the device. So an Android device being less premium is a solid defense.</p>
<p>Those are the ideas that I came up with. If you have any other suggestions, feel free to leave those down below in the comments. And if you enjoyed this video, I think you'll like the top one shown here, and the bottom one has been selected for you based on your viewing habits.</p>
How to guide - Raspberry Pi USB Boot2023-03-06T10:00:00+00:002023-03-06T10:00:00+00:00https://sideofburritos.com/blog/raspberry-pi-usb-boot/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/_5Drx8hNIr0">Video Link</a></h2>
<hr />
<h2 id="links-referenced-in-for-video">Links referenced in/for video</h2>
<ul>
<li><a class="text-break" href='https://youtu.be/CnRYn-9EGvE' target="_blank">https://youtu.be/CnRYn-9EGvE</a> - What is Raspberry Pi Imager?</li>
<li><a class="text-break" href='https://www.raspberrypi.com/software/' target="_blank">https://www.raspberrypi.com/software/</a> - Download Rapsberry Pi Imager</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong> βοΈ</p>
<p>The default boot order on the Raspberry Pi is to first boot from the micro SD card, which is less than ideal if you would like to boot from a USB drive first. So, in today's video, I'm going to cover how you can change the boot order on your Raspberry Pi.</p>
<p>To begin, you will need Raspberry Pi Imager. For this, if you've never used it before, check out my video linked on the screen now and down below where I go over the basics and how to install it.</p>
<p>Once you open Raspberry Pi Imager, select "Choose OS", scroll down, and select "Miscellaneous utility images", and select "Bootloader". Then, select the option for USB boot which boot from USB if available, otherwise boot from SD card, which is exactly what we want.</p>
<p>So, once you select that, the next step is to choose a storage device. For this example, I'll be using a Micro SD card, but make sure whatever medium you decide to use, you don't have any data stored on it that you need to keep because this process will completely erase it.</p>
<p>So, at this point, connect the SD card to your computer.
Once that's connected, select "Choose storage", select your storage device, and then before we click "Write", just double-check that you have USB boot as the operating system, the correct storage device is selected, and then go ahead and click "Write" again. Just a warning that all existing data will be erased. Are you sure you want to continue? Yes.</p>
<p>The USB boot image is very small, so this should take less than 30 seconds. Once it does finish, you can select "Continue", and we can now remove our storage device from our computer.</p>
<p>So, at this point, we now have our Raspberry Pi. I'm going to go ahead and insert the micro SD card into it, and now the next step will be to power it up. I'm just going to switch my camera to my computer screen so you can see what it looks like. If you don't have a monitor to connect your Raspberry Pi to, that's perfectly fine. Just power up your Raspberry Pi, let it sit for 30 seconds, and you should be all set.</p>
<p>As you'll see in a moment on my screen, the Raspberry Pi will power up from an image we just flashed to our micro SD card, and the bootloader will be reconfigured to boot from the USB drive first and the micro SD card second.</p>
<p>So, at this point, I have my Raspberry Pi connected to my monitor, and I have the micro SD card inserted in the Raspberry Pi. I'm now going to power up the Raspberry Pi.</p>
<p>Once the green screen shows up, that means that the boot order has been successfully reconfigured, and now our Raspberry Pi will boot from USB first and micro SD card second. If you enjoyed this video, I think you'll like the top one listed here, and the bottom one has been automatically selected for you.</p>
Considering GrapheneOS? Quick tour + useful settings2023-02-27T10:00:00+00:002023-02-27T10:00:00+00:00https://sideofburritos.com/blog/grapheneos-tour/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/d777l1i1p2k">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://grapheneos.org' target="_blank">https://grapheneos.org</a> - GrapheneOS</li>
<li><a class="text-break" href='https://grapheneos.org/features' target="_blank">https://grapheneos.org/features</a> - GrapheneOS Features</li>
<li><a class="text-break" href='https://grapheneos.org/usage' target="_blank">https://grapheneos.org/usage</a> - GrapheneOS Usage</li>
<li><a class="text-break" href='https://grapheneos.org/faq' target="_blank">https://grapheneos.org/faq</a> - GrapheneOS FAQ</li>
</ul>
<p><strong>Auditor App</strong></p>
<ul>
<li><a class="text-break" href='https://attestation.app/' target="_blank">https://attestation.app/</a> - Auditor App</li>
<li><a class="text-break" href='https://attestation.app/tutorial#scheduled-remote-verification' target="_blank">https://attestation.app/tutorial#scheduled-remote-verification</a> - Remote attestation setup</li>
</ul>
<p><strong>GrapheneOS Camera</strong></p>
<ul>
<li><a class="text-break" href='https://grapheneos.org/usage#grapheneos-camera-app' target="_blank">https://grapheneos.org/usage#grapheneos-camera-app</a> GrapheneOS Camera documentation</li>
<li><a class="text-break" href='https://github.com/GrapheneOS/Camera' target="_blank">https://github.com/GrapheneOS/Camera</a> - GrapheneOS Camera GitHub</li>
</ul>
<p><strong>GrapheneOS PDF Viewer</strong></p>
<ul>
<li><a class="text-break" href='https://grapheneos.org/features#grapheneos-pdf-viewer' target="_blank">https://grapheneos.org/features#grapheneos-pdf-viewer</a> - GrapheneOS PDF Viewer documentation</li>
<li><a class="text-break" href='https://github.com/GrapheneOS/PdfViewer' target="_blank">https://github.com/GrapheneOS/PdfViewer</a> - GrapheneOS PDF Viewer GitHub</li>
</ul>
<p><strong>GrapheneOS Vanadium</strong></p>
<ul>
<li><a class="text-break" href='https://grapheneos.org/features#vanadium' target="_blank">https://grapheneos.org/features#vanadium</a> - GrapheneOS Vanadium documentation</li>
<li><a class="text-break" href='https://github.com/GrapheneOS/Vanadium' target="_blank">https://github.com/GrapheneOS/Vanadium</a> - GrapheneOS Vanadium GitHub</li>
</ul>
<p><strong>Settings</strong></p>
<ul>
<li><a class="text-break" href='https://grapheneos.org/features#auto-reboot' target="_blank">https://grapheneos.org/features#auto-reboot</a> - Auto reboot</li>
<li><a class="text-break" href='https://grapheneos.org/features#attack-surface-reduction' target="_blank">https://grapheneos.org/features#attack-surface-reduction</a> - Wi-Fi/Bluetooth timeout</li>
<li><a class="text-break" href='https://grapheneos.org/features#pin-scrambling' target="_blank">https://grapheneos.org/features#pin-scrambling</a> - Pin Scrambling</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong> βοΈ</p>
<p>I received a message recently that asked if I ever considered doing a tour of GrapheneOS. This individual was interested in seeing what the operating system was like just after the install before they actually set it up on their own device or purchased one to use it with. I thought it was a great idea, so if that sounds like you, then I think you'll enjoy this video.</p>
<p>Before we start, I do want to mention that the best source for information is always going directly to the source. The GrapheneOS Project does a fantastic job documenting the features, usage, and some commonly asked questions, all of which will be linked down below.</p>
<p>This is a Pixel 6A running the latest version of GrapheneOS. All I've done is go through the initial setup screen, which I talk about in my install video. I've connected to Wi-Fi and I've changed the display to Dark theme to make this video a bit easier to watch.</p>
<p>So, this is the home screen. It might feel a bit barren; it might be a shock at first, especially if you're coming from a stock OS that's bundled with apps. So, we're going to swipe up and go through each app individually in the app drawer.</p>
<p>The first app is called "Apps." This is the official GrapheneOS app repository. It tracks and updates GrapheneOS apps, and it lets you install Google Play services. So, now going back to the app drawer, the next app is the "Auditor" app.</p>
<p>This app uses hardware-based security features to validate the identity of a device, along with the authenticity and integrity of the operating system. It will verify that the device is running the stock operating system with the bootloader locked, and that no tampering with the operating system has occurred. A downgrade to a previous version will also be detected. This is one of those features that doesn't get enough credit.</p>
<p>I really need to do a deep dive on this topic, but I haven't yet. I do use the remote attestation feature and the process for that is documented here. Give this a read-over; it's a very useful feature. Here, we have the calculator app. This is for doing math. This is the AOSP version of the calculator app. Nothing too much else to say about that. This is the official Graphene OS camera app. It's based on Android's camera X Library, and it works well. This is all I use. Following that, we have the clock. This is just the standard AOSP clock app; alarm clock, timer, stopwatch. Next is Contacts. This is the AOSP Contacts app. You can import and store your contacts locally, or you can use an app like Dev X5 to sync your contacts with a cloud service.</p>
<p>Following the Contacts app, we have the Files app. This is another AOSP app; it's simple, but it works well. The main things I do with it are rename screen recordings or copy them to an external USB drive. Besides that, I don't do much else in here. Next, we have the AOSP Gallery app. It's simple, doesn't have a ton of features, but all I use it for is browsing my photos. After that, we have the AOSP messaging app. It works fine for sending and receiving SMS messages. Most of my communication takes place over Signal. SMS is not encrypted, so I would suggest you use something like Signal, which is encrypted and secure, and try to use SMS as little as possible.</p>
<p>Next, we have PDF viewer. This is a simple Android PDF viewer by Graphene OS based on pdf.js and content providers. This app doesn't require any permissions. The PDF stream is fed into the sandboxed WebView without giving it access to content or files, which is pretty cool. The app works well for me, and all the PDFs I've opened on my device have been formatted correctly to read. Following that, we have the AOSP Phone app. Similar to the messaging app, most of my voice communication takes place over Signal, so I don't use this app much, but when I do, it works well.</p>
<p>After that, we have Settings. I'll come back to this shortly, and lastly is Vanadium. Vanadium is the stock Graphene OS browser maintained by the Graphene OS team. It's a privacy and security-enhanced release of Chromium. It also provides the WebView and a standard user-facing browser on the OS. This is the only browser I use on my device, and I'll link a video down below where I talked more about Vanadium and my configuration if you're interested.</p>
<p>Now, back to the Settings app. If you've ever used Android before, then this should look pretty familiar to you. There are a few options that Graphene OS offers that I like to enable. The first is under the Network and Internet. If we select our Wi-Fi network that we're connected to, the network preferences, there's a setting here to turn off Wi-Fi automatically. I like to change this to 10 minutes. This is helpful so that when you leave your home or wherever you're connected to Wi-Fi, your phone is no longer scanning for available Wi-Fi networks or saved networks.</p>
<p>Similar to the auto-off for Wi-Fi, there's a similar setting for Bluetooth. So under connected devices, Bluetooth timeout, I like to set this one to two minutes. And again, I enable this for the same reason I enabled the auto-off for Wi-Fi. It is a minor inconvenience that you need to manually turn on Wi-Fi or Bluetooth when you want to use them, but I think the benefits outweigh the inconvenience that it causes.</p>
<p>Now, the last two settings that I like to enable: the first is auto reboot, which is under security Auto reboot. For me, I like to change this to 12 hours. So what this does is, if your device has not had a successful unlock within the time period specified, your device will automatically reboot. This puts the device fully at rest in a pre-first unlock state, which is the most secure state for your data. This is a useful feature if your device is lost, stolen, or taken.</p>
<p>And now, the last feature I want to mention is on the same page, and that is pin scrambling. This feature does exactly what it says; it scrambles your pin on the lock screen. I find this feature extremely useful in public places. So, if someone is watching me type my PIN code on my screen, they won't be able to tell which numbers I pressed just based on the physical location of my finger.</p>
<p>These settings are all just preference; you don't need to use them. But I will link the relevant documentation down below if you would like to read more about them. So that was my tour of Graphene OS. It was a basic overview, but hopefully, it can give you a bit more confidence in case you are hesitant about installing it. So, if you enjoyed this video, I think you'll like the top one here, and this bottom video was selected for you by the machines at YouTube.</p>
What is Raspberry Pi Imager?2023-02-20T10:00:00+00:002023-02-20T10:00:00+00:00https://sideofburritos.com/blog/what-is-raspberry-pi-imager/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/CnRYn-9EGvE">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://www.raspberrypi.com/software/' target="_blank">https://www.raspberrypi.com/software/</a> - Raspberry Pi Imager Download</li>
<li><a class="text-break" href='https://github.com/raspberrypi/rpi-imager' target="_blank">https://github.com/raspberrypi/rpi-imager</a> - Telemetry collection details</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong> βοΈ</p>
<p>Raspberry Pi Imager makes it easy to install a variety of operating systems onto your micro SD card, external SSD, or whatever other medium you choose to install your operating system on for your Raspberry Pi. They make it super easy to install. You can head on over to raspberry pi.com. Once you get there, select "Software" and then, depending on which operating system you are running, select that download. In my case, download for Windows.</p>
<p>Once the download finishes, open it. Do you want to allow this app? Yes, follow the prompts. Once that finishes, select "Finish." There is one setting I like to change before I use it. The setting I like to change is located in the advanced settings. To access that on Windows, you need to hit Ctrl, Shift, and X on your keyboard, and you should see this screen pop up. Once this shows up, I change this to "Always use," and then I scroll down to the bottom, and the setting labeled "Enabled Telemetry," I uncheck that and then select "Save."</p>
<p>The detail on the GitHub page, which I will link down below, explains what Telemetry is collected, the URL, operating system name, and category if present, of a selected image are sent along with the running version of Raspberry Pi Imager, your operating system, CPU architecture, local, and Raspberry Pi revision if applicable to this URL. And then they go over the web service that it's sent to, where it's hosted and why they do it, which is to allow them to query the number of downloads over time and nothing else. I personally don't think there's anything malicious about the Telemetry they want to collect, but since the option is easily accessible, I like to disable it.</p>
<p>So, at this point, you can now browse the OS's that are available to install through the tool. They have the default Raspberry Pi OS, a popular section I like to use, as well as other general-purpose OS. In here, they have Ubuntu, which is what I'll be using in my demonstrations in future videos. They have some useful options under "Miscellaneous Utility Images" and under "Bootloader." From here, you can change the boot order of your device. So, if you want to boot from USB before SD card, you can configure that from here.</p>
<p>I just wanted to give a quick overview of what this software offers. In a future video, I'll walk through the install and booting up of our freshly installed OS on our Raspberry Pi. If you enjoyed this video, I think you'll like the top one here, and the machines think you'll like the bottom one.</p>
Apple Has NOT Begun Scanning Your Local Image Files Without Consent | How to spot FUD2023-02-13T10:00:00+00:002023-02-13T10:00:00+00:00https://sideofburritos.com/blog/apple-has-not-begun-scanning-local-image-files/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/woD3KQzoXnk" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://sneak.berlin/20230115/macos-scans-your-local-files-now/' target="_blank">https://sneak.berlin/20230115/macos-scans-your-local-files-now/</a> - Apple Has Begun Scanning Your Local Image Files Without Consent by Jeffrey Paul</li>
<li><a class="text-break" href='https://news.ycombinator.com/item?id=34392391' target="_blank">https://news.ycombinator.com/item?id=34392391</a> - Hacker News thread</li>
<li><a class="text-break" href='https://twitter.com/mysk_co/status/1617291107456454656' target="_blank">https://twitter.com/mysk_co/status/1617291107456454656</a> - Mysk Twitter thread</li>
<li><a class="text-break" href='https://youtu.be/_YQEE9Jl7fs' target="_blank">https://youtu.be/_YQEE9Jl7fs</a> - Mental Outlaw video</li>
<li><a class="text-break" href='https://youtu.be/6LfCJGSUcfk' target="_blank">https://youtu.be/6LfCJGSUcfk</a> - Louis Rossman Video</li>
<li><a class="text-break" href='https://youtu.be/-aRp0fSw3uk' target="_blank">https://youtu.be/-aRp0fSw3uk</a> - Louis Rossman followup</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong> βοΈ</p>
<p>FUD stands for "fear, uncertainty, and doubt." It's a popular term used a lot in the privacy community, and leads me to a topic I've been wanting to talk about: best practices when researching and analyzing information on the internet. I will be referencing an article written by a security researcher about Apple. I am not making this video to defend or shill Apple, but because I believe that real conversations about privacy and security should be based on facts, not lazily written articles attempting to lead readers down a path the author wants.</p>
<p>The article was published on January 15th, 2023 and has a very intriguing title. However, my skepticism kicked in and I looked into it some more. A lot of information is out there and, sadly, catchy headlines are the ones that get shared first without much validation.</p>
<p>So, let me take you through my process when evaluating an article, especially one that I am considering sharing with an audience. When I first get to the page, I see the title. In the sidebar, I quickly read about the author, who is a hacker and security researcher living in Berlin. After reading that, I think that the information should be technical with a lot of detail. However, the title, "Apple has begun scanning your local image files without consent," is a very strong claim to make, and I would expect something equally strong in the writing to back that up.</p>
<p>The author starts off with a preface, explaining that they don't use iCloud, Apple ID, Mac App Store, or store photos in the Mac OS Photos application. They use Mac OS software on Apple hardware.</p>
<p>The author then describes using a program called Little Snitch, which alerts them to network traffic attempted by the programs they use, and that they have all network access denied for many Apple OS level apps. They then start browsing some HEIC files in a subfolder of their documents and Little Snitch tells them that Mac OS is now connecting to Apple APIs via a program named "media analysis daemon," a background process for analyzing media files.</p>
<p>Instead of reading more detailed technical analysis and information, the author just starts to talk about Apple's client-side scanning for CSAM in 2021, and how they retracted it because of a public backlash. The author talks about the need to read Apple's statements carefully and how they are very good at writing technically truthful things that say one thing, but cause reporters to report a different thing.</p>
<p>The article concludes by reminding readers that if they have nothing to hide, they've done nothing wrong, and it's most important to limit information in those times.</p>
<p>So, to put this in perspective, the first few paragraphs gave the preface and some background on what the author found. Everything else talked about Apple's CSAM scanning, how they're bad, and the government. When I read an article and someone gives me one or two paragraphs with technical detail and then the following 10 paragraphs are about an event they want me to remember, that's a little suspicious and I feel like I'm being led down a path to correlate events without the author actually saying that.</p>
<p>So, after reading that, I had some hesitation about actually trusting what I read in this article or about what the author found. So, the next thing I like to do in that case is to actually search for the title of the article and see what else shows up. See if anyone on the Internet is talking about it. Typically, if it's a newly published article, I'll search for it on Google because they usually index first before other search engines. So, in this case, we'll search for the title, and we can see here I actually clicked it in the past. But one of the first results is for Hacker News.</p>
<p>This is a forum where information can be posted and shared, and people can comment on it. And we can see here, the article is posted 25 days ago. This is the site we were on reading it. Sneaked up Berlin. You might notice it was published by sneak, and if we go to this website, we can see most of the handles the author has are sneak. We don't see the Hacker News one listed here, but if we go to the home page of the website, they list that their Hacker News handle is at sneak. So, we can confirm that the author is the one that posted this on Hacker News. We can also see the article was flagged, and if you start reading through the comments, we can start to see pretty quickly that other people had similar doubts. It talks about the domain that showed up in the author's image smoot.apple.com is used for spotlight. This article is rightly flagged as BS. This guy found something a little snitch and suddenly exposing some dark company secret in the story.</p>
<p>I understand these are just some strangers on the Internet, but they're already confirming some of these suspicions I had about this article, and we know that sneak is the username for the author. So, if we search for sneak on the page, we can start to see some comments from the author. "If I made any false claims in the article, please let me know ASAP so I can correct them. I was very careful to report facts only and let the readers draw their own conclusions about what is happening here." You didn't report any false claims, you reported a bunch of unrelated claims without any technical research, and then pointed your readers to a conclusion that lacked any technical or journalistic merit.</p>
<p>It's shallow alarmism, and I want to be clear that I understand people might publish information that's inaccurate. But if someone goes back then and edits their information or adds something at the bottom saying "you know, after further research this was determined," but what you find from reading this is that the author chose to die in this hill. I didn't make that claim because I have not reverse engineered media analysis D to know precisely what it's doing. And this, I think, sums it up right here. We have a lazily written article where the author found something that they knew would get clicks.</p>
<p>So, nothing that we found is concrete proof of what's going on, but my trust with him is lacking because instead of adding corrections or addendums to his article, he chose to publicly defend it and continually say that he did not make those claims, even though he employed the same practice that he bashed Apple for, which is Apple is very good at writing technically truthful things that say one thing, that caused reporters to report a different thing.</p>
<p>Now, to contrast the article that was posted by Jeffrey, a miss-put thread on Twitter countered what was actually claimed in that article: no, Mac OS doesn't send info about your local photos to Apple. We analyzed media analysis D after an extraordinary claim by Jeffrey Paul that it scans local photos and secretly sends the results to an Apple server. They did a thorough analysis of what was claimed by the author to analyze the process, the network traffic. They did all the work that Jeffrey did not do or chose not to do. The unfortunate part is that it's likely these tweets with actual technical data to back them up did not get the same attention the original article did. They posted an update that this was indeed a bug and was fixed in Mac OS 13.2. This process no longer makes calls to Apple servers.</p>
<p>So, that's what I do when I find an article that I think is too good to be true, especially if I'm considering making a video on the topic. I do want to touch on one last point on why I think publishing this type of information and letting readers draw their own conclusion is irresponsible. This article had a clear conclusion they wanted the readers to come to, and that's exactly what happened. Two other popular YouTubers, with audiences much larger than myself, Mental Outlaw and Louis Rossman, both published videos on the topic. In defense of Lewis, he did publish an updated video correcting what he said in this one. If you produce content for a large audience, at least spend a few minutes fact-checking the articles you're talking about. At the end of the day, people are out there trying to make the best educated and informed decisions that they can. Content and blog posts like this are not helpful and they do more harm than good.</p>
<p>I absolutely agree these companies are doing things that are not good for user privacy, but if we're going to have discussions like this, they should be based on accurate technical details, not conspiratorial narratives based on fear, uncertainty, and doubt that get clicks and shares. So, if you liked this video and made it this far listening to me talk, I think you'll like this top video, and the algorithm thinks you'll like the bottom one.</p>
F-Droid - App not installed as package appears to be invalid2023-02-06T10:00:00+00:002023-02-06T10:00:00+00:00https://sideofburritos.com/blog/fdroid-app-not-installed/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/E3erRhXPPNY" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://f-droid.org/' target="_blank">https://f-droid.org/</a> - F-Droid homepaage</li>
<li><a class="text-break" href='https://f-droid.org/en/packages/org.fdroid.fdroid/' target="_blank">https://f-droid.org/en/packages/org.fdroid.fdroid/</a> - F-Droid package</li>
<li><a class="text-break" href='https://www.sisik.eu/apk-tool' target="_blank">https://www.sisik.eu/apk-tool</a> - Browser APK analyzer</li>
<li><a class="text-break" href='https://forum.f-droid.org/t/cannot-install-f-droid-invalid-package-using-profiles/16122' target="_blank">https://forum.f-droid.org/t/cannot-install-f-droid-invalid-package-using-profiles/16122</a> - F-Droid forum post 1</li>
<li><a class="text-break" href='https://forum.f-droid.org/t/why-does-the-f-droid-website-nearly-always-host-an-outdated-f-droid-apk/6234' target="_blank">https://forum.f-droid.org/t/why-does-the-f-droid-website-nearly-always-host-an-outdated-f-droid-apk/6234</a> - F-Droid forum post 2</li>
<li><a class="text-break" href='https://hub.libranet.de/wiki/and-priv-sec/wiki/apps' target="_blank">https://hub.libranet.de/wiki/and-priv-sec/wiki/apps</a> - Android apps</li>
<li><a class="text-break" href='https://grapheneos.org/features#install-available-apps' target="_blank">https://grapheneos.org/features#install-available-appss</a> - GrapheneOS install available apps feature</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong> βοΈ</p>
<p>It's good practice to document answers to frequently asked questions, as it allows other users to reference them. For example, I've been asked multiple times through email and video comments why a user is unable to install F-Droid in another user profile. To avoid answering these questions individually, I decided to make a video explaining the reason behind this issue. To demonstrate the process, a user can go to f-droid.org on their Android device and click the "Download" button on the home page to download F-Droid. Once the download is complete, they can install the APK.</p>
<p>Open the app, ignore the warning, allow it a minute to update the repositories. Now, if you go to updates because of the notification, the first thing the app wants you to do is update F-Droid to the newest version. The user now has the latest version of it installed. They go through and download whatever apps they want, install them, and then shortly after this, the user finds out about user profiles and wants to start separating their apps to different user profiles to separate user data.</p>
<p>So, they create a new user profile and we're on that new user profile. And again, the first thing they want to do is install F-Droid so they can download apps. They go to fdroid.org again, same process as before, click the download button, download once the download finishes, open, and install again. And they are presented with an error. This is the error I get asked about and that I see different posts about online.</p>
<p>So now that we see what is happening, let's talk about why this is happening. This diagram is overly simplified, but I think it'll help paint the picture of what's going on. At the bottom here, we have the system and part of the system is the Android Package Manager, which we can see here. And above the system level is the user profiles, as we saw in the example. We had our initial owner user profile that we were on and then switched to our user profile, which was that second user profile where the F-Droid install failed.</p>
<p>A common misconception is that when you install an app on a user profile, it's installed in that user profile and then when you switch to the other user profile, it's installed there as well. But that is not correct. What happens when you install an app on Android is that it is handled by the Android Package Manager. That app is installed and then linked, for lack of a better term, to the profile that you are presently in.</p>
<p>In this example, we installed F-Droid from our owner profile. We downloaded it and installed it, which was version one. And as we saw in the example, once we installed F-Droid, we were immediately prompted to update the app, so we went from version one to version two. These are not the actual version numbers. I'm just doing this for the sake of simplicity. So at this point, we now had version 2 of it installed and being managed by the Android Package Manager.</p>
<p>We went to our second user profile, downloaded and installed F-Droid, or tried to install it, but the issue that was occurring was that when we downloaded F-Droid from the website, the version we downloaded was actually version one. Since Android packages are managed by the system, there's a protection in place that prevents an app from being downgraded. So in this case, we were trying to install version one of F-Droid, but the Package Manager saw that we had version 2 installed, therefore it blocked the install on that second user profile, and we were unable to install F-Droid on it.</p>
<p>Just to reiterate, because it was a misconception that I had as well, user profiles are meant to separate user data. The actual installation of apps is handled at the system level by the Android Package Manager. And if you try to install an app on a separate user profile that is an older version than the one currently being tracked by the Android Package Manager, the install will fail.</p>
<p>You may have noticed that when you update an app in one user profile, the same update is reflected in all other user profiles. This is because the package installation is handled at the system level, not at the user profile level. When the app is updated in one profile, the actual package is upgraded across the system, making all user profiles use the same updated version.</p>
<p>This is why the issue of updating F Droid continually occurs. F Droid hosts an outdated version of their app on their website, so every time a new user visits the site, they end up downloading an older version of the app, which then prompts them for an update. To avoid this, you can download the latest version of the app from the home page and save it in a folder titled "F Droid". From there, you can search for "F-Droid" on the right side.</p>
<p>We can scroll down to the latest version labeled "Suggested Download". Again, placing that in the "F Droid" folder. Now, for the sake of simplicity, I'm going to use this online APK analyzer. Here we have our "F Droid" folder with the "F Droid.apk" that was downloaded from the home page and the "org.fdroid" that was the most recent suggested version we downloaded.</p>
<p>If we look at these, we can see that the one from the home page is version 1.15.4, and the version from the actual page in the search was 1.15.6. The 1.15.4 was published on December 2nd, 2022, and the most recent suggested version on January 14th, 2023.</p>
<p>That's why if you go to a separate user profile and try to download F Droid from the main home page, you receive an older version that's out of date and the install fails because Android's downgrade protection kicks in and blocks the install.</p>
<p>Now that we know what is happening and why, there are a couple of things you can do to get around this issue:</p>
<p>Instead of going to the F Droid home page, you can scroll down, search for "Appdroid", select F Droid, and download the latest version with the tag "Suggested". When you open this one and select "install", it's not blocked by Android because you're not trying to install an older version of the app. This is probably the easiest for most people.</p>
<p>If you are running Graphene OS, you can go into "Settings", "System", "Multiple Users", select the second user profile, and use the option "Install Available Apps". Change the toggle next to F Droid, and it will be accessible from your second user profile. The reason the "Install Available Apps" feature works is that APK installation is handled by the package manager at the system level, so when you are in the owner profile, you can give additional profiles access to installed apps.</p>
<p>For the F Droid team, you could update the version on your home page to the latest stable version. It's not good security practice to intentionally host an outdated version of your app in the most popular place to download it. This one change of hosting the most recent version on your home page would save everyone time and make for a better overall user experience.</p>
<p>If you enjoyed this video, I think you'll like the top one listed here, and the engineers at Google think you will like the bottom one.</p>
Raspberry Pi 4 Explained | Hardware layout2023-01-30T10:00:00+00:002023-01-30T10:00:00+00:00https://sideofburritos.com/blog/raspberry-pi-4-explained/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/oWxeoU9v3K8" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://www.amazon.com/dp/B09HKGGPLR' target="_blank">https://www.amazon.com/dp/B09HKGGPLR</a> - Western Digital 250GB WD Blue SN570 NVMe</li>
<li><a class="text-break" href='https://www.amazon.com/dp/B08G14NBCS' target="_blank">https://www.amazon.com/dp/B08G14NBCS</a> - ORICO M.2 NVMe SSD Enclosure</li>
<li><a class="text-break" href='https://www.hackster.io/news/meet-the-new-raspberry-pi-4-model-b-9b4698c284' target="_blank">https://www.hackster.io/news/meet-the-new-raspberry-pi-4-model-b-9b4698c284</a></li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong> βοΈ</p>
<p>In today's video, I wanted to cover the hardware components on the Raspberry Pi. Understanding what you are working with is helpful and I find it impressive what they have managed to cram on this circuit board. Towards the end of the video, I will suggest an upgrade if you plan to use it for full-time hosting. On the top right, we have a gigabit Ethernet port, which supports true gigabit Ethernet speeds. The Ethernet transceiver chip on the Raspberry Pi allows you to achieve full gigabit speeds of 1000 megabits per second, compared to the Raspberry Pi 3, which was limited to 300 megabits per second. Below the Ethernet port, we have two USB 3.0 ports and two USB 2.0 ports. On the side view, we can see the Ethernet port in the center and two USB 3.0 ports (which have blue inside) and two USB 2.0 ports (black) on the left. Below the Ethernet controller, we have the USB controller chip. On the previous Raspberry Pi 3, the Ethernet and USB controller were on the same chip, causing the limitation of 300 megabits per second on the gigabit Ethernet interface.</p>
<p>Now, that's broken up into two separate chips, which allows for USB 3.0 and the true gigabit Ethernet port. So now, if we continue on our way around the board, here we have a four-pole stereo output jack, which is handy if you want to connect headphones or some other external speaker. To the left of that, we have a CSI camera port. This is something I've never actually used, but if you wanted to connect an external web camera, if you use this as a desktop replacement, that's what that port could be used for. To the left of that, we have two micro HDMI ports, which means that this board does support dual displays, which again is impressive for something so small. If you only use a single monitor, then this board can support 4K at 60 frames per second. If you use the dual display option, it can support two monitors at 4K 30 frames per second. Now, to the left of the micro HDMI ports, we have a USBC port, and this is used to provide power to the Raspberry Pi. Now, returning to the top of the board, here we have a DSi display port, this is something I've never used. And, continuing up to the top left, we have a radio frequency shielded module that provides Dual Band Wi-Fi 2.4 and 5 gigahertz. It provides 802.11 BGN and AC along with Bluetooth 5.0 and Bluetooth LE. So, if you don't have a nearby Ethernet port, you can still use the wireless adapter and have internet access. It's also helpful if you use this as a desktop computer replacement; you can connect a Bluetooth keyboard and mouse to it. Above that, we have this black bar with 40 pins in it; this is a 40-pin GPIO header, you likely won't be using this. And next to that, we have a grouping of four pins, and this is used for PoE. There's an extra module you can purchase, which is a PoE hat, and what that allows you to do is use PoE with the Raspberry Pi. PoE stands for power over Ethernet, so what that does is, once you plug in the PoE hat to the Raspberry Pi, you can now plug in an Ethernet cable, and if your switch supports PoE, then that singular cable can provide both network connectivity and power to the Raspberry Pi, and you don't need to use the USBC port to power it.</p>
<p>So, in the center, we have the "star of the show." This is a 64-bit quad-core Arm Cortex A72 processor clocked at 1.5 gigahertz. This processor has been more than enough for small projects. To the right of the CPU, we have DDR4 SD RAM. This will vary in size depending on the Raspberry Pi purchased. This one has 4GB of RAM, but it can range from 2GB to 8GB. This concludes the top of the board.</p>
<p>Moving to the bottom, there's one component to highlight: the Micro SD card slot. This is commonly used to store the OS and related files. To upgrade, the author suggests using an NVMe SSD instead of the Micro SD card. You'll need an NVMe SSD and an enclosure to plug the SSD in, then connect it to the Raspberry Pi via USB. This author uses it for a Mastodon server on a Raspberry Pi. You'll still need a Micro SD card for initial setup, but once that's done, the OS and data will be stored on the NVMe SSD. The reason for this upgrade is that Micro SD cards can be unreliable with large amounts of reading and writing. If a modern SD card fails, it goes into read-only mode to protect data.</p>
<p>I actually experienced this twice when I was setting up my Mastodon server. I tried to use only a Micro SD card, but when I installed the ruby gems, which required a high number of reads and writes, the SD cards went into read-only mode and I could no longer use them. Since I upgraded to the M.2 SSD, I haven't had any issues and it's been running reliably. I'll link both the enclosure and the NVMe SSD below if you're interested in purchasing them. I bought both from Amazon, the bookstore run by Bezos. The enclosure cost me around $19 and the specific NVMe drive that I bought was $35. There are cheaper drives available, but I like Western Digital, so you can probably pick one up for $15 on the low end. Again, this isn't a required upgrade, you can still just use the Micro SD card if you prefer, but for reliability's sake, I would suggest making the upgrade. There were some comments on my last video that said you can get a used old laptop for cheaper. This is likely true, but I like the small form factor and low power consumption of the Raspberry Pi, so I stick with it. The self-hosting guides that I'll have in the near future can be adapted to whatever hardware you have lying around, but I'll be demonstrating and performing the installs on a Raspberry Pi. If you made it this far and are not tired of hearing me talk yet, the top video is one I think you'll enjoy if you liked this one, and the bottom one was chosen for you by the YouTube algorithm.</p>
GrapheneOS vs Android OS on the Pixel 7 Review2023-01-22T10:00:00+00:002023-01-22T10:00:00+00:00https://sideofburritos.com/blog/grapheneos-vs-android-pixel7/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/nuy76Iapmn8" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://grapheneos.org/features#sandboxed-google-play' target="_blank">https://grapheneos.org/features#sandboxed-google-play</a> - Sandboxed Google Play Documentation</li>
<li><a class="text-break" href='https://youtu.be/hx2eiPTe7Zg' target="_blank">https://youtu.be/hx2eiPTe7Zg</a> - Sensor & Network Permissions</li>
<li><a class="text-break" href='https://youtu.be/WjrANjvrSzw' target="_blank">https://youtu.be/WjrANjvrSzw</a> - Storage Scopes</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong> βοΈ</p>
<p>I am upgrading to the Pixel 7 and after nearly two years of using Graphene OS, I have decided to leave the stock Android OS installed on it. Let me be clear, I did not want to do this, but I figured in order to offer a fair comparison between stock Android OS and Graphene OS, I should probably test out the stock OS and see how it is. My first impression with stock Android OS is that it has a very friendly setup. It wants you to log into your accounts to sync your settings and it comes with a ton of popular apps installed, as well as the Google Play Store, installed by default. I am speaking objectively for someone new to the OS, not from a privacy or security perspective. The whole initial experience was very welcoming. To keep things equal in my testing, I am going to be using the Play Store on both OS's by signing in so I can download apps. I also wanted to try and embrace the stock Android OS as much as possible to see if there were any features I might miss.</p>
<p>I am a simple person and my phone habits stick to that theme, so it's likely I missed a bunch of features that these OS's offer. With my time on stock Android OS, there are a few major things I noticed. The OS wants you to sign in a lot, which I guess is no surprise. You are always reminded to log in, sync, and use your Google account. I did my best to avoid this, even though I signed into the Google Play Store. I didn't want to sync any of my phone data with my Google account. As far as navigation goes, I noticed that Google Maps is very helpful for traffic. As someone who lives in a busy city that I think has some of the worst drivers in the United States, Google Maps saved me time at least on three different occasions by helping me take a different route instead of the one that had multiple traffic accidents during rush hour. Now the biggest difference I noticed right off the bat, which I was not expecting, was Google Keyboard, otherwise known as Gboard. It makes the initial feeling of stock Android OS very fluid and cohesive. My typing felt more accurate while using it and I've heard people in the past suggest using a different keyboard from the stock one that comes with Graphene OS. Now, I can see why they suggested it. It really makes a big difference. The phone and clock apps on stock Android OS are very well designed as compared to the AOSP versions used on Graphene OS. While I didn't use any of the extra features offered by the phone or clock app on stock Android OS, aesthetically, they are very nice looking.</p>
<p>In terms of functionality, the way I use them, there was no difference. There are two features on stock Android OS that are not available on Graphene OS. The first is Android Auto. The reason for that is that it requires system-level integration, and that is not something the project is willing to support, which I completely understand. The second feature that I found, which I really liked, is the now playing feature. Now playing listens to background audio in your environment and will show you the song that is now playing on the lock screen, if it can identify them. It does sound a little bit counter-intuitive from a privacy perspective, but I liked it. Now playing doesn't send audio or background conversations to Google, according to their documentation, and all processing takes place locally on your device. I can already hear the people typing 'lies, Google's collecting my audio and listening to my conversations.' I'm going based off of the information available and documentation, not speculation. So with all that said, at the end of the day, I still did not like being on the stock OS. You are reminded that Google is there for your convenience, ready to save your passwords, collecting telemetry in the background, and the inability to uninstall a lot of the bundled apps. All you can do is disable them. There's just something uncomfortable about knowing that Google services have system-level integration, and therefore do not follow the regular permission controls available for sandboxed apps. So after almost two weeks, I went and installed Graphene OS on my Pixel 7.</p>
<p>The first things I did to make it a fair comparison were to install sandboxed Google Play services, all of my apps, I installed the Google keyboard, and I set the same wallpaper. I was happy to be back. No annoying prompts to sign in, and I felt like my privacy was back under my control pretty quickly. I noticed some of the visible features that I missed that Graphene OS offers. Those features were the network permission, when you install an app, the sensor's permission, and storage scopes. Stock Android OS does not have these features. If you want to learn more about those, I'll link my video covering those down below, but overall, with the Play Store, Gboard, and a wallpaper set, the experience felt very familiar to stock Android OS. I honestly thought there would be a jarring difference when I switched back, but there wasn't. A popular question I see is, 'Am I getting any benefit to using Graphene OS with sandboxed Play Services installed?' And the answer is yes. On Graphene OS, they are installed as sandboxed apps, like any other app you install. They have no access beyond what other apps can access, and you can set the permissions on the apps installed. This implementation provides a great balance of usability and privacy. Now, this was an oversimplified explanation. The official documentation goes over this in great detail and explains it very well. I'll link that down below, and I do suggest you give it a read if you plan on using them or want to learn more. So, at the time of this recording, I've been using Graphene OS on my Pixel 7 for nearly two weeks, and I haven't noticed any issues or bugs for my specific use cases. As far as battery life goes, I haven't noticed much of a difference between the two OS's. I feel that they are similar for the setup that I'm using, but I haven't done any official tests for battery life. Now, the setup in this video isn't how I'm going to leave my Pixel 7. I'll be covering a new setup that I'm going to try in a future video, but if you have any hesitations about moving from stock Android OS to graphene Os from my basic phone usage habits with sandbox to play services installed I don't think you'll have much of an issue.</p>
Should you use self hosted applications?2023-01-16T10:00:00+00:002023-01-16T10:00:00+00:00https://sideofburritos.com/blog/self-hosted-raspberry-pi/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/NqWho5Qgq5A" target="_blank">Video Link</a></h2>
<hr />
<h2 id="supplies-needed">Supplies needed</h2>
<ul>
<li>Raspberry Pi - I purchased the Raspberry Pi Model B (4GB). If you can afford it, try to get 2 (1 for a backup).</li>
<li>Micro SD Card - I went with a 64GB High Endurance SanDisk card (linked below). I would suggest buying 1 extra.</li>
<li>External monitor - this isn't required, but it would make things easier to see the display out from your Raspberry Pi. You can use it without a monitor, as long as you know how to find out the IP address for SSH.</li>
<li>If you want to use a monitor, you'll need a Micro HDMI to HDMI cable</li>
<li>Keyboard & mouse (wireless or wired). Again, this isn't required. You can SSH into the Raspberry Pi from another computer.</li>
<li>A desktop/laptop you can SSH to the Raspberry Pi from. The other option would be to configured it using a monitor you plug into it with a keyboard/mouse, and you wouldn't need access to another computer.</li>
<li>Ethernet cable if you'd like to use the Ethernet port. It also supports Wi-Fi.</li>
</ul>
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://rpilocator.com/' target="_blank">https://rpilocator.com/</a> - Helpful tool to monitor multiple sites for Raspberry Pi availability. This will be your best bet at finding one.</li>
<li><a class="text-break" href='https://store.rakwireless.com/' target="_blank">https://store.rakwireless.com/</a> - I've purchased two from here. They ship directly from China and have a heat sink attached. I don't know if these are knockoffs, but everything looks legitimate.</li>
<li><a class="text-break" href='https://www.amazon.com/dp/B07P3D6Y5B' target="_blank">https://www.amazon.com/dp/B07P3D6Y5B</a> - SanDisk 64GB High Endurance Video MicroSDXC</li>
<li><a class="text-break" href='https://www.amazon.com/dp/B08ZY3RR9X' target="_blank">https://www.amazon.com/dp/B08ZY3RR9X</a> - Micro HDMI to HDMI cable</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong></p>
<p>They say the best option for privacy is to self host your own data and services. While I do agree the privacy benefits are hard to beat, there are some downsides that I don't think are discussed enough. Before we get into it, I will be doing a self hosting series in the very near future using a Raspberry Pi, I settled on the Raspberry Pi Because it's an affordable option for many people compared to purchasing a full fledged server. It's low power nearly silent, since it's fanless. And you can get one for between 35 and 100. US dollars, depending on where you buy them from. One of the main benefits of self hosting, especially as someone who talks a lot about privacy is that you own your data and have physical control over it. It's not uploaded to the cloud encrypted on a server that a company may have access to, you are going to be responsible for it yourself on your own hardware, wherever you decide to plug it in and powered up. I think having that level of control can be liberating, while at the same time terrifying, your data will be stored on a little card like this. That means if you lose it, the card malfunctions, or there's a natural disaster and it's destroyed, and you didn't take a backup or replicate it somewhere your data is gone. And that's on you. There's no large corporation ensuring its integrity, and that it's stored in multiple geographic locations in case of catastrophic failure. Now, while that might sound a bit scary, there's also something satisfying about knowing that if you want to destroy your data you can and it's not stored somewhere that you were not aware of.</p>
<p>So as far as privacy goes, self hosting is a big win. Security. That's a different story. For all intents and purposes, you will be a systems administrator, patches, updates, upgrades configurations, the security we all take for granted when we upload our data to a billion or trillion dollar company is now your responsibility. This goes back to where I mentioned that at least some part of you has to be okay with tinkering and troubleshooting. This won't be a set it and forget it sort of thing, you'll have to maintain it and take care of it. It also sounds like I'm talking about a pet. Modern day expectations are that services are available 24/7 365 As someone who has worked for a hosting company, I don't think most people realize the level of effort and resources it takes to get five nines of uptime. When you self host you're at the mercy of your internet service provider and Power Company. Maybe the power goes out for 10 seconds, which normally wouldn't be a big deal. But now your server was powered off and you need to turn it on and login again. Maybe you had a battery backup so you're good for short outages. But what if you live somewhere like Florida and the power's out for weeks. I also heard that some ISPs have rules about hosting services out of your home, even if they are for personal use. I've never had any issues in the United States. But I don't know how that works in other countries. An easy way to avoid some of the hardware power and internet failures I just mentioned would be to rent a VPS from a cloud provider. There are some pretty affordable ones out there. But for now on this channel, I'm going to focus on hosting out of your home.</p>
<p>With the doom and gloom out of the way. I'll be doing various demonstrations in the coming months on configurations and services. If you have the money, I would suggest getting at least two Raspberry Pi's with extra SD cards so that you can have one to mess around with and one to host your data. It's also useful to have one as a backup in case your main one has a hardware issue. The goal of this was not to demotivate you. That's the last thing I want, especially since I'll be making videos on it in the near future. I just want to make sure that you're aware of the added responsibility you'll have before embarking on this.</p>
Your NFT is just a URL | NFT Explained2023-01-09T10:00:00+00:002023-01-23T10:00:00+00:00https://sideofburritos.com/blog/nfts-are-urls/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/9la5erHd5LY" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://opensea.io/assets/ethereum/0xbc4ca0eda7647a8ab7c2061c2e118a18a936f13d/3559' target="_blank">https://opensea.io/assets/ethereum/0xbc4ca0eda7647a8ab7c2061c2e118a18a936f13d/3559</a> - NFT used in example</li>
<li><a class="text-break" href='https://etherscan.io/address/0xbc4ca0eda7647a8ab7c2061c2e118a18a936f13d#readContract' target="_blank">https://etherscan.io/address/0xbc4ca0eda7647a8ab7c2061c2e118a18a936f13d#readContract</a> - NFT example Etherscan contract</li>
<li><a class="text-break" href='https://ipfs.io/ipfs/QmeSjSinHpPnmXmspMjwiXyN6zS4E9zccariGR3jxcaWtq/3559' target="_blank">https://ipfs.io/ipfs/QmeSjSinHpPnmXmspMjwiXyN6zS4E9zccariGR3jxcaWtq/3559</a> - NFT example IPFS data (JSON)</li>
<li><a class="text-break" href='https://ipfs.io/ipfs/QmQHfJJiCuHuyAEgm12SmbQ7tzDiX3xtYGgzvupj3PEeJp' target="_blank">https://ipfs.io/ipfs/QmQHfJJiCuHuyAEgm12SmbQ7tzDiX3xtYGgzvupj3PEeJp</a> - NFT example IPFS image</li>
<li><a class="text-break" href='https://opensea.io' target="_blank">https://opensea.io</a> - OpenSea | NFT Marketplace</li>
<li><a class="text-break" href='https://futurism.com/logan-paul-nft-game' target="_blank">https://futurism.com/logan-paul-nft-game/</a></li>
<li><a class="text-break" href='https://www.wired.com/story/no-one-will-escape-the-ftx-fallout/' target="_blank">https://www.wired.com/story/no-one-will-escape-the-ftx-fallout/</a></li>
<li><a class="text-break" href='https://rameerez.com/no-your-nft-not-on-the-blockchain/' target="_blank">https://rameerez.com/no-your-nft-not-on-the-blockchain/</a></li>
<li><a class="text-break" href='https://medium.com/coinmonks/how-to-find-your-nft-on-ipfs-e51bc5e7c8a1' target="_blank">https://medium.com/coinmonks/how-to-find-your-nft-on-ipfs-e51bc5e7c8a1</a></li>
<li><a class="text-break" href='https://www.theverge.com/2021/3/25/22349242/nft-metadata-explained-art-crypto-urls-links-ipfs' target="_blank">https://www.theverge.com/2021/3/25/22349242/nft-metadata-explained-art-crypto-urls-links-ipfs</a></li>
<li><a class="text-break" href='https://www.researchgate.net/figure/How-the-BitTorrent-Protocol-Works_fig9_220080811' target="_blank">https://www.researchgate.net/figure/How-the-BitTorrent-Protocol-Works_fig9_220080811</a> - Bittorrent Diagram</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong> βοΈ</p>
<p>Maybe you've heard or maybe you haven't, but there is ongoing drama in the crypto space. Not even necessarily drama, just mind-blowing behavior from Logan Paul to SPF with FTX. All of this has reminded me of a topic I've wanted to make a video on: NFTs are not what they seem. These are photos I printed on a Kodak printer at CVS, but they're being sold as NFTs. There's a big misconception that when you buy an NFT, you're buying the artwork, but that's not true. The blockchain only confirms that you own the NFT, not the artwork. I heard someone say before that when you buy an NFT, you're just buying a URL, but I never looked into it further. So today, we're going to look into what you actually get when you purchase an NFT. I would say NFTs are the low point of crypto, but then something else happens and we reach a new low.</p>
<p>This is OpenSea, an NFT marketplace, likely the most popular one out there. For our example, let's search for a popular project such as Board AB Yacht Club. Here are the current NFTs that are up for sale. Let's pick one of these as an example; they just get worse and worse the more you scroll. So let's go with this one. On this page, if we scroll down and go to the details section, from here, we can see the contract that is actually tied to this NFT. Let's go ahead and open this in a new tab. This takes us to Etherscan. On this page, we want to go to the contract. This is the actual code that the contract is comprised of. We want to go to read contract. And on this page, we want to look for a function called token URI. We can see here number 20, token URI. Inside of here, we want to take the token ID from open C 3559. Put that in that box. Select query. Now we are presented with a string that contains an IPFS address. IPFS stands for Interplanetary File System. If you've ever heard of BitTorrent and how it works, IPFS is similar. You have a network comprised of nodes, which are just individuals, servers, or companies running this IPFS software. These nodes can talk to one another. If you're a node on the network and you request an IPFS URL, you'll ask a nearby peer if they know who has this content. That peer will say yes, I know who does and provide the node with the content. It's a decentralized way to store files and share information.</p>
<p>And that's what we see here. This is the IPFS URL. You can't just go there in your browser, it doesn't work. So instead, we're going to use an IPFS gateway. There are public ones available, a popular one is ipfs.io/ipfs. And then we follow that with the string that we found on etherscan.io. Now when we load this, the reply we get is JSON. And what we can see here is we have an image, with a URL that is tied to it, and then some metadata about the image. This is the data that is tied to the NFT that is purchased when it's bought. And this is the image that you actually get. Again, it's another IPFS URL. Now, if we go to this, we can see the image. The image is not actually on the blockchain, it's not there for people to see. It's just this JSON data that has the image URL that you can access on the interplanetary file system. Someone has that image hosted there, but it may not be there forever. Sometimes the image just disappears after the sale. You're not purchasing any rights or anything like that. You're just purchasing this JSON data that has some metadata attached to it, some attributes, and a pointer to a URL. As we saw here, this is going for over $100,000. All that you get is a record on the blockchain that says you purchased this.</p>
<p>To the defenders of NFTs, I know there are different ways to host these files that are more resilient and reliable. But that takes us back to the initial question of what you get when you buy an NFT. To me, this is much different from what I initially thought NFTs were and how they were marketed and promoted. So, this is not glamorous by any means. But I think the story we were told about NFTs is a lot more glamorous than what you're actually getting. So, the moral of the story is, don't pay six figures for some NFT that an influencer promoted so they can make a quick buck off their fan base.</p>
Most Secure and Private Browser for Mobile | Vanadium2023-01-02T10:00:00+00:002023-01-02T10:00:00+00:00https://sideofburritos.com/blog/secure-and-private-browser-for-mobile-vanadium/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/G-SL9F8x_Nk" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://grapheneos.org/usage#web-browsing' target="_blank">https://grapheneos.org/usage#web-browsing</a> - GrapheneOS | Web browsing</li>
<li><a class="text-break" href='https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/' target="_blank">https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/</a> - Mullvad Adblocking DNS server</li>
<li><a class="text-break" href='https://microsoftedge.github.io/edgevr/posts/Super-Duper-Secure-Mode/' target="_blank">https://microsoftedge.github.io/edgevr/posts/Super-Duper-Secure-Mode/</a> - Microsoft article on CVE data</li>
<li><a class="text-break" href='https://github.com/GrapheneOS/Vanadium' target="_blank">https://github.com/GrapheneOS/Vanadium</a> - Vanadium GitHub</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong></p>
<p>If you've been following my channel for any length of time, then you know that I use graphene OS on my mobile device. My browser of choice is the one that's bundled with it, which has vanadium. In addition to being bundled with the OS, there are a few other reasons I really like it, which I'll cover in today's video on graphene OS vanadium is the user facing browser that's included with the OS and the provider of web view, which is used by other apps to render content. Now you might be asking what is what view. So as an example, let's take a look at mastodon. Now there's a post on Mastodon with a link included with it. And I selected, we can see that the page was opened, but I wasn't actually taken outside of the Mastadon app to my web browser. Instead, the app displayed the link using web view. So even though you might not think you're using vanadium, if we select the three dots in the upper right-hand corner, we can see at the bottom running in vanadium. So, that's what web view is, as the name implies, that lets you view the web vanadium is a chromium-based browser, which means it provides the strongest sandbox implementation available for browsers at this time. Among other security features like exploit protection and site isolation. Vanadium actually improves upon these features, so you get even more protection as compared to using the standard Chrome browser.</p>
<p>Another important feature is that by default, JavaScript JIT is disabled. I'm pretty sure it's pronounced a JIT and not J. It just like iOS is not ios. But I could be wrong. While JIT is meant to improve performance on load times, it also increases your vulnerability to browser-based exploits. And an article by Microsoft, they noted that looking at CVE data after 2019 shows that roughly 45% of the CVE issued for V eight, which is Chrome's JavaScript engine, were related to the JIT engine. So blocking JIT by default means that you greatly reduce your vulnerability to browser-based exploits. I hope to go into more detail in the future on topics like sandboxing, JIT and exploit mitigation. When I figured out a decent way to explain and demonstrate them, there was one feature I wish this browser had, and that is a built in ad blocker. The section on graphene os.org that discusses web browsing does mention that they have plans in the near future to add content filtering. Luckily, there are still two popular ways to block ads. The first is if you use a VPN, typically they have an option for ad blocking. This is done via DNS where they filter out any known ad domains. It's not great, but it works. Another similar method, which uses the same DNS filtering technique is using the secure DNS option and vanadium and specifying a DNS server that filters ads, one that I like to use as the mullvad ad blocking DNS server, research any recommendations before blindly trusting a YouTube stranger? It's what I like to use, but it might not be the best for you.</p>
<p>Besides adding the custom DNS server, there's a couple other changes that I like to make under passwords. I don't use medium for passwords, so I disabled that. Same under Payment Methods addresses, disable that as well. Under privacy and security. I disable autocomplete searches and URLs I've mentioned in the past, but I don't like autocomplete in my browsers, I only want my data to be sent when I click Submit, I enable open External links and incognito. I like this feature. Let's say your friend sends you a link and you click it. Instead of that link being opened in a normal tab. It's now opened in an incognito tab, I leave Do Not Track enabled because it's enabled by default, disabling it would just set you apart from the others using the default settings. And then the last option I change if we go back, I turn off the homepage. This is just personal preference. And then one other tip that I see some people have questions on it. Let's say you want to use a different search engine such as start page, you don't see it in the list here. What you need to do is first go to start page.com Once you get there, if you click Set as Default the instructions explain the steps, but what you need to do is go into the Start Page Settings, Settings. Scroll down to the section labeled HTTP request method. Change that to get save your settings confirm and now if we make a search and go back into our browser settings search engine. We now see recently visited start page we can select that and now when we run a search, we can see that start page is used by default.</p>
<p>If you use vanadium or thinking about using vanadium, check out the web browsing section on graphene os.org. It has a lot of great information</p>
5 funniest GitHub issues2022-12-26T10:00:00+00:002022-12-26T10:00:00+00:00https://sideofburritos.com/blog/5-funniest-github-issues/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/4HL79Xg1gVs" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://github.com/dylanaraps/neofetch/issues/922' target="_blank">https://github.com/dylanaraps/neofetch/issues/922</a> - #5 neofetch: Weight of computer</li>
<li><a class="text-break" href='https://github.com/liftoffcli/liftoff/pull/178' target="_blank">https://github.com/liftoffcli/liftoff/pull/178</a> - #4 liftoff: LAMP</li>
<li><a class="text-break" href='https://github.com/liftoffcli/liftoff/pull/178#issuecomment-57727728' target="_blank">https://github.com/liftoffcli/liftoff/pull/178#issuecomment-57727728</a> - #4 liftoff: LAMP, screenshot of original comment(s)</li>
<li><a class="text-break" href='https://github.com/pypa/twine/issues/153' target="_blank">https://github.com/pypa/twine/issues/153</a> - #3 twine: I don't care</li>
<li><a class="text-break" href='https://github.com/MrMEEE/bumblebee-Old-and-abbandoned/issues/123' target="_blank">https://github.com/MrMEEE/bumblebee-Old-and-abbandoned/issues/123</a> - #2 bumblebee: erasing <code>/usr</code></li>
<li><a class="text-break" href='https://github.com/microsoft/vscode/issues/87268' target="_blank">https://github.com/microsoft/vscode/issues/87268</a> - #1 vscode: Santa hat</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong></p>
<p>GitHub is a hosting service for software projects. And on each GitHub project, there is a tab for issues, where users or the developers themselves can open up anything that might be an issue with the project. Not typically, the Issues tab has a place where useful discussions take place. And other times it's a source of entertainment. So today, I'll be sharing my five favorite GitHub issues that I found over the years. So let's start with number five. The first issue is for a project called Neo fetch. It is a command line system information tool basically displays information about your system, the OS kernel uptime, the issue that was opened was titled at Neo fetch is not displaying the weight of my computer as a possible for Neo displaying the weight of my computer can see the comments and what ask your kitchen scale. So, I don't know if this person was serious when they open this issue. But as you could expect from the internet, comical replies ensued. This is really good idea, weight and volume are always hard to measure would be really useful. One could see the current weight of their laptop, depending on the battery percentage. So reading the thread, there was actually some pretty decent suggestions besides the funny ones. Since they are scraping hardware information about the computer, someone suggested that once the hardware information was determined, they could scrape publicly available information for the weight of different components. Either way, that being said this was not implemented, but nevertheless, still pretty funny.</p>
<p>Coming in at number four is a project called the liftoff. Se CLI for creating and configuring new Xcode projects. This one's a good reminder why recruiters should not chime in on GitHub issue threads. So if we take a look at the issue that was opened, it was added support for the new launch screen. xiv files. Okay, fair enough. You know, some regular discussion not convinced this should be the default. If we keep scrolling down, right at this point, there used to be some comments here that were deleted by the initial author. Thankfully, someone on the internet took some screenshots, we can see here a post from a recruiter, notice that you guys have been so active in iOS development would really like your input about this position I'm currently trying to fill the company is asking for iOS developers with a strong lamp background, we can see the first comment that came in by lamp background, do you mean writing flashlight app specifically? A little bit further down, I meant LAMP stack. If you don't know what lamp stands for, it stands for Linux, Apache, MySQL, and PHP, which is a typical software stack or was a typical software stack that was used, just a quick way to refer to it. But obviously, the recruiter made a typo with lamp background, I wrote a really strong web flashlight app, I could probably port that to iOS. It really just took off pretty quick. We can see here the recruiter was a little bit salty about the comments. Oh, great, funny, but not really helpful. And then still posted the entire job description. But then a little bit further down and start getting pretty interesting. We have a stack of lamps, some more lamps, literal stack of lamps. You gotta love it when people give some additional context on images. The senior lamp developer above is mentoring the junior lamp, very touching. This is a funny one to read through. And as always, the links will be down below in the description in case you want to read through these threads yourself, which I suggest you do. They're pretty entertaining. So what can we learn from this, if you're a technical recruiter, you should probably stay out of the GitHub issues. Because if you make one mistake, you will be eaten alive by everyone else in there. </p>
<p>On to number three. This is for something called twine, which is utilities for interacting with pi pi. This one's pretty straightforward. If we go to the issue, the individual said I had some trouble using twine to upload a package to testify pi i tried like this. They put the details what else happened? And then scrolling down a little bit further, we get a comment. Were you able to resolve the issue? And then the original poster said, No, I decided I don't care. So not really much to it, but just the tone of the original person straightforward to the point. And you know, they didn't figure it out because they don't care. I feel like we can all learn something from this. Sometimes in life, there are tasks or problems that just aren't worth it. So sometimes you need to decide that you just don't care.</p>
<p>So moving on to number two actually had a pretty difficult time deciding on what should be first and second place. But ultimately, I decided on setting Bumblebee which is now old and abandon as second place. But if we go to the issue that occurred with this install script does RM dash RF slash user for Ubuntu? So if we go down to the details for this issue, I want you to note just how many reactions are on this and how many comments were actually left. So the initial report says an extra space at line 351. So if you're familiar with Linux at all, RM what that is used for is removing or deleting files or folders. The our flag specified here that means a recursive and so if you have a folder inside have a folder. It'll remove everything after that recursively and the F flag that stands for force. So that means you will not be prompted for any confirmation on what you want to remove in the mistake in the code was that there was this extra space here between slash user and slash lib. So instead of actually removing the X Org, at the end of the path here, since there was a file here, what happened instead is that the slash user directory was completely removed. When this was run. We can see here totally cool, dude, this script deletes everything under slash user, I just had to reinstall Linux on my PC to recover. So yes, one single space caused quite a bit of issue. And if we see the response from the developer, well, first we have another person who yes, this happened to me as well. developer on the project, fixed it. And then the comment, giant bug causing slash user to be deleted. So sorry, if we scroll down a little bit further, we get some more information on why this mistake was made. Yeah, I was very tired that night. And then there's some comments. This is from the initial person that reported it. Get some good humor laughing about it. Poor guy. Nice. You're famous. So I like this one, especially give this man a round of applause. His styling caused the Linux to commit die. This is the power of Linux, this whole issue actually reminds me of this meme. Hey, can I uninstall edge? No, you'll break your system. I'm going to uninstall the bootloader, your system will break sudo. I'm going to uninstall the bootloader. Go ahead. Gotta love the power of Linux and what it will let you do.</p>
<p>Now that brings us to number one, which I think is well timed for this time of the year, as you will see why shortly. This is for Visual Studio Code, which is a popular source code editor by Microsoft, the issue that we're looking at is a blend of humor and drama to each their own in their own opinions. But this was for Santa hat on vs. Code insiders and pushing a religion is very offensive to me. So yes, this you can read over what's going on here. If we scroll down further. The issue was, is that on VS code, they added a Santa hat to the settings logo. And this was not taken kindly by some people. Apparently, the developers actually removed it very quickly. But then what ensued was a storm of comments on this related issue. There were more comments on the original issue in the past, but they'd been deleted at this point. The linked issue is the actual response from the Microsoft team. I'm pretty sure this turned into a rather large PR nightmare for them. They even had the lock the repository. This one always makes me laugh, because I don't think I've ever seen such a detailed response from Microsoft on anything. They went into quite a bit of detail. They even added updates because of the response. They got the background. What happened gave more details on the situation. This one got out of control for them real quick from a very simple change. But if you're looking for a thread full of humor and drama, then I think this one would make for a good read. There's a lot going on here. Probably my favorite comments on this issue was where someone took Octocat, which is the GitHub logo, put a Santa hat on it and a dreidel in its hand. I don't really have much more to say about this issue, as I don't want to get into this topic on my YouTube channel. Either way, still a piece of history to me at least that wraps up the list and this year, so merry Christmas, happy Hanukkah, happy Kwanzaa. Happy Holidays and Happy New Year.</p>
My Brave Browser Setup and Recommendations2022-12-19T10:00:00+00:002022-12-21T10:00:00+00:00https://sideofburritos.com/blog/brave-browser-setup/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/lmHsdkalyCw" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://brave.com/download/' target="_blank">https://brave.com/download/</a> - Brave Browser Download</li>
<li><a class="text-break" href='https://developer.mozilla.org/en-US/docs/Web/API/WebRTC_API' target="_blank">https://developer.mozilla.org/en-US/docs/Web/API/WebRTC_API</a> - WebRTC Explained</li>
<li><a class="text-break" href='hhttps://brave.com/privacy/browser/#safe-browsing' target="_blank">https://brave.com/privacy/browser/#safe-browsing</a> - Brave Safe Browsing Privacy Policy</li>
<li><a class="text-break" href='https://github.com/iamadamdev/bypass-paywalls-chrome' target="_blank">https://github.com/iamadamdev/bypass-paywalls-chrome</a> - Bypass Paywalls Extension</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong></p>
<p>So I'm going to be brave here and to share with you my brave browser settings. Before that, I want to make a quick disclaimer, there is some benefit that comes with just using the default settings the browser comes with, you blend in with all the other default installs instead of using a customized browser. Brave is what I'm using right now on my desktop. On my mobile, I'm using vanadium. Privacy and security are always changing. So what you see now will likely evolve over time and change. But this is what works well for me at the time of this recording. In the past, I used Safari on Googled chromium, chromium, Firefox with a bunch of add ons. So take it with a grain of salt, always do your own research and use my advice as a starting point to figure out what's best for you. And then lastly, as far as security goes, Chromium is more secure than Firefox at this time, which is why I'm using brave a chromium based browser. The only time I use Firefox is when I'm using Tor browser. So for this demonstration, I'll be using a fresh install of brave on Windows 11. So once you first install brave, you'll see this screen, I'm going to just click Skip welcome tour, you're presented with this busy dashboard. And the first thing we're going to do to start our customization, click the three bars in the upper right hand corner and go into settings. If you already have brave installed on your computer, you can just follow along and go into the settings. So on the first section getting started, I just leave all this set to the default, I don't change anything here, you can make brave your default browser if you want.</p>
<p>Next on to appearance. And this one, I like to disable the show side panel button. The side panel is this, I don't use this reading list at all. So I disabled it. We can then scroll down. I like to enable this setting always show full URLs. And so what that means is you'll always see the full URL in the address bar when you're visiting a website, you won't see an abbreviated version. And that's the last setting I change on appearance on to New Tab page. So this busy dashboard, we see on a new tab that we saw at the start, I don't care for this. So in the settings, what I do is I change that to blank page. The dashboard is disabled the settings for it. And now if we open a new tab, we just see this. So again, that's just preference. I don't like the busyness of it. So that's up to you. So on the next setting shields. So on this page, I leave all these the default trackers and ads blocking, you have a couple options here. You can either leave it standard or change it to aggressive. Personally, I leave it on standard. If you change it to aggressive, you might break some site functionality. But again tested out up to you block scripts, if you enable this you will break sites. So I leave it disabled block fingerprinting, this also has a strict may break sites option. To me the jury's still out on whether or not blocking fingerprinting actually works or if it just makes you more noticeable. I haven't done much research into exactly what brave does to block fingerprinting. So I just leave it on standard block cookies only cross site. If you block all cookies, again, you'll break functionality, so I leave it on only cross site. Next is brave rewards. I don't enable this, I don't use brave rewards at all. So I like to disable the option in the menu bar. So now we can see that's gone. Now on to social media blocking, if you use Google or Facebook to log into any third party sites, then you want to leave these enabled. Me personally, I don't use Google or Facebook to log into any third party sites. So I just disabled these. And the last setting on here allowed Twitter embedded tweets. So if you ever reading a news article, and you see an embedded tweet on there, if you disable this, that tweet will be blocked and you won't see it. So if you'd like seeing the tweets, leave it enabled if you don't disable it on to privacy and security.</p>
<p>The first setting autocomplete searches in URLs, I always make sure this is disabled. When you enable this, it starts sending the data as soon as you start typing in the search box. So if you accidentally type something personal, that data is already sent off without you actually even submitting the search. So I always make sure this is disabled so that my searches are only sent when I press enter. The next setting is WebRTC IP handling policy. And click here to learn more. So we can see here the default WebRTC has the right to enumerate all interfaces and bind them to discover public interfaces. That is not a great default setting. The one we're going to change it to is disabled, non proxied UDP, and I'll show you why in a moment. So if we go and search for WebRTC leak test, I'm just going to click the first one. So depending on your home network setup, but WebRTC has the ability to potentially leak your real IP address, even if you're using a VPN service. I'll leave some more links down below in the description. So you can read more about WebRTC if you want to. I'm not going to cover all the details about it in this video. But in our browser, we're going to change this from default to this able nonpracticing UDP. Now if we go back here and refresh the page, we can see web RTC is disabled and will not leak your IP address. So that's just an example of why we want to change that from the default setting, I would suggest reading more about WebRTC, which stands for web real time communication. It's mostly used for video chat and different things like that. But changing it to this setting will reduce our exposure. Further down, we have allow privacy preserving product analytics, disable, automatically send daily usage ping to brave, disable, I leave the clear browsing data set to default like only Claire manually, but if you want, you can set it up so that on exit your data is cleared. Cookies, I'll leave this on default. But we are going to click on security. So now Safe Browsing from what I understand is that it takes a hash of your URL that you're visiting, and compares it against a hash of malicious urls to make sure that you're not visiting a malicious site. If you are it'll warn, you know, I don't want to install a new build. Different browsers implement this in different ways I wrote about how brave does it I'll link that down below. It sounds like their implementation is better than how Google Chrome doesn't. But I'm still not the biggest fan of it. So for me, I disable it, even though that's not recommended. But I would suggest you read about it, the pros and cons of it, how it works, and then make that determination for yourself and what's best for you. And the last setting I like to enable on this page is always use secure connections. And what that does is if you browse to a site over HTTP, and for some reason, the website doesn't automatically redirect you to HTTPS, brave will handle that for you, and redirect you automatically. And if for some reason the site doesn't support HTTPS, it'll warn you before loading sites that don't support it. So that's the last option I change on this page. So we can scroll back up, go back. And on the same page, we're now going to go into site and shield settings. So these next settings will be personal to you and how you use your browser. So under permissions. For me personally, I never use location in my browser. So I'm going to click on location. And then I'm going to select don't allow sites to see your location. So instead of a site showing a pop up asking if they can see your location, I like to disable that completely. So I don't even see the pop up, we can then go back. And the rest of these I'm going to leave enabled, I use video chatting in my browser. So I need to use the microphone and camera for that. If you don't go ahead and disable those notifications, if you don't like them, disable them. Then everything else on this page, I just leave set to the default screen, scroll up again, go back.</p>
<p>The last thing I like to disable is this private window with Tor. If I want to use Tor, I just use the Tor Browser. I don't want brave handling that at all. So I like to disable that functionality. So that's all on this page. Next is sync, I don't use sync search engine. So this is personal preference. There's a bunch of options here. So I've been using brave search for a while and it's been working well. Sometimes I use start page or DuckDuckGo haven't really had a chance yet to settle on one. And then sometimes if I'm looking for something specific, that's technical, I'll actually use Google because sometimes I get better results there. I know I'm a fraud. But that's what works for me. And then on to extensions, I disabled the Hangouts option. This next one about unstoppable domains. I just disabled This, along with the method to resolve the Ethereum Name Service. I also disabled this, if you use either of these, you should probably leave this setting enabled. If you don't like me, then you can probably disable them. Web torrent, I disabled this one I don't want my browser opening torrent files or magnet links the setting here for Widevine if you use any streaming sites such as Netflix or Amazon Prime video, you'll likely have to enable this. Otherwise the content will not play in your browser. For me, I don't use those so I just leave it disabled. So there's nothing else will be changing on this page. So next we can go on to Wallet. So brave also has support for cryptocurrency wallets. I don't use it. So I just disable all these seven to none. So since I don't use the wallet feature in Brave, I don't need the icon in the toolbar. So I disabled that. On to IPFS IPFS stands for interplanetary file system. They have some links here if you want to learn more about it, you can click and read. I don't use it at all. So I set it to disabled next week and go on to autofill so if you've seen any of my previous videos, you might know that I use one password I'm still in the process of testing out and migrating to bit Warden But with all that being said I don't use any browser Password Manager. So I like to go into the settings and disable that. Let's go back. So besides passwords I don't let brave store my payment methods solely To disable this as well,</p>
<p>I can go back. And the last one addresses, I don't let brave store my addresses either. Disable that, go back onto languages, I don't like to use brave translate. If I want to translate something, I'll just paste it into a website to translate it. So I disabled that on to downloads, I just leave this set to default help tips. So this setting is actually pretty cool show Wayback Machine prompt on four or four pages. So if you get a 404 and a web page, which means Page Not Found brave will give you the option to go to the Wayback Machine and see if there's a cached copy of the page there. So that can be pretty handy. So I just leave that enabled on to system. I don't like this continue running background apps on Brave is closed. So I disabled that. And that is the last browser setting that I change. So as far as additional extensions go, I do use the one password extension. I also use something called bypass paywalls. It's on GitHub, and it does exactly what it's named. But besides those, that's it I try to keep my browser as stock as possible and not loaded down with extensions. Most people think the more privacy extensions you had, the better but really, you're just making yourself more unique compared to someone who's using a default setup. So again, this is what works for me now. I hope we can help get you started in your own research and testing. As this was a browser preference video. I'm sure there will be some feedback. So if you have any feel free to let me know down below in the comments.</p>
How Microsoft killed 'Do Not Track'2022-12-12T10:00:00+00:002022-12-21T10:00:00+00:00https://sideofburritos.com/blog/how-microsoft-killed-do-not-track/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/vZEVvqpcuZw" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://www.privacy-handbuch.de/handbuch_21i.htm' target="_blank">https://www.privacy-handbuch.de/handbuch_21i.htm</a> - Firefox Snake Oil - Main article referenced</li>
<li><a class="text-break" href='https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks' target="_blank">https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks</a> - EFF original announcement of DNT</li>
<li><a class="text-break" href='https://gizmodo.com/do-not-track-the-privacy-tool-used-by-millions-of-peop-1828868324' target="_blank">https://gizmodo.com/do-not-track-the-privacy-tool-used-by-millions-of-peop-1828868324</a></li>
<li><a class="text-break" href='https://www.wired.com/story/browser-fingerprinting-tracking-explained/' target="_blank">https://www.wired.com/story/browser-fingerprinting-tracking-explained/</a></li>
<li><a class="text-break" href='https://www.groovypost.com/reviews/internet-explorer-10-preview-windows-7/' target="_blank">https://www.groovypost.com/reviews/internet-explorer-10-preview-windows-7/</a></li>
<li><a class="text-break" href='https://www.wired.com/2012/08/microsoft-do-not-track-is-good-for-users-on-by-default-in-ie-10/)' target="_blank">https://www.wired.com/2012/08/microsoft-do-not-track-is-good-for-users-on-by-default-in-ie-10/)</a></li>
<li><a class="text-break" href='https://news.yahoo.com/yahoo-stops-supporting-not-track-privacy-setting-163054926.html' target="_blank">https://news.yahoo.com/yahoo-stops-supporting-not-track-privacy-setting-163054926.html</a> - Yahoo stopping support for DNT</li>
<li><a class="text-break" href='https://martech.org/know-twitters-latest-privacy-policy-update/' target="_blank">https://martech.org/know-twitters-latest-privacy-policy-update/</a> - Twitter stopping support for DNT</li>
<li><a class="text-break" href='https://support.google.com/chrome/answer/2790761' target="_blank">https://support.google.com/chrome/answer/2790761</a> - Google doesn't support DNT</li>
<li><a class="text-break" href='https://www.macworld.com/article/232426/apple-safari-removing-do-not-track.html' target="_blank">https://www.macworld.com/article/232426/apple-safari-removing-do-not-track.html</a> - Apple removes DNT from Safari</li>
</ul>
<hr />
<h3 id="how-to-disable-do-not-track-in-popular-browsers">How to disable "Do Not Track" in popular browsers</h3>
<ul>
<li><a class="text-break" href='https://support.google.com/chrome/answer/2790761' target="_blank">https://support.google.com/chrome/answer/2790761</a> - How to disable "Do Not Track" in Chrome</li>
<li><a class="text-break" href='https://support.mozilla.org/en-US/kb/how-do-i-turn-do-not-track-feature' target="_blank">https://support.mozilla.org/en-US/kb/how-do-i-turn-do-not-track-feature</a> - How to disable "Do Not Track" in Firefox</li>
<li><a class="text-break" href='https://answers.microsoft.com/en-us/windows/forum/all/do-not-track-setting-in-edge/b3d7b40f-dfce-47f7-b9ab-9d0e940ccf97' target="_blank">https://answers.microsoft.com/en-us/windows/forum/all/do-not-track-setting-in-edge/b3d7b40f-dfce-47f7-b9ab-9d0e940ccf97</a> - How to disable "Do Not Track" in Edge</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong></p>
<p>If you've ever explored the privacy settings in your browser, you've likely come across a setting related to do not track. Let's talk about what this is. I'll show you exactly what the setting does. And then we'll talk about how Microsoft killed it. DNT or do not track was proposed by the EFF in 2009. It will be implemented by your browser is sending an additional header to the website that you are visiting, indicating that you wished not to be tracked. The W3C standard for DNT explicitly stated that it's only used when the user made a deliberate choice to enable it. While this feature had the best of intentions, some early studies indicated that it was largely being ignored by the trucking industry. Before we continue, let's take a look at exactly how DNT works. </p>
<p>So, here I am on my website site of burritos.com. I currently have the Do Not Track setting enabled in my browser. If we right-click, go to inspect, go to the Network tab, and then refresh the website. We're going to select the initial request. And if we scroll down to the section labeled request headers, we can see a header here called the DN T with a value of one. So, when you have this setting enabled in your browser, your browser will then send the DNT header on all requests indicating that you have it enabled. Now if I disable the Do Not Track setting and go back to the same page, we were just on, refresh the page again. Click on the newest request, scroll down to the request headers, and we no longer see that d and t header 13 years later in 2022. This feature is actually having the opposite effect of what it originally intended. So, since so few users have this feature enabled, and it's making little to no difference in preventing tracking, companies and marketers are using the DNT header we saw in the demonstration as another way to track visitors. So instead of helping you, it's hurting you by actually creating an additional data point that can be used to fingerprint you.</p>
<p>The last reason not to use it is that Microsoft killed it. As I mentioned, the W3C standard stated that this feature had to be a deliberate choice by the user. In 2012. Internet Explorer 10 was released with DNT enabled by default, which violated the standard and gave the tracking industry a reason to officially ignore it, since it could no longer be assumed the user enabled the feature. In May 2014. Yahoo announced they would stop supporting the Do Not Track privacy header. And in the years following, Google, Facebook and Twitter made similar announcements. More recently, in 2019, Apple removed the DN T feature from their Safari browser completely. I remember when this feature was originally announced, and I was pretty excited we were finally making some progress in terms of user privacy. As we can see, now the feature is dead, and it can actually cause more harm than good. So make sure you don't have it enabled in your browser. And if you do, I would suggest disabling, and I'll leave links down below in the description and how you can verify in popular browsers whether or not you have this setting enabled.</p>
A minimalist dumb phone you should actually use2022-12-05T10:00:00+00:002023-01-23T10:00:00+00:00https://sideofburritos.com/blog/minimalist-dumb-phone/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/OrZacTUhH0c" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://grapheneos.org/' target="_blank">https://grapheneos.org/</a> - GrapheneOS</li>
<li><a class="text-break" href='https://jkuester.github.io/unlauncher/' target="_blank">https://jkuester.github.io/unlauncher/</a> - Unlauncher</li>
<li><a class="text-break" href='https://github.com/jkuester/unlauncher' target="_blank">https://github.com/jkuester/unlauncher</a> - Unlauncher GitHub</li>
<li><a class="text-break" href='https://signal.org/' target="_blank">https://signal.org/</a> - Signal</li>
<li><a class="text-break" href='https://store.google.com/category/phones' target="_blank">https://store.google.com/category/phones</a> - Google Pixel</li>
<li><a class="text-break" href='https://youtu.be/B0RVWU_nROk' target="_blank">https://youtu.be/B0RVWU_nROk</a> - YouTube Video - I used a flip phone for 30 days</li>
<li><a class="text-break" href='https://youtu.be/Vl5OrbsXBI8' target="_blank">https://youtu.be/Vl5OrbsXBI8</a> - YouTube Video - One Month with a Minimalist Dumb Phone | Light Phone II Review</li>
<li><a class="text-break" href='https://www.thelightphone.com/' target="_blank">https://www.thelightphone.com/</a> - Light Phone</li>
<li><a class="text-break" href='https://palm.com/pages/product' target="_blank">https://palm.com/pages/product</a> - Palm Phone</li>
<li><a class="text-break" href='https://mudita.com/products/phones/mudita-pure/' target="_blank">https://mudita.com/products/phones/mudita-pure/</a> - Mudita Pure</li>
<li><a class="text-break" href='https://github.com/sduduzog/slim-launcher' target="_blank">https://github.com/sduduzog/slim-launcher</a> - Slim launcher (Unlauncher is a fork of this project)</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong> βοΈ</p>
<p>I'll be the first to admit, whenever I see some slick looking minimalistic dumb phone, video thumbnail or a title with "I use the flip phone for 30 days," I click it. And why you may ask? Because I'm tempted to try one. From a design aspect, the minimalist phone gets a nine out of 10. The Flip Phone usually doesn't look as great, but they are minimal.</p>
<p>But for both of those options, it's downhill pretty quick from their functionality, usability, and hardware. They are all lacking. But the biggest downside for me as someone who has a tech background is the lack of security and privacy on these phones. These devices all have some random custom OS specifically designed for aesthetics. From an OS perspective, they're insecure. From an app perspective, it's no surprise that it's also minimal. And usually the only form of communication you have is standard phone call and SMS, which are both unencrypted and not secure.</p>
<p>So what are you really getting for your money? Once you dig a little bit deeper and get past the good looks, you end up with a device that in all honesty, nobody should be using. So what options are you left with? Do you use an iPhone with the color turned off, so you're less tempted to use it, or maybe a stock android phone with all the apps uninstalled? Both of those are not great from a privacy perspective. And they both take quite a bit of customization to actually get what you're looking for. And so for me, neither of those are great options.</p>
<p>That brings us to something called a Graphene OS. It's a private and secure mobile operating system with Android app compatibility. And this is what it looks like. Minimal, clean, simplistic, and most importantly, private and secure.</p>
<p>This in and of itself as a minimal phone, you can see the apps that it comes with just the basics to get you started and have a functioning device. You can make phone calls, receive text messages, you have a browser, calculator, alarm, nothing extra unless you choose to add it. And so I'm a fan of the default interface.</p>
<p>If you want that aesthetically pleasing, minimalistic phone looking interface, there's something called On Launcher. On Launcher is a free launcher you can install on your Android device. In this case, my Google Pixel six a running Graphene OS. So once you install it and set it as your default launcher, this is the interface that you are now presented with. At the bottom left, we have access to our phone. At the bottom right, we have access to the camera. In the center, we have settings. And if you swipe up, no colors or fanciness, drawing you in, just a simple list of your apps in a functional interface.</p>
<p>So now that we have our secure and private device with our simple interface configured, there is one last app we want to install. And since this is an Android device, it is compatible with Android apps. And that last step is Signal. What that's going to provide us with is a secure and private means of communication. If you've never used it before, it has text, audio, and video chat available. I have a friend using a setup very similar to this. </p>
<p>He's been using it for over six months and at this point, he said there's no going back. So, if you're interested in getting a similar setup for yourself, graphene OS supports the Google Pixel. So, if you have one of those, install on launcher and signal, all of which will be linked down below. And at that point, you will then have a secure, private, and minimalistic phone that will make you not hate your life.</p>
How to install GrapheneOS on Google Pixel 7 (Pixel 7 Pro) + Setup for new users2022-11-28T10:00:00+00:002022-12-21T10:00:00+00:00https://sideofburritos.com/blog/how-to-install-grapheneos-on-pixel7/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/ZAZlmYKrwfk" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://grapheneos.org/install/web' target="_blank">https://grapheneos.org/install/web</a> - GrapheneOS Web installer</li>
<li><a class="text-break" href='https://grapheneos.org/donate' target="_blank">https://grapheneos.org/donate</a> - GrapheneOS donation page</li>
<li><a class="text-break" href='https://grapheneos.org/features#sandboxed-google-play' target="_blank">https://grapheneos.org/features#sandboxed-google-play</a> - Sandboxed Google Play details</li>
<li><a class="text-break" href='https://sideofburritos.com/docs/setup-guides/mobile-privacy/' target="_blank">https://sideofburritos.com/docs/setup-guides/mobile-privacy/</a> - Mobile Privacy & Security Guide</li>
<li><a class="text-break" href='https://youtu.be/SZ0PKtiXTSs' target="_blank">https://youtu.be/SZ0PKtiXTSs</a> - How to install Sandboxed Google Play in a separate User Profile</li>
<li><a class="text-break" href='https://nitter.net/DanielMicay/status/1552966692749414402#m' target="_blank">https://nitter.net/DanielMicay/status/1552966692749414402#m</a> - Twitter thread explaining OEM unlocking</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong></p>
<p>So in today's video, I'll be demonstrating how to install graphene iOS on the Google Pixel seven specifically, but if you have a different Google Pixel, this process will be relatively similar, I'm going to be using the web installer. And if you use that, it's nearly impossible to mess up your phone. So don't be afraid to attempt this. Now with that being said, there are a few hiccups you may run into during the install process. And I'll cover those at the relevant points in the video. The computer I'm demonstrating this from is running Mac OS, and I'm using the brave browser. So to get started, we're going to head on over to Griffin os.org. All websites that I mentioned in the video will be linked down below in the description box. So once you get here, click on Install Griffin OS. As I mentioned, we're going to be using the web based installer. So once you get to this page, we're going to scroll down to the prerequisites, give this a read through make sure that you have all of these requirements met. Make sure you're using one of the supported OSS, like I said, I'll be installing from macOS. So besides a supported operating system, make sure you are using a supported browser. There is an important note here, if you are using chromium on Ubuntu, it's broken and will not work. So use a different browser, such as Google Chrome. Another important note here do not use incognito or private browsing mode. And so once you give that a read through, I'm not going to waste your time by reading it to you, and you make sure that all the prerequisites are met, we can then proceed on to the first step, which is enabling OEM unlocking in the screen we're currently on is the screen that you'll see if you just bought it brand new and just took it out of the box. So first, I'm going to walk through the initial setup. If you're already past this part, you can skip it, I'll leave the timestamps down below in the play bar. So we're going to go ahead and select to get started. I'm not going to connect to a mobile network, I don't have a SIM card in my phone. Skip. I'm going to skip connecting to Wi Fi select Setup offline, continue. Date and time, you can leave that set to default. You don't need to uncheck these but I like to anyways click Accept limited warranty. Next additional legal terms except we are going to be erasing the phone so you don't really need to set a pin but I think it's good practice anyways</p>
<p>confirm the pin fingerprint unlock I'm going to skip this because like I said, we're just gonna be erasing the phone momentarily. No banks face on luck, no thanks. This is just a quick tutorial on swipe navigation. If you want, you can go through it. Otherwise skip. So we have finished the initial setup offline and go ahead and swipe up. And we're now at the home screen. So I'm recording this part while editing the video because I forgot to mention it initially, this step is not required. But it is suggested that you update your device before installing graphene allow us to check for updates, first connect to Wi Fi, then swipe up, go into settings, scroll down, tap on system. And then tap system update. If you see your system is up to date, then you're good to go. Otherwise, install any pending updates and then continue with the video. So to enable OEM unlocking we first need to enable developer options, which you can do by going to settings about and repeatedly pressing the build number menu entry. And just one note before we actually start following the instructions, make sure you always go to the source when you're looking for information. Don't just follow some random YouTuber or some blog post, always go to the official documentation in this case graphene os.org get your information from the source first and then go from there. Select the instruction said we're going to swipe up, go into settings, scroll down to the bottom, we're going to tap about phone, scroll to the bottom. And down here we have build number. Go ahead and tap that until you are prompted for your PIN. If you set one, enter your PIN. And we can now see you are now a developer. So another developer options are enabled. Next go into Settings System developer options and toggle the OEM unlocking setting. So we're going to go back, scroll down, go to system. At the bottom, we have developer options, tap that. If we scroll down, we can see here OEM unlocking so there is one caveat about OEM unlocking that I want to mention. So if you purchased your phone brand new from Google or from a store, you will need to connect to the internet first so that your phone can check if the serial number was sold carrier locked or if you're able to enable OEM unlocking devices that are typically locked by the carrier or Verizon based devices, those ones even if you connect to the internet, you won't be able to unlock. Your only option at that point is to either return the device or sell it and buy a factory unlocked device. For me personally, I usually buy my devices directly from Google, I select the unlocked version option. And every time I've had no issues, so if you're watching this video and haven't purchased a device yet, and you're looking to buy a used mobile phone, I suggest asking the seller to send you a screenshot or a photo showing that OEM unlocking is available. That's the only way to truly guarantee it. I've purchased a device used in the past, and it was carrier unlocked, which means I could connect to different carriers, but it didn't actually support OEM unlocking so reach out to the seller to confirm that if they're not willing to send you a photo showing that I would suggest not buying that device. So again, if you bought a new phone, you connected the internet OEM unlocking should be available at that point. And once it is, go ahead and enable OEM unlocking, you'll be prompted for your pin again. Allow OEM unlocking, enable, and we can now see OEM unlocking is enabled. So on to the next step flashing as non root. This is for anyone who's on Linux, I'm not on Linux. So I'm not going to cover this. But if you are give this a read over following that is booting into the bootloader interface, you need to boot your phone into the bootloader interface. To do this, you need to hold the Volume Down button while the phone boots, the easiest way is to reboot your phone and begin holding the Volume Down button until it boots up into the bootloader interface. So this part can be a little bit tricky for some people. So we're going to swipe down, swipe down again, you'll see down here the power button, select that, and then select Restart. Once restarting disappears from the screen, hold the Volume Down button.</p>
<p>This will take a minute. And if you were successful on booting into the bootloader interface, you will see this screen. If you were not successful, your phone will just boot up as normal. At that point restarted again, hold the Volume Down button until you get into this interface. So the next step is connecting the phone. If you're on Linux, here's a note about that. If you're on Windows, you need to install the driver for fast boot if you don't already have it, there's a couple options for actually obtaining the drivers. So pause the video and Give this a read over if you're on Windows. And for everyone else, we can just go ahead and connect our USB cable to our device. So this is where a lot of people run into an issue. They plug their phone into the computer with a USB cable, and their computer doesn't actually see the phone and they don't understand what's going on. Typically that's due to a faulty USB cable. The best option in this scenario is to use the stock cable that came with your device. If you don't have that use a third party cable. But if you plug in your phone to the computer with a USB cable, and it doesn't see it, try a different cable. Typically it's a faulty cable causing you issues. One other thing to mention, make sure you're plugging your USB cable directly into your computer, don't plug it into a dongle first. That can also be the cause of issues. So again, use the cable that came with your device, plug it directly into your computer, and you should have the best chance of not having an issue. So plugging the cable to your device. So before we unlock the bootloader it's important to note that once you do, all data on your device will be wiped. So if you were using your phone and you took some photos, or maybe this was your primary device and now you want to test out graphene iOS, make sure you make a backup of everything on there, your contacts, calendar events, text messages, everything will be erased and there's no way to recover it. So once you confirm you have everything's backed up or saved that you want, you can then proceed to unlock the bootloader select unlock bootloader and if your cables not faulty and your computer sees your device, you will see a prompt like this graphene os.org wants to connect, you should see your device listed here. Select Connect, we can see the screen changed, we have a quick disclaimer down here about unlocking the bootloader. And up here we can see it do not unlock the bootloader we want to unlock the bootloader. So to change the selection, we're going to press the volume down or up. You'll now see it says unlock the bootloader once you see that to select that option, press the Power button. And if you were successful at unlocking the bootloader you'll see device state has now changed to red unlocked. So now that the bootloader is unlocked, we can proceed on to the next step which is obtaining factory images. We're going to select Download release. And the actual amount of time this takes to download will vary depending on your internet speed. It's gonna take a minute, two minutes or an hour. And so while that's downloading, I just want to mention to consider donating to the project if you're getting any sort of value from it, the developers putting in a lot of work to updates and Supporting new phones as they come out. My favorite way to contribute is using GitHub sponsors, it lets me schedule a monthly recurring donation to them. So again, consider donating to the project donations are used for paying developers purchasing hardware paying for infrastructure. So once the download has finished, it'll say downloaded and the progress bar will be full. So now that the download has completed, we can proceed on with flashing our device, the initial install will be performed by flashing the factory images. This will replace the existing OS installation and wipe all the existing data, give this paragraph or read over. But the most important part is avoid interacting with the device until the flashing script is finished. So once we click flash release, just leave your device alone, don't touch it, wait for it to complete. Once you're ready, select flash release, you'll see the screen changes. And again, just let the device do its thing. Don't interact with it at all.</p>
<p>And so while that's flashing I just want to mention that I have a somewhat monthly newsletter that I send out, you can sign up for that at site of burritos.com. If you're new to privacy and security on your mobile device, I have a page on my website that has an index of all my videos I have. It's a good starting point if you want to get familiar with what options are out there.</p>
<p>And then while we wait for this to complete, one of my friends came to me the other day upset about something they did, I told them some solid life advice, and that was that they needed to embrace their mistakes. So they gave me a hug</p>
<p>so once the flashing has completed, you'll see the text on the screen has changed to flashed, and our phone is back at the bootloader interface. The next step and this is extremely important is to actually lock the bootloader give this a read over it explains why it's so important. But again, to do that, we're going to select Lock bootloader we see the prompt on our screen again, we see it says do not lock the bootloader same as earlier we're going to press the volume up or down until it says lock the bootloader at that point, press the Power button</p>
<p>and if that completes successfully, we'll see device state now says locked and it is green. Congratulations. You've now successfully installed graphene OS and can boot it. pressing the power button with the default start option selected in the bootloader interface will boot the OS. So if you have the default option selected, it should say start press the power button</p>
<p>you're going to see the screen here devices loading a different operating system. Since we have a nonstock operating system installed, the screen is normal so expect to see that it's also normal to see the Google splash screen. And at this point you'll now see the graphene OS boot animation we'll take a minute for the initial boot we can now walk through the initial setup. Select Start, select your language Next, set your timezone. Next I'm going to skip connecting to Wi Fi for now skip I don't have a SIM card in my device but you can put one in if you want. Next, I'm going to disable location services for now. Next fingerprint you can set this up if you want to.</p>
<p>I do suggest setting a PIN code at the very least then please set something else besides 12345. Once you type that in and again press confirm if you had a backup from an existing graphene OS installation, you can restore it now. Otherwise, if this is a new installation for you, press skip</p>
<p>and then start so back on the webpage disabling OEM unlocking OEM unlocking can be disabled again in the developer settings menu within the operating system after booting it up again. After disabling OEM unlocking we recommend disabling developer options for a device that's not being used for app or OS development. So we're going to follow the same steps We did it when we initially enabled OEM unlocking, we're going to go into settings, scroll to the bottom, select About phone, go to the bottom, tap build number to be prompted for your PIN code. You are now a developer, select back, go into System developer options. We can see here OEM unlocking is enabled, we want to disable that, please restart the device to enable device protection feature. So we're going to do that in a moment. And then again, we want to disable developer options. So on select that, you need to restart your device to change this setting. Tap Restart. Now on the boot screen, I'm going to press my power button. When that initial warning shows up, tell you why in a second.</p>
<p>So pressing the power button pauses the boot. And the reason for that is down below here, we can verify the boot key hash. And so what you want to do depending on the device you have, if it's a pixel six or newer, you want to look at this screen. In my case, I'm on the pixel seven. And I want to verify that this string matches what is displayed on my device. So take a minute to do that. Looking at it, I can see it does match. The reason as to why is listed here. So give that a read over. And so once you confirm that, press the Power button again to resume the boot. So at this point, you have successfully installed graphene OS and you can start using it if you like. But if you are new and looking for the simplest way to get started, I want to quickly cover that one feature of graphene OS is they offer sandbox Google Play services on stock Android OS plays services are installed in a way where they bypass the app sandbox and receive a massive amount of highly privileged access. On Griffin OS Play services can be installed as standard apps with no special access or privileges. So if you're new and looking for the simplest way to get started, this is what I recommend. And that's what I will be demonstrating. There's a couple other options if you want a bit more privacy, such as installing them in a separate user profile. And I cover that in a video which I will link down below. But if you're at all hesitant about this switch, and using graphene OS, then I suggest installing them as I'm about to demonstrate. Once you get more comfortable, you can watch my other videos or check out different blog posts on some ways to enhance your privacy and security. But for now, take the simplest approach get comfortable and go from there. So the first thing we need to do to install sandbox Play services is connected to Wi Fi. So I'm going to swipe down, select Internet, I'm going to select my Wi Fi network. Once you've successfully connected to your Wi Fi, we're going to swipe up, select the Apps app. We're going to go to Google Play Store, select that, as we can see here, it's also going to install a Google services framework and Google Play services. Select Install all it's going to take about five minutes to complete, I will be linking this down below, I do suggest you take the time to read it over, as well as the usage guide that's linked at the bottom. There's a lot of great information in here. It explains how it works, the actual configuration, limitations, things like that. So take the time read it over. There's a lot of good stuff. So once that's completed, you'll see down here and now says open instead of installing. I'm just going to swipe up. We're going to swipe up again, go into our app drawer. And you'll now see Play Store listed here. So this will function just like Play Store on stock Android OS, you can select that sign in. If you're looking for a little more privacy, create a separate Google account that you just use on here to download apps and things like that. Go ahead and sign in, download your apps, get yourself started. And then like I said at that point once you're comfortable, check out some of my other videos or different options that are available. On my last piece of advice, privacy and security. It's a journey. Don't try and do everything at once. If you change too much, it'll be hard to keep the habit so take it step by step. Do what you can and every little bit helps.</p>
How to join Mastodon Social Network + Migration tool2022-11-21T10:00:00+00:002023-01-01T10:00:00+00:00https://sideofburritos.com/blog/how-to-join-mastodon-social-network/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/5J9cw3wjl8M" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://joinmastodon.org/' target="_blank">https://joinmastodon.org/</a> - Mastodon create account</li>
<li><a class="text-break" href='https://joinmastodon.org/covenant' target="_blank">https://joinmastodon.org/covenant</a> - Mastodon Server Covenant</li>
<li><a class="text-break" href='https://debirdify.pruvisto.org/' target="_blank">https://debirdify.pruvisto.org/</a> - Debirdify - Twitter migration tool</li>
<li><a class="text-break" href='https://apps.apple.com/us/app/mastodon-for-iphone/id1571998974' target="_blank">https://apps.apple.com/us/app/mastodon-for-iphone/id1571998974</a> - Apple/iOS Mastodon mobile app</li>
<li><a class="text-break" href='https://play.google.com/store/apps/details?id=org.joinmastodon.android' target="_blank">https://play.google.com/store/apps/details?id=org.joinmastodon.android</a> - Android Mastodon mobile app</li>
<li><a class="text-break" href='https://axbom.com/mastodon-tips/' target="_blank">https://axbom.com/mastodon-tips/</a> - Mastodon helpful tips</li>
<li><a class="text-break" href='https://sideofburritos.social/@josh' target="_blank">https://sideofburritos.social/@josh</a> - My Mastodon profile</li>
<li><a class="text-break" href='https://infosec.exchange/' target="_blank">https://infosec.exchange/</a> - Mastodon instance I signed up with</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong></p>
<p>So let's talk about mastodon. There's a lot of videos out there on why you should sign up for Mastodon, but I thought I would make a video on what it is a step by step guide with a live demo on how to sign up some basic usage, importing your Twitter followers and how to log into the mobile app. It's also important to realize that you shouldn't see Mastodon as a direct replacement for Twitter, or wonder if it can replace Twitter. It's a different platform, it's going to be a different community. So I suggest just checking it out, giving it a try seeing what you think, and kind of going from there. So before we go into the step by step of how to sign up for an account on Mastodon, I want to first talk about what it is and what it means to be a federated service. If you already understand the basics of Mastodon, you can skip this part, I will have the timestamps in the play bar below. So Mastodon is a federated service, which means it's a group of servers hosted by individuals, even you could host your own if you wanted, and they're federated together, which means they have a common communication protocol, which lets each individual server interact with one another. To understand that a little bit better. Let's take a look at some pictures. So the first example is what a non federated service looks like. So if you, the user want to sign up for twitter.com, you go to the one location of Twitter, which is twitter.com. users sign up and they interact with each other on that platform. Another example is Facebook. If you want to sign up for Facebook, you go to facebook.com, sign up with an account, and you interact with users on that platform. But for all intents and purposes, these two platforms operate independent of one another. If you're searching for something on Twitter, if you're posting to Twitter, you're not going to be interacting with anyone on Facebook, there's a hard line between the platforms, they are run by a singular organization. There's no Twitter to Twitter, three, Facebook to you sign up on one platform, it's all centralized. And all content and interaction happens on that singular instance. So again, this is an example of a non federated centralized service. So now before we talk about Mastodon, let's talk about another federated service that you are most likely already using, but did not realize it. So email is a federated service, you can sign up on different providers, whether that's Yahoo, AOL, Gmail, proton mail. And so even though you signed up for your email address on these individual platforms, someone on proton mail can send an email to someone on Gmail, and vice versa. These platforms are all independently operated, but they use a common protocol, which lets them communicate with one another, which is why email is considered federated. Another example would be cell phone service, you can call another number that's on another carrier, T Mobile AT and T you could even call someone from the United States to someone in Europe and communicate. They're all operated by individual companies. But they use an agreed upon standard which lets them communicate with one another scenario that we saw an example of a non federated service, a federated service, such as email, let's talk about Mastodon specifically. So Mastodon is not a centralized service. It is Foss, or free and open source software that is run on different servers operated by different individuals or groups on what are referred to as instances. So what you have here is you'll have someone hosting a mastodon instance, you have other individuals or groups again, hosting the same software running on their server that they control. And then what makes Mastodon a federated service is that each of these instances that are operated by different groups or individuals use an agreed upon protocol that allows them to communicate and interact with one another. So as you'll see, shortly, when we sign up for an account, we're going to pick a specific instance where we sign up with our account. So for example, let's say we sign up for an account on Tiger since Mastodon is a federated service. Even though we just signed up on this singular instance, we will be able to communicate with anyone on a different instance. So you sign up on Tiger, you can still talk with someone on lizard or fish, they'll be able to search for you and your content, they'll be able to see your posts, but this is mostly so you can get the basic understanding that it is a decentralized service comprised of different instances run by individuals and groups that can all talk with one another. No singular organization controls the mastodon network. It's a group of instances that can communicate with one another that creates the federated network. So that was a basic overview of Mastodon and how a federated network operates. If that just made it more confusing, don't worry, the actual signup might make things a little bit clearer once you can see it. So the first step for actually signing up for a mastodon account is to head on over to join mastodon.org. As always, links will be down below in the description. Once you get here, we're going to select Create Account. And so like I mentioned in the example, we're going to have a bunch of instances that we can select from ritually sign up for our account. And so the reason we're going to join mastodon.org to find a server is that while this isn't a list of all servers that are out there, it's a list of servers that have committed to the mastodon covenant, which is a good starting point. Like I said, these servers are operated by individuals or small organizations, which means that those individuals or groups control the content that can appear on there as well. As how those servers are run, such as backups and different things like that. So at the bare minimum, at least know the servers listed here committed to the following four items, which is a good starting point. And just because you don't see a server listed here doesn't mean it's bad. It just means that the operator did not submit their server to be indexed here. So the instance you choose is kind of like selecting your local bar or pub that you might frequent. And once you get in there, you can still communicate with everyone else, it's just that that location you selected is your entry point into the network. Let's say that your Pub is located in North America. And you want to find one that has the same interest as you so that when you enter there, first UC people that like to talk about the same things. In my case, North America, I like technology, some locations might require you to apply for an account. But for the sake of this example, I want an instant account. And so now we're looking at instances that are legally based in North America with the topic of technology that have instant sign up. So I'm just going to pick this IOC data exchange. But regardless of what I initially choose, I can still interact with anyone on the mastodon network. And one more thing before we sign up, if you're like me and afraid of commitment, do not worry, you can sign up for an instance. And if for some reason you don't like the people that are on there, you can always migrate and switch to a different one at a later time. So take your time look around to try out different instances until you find one that you'd like. So to actually sign up, we're going to click Create Account. And we are now taken to the homepage for this instance, which is IOC data exchange, as we can see in our browser. So as I was mentioning about looking around and checking out the instance, before you actually join, once you get to the homepage, you can kind of take a look around and see what the posts look like. You can see some stats about the server, this IOC that exchange has 17,000 active users, you can check out the Explorer option, local, they give a little explanation here, these are the most recent public posts from people whose accounts are hosted by IOC data exchange. So again, local to the instance that we are on currently, there is then the federated option. And these are the most recent public posts from people on this and other servers on the decentralized network that the server knows about. So let's say that someone on IOC that exchange follows another user on a different federated server. And since someone on IOC that exchange is following someone on mastodon.rt, those two servers know about each other in the federated network, which is why you see posts from mastodon.rt on the federated page. And so as far as researching the instance that you want to sign up for goes, here, we have who it's administered by, again, server stats, we can click learn more, we can kind of see some details about it, the server roles. And so since this is decentralized, and individuals are hosting these instances, you can see some details about the hosting. So here we have, it's hosted in Linode. It's costing them around $300 a month, where media files are hosted different details like that. So each of the servers here should have some sort of information like that. So if we take out, so we check out tech hub dot social. Again, we can see who it's administered by 42,000 active users. Learn more, we can see details about it. So look through different servers, check out the local content, see if it's things you're interested in. There's a lot of servers to choose from. So take your time and test them out. So for this example, like I said, I'm going to create an account on IOC that exchange. So create an account, just some ground rules, except, so your display name is what will show on your profile. So in my case, I'm just going to put side of burritos, your user name, this is going to be your handle on mastodon. So I'm just going to do side of burritos, enter your email address, password, agree and sign up. Select most online accounts, you need to go click the confirmation link that went to your email address. Once you click that, you'll then be able to login.</p>
<p>So we're back I just clicked the confirmation message in my email, we can see we're presented with a page of individuals we can follow. Click the plus to follow people if you want. So we just followed these two individuals. So this is the home feed, we can see here the individuals that I followed a little bit earlier. On the left side here we have or we can write whatever we want and then publish it along with different options, add photos, who can view it different things like that. Bottom right, we have things that are trending on the right side notifications explorer local. So again, just explore click around you can see different things. There's a couple things I want to cover on the actual profile page. So I'm going to go to my profile. This is not my actual profile. I just signed up with this for an example. So don't try and follow this. And so what I want to note on this page, so if you used Twitter, you might have seen that you had a handle. Mine was outside of burritos, but on Mastodon there's one extra part on here, which is the actual domain of the instance that we signed up for, in my case IOC data exchange. And the reason for this is that this username that I configured on IOC that exchange is unique to this instance. So if we go back to the mastodon servers page, someone could also go ahead and create an account, which is outside of burritos at Tech Hub dot social because user names are unique per instance on the mastodon network. So now what you might be thinking is well, that could lead to a lot of impersonations, or someone making a fake profile and a different instance and pretending to be you or, or me in this example. And that could definitely be a problem. And so that's why I want to talk about how you can validate someone on Mastodon to make sure it's the individual that you're actually looking for. So my actual account where I am on Mastodon is at side of burritos at info, sec dot exchange. So we search for that we find my actual profile here, again, InfoSec. That exchange is the actual Mastodon instance that I signed up with. If you go to a profile on Mastodon and see a green box like this, that means the user validated, they own the domain or URL listed. The validation works by adding a small bit of code to the listed website that tells this Mastodon instance that my profile is associated with that domain, only someone that owns the actual domain they are claiming could add this code to it, which is why this works for validating domain ownership. So if you know someone is associated with a specific domain, and they validated it, this is a good indication that the profile is valid, and they are who they claim to be. You can validate domains under your profile settings. So in my case, I validated that I owned the site of burritos.com. I have my newsletter, if we go to those actual URLs, we can see that is indeed the actual site. So that's just one way to validate someone is who they say they are. Another way to validate an account is to go to a site where you know, that individual already has an account. So in my case, there's my Twitter page and my display name, I added my actual Mastodon account. So again, this is another way to validate my actual profile. So while this might sound a little bit confusing, at first, this is honestly just good practice to validate online profiles. Go to known good sources, such as Twitter, or YouTube channel, or someone's individual website, and validate that actually claimed that they own a profile that you're seeing for them, and it's not someone impersonating them. Oh, and one more thing, while we're on the topic of validation, if you see a checkmark or a blue checkmark on Mastodon, anyone can add those, it's just a little icon, I added a burrito that does not have the same meaning as a checkmark on Twitter, not that checkmarks on Twitter mean much anymore. But just be careful if you see a blue checkmark on Mastodon, don't assume that has any meaning behind it. And on the topic of getting set up, there's a couple tools that exist that allow you to find your existing followers on Twitter that already have Mastodon accounts, the one I'll be demonstrating with is deeper certify. Again, links will be down below in the description. And so what this does is connects to your Twitter account with Read Only permissions. And it'll look through your followers or those you follow. And it'll look for their account name, they might have listed on their profile. So in my case, I have it in my display name. It also searches for pin tweets, different things like that. And if it finds a mastodon account, it lets you export it, and then you can import that to your profile. So it's an easier way to find people and kind of already get set up on the platform. So I'll just run through an example. So authorized with Twitter, I'm going to authorize this app. So on an unrelated point to this video, always be careful authorizing apps don't just authorize some random app to your account. As we can see here, it's going to be able to see the tweets from your timeline that so can look through my pin tweet and see if I have an account listed there. It's going to be able to see my profile information. And then it's also going to be able to see those I follow mute and block someone to authorize app. I want to search followed accounts. We can see here that it searched 35 Twitter accounts. That's how many accounts I'm following. It goes through which instances they are on. It's all for mastodon. Here's the details of those users. At the very bottom, I can download a CSV for export for Mastodon import. I'm going to do that. So now we're going to go back to Mastodon where we created our account, we're going to go into preferences. On the left hand side, import and export and go to import. The import type is following list. This is going to be people who I was following. I'm going to leave it set to the default of merge choose file. Following accounts. This is the CSV export from the Berta fi going to click Upload. Your data was successfully uploaded and will be processed in due time. If we go back to Mastodon I'm going to go to my profile. And we can now see that I'm following 12 accounts on mastodon. That's how many accounts the Berta fi found out of the 35 individuals that I was following. So this is a quick way to import any of the accounts who were following on Twitter if those individuals added their profile information to their Twitter account. And since this is a popular tool, I would suggest that if you sign up for a mastodon account, add that to your display name on Twitter so that if someone else uses this tool to import their followers or those they're following to their Mastodon account, they'll be able to find you and start following you. So now that we signed up for an account, like most things, you might want to access that on your mobile device. So I want to walk through that and show you how to set that up. So once you open the app, we're going to select login. And I think this is the part where most people get confused. So since we signed up on a specific instance, IOC that exchange, that's the URL that we need to use inside the app to actually sign into our account, since that's where our account exists. So I'm going to search for my server IOC dot exchange.</p>
<p>Here it is selected. Next, we're taking the login page. So I'm going to sign in.</p>
<p>And so as long as you selected the correct instance, where you initially created your account, your email address and password will work for authentication, you're going to see this page where you need to authorize the app with the ability to actually access your account. I'm going to allow it Authorize. And at this point, you're in the app, you can post information, see your profile, see who you're following everything like that. So if you have any difficulties, remember, you need to select the exact server that you signed up for an account on. If you don't, your sign in will not work. So that's Mastodon if you want to follow me or tag me in a post or slide into my DMs Feel free. So far, my experience has been positive. So I hope you have a similar experience after you sign up. I'm excited to see what the future holds. A big shake up on any platform is always kind of exciting leads to interesting times and whether the shake up leads to permanent platform changes or temporary ones. It's still far too early to tell</p>
Android Full Lock Screen Bypass - Pixel | Demo + Explanation | CVE-2022-204652022-11-14T10:00:00+00:002022-12-21T10:00:00+00:00https://sideofburritos.com/blog/android-os-full-lock-screen-bypass/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/B6q0nJnltsk" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://feed.bugs.xdavidhu.me/bugs/0016' target="_blank">https://feed.bugs.xdavidhu.me/bugs/0016</a> - Complete Lock Screen Bypass on Google Pixel devices post by David SchΓΌtz</li>
<li><a class="text-break" href='https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/' target="_blank">https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/</a> - Accidental $70k Google Pixel: Lock Screen Bypass - by David SchΓΌtz</li>
<li><a class="text-break" href='https://nitter.net/xdavidhu/status/1590626467414958080' target="_blank">https://nitter.net/xdavidhu/status/1590626467414958080</a> - Tweet by David SchΓΌtz announcing discovery of vulnerability</li>
<li><a class="text-break" href='https://source.android.com/docs/security/bulletin/2022-11-01' target="_blank">https://source.android.com/docs/security/bulletin/2022-11-01</a> - Pixel Update BulletinβNovember 2022</li>
<li><a class="text-break" href='https://android.googlesource.com/platform/frameworks/base/+/ecbed81c3a331f2f0458923cc7e744c85ece96da' target="_blank">https://android.googlesource.com/platform/frameworks/base/+/ecbed81c3a331f2f0458923cc7e744c85ece96da</a> - Technical details regarding fix</li>
<li><a class="text-break" href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20465' target="_blank">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20465</a> - CVE-2022-20465</li>
<li><a class="text-break" href='https://support.google.com/pixelphone/answer/4457705' target="_blank">https://support.google.com/pixelphone/answer/4457705</a> - Support schedule for Pixel Phones</li>
<li><a class="text-break" href='https://nitter.net/DanielMicay/status/1590941219462742018' target="_blank">https://nitter.net/DanielMicay/status/1590941219462742018</a> - Tweet by Daniel Micay regarding scope of vulnerability</li>
<li><a class="text-break" href='https://grapheneos.org/features#auto-reboot' target="_blank">https://grapheneos.org/features#auto-reboot</a> - GrapheneOS Auto reboot feature</li>
<li><a class="text-break" href='https://grapheneos.org/' target="_blank">https://grapheneos.org/</a> - GrapheneOS home page</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong></p>
<p>On November 10 2022, I saw a tweet circulating from someone named David shifts that he had found a vulnerability to unlock any Google Pixel. He did a great write up on his blog, including the timeline when he disclosed it to Google explanation of how he found it and decode logic exploits, as well as a demonstration video, all of which I will link down below. The vulnerability exists in the way that the SIM card is unlocked on Android OS using the PUK code, which I will explain a little bit more later, I want to be clear that I have nothing to do with actually discovering this vulnerability. I'm just discussing what David shared publicly. And while I was debating and just talking about the video that he shared, it's always a lot cooler to actually show something than just to talk about it, so I decided to test it out myself. To exploit this vulnerability, you need to have a SIM card with a pin which is easy enough anyone can set that through the settings and you also need a PUK code which is either written on the packaging that your SIM card comes in, or you need to call your carrier to get that information. The PUK code is used if you have a pin set on your SIM card and you forget it. Once you enter the PIN incorrectly three times you need to enter the PUK code to unlock it and to set a new pin. The easiest way to test this would be to use the SIM card I already have for my existing cell phone service. But it turns out that my carrier does not keep the PUC codes or does not give them out to users. If you lock yourself out of your SIM card, they just send you a new one. So that was not going to be an option. My next choice was to buy a prepaid SIM card and hope that it had the PUK code printed on the actual packaging. So the first prepaid SIM card I bought from Target since I had to go there anyways, I opened the packaging and there was no PUK code written on it. That means I would need to reach out to the carrier to get the PUK code. So I message them on Messenger through their website. I told them that I set a PIN code I forgot it and locked my sim before I was able to set up service. I asked them if I could get the PUK code to unlock it. They said absolutely we can sure do that for you. So I got pretty excited because usually things do not go so smoothly on a first try. And then the next message said we can give you the PUK code as soon as you sign up for service. After I pushed a few more times the representative kindly closed down the chat and I was out of luck. So I looked up where the nearest Best Buy was and I headed over there in the hopes that they would have a few more options. Thankfully, Best Buy did have more options. So I bought three different ones so I didn't have to keep going back. I live in Florida, so I'm pretty sure that the cashier thought I was a dealer buying so many prepaid cards all at the same time. But regardless, I got to my car tore up in the packaging for the three SIM cards and none of them had the PUK code printed on it.</p>
<p>So when I got home, I checked and one of the three carriers had live chat available. So that's the one I started with. I use the exact same story as earlier that I set a PIN code, I forgot it and I needed the PUK code so I could set up service. Thankfully, this time, the support individual was more than happy to give me the code. So we were all set the test. If you watch the recording that David released, it took him one attempt to actually get the screen to unlock on his device, which was a pixel six. For me, I was testing on a pixel six A where I intentionally flashed an out of date version of Android OS that had the October 2022 security patch, which means it was vulnerable to this exploit. And while it did end up working and unlocking my device, as you'll see, it did take me about 10 minutes to actually get it to work. So the first thing I'm doing is failing the fingerprint authentication so that a PIN code is required so that I can show you that the phone is indeed locked. This is not required but make the demonstration a little more realistic. So the next step is to eject the SIM card slot on the device and then insert the SIM card that you set a PIN code on and that you know the PUK code for once you place that in the device, you're going to get this screen asking for the sim pin. And what you want to do next is incorrectly enter the sim pin three times as fast forwarding this part because I'm adjusting my camera and then after you enter the sim PIN code and correctly three times you're presented with this screen which is asking for the PUK code. You then enter the PUK code correctly, which lets you set a new pin. Once you do that, you'll see the unlocking SIM card. And on the screen you might have seen it it was quick. But we saw the lock screen glitch and show us the Settings screen, which is the screen I have open currently on the pixel six A that I'm testing this on, this is the part that I didn't see in David's video, at least on the six A it took me multiple times as you'll see, to actually get the lock screen to disappear. So I don't know exactly what's happening in the background that's making this not unlock on the first time. But at this point I'm going to fast forward my next attempts so your eyes do not bleed from watching the same thing over and over again. And so while we wait for my unlock to be successful, let's talk about exactly how this works. From what I understand at this time. This works because of a race condition that's occurring in the sim unlock process. And don't worry if you don't completely understand my explanation the blog at LinkedIn the district Shouldn't goes into more details if you want to read up on it. But on Android, there's a concept of security screens when the fingerprint screen is displayed. That's a security screen. When the pin on lock is displayed, that's a security screen. These screens can also be layered on top of one another. So in this example, we have the PIN code security screen. And on top of that is the PUK code security screen. When the sim puck reset is successful, it issues a dismiss function, the dismiss function it calls does not specify which security screen is going to dismiss. So whichever security screen is active is the one that is dismissed. So what appears to be happening is that the puck reset is completing successfully, the puck reset is then calling the dismiss function. But something is changing in the background that's making the PIN code security screen the active security screen instead of the puck code security screen. So therefore, instead of the puck security screen being dismissed, the PIN code security screen is dismissed and the phone is unlocked. And so we're now back to normal speed because this is the attempt that unlocks my device. And there's a couple things I want to point out that I noticed. So right after you enter the third sin pin incorrectly, the lock screen actually flashes and you can see the time there. That doesn't happen on the previous attempts that were unsuccessful. The previous attempts would instantly show the PUK code the screen, and whenever that happened, the unlock was unsuccessful. So we can see here unlocking SIM card, and we now see the screen that was left open on my Pixel six A, the device is completely unlocked. We can swipe up see all the apps the device works as if we successfully unlocked it. So the main reason I made this video is to try and communicate that timely security updates matter vulnerabilities exist in all software just waiting to be discovered. And timely security updates are the only way that you can ensure that you're protected quick updates might seem like a boring feature to look for in a mobile OS, but you need them. The fix for this is in the November 2022 security patch from Google to check if your Android device is patched, you can go into settings, about phone, tap on Android version, you can then look at the date for the Android security update. And if your phone isn't up to date, update it.</p>
<p>If you're using an OS with delayed updates, consider switching to another OS with faster updates. And if your phone is no longer supported with security updates, I guess this is more of an FYI. So that you understand the risk of using end of life hardware, you can't have privacy without security. And this is just one example to show that. One example of an OS that still isn't patched yet is lineage OS. I just installed this last night on a pixel five A. And as we can see, it's still in the October 2022 security update, which means it is vulnerable. It's also running android 12, which in my testing works every time you try this exploit. And as of the time of this recording, which is November 12 2022. I did confirm that graphene OS calyx, OS and stock Android OS are all up to date and are no longer vulnerable to this exploiting. The last thing I want to talk about is a feature on the OS that I recommend and use, which is Griffin OS. The feature is called Auto reboot. You can access this by going to your Settings Security, and selecting auto reboot. The option you select determines how long until your phone auto reboots after the last successful unlock. So in my case, if I don't unlock my phone in a 12 hour time period, it reboots. Now, you might be asking yourself, Josh, how's this supposed to help me if the lock screen can be bypassed. So it's important to remember that if you just restarted your device, and you have not entered your PIN code successfully, at least once, then the user data on your device is still encrypted. And so while this exploit bypasses the lock screen, it has nothing to do with the encryption of your data. So as an example, I use this exploit after a reboot, and we can see the phone just hangs on pixels starting. The phone never gets past this point because the user data is still encrypted and safe. So let's say that you were out somewhere in October, you lost your phone and someone found it. A few weeks later, it's November, the individual that found your device came across this exploit and wants to see if they can get into your phone. So luckily, you had the auto reboot feature enabled 12 hours after the individual found your device and rebooted itself. And while they were able to get past the initial lock screen, since your device was not fully up to date, that individual was not able to actually get your data since it was still safe and encrypted. And so while this protection is imperfect, that does decrease the window of opportunity for the malicious actor.</p>
<p>So as far as the scope of this vulnerability goes, Daniel McKay covered that in a tweet. I'm paraphrasing what he shared, but this is an Android vulnerability, not something specifically related to the Google Pixel, depending on what a vendor altered in their fork of aos P. They may not be impacted by this, but if they use close to unaltered aos P will likely be impacted. And lastly, I want to mention that while this might seem like a basic oversight by a developer vulnerabilities like this exist in all code and will continue to be discovered, so keep your software up to date and do protection so keep your software up to date to make sure that you stay protected</p>
How to install GrapheneOS on Google Pixel 6a (GP6a) + Setup for new users2022-11-06T10:00:00+00:002022-12-21T10:00:00+00:00https://sideofburritos.com/blog/how-to-install-grapheneos-on-pixel6a/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/qruzL9IdUr8" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://grapheneos.org/install/web' target="_blank">https://grapheneos.org/install/web</a> - GrapheneOS Web installer</li>
<li><a class="text-break" href='https://nitter.net/DanielMicay/status/1552966692749414402#m' target="_blank">https://nitter.net/DanielMicay/status/1552966692749414402#m</a> - Twitter thread explaining OEM unlocking</li>
<li><a class="text-break" href='https://grapheneos.org/donate' target="_blank">https://grapheneos.org/donate</a> - GrapheneOS donation page</li>
<li><a class="text-break" href='https://grapheneos.org/features#sandboxed-google-play' target="_blank">https://grapheneos.org/features#sandboxed-google-play</a> - Sandboxed Google Play details</li>
</ul>
<hr />
<h3 id="transcript">Transcript</h3>
<p><strong>Please excuse any grammatical errors. I used a tool to generate the transcript and haven't had a chance to read through it yet.</strong></p>
<p>So the main purpose of today's video is to install graphene OS on the Google Pixel six a specifically, the process will be similar regardless of which pixel you have. But the one I'm demonstrating on today is the six A, we're going to be following the instructions on graphene os.org. I'll put the link down below in the description as well as on the screen right now. And we will be using the web installer, it's essentially impossible to break your phone using the web installer. So don't be scared to try this, I've done the process probably about 50 to 100 times at this point, I've never had an issue with it. Now that being said, there are some issues that come up for some individuals when they are going through the install process. And I will point those out throughout the video for any tips, you can try to overcome those. But with that out of the way, let's begin the installation process. So we're at Griffin os.org, the web installer, we're going to go down to the prerequisites, give this a read through the supported OS. I'm installing this from Mac OS today using brave browser, make sure you are using a supported browser and a supported OS. Otherwise you will encounter issues. This is a very important note for those on Ubuntu. If you're using chromium that is broken and will not work. So make sure if you're on a boon to you are not using chromium. So once you know you're using a supported browser and OS, we can continue, make sure to give all this a read through I'm not going to waste your time reading it to you. But there's some other important bits of information in here such as Do not use an incognito browser or private browser. Because again, you will encounter issues. So once you make sure all the prerequisites are met, we are on to enabling OEM unlocking. So just a note about where you get your information from always go to the source directly, in this case, Griffin os.org. That's why I'm following along in their guide when showing you the developers do a great job documenting the installation process and different features. Always go to the source. First, don't trust some random YouTuber talking about it, or some random forum posts that you saw, you'll always get the best information directly from the source. So the first step for this OEM unlocking needs to be enabled from within the operating system, enable the developer options by going into settings about and pressing the build number entry until developer mode is enabled. So I'm going to be demonstrating this, like I just took my pixel out of the box. When you turn it on for the first time, you will see this screen. If you already past the initial setup, and you want to skip ahead, I'll have that in the play bar below. So you can skip this section. But if you're here, go ahead and press Get Started. I don't have a SIM card in the phone yet. So go ahead and click Skip. So you could connect to Wi Fi at this point. But I like to skip this because we don't need a Wi Fi connection, we can set up the pixel offline first. So we're gonna go to Setup offline. Just a quick warning about setting up offline continue. Date and time. I uncheck these just for good practice. Except Except it's always good practice to set a pin. Even if you're just going to be erasing the OS quick. Sometimes I don't but you should anyways.</p>
<p>No fingerprint, no thanks. Skip, and then swipe up to go home. So at this point, we're on the home screen, the first step is to go into settings about so swipe up,</p>
<p>you'll see settings, go to Settings, scroll down to the bottom, we're going to go into about phone, scroll down at the bottom here you see build number. Now tap on that you will get this screen if you set a PIN number, type in the pin. And we can now see you are now a developer. So developer options are enabled. And that's where the setting for OEM unlocking will be located. So next, go into settings, system developer options and toggle OEM unlocking. So we're gonna go back word in the settings, so go to System developer options. And here's the option to enable OEM unlocking. So there's a couple things to note about OEM unlocking. So if you purchase your device brand new OEM unlocking will be grayed out and you won't be able to enable it. The reason for that is that you need to actually connect to Wi Fi at this point before you can enable OEM unlocking. So we can see here OEM unlocking requires Internet access so that the stock OS can check if the device was sold as locked by a carrier. And so what does that actually mean? So the founder and lead developer of graphene OS has a thread on Twitter describing how OEM unlocking actually works, which again, I'll link down below if you want to read through it. So essentially, how that works is that Google has a database of the pixels serial numbers and which ones were sold as an unlocked device not locked by the carrier. Your device will check with Google if the device is enabled for OEM unlocking after you connect to the internet. You will then be able to enable OEM unlocking. If your device checks with Google and your serial number is not authorized for unlocking, then that option will remain grayed out because it's locked by the carrier devices that are commonly locked or Verizon branded pixels. So if you have a Verizon pixel, you will not be able to enable OEM unlocking and you cannot install graphene unless your only option is to return it or sell it and buy a OEM, unlockable pixel. For me personally, I buy my devices directly from Google as unlocked, so I know that it's unlockable, I don't need to worry about it being locked. If you decide to buy used online, I would suggest asking the seller to confirm if OEM unlocking is available, had them send you a screenshot so that you know, I've made the mistake in the past of buying a locked pixel, I had to return it. So don't make the same mistake as me. One other note on the site is so for the pixel six A, this phone in particular, if you're using one, unlocking won't work with the version of the stock OS from the factory, you need to update it to the June 2022 release or later, via and over the air update. After you've updated it, you also need to factory reset the device to fix the OEM unlocking issue. So depending on when you bought your pixel, this may not be an issue for you. This pixel was purchased around a month ago, and it shipped with the newer updates. And I did not have to factory reset or follow this at all to get it to work. But if you purchased a pixel earlier, you may need to do this and follow these steps to actually get OEM unlocking to work. So I've unlocked this device in the past, which is why OEM unlocking is available. So again, connect to Wi Fi, if it's not, if your device is able to be unlocked after a checksum with Google, you will then be able to enable it, enable OEM unlocking if you have a pin set you need to enter it. Allow OEM unlocking enable, and we can now see it's enabled. So on to the next step flashing as non root. This is for Linux distributions, I'm not going to cover this part. So the next step is booting into the bootloader interface, you need to boot your phone into the bootloader interface. To do this, you need to hold the Volume Down button while the phone boots. The easiest approach is to reboot the phone and begin holding the Volume Down button until it boots up into the bootloader interface. So now what that looks like we have OEM unlocking enabled. Going to swipe down, going to pull down again, in the bottom right hand corner is the power button. And then from here, we're going to select Restart, hold down the volume down button on the right side of the phone. So as you saw that took about 10 seconds. And once you see this screen, we are in the bootloader interface. If the screen doesn't come up for you, the phone will just boot up like normal, try restarting and again, hold the Volume Down button until you get to this screen. So the next step is actually connecting the phone to our computer. And so for this step I want to mention, make sure you use the stock cable that actually came with your device. Now that being said, the most common issue that I've heard others talk about is that their computer doesn't see the phone. And that's because they have a faulty USB cable. So if you plug in your USB cable to your computer with your phone, and it doesn't see it or you have any other strange issues when downloading the OS later in this guide, go ahead and try a different USB cable, and likely that'll solve your issue. Also, when connecting the USB cable to your computer connected directly to your computer, don't connect it through a dongle that's plugged into another port. While it still might work. This could lead to some other strange issues. Let's go ahead and connect the USB cable to our device. So just some notes here. If you're using Windows on Windows, you need to install the driver for fastboot. If you don't already have it, you can obtain the driver from Windows Update, which will detect it as an optional update when the device is booted into the bootloader interface and connected to the computer. So you should see a little pop up if you're on Windows. Another method is to go here and just download the driver manually. But the easiest option will likely be through Windows Update. So once you have your device connected to your computer with a USB cable, and you have all the drivers installed, if you're on Windows, the next step is unlocking the bootloader. It's important to note that unlocking the bootloader will erase the device and wipe all data. It's impossible to recover your data if you erase it. So make sure if you had any contacts or calendar events or photos that you need to save that you save those before proceeding because your device will be erased. So if you're ready to continue, we're going to press the unlock bootloader button, you'll see this prompt in your browser. If you have issues or if the drivers didn't install or you're using an unsupported browser, you've likely will not see your phone here. If that's the case, the first and easiest step, go through again, if you're on Windows, make sure you install the drivers. And what I usually suggest to people is if you're not using Google Chrome, just go ahead and install it even if it's temporary google chrome Rome is supported and will work. So that's one easy way to rule out that your browser is the issue. But if you do see it in your browser, and you see you can select your phone, go ahead and select Connect, you're going to see this warning on the phone, take a second to read that through. Once you do, press the volume down or up button, so that it says unlock the bootloader. And once you see that, press the Power button to select that. And if this was successful, you will now see device state red unlocked, as compared to before where it was green and said locked. So once you see device state unlocked, we're ready to proceed on to the next step. Next one is obtaining the factory images. So go ahead and press download release. This will download the release in your browser. Depending on your internet connection speed. This could take a minute, a few minutes or an hour. And so while that's downloading it, just want to mention that once you start using graphene OS consider donating to the project. The developers put in a lot of hard work supporting current devices and new devices very quickly. The donations are used for paying developers and purchasing hardware. Me personally, I like the GitHub sponsors option. So I set that up. So I have a reoccurring monthly donation. And again, I'll link this down below. So you can check out the page and set up your donation. And so once that finishes, you'll see the progress bar is full and this will say downloaded and then the name of the release dot zip. And the next step is to actually flash the image to our device. So the initial install be performed by flashing the factory images. This will replace the existing OS installation and wipe all existing data. The main thing to note here is avoid interacting with the device until the flashing script is finished and the device is back at the bootloader interface. So once you're ready, select flash release, you'll see your screen change waiting bootloader. And your device will now flash and go through the entire process. And again, this will probably take five to 10 minutes. So while that's flashing and you and I are both waiting for this to finish, I just want to mention that I have a monthly newsletter that I send out, you can sign up for that at side of burritos.com. So the other day I was talking to my best friend who was a truck driver and he asked me if I knew what frogs did when their car breaks down. I said no, I do not know what frogs do when their car breaks down. And he said they get it towed. So with that great joke out of the way I'm going to fast forward the video and I will see you shortly</p>
<p>so once that's completed, for me, it took about five minutes for that to complete. You will see flashed and then again the name dot zip to device. And I want to the next step which is locking the bootloader which is extremely important as it enables full verified boot. And some of the reasons why this is extremely important are in the rest of this paragraph, which I would suggest you read over. So to do that, we're going to select Lock bootloader again, we can see do not lock the bootloader use the volume up or down to change that. When it says lock the bootloader Press the Power button to select and once that is successful, you will see device state is now green locked. So once that's completed, we can go on to the next step post installation booting. You've now successfully installed graphene OS congratulations and can boot it. pressing the power button with the default start option selected in the bootloader interface will boot the OS. So we can see here it says start press the power button the screen is normal. Do not be afraid if you see that we have a customer lesson installed. Seeing the Google screen is normal and then once you see the graphene OS screen, this is now the boot animation booting into graphene OS so the next step after booting is disable OEM unlocking. So for that we have to go to the initial setup. So start set your language, date and time set that we're going to skip Wi Fi for now. I don't have a SIM card if you do, you can put it in now just turn location services off by default. Next, I'm going to skip fingerprint setup but you can set that up if you want. I'm just going to set a PIN code quick just for the demo but again, set a secure PIN code along with fingerprint if you want. I don't have a backup to restore from Skip and start. So we have now reached the GrapheneOS home screen. And now to disable OEM unlocking we're gonna go into settings. We're going to scroll down again to About phone. Go to the bottom tap Build Number or type in the PIN code. We can now see your now developer, go back system developer options.</p>
<p>Disable OEM unlocking, please restart the device to enabled device protection feature. And also, I'm going to disable developer options, you don't really need those enabled,</p>
<p>we can now see developer options are gone. So as the instruction said, Let's Reboot the device, since we disabled OEM unlocking, restart so I'm just gonna press the power button quick, so I can pause it on the screen. So the next part, verifying installation, give this a read over some very good information. This verified boot key hash, the reason I paused it by pressing the power button on boot is that we can verify the boot key hash. And here we have the pixel six A in this example, can make sure the number matches there. Which does so we're good to go. So I'm gonna press the power button to resume. So I'm just gonna log in quick. So the next thing I want to cover quick is what I think is the best setup for anyone that's new to Griffin OS. If you've read around, there's a lot of videos, including my own channel or blog post that talks about using F Droid or Aurora store or all these different things you can do to increase your privacy and security. And while some of them are valid, it can be a bit overwhelming for anyone that's new. So what I'm going to do is show you a basic initial setup that I think is best for anyone that's new here. So for that we need to connect to Wi Fi.</p>
<p>And some other Wi Fi is connected, we can proceed on, we're going to swipe up, we're going to go into apps.</p>
<p>And the apps app support allows you to install different apps that are provided by Griffin OS. In this case, we're going to be installing the sandbox Google Play services. Again, like I said, this is going to be a basic setup for anyone that's new, I get a lot of messages from people that say they're new to privacy or the security community. And it's overwhelming at first they get a VPN, they get a new phone, they get this, they get that they want to use F droid. And I can understand how that's overwhelming. And that's why don't suggest trying to do everything at first, privacy and security as a journey. You can't do it all at once. Because if something's too difficult, you're not going to stick with it, you're gonna give up easily. And that's why I think it's easier to go ahead and install the sandbox Play services use Google Play, like we're about to do and start there. Once you get comfortable with the OS, you can make changes one by one, you can check out some other videos I have, you can see different suggestions that users might have online. But the first step is getting a solid base that you're comfortable with using Griffin OS. And I think sandbox Google Play services are a great place to start. So to do that, we're going to go down to the bottom, and we want to install Google Play Store. We can see here it's going to install these other two dependencies, services framework and Play services. So select Install. All right. So that took about three minutes, we can now see that it's finished. Because we see the Open option. You can either select open, or you can go swipe up. And you'll now see Play stores installed. This is the same Play Store you'd get on Android OS except on graphene OS it's sandboxed and installed as a normal app instead of an app with system level access. So select the Play store. You can select Sign In. And then at this point, you can either sign in with your personal Gmail account. Or another option if you want a little bit of increased privacy, create a separate gmail account that you can use specifically for this. That's not tied to anything else you have. If you have paid for apps, you can sign in with that account. You can installed paid apps like anything else. And since we now have all the Google services installed in our device, notifications, and everything else will work as expected. And if you've used Android in the past, this is going to feel like the standard Android experience.</p>
How to set up Googleβs Advanced Protection Program | Secure YouTube Channel2022-10-31T10:00:00+00:002022-11-02T10:00:00+00:00https://sideofburritos.com/blog/googles-advanced-protection-program/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/ZoUF8bWG5FU" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://landing.google.com/advancedprotection/' target="_blank">https://landing.google.com/advancedprotection/</a> - Enrollment page</li>
<li><a class="text-break" href='https://about.fb.com/news/2022/10/protecting-people-from-malicious-account-compromise-apps/' target="_blank">https://about.fb.com/news/2022/10/protecting-people-from-malicious-account-compromise-apps/</a> - Facebook/Meta compromised apps</li>
<li><a class="text-break" href='https://support.google.com/a/answer/9503534' target="_blank">https://support.google.com/a/answer/9503534</a> - Advanced Protection Program FAQ</li>
<li><a class="text-break" href='https://support.google.com/accounts/answer/9289445' target="_blank">https://support.google.com/accounts/answer/9289445</a> - Use your phone's built-in security key</li>
<li><a class="text-break" href='https://support.google.com/accounts/answer/7519408' target="_blank">https://support.google.com/accounts/answer/7519408</a> - How Advanced Protection Program works</li>
<li><a class="text-break" href='https://support.google.com/accounts/answer/46526' target="_blank">https://support.google.com/accounts/answer/46526</a> - Google Account Security Checkup</li>
</ul>
GrapheneOS - Sensors, Network, Exploit Protection | Changelog 022022-10-24T10:00:00+00:002022-10-24T10:00:00+00:00https://sideofburritos.com/blog/grapheneos-changelog-02/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/0ic6QK0xUMY" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href='https://youtu.be/hx2eiPTe7Zg' target="_blank">https://youtu.be/hx2eiPTe7Zg</a> - Sensors and Network permission toggle video</li>
<li><a href='https://grapheneos.org/features#sensors-permission-toggle' target="_blank">https://grapheneos.org/features#sensors-permission-toggle</a> - Sensors permission toggle</li>
<li><a href='https://grapheneos.org/features#network-permission-toggle' target="_blank">https://grapheneos.org/features#network-permission-toggle</a> - Network permission toggle</li>
<li><a href='https://discuss.grapheneos.org/d/502-mahjong-soul-game-constantly-crashing' target="_blank">https://discuss.grapheneos.org/d/502-mahjong-soul-game-constantly-crashing</a> - Thread discussing Unity memory corruption bug</li>
<li><a href='https://grapheneos.org/usage#exec-spawning' target="_blank">https://grapheneos.org/usage#exec-spawning</a> - Exec spawning</li>
<li><a href='https://grapheneos.org/usage#bugs-uncovered-by-security-features' target="_blank">https://grapheneos.org/usage#bugs-uncovered-by-security-features</a> - Bugs uncovered by security features</li>
<li><a href='https://grapheneos.org/features#exploit-mitigations' target="_blank">https://grapheneos.org/features#exploit-mitigations</a> - Exploit mitigations</li>
</ul>
YouTube Handles | The security feature we ALL needed2022-10-17T10:00:00+00:002022-10-17T10:00:00+00:00https://sideofburritos.com/blog/youtube-handles/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/ggxSz0e7vrg" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href='https://blog.youtube/press/' target="_blank">https://blog.youtube/press/</a></li>
<li><a href='https://blog.youtube/news-and-events/introducing-handles-a-new-way-to-identify-your-youtube-channel/' target="_blank">https://blog.youtube/news-and-events/introducing-handles-a-new-way-to-identify-your-youtube-channel/</a></li>
<li><a href='https://www.youtube.com/watch?v=1Cw-vODp-8Y' target="_blank">https://www.youtube.com/watch?v=1Cw-vODp-8Y</a> - Video: YouTube Needs to Fix This</li>
<li><a href='https://www.youtube.com/watch?v=w3QxMFwQAfM' target="_blank">https://www.youtube.com/watch?v=w3QxMFwQAfM</a> - Video: YouTube Comment Giveaway SCAMS ft. Pleasant Green</li>
</ul>
Why you probably don't need a VPN | Do I need a VPN?2022-10-10T10:00:00+00:002022-10-10T10:00:00+00:00https://sideofburritos.com/blog/why-you-probably-dont-need-a-vpn/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/BE33daPiaYQ" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://matt.traudt.xyz/posts/2019-10-17-you-want-tor-browser-not-a-vpn/' target="_blank">https://matt.traudt.xyz/posts/2019-10-17-you-want-tor-browser-not-a-vpn/</a></li>
<li><a class="text-break" href='https://madaidans-insecurities.github.io/index.html' target="_blank">https://madaidans-insecurities.github.io/index.html</a></li>
<li><a class="text-break" href='https://privsec.dev/knowledge/commercial-vpn-use-cases/' target="_blank">https://privsec.dev/knowledge/commercial-vpn-use-cases/</a></li>
<li><a class="text-break" href='https://www.cnet.com/home/internet/ftc-calls-out-internet-providers-for-amassing-user-browsing-data/' target="_blank">https://www.cnet.com/home/internet/ftc-calls-out-internet-providers-for-amassing-user-browsing-data/</a></li>
<li><a class="text-break" href='https://blog.james.cridland.net/why-you-probably-dont-need-a-vpn-e7bb35e7d744' target="_blank">https://blog.james.cridland.net/why-you-probably-dont-need-a-vpn-e7bb35e7d744</a></li>
<li><a class="text-break" href='https://www.tomsguide.com/news/you-may-no-longer-need-vpn' target="_blank">https://www.tomsguide.com/news/you-may-no-longer-need-vpn</a></li>
</ul>
Trezor Model T Unboxing | Best Monero wallet (XMR)2022-10-03T10:00:00+00:002022-10-03T10:00:00+00:00https://sideofburritos.com/blog/hardware-wallet/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/DPrr3_3sAdw" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://shop.trezor.io/product/trezor-model-t' target="_blank">https://shop.trezor.io/product/trezor-model-t</a> - Trezor Model T</li>
<li><a class="text-break" href='https://blog.trezor.io/shamir-backup-a-new-security-standard-3aa42a6ebb5f' target="_blank">https://blog.trezor.io/shamir-backup-a-new-security-standard-3aa42a6ebb5f</a></li>
<li><a class="text-break" href='https://www.reddit.com/r/CryptoCurrency/comments/ralb99/ultimate_guide_to_cryptocurrency_wallets_for/' target="_blank">https://www.reddit.com/r/CryptoCurrency/comments/ralb99/ultimate_guide_to_cryptocurrency_wallets_for/</a></li>
<li><a class="text-break" href='https://coindiligent.com/benefits-cryptocurrency-hardware-wallet' target="_blank">https://coindiligent.com/benefits-cryptocurrency-hardware-wallet</a></li>
<li><a class="text-break" href='https://dcxlearn.com/cryptocurrency/what-are-cryptocurrency-wallets-what-are-the-types-of-cryptocurrency-wallets/' target="_blank">https://dcxlearn.com/cryptocurrency/what-are-cryptocurrency-wallets-what-are-the-types-of-cryptocurrency-wallets/</a></li>
<li><a class="text-break" href='https://www.coincover.com/post/what-are-the-different-types-of-bitcoin-wallets' target="_blank">https://www.coincover.com/post/what-are-the-different-types-of-bitcoin-wallets</a></li>
<li><a class="text-break" href='https://en.wikipedia.org/wiki/Mt._Gox' target="_blank">https://en.wikipedia.org/wiki/Mt._Gox</a></li>
<li><a class="text-break" href='https://crystalblockchain.com/articles/the-10-biggest-crypto-exchange-hacks-in-history/' target="_blank">https://crystalblockchain.com/articles/the-10-biggest-crypto-exchange-hacks-in-history/</a></li>
<li><a class="text-break" href='https://www.investopedia.com/trezor-vs-ledger-5193580' target="_blank">https://www.investopedia.com/trezor-vs-ledger-5193580</a></li>
<li><a class="text-break" href='https://privacypros.io/trezor/shamir-backup/' target="_blank">https://privacypros.io/trezor/shamir-backup/</a></li>
<li><a class="text-break" href='https://academy.binance.com/en/articles/custodial-vs-non-custodial-wallets-what-s-the-difference' target="_blank">https://academy.binance.com/en/articles/custodial-vs-non-custodial-wallets-what-s-the-difference</a></li>
<li><a class="text-break" href='https://www.theblock.co/post/139554/a-350000-bored-ape-nft-was-just-sold-for-only-115' target="_blank">https://www.theblock.co/post/139554/a-350000-bored-ape-nft-was-just-sold-for-only-115</a></li>
<li><a class="text-break" href='https://intercom.help/bity-help-center/en/articles/5609077-how-do-i-import-my-bitcoins-btc-from-a-paper-wallet-to-a-software-wallet' target="_blank">https://intercom.help/bity-help-center/en/articles/5609077-how-do-i-import-my-bitcoins-btc-from-a-paper-wallet-to-a-software-wallet</a></li>
<li><a class="text-break" href='https://blog.trezor.io/getting-started-with-trezor-model-t-a8db9096a7a6' target="_blank">https://blog.trezor.io/getting-started-with-trezor-model-t-a8db9096a7a6</a></li>
<li><a class="text-break" href='https://www.nasdaq.com/articles/cryptopia-exchange-currently-in-liquidation-gets-hacked-again%3A-report-2021-02-20' target="_blank">https://www.nasdaq.com/articles/cryptopia-exchange-currently-in-liquidation-gets-hacked-again%3A-report-2021-02-20</a></li>
<li><a class="text-break" href='https://www.nerdwallet.com/best/investing/crypto-exchanges-platforms' target="_blank">https://www.nerdwallet.com/best/investing/crypto-exchanges-platforms</a></li>
</ul>
Tornado Cash | The threat to Open Source Software (FOSS)2022-09-26T10:00:00+00:002022-09-26T10:00:00+00:00https://sideofburritos.com/blog/tornado-cash-threat-to-oss/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/QkyO93TLU0U" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href='https://home.treasury.gov/news/press-releases/jy0916' target="_blank">https://home.treasury.gov/news/press-releases/jy0916</a> - US Treasure Sanction Press Release</li>
<li><a href='https://www.coindesk.com/policy/2022/08/26/wife-of-pertsev-arrested-tornado-cash-developer-denies-russia-secret-service-links/' target="_blank">https://www.coindesk.com/policy/2022/08/26/wife-of-pertsev-arrested-tornado-cash-developer-denies-russia-secret-service-links/</a></li>
<li><a href='https://www.coindesk.com/policy/2022/08/21/arrest-of-tornado-cash-developer-draws-dutch-crypto-community-protest/' target="_blank">https://www.coindesk.com/policy/2022/08/21/arrest-of-tornado-cash-developer-draws-dutch-crypto-community-protest/</a></li>
<li><a href='https://www.coindesk.com/policy/2022/08/24/alleged-tornado-developer-pertsev-must-stay-in-jail-dutch-judge-rules/' target="_blank">https://www.coindesk.com/policy/2022/08/24/alleged-tornado-developer-pertsev-must-stay-in-jail-dutch-judge-rules/</a></li>
<li><a href='https://www.coincenter.org/education/advanced-topics/how-does-tornado-cash-work/' target="_blank">https://www.coincenter.org/education/advanced-topics/how-does-tornado-cash-work/</a></li>
<li><a href='https://www.fincen.gov/news/news-releases/fincen-announces-140-million-civil-money-penalty-against-usaa-federal-savings' target="_blank">https://www.fincen.gov/news/news-releases/fincen-announces-140-million-civil-money-penalty-against-usaa-federal-savings</a></li>
<li><a href='https://etherscan.io/' target="_blank">https://etherscan.io/</a> - Blockchain explorer</li>
<li><a href='https://decrypt.co/resources/what-are-coin-mixers-tornado-cash-how-do-they-work' target="_blank">https://decrypt.co/resources/what-are-coin-mixers-tornado-cash-how-do-they-work</a></li>
<li><a href='https://en.0xzx.com/ethereum-mixer-tornado-cashback-banned-on-github/' target="_blank">https://en.0xzx.com/ethereum-mixer-tornado-cashback-banned-on-github/</a></li>
<li><a href='https://thehackernews.com/2022/08/tornado-cash-developer-arrested-after.html' target="_blank">https://thehackernews.com/2022/08/tornado-cash-developer-arrested-after.html</a></li>
<li><a href='https://forkast.news/headlines/tornado-cash-developer-alexey-pertsev-stay-in-jail/' target="_blank">https://forkast.news/headlines/tornado-cash-developer-alexey-pertsev-stay-in-jail/</a></li>
<li><a href='https://learn.bybit.com/defi/what-is-tornado-cash/' target="_blank">https://learn.bybit.com/defi/what-is-tornado-cash/</a></li>
<li><a href='https://cointelegraph.com/news/coinbase-is-fighting-back-as-the-sec-closes-in-on-tornado-cash' target="_blank">https://cointelegraph.com/news/coinbase-is-fighting-back-as-the-sec-closes-in-on-tornado-cash</a></li>
<li><a href='https://www.bloomberg.com/news/articles/2022-08-12/dutch-arrest-man-suspected-of-being-involved-in-tornado-cash' target="_blank">https://www.bloomberg.com/news/articles/2022-08-12/dutch-arrest-man-suspected-of-being-involved-in-tornado-cash</a></li>
<li><a href='https://en.wikipedia.org/wiki/Tornado_Cash' target="_blank">https://en.wikipedia.org/wiki/Tornado_Cash</a></li>
<li><a href='https://www.banklesstimes.com/cryptocurrency/top-nft-rug-pulls/' target="_blank">https://www.banklesstimes.com/cryptocurrency/top-nft-rug-pulls/</a></li>
</ul>
<hr />
<h3 id="tornado-cash">Tornado Cash</h3>
<p><strong>This is where Tornado Cash is hosted on IPFS (InterPlanetary File System)</strong></p>
<p>This URL will take you to the actual service. I'm linking it for reference if you're curious.</p>
<p>hXXps://ipfs[.]io/ipns/tornadocash.eth/</p>
<p><a href="https://twitter.com/tornadocash" target="_blank">https://twitter.com/tornadocash</a> - Tornado Cash twitter account</p>
Progressive Web Apps | How they work + Security & Privacy2022-09-19T10:00:00+00:002022-09-19T10:00:00+00:00https://sideofburritos.com/blog/progressive-web-apps-explained/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/crF0c96pXhI" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://appsco.pe/" target="_blank">https://appsco.pe/</a> - Site with list of Progressive Web Apps</li>
<li><a href="https://medium.com/@amberleyjohanna/seriously-though-what-is-a-progressive-web-app-56130600a093" target="_blank">https://medium.com/@amberleyjohanna/seriously-though-what-is-a-progressive-web-app-56130600a093</a> - What is a Progressive Web App?</li>
<li><a href="https://developer.mozilla.org/en-US/docs/Web/Manifest" target="_blank">https://developer.mozilla.org/en-US/docs/Web/Manifest</a> - Web app manifests</li>
<li><a href="https://web.dev/learn/pwa/service-workers/" target="_blank">https://web.dev/learn/pwa/service-workers/</a> - Service Workers</li>
<li><a href="https://infrequently.org/2015/06/progressive-apps-escaping-tabs-without-losing-our-soul/" target="_blank">https://infrequently.org/2015/06/progressive-apps-escaping-tabs-without-losing-our-soul/</a> - Alex Russell post about "websites that took all the right vitamins."</li>
<li><a href="https://blog.nviso.eu/2020/01/16/deep-dive-into-the-security-of-progressive-web-apps/" target="_blank">https://blog.nviso.eu/2020/01/16/deep-dive-into-the-security-of-progressive-web-apps/</a> - Progressive Web App security</li>
<li><a href="https://www.simicart.com/blog/pwa-hardware-access/" target="_blank">https://www.simicart.com/blog/pwa-hardware-access/</a> - Progressive Web App and hardware access</li>
<li><a href="https://asperbrothers.com/blog/pwa-vs-native-app/" target="_blank">https://asperbrothers.com/blog/pwa-vs-native-app/</a> - PWA vs Native App</li>
</ul>
eSIM Explained | How to activate eSIM Android | GrapheneOS2022-09-05T10:00:00+00:002022-09-05T10:00:00+00:00https://sideofburritos.com/blog/esim-explained/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/zrw8TaAFa5A" target="_blank">Video Link</a></h2>
<hr />
<h2 id="mobile-privacy-guide">Mobile privacy guide</h2>
<ul>
<li><a href='https://sideofburritos.com/docs/setup-guides/mobile-privacy/' target="_blank">https://sideofburritos.com/docs/setup-guides/mobile-privacy/</a></li>
</ul>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://grapheneos.org/usage#sandboxed-google-play-esim" target="_blank">https://grapheneos.org/usage#sandboxed-google-play-esim</a> - GrapheneOS eSIM documentation</li>
<li><a href="https://www.usmobile.com/" target="_blank">https://www.usmobile.com/</a> - US Mobile - <strong>not an endorsement</strong></li>
<li><a href="https://support.google.com/pixelphone/answer/7086887" target="_blank">https://support.google.com/pixelphone/answer/7086887</a> - Google Pixel SIM documentation</li>
<li><a href="https://www.makeuseof.com/tag/what-is-esim-better-sim-card/" target="_blank">https://www.makeuseof.com/tag/what-is-esim-better-sim-card/</a> - eSIM vs SIM card</li>
<li><a href="https://ozekiphone.com/p_4411-voip-vs.-gsm.html" target="_blank">https://ozekiphone.com/p_4411-voip-vs.-gsm.html</a> - VoIP vs GSM</li>
<li><a href="https://www.moflixgroup.com/blog/esim-for-telcos-unlocking-opportunities" target="_blank">https://www.moflixgroup.com/blog/esim-for-telcos-unlocking-opportunities</a> - Details about eSIM's</li>
</ul>
Best eReader for Privacy | kobo | Kindle2022-08-28T14:51:16+00:002022-08-28T14:51:16+00:00https://sideofburritos.com/blog/best-ereader-privacy/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/tFGP6gD4Wwg" target="_blank">Video Link</a></h2>
<hr />
<h2 id="mobile-privacy-guide">Mobile privacy guide</h2>
<ul>
<li><a href='https://sideofburritos.com/docs/setup-guides/mobile-privacy/' target="_blank">https://sideofburritos.com/docs/setup-guides/mobile-privacy/</a></li>
</ul>
<hr />
<h2 id="how-to-bypass-kobo-account">How to bypass kobo account</h2>
<ol>
<li>On Kobo screen, tap <code>Don't have a Wi Fi network?</code></li>
<li>Attach kobo to computer with a USB cable.</li>
<li>Open terminal and change to the Kobo directory:
<code>cd /Volumes/KOBOeReader/.kobo/</code></li>
<li>Open <code>KoboReader.sqlite</code> using sqlite3
<code>sqlite3 KoboReader.sqlite</code>
If you don't have sqlite3 installed you can download it from - <a href="https://www.sqlite.org/download.html" target="_blank">https://www.sqlite.org/download.html</a></li>
<li>Enter the following command and press enter - <code>INSERT INTO user(UserID,UserKey) VALUES('1','');</code>.</li>
<li>Enter the following command and press enter to exit the database - <code>.exit</code>.</li>
<li>Eject the Kobo from your computer and you should see the main device screen.</li>
</ol>
<p>Source: <a href="https://www.reddit.com/r/kobo/comments/mt2f30/how_to_bypass_account_setup/" target="_blank">https://www.reddit.com/r/kobo/comments/mt2f30/how_to_bypass_account_setup/</a></p>
<hr />
<h2 id="how-to-remove-walmart-stock-logo">How to remove Walmart/stock logo</h2>
<p>On the boot screen, depending on where you purchased your device from you may see a random company logo (such as Walmart). The following will let you remove that branded logo.</p>
<ol>
<li>Connect your kobo to your computer with a USB cable.</li>
<li>Double click the Kobo device to open the device folder.</li>
<li>Make sure "hidden files/folders" are configured to show on your computer, select the <code>.kobo</code> folder.</li>
<li>Inside the <code>.kobo</code> folder, open the file named <code>affiliate.conf</code>.</li>
<li>Change <code>affiliate=walmart</code> (or whatever company it says) to <code>affiliate=kobo</code>. Save and exit the file.</li>
<li>You should no longer see the affiliate logo when booting up your device.</li>
</ol>
<p>Source: <a href="https://www.reddit.com/r/kobo/comments/igin1w/step_by_step_directions_for_removing_the_walmart/" target="_blank">https://www.reddit.com/r/kobo/comments/igin1w/step_by_step_directions_for_removing_the_walmart/</a></p>
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://www.eink.com/benefits.html" target="_blank">https://www.eink.com/benefits.html</a> - Eink display details</li>
<li><a href="https://us.kobobooks.com/products/kobo-clara-hd" target="_blank">https://us.kobobooks.com/products/kobo-clara-hd</a> - kobo clard HD</li>
</ul>
GrapheneOS Sensors and Network Permission Toggle2022-08-21T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/sensors-network-toggle/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/hx2eiPTe7Zg" target="_blank">Video Link</a></h2>
<hr />
<h2 id="mobile-privacy-guide">Mobile privacy guide</h2>
<ul>
<li><a class="text-break" href='https://sideofburritos.com/docs/setup-guides/mobile-privacy/' target="_blank">https://sideofburritos.com/docs/setup-guides/mobile-privacy/</a></li>
</ul>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://grapheneos.org/features#network-permission-toggle' target="_blank">https://grapheneos.org/features#network-permission-toggle</a> - GrapheneOS Sensors and Network permission toggle documentation</li>
<li><a class="text-break" href='https://github.com/GrapheneOS/os-issue-tracker/issues/597' target="_blank">https://github.com/GrapheneOS/os-issue-tracker/issues/597</a> - GitHub issue referenced regarding default sensor permission seting for system apps</li>
</ul>
You're probably doing it wrong | Multi-Factor Authentication Explained2022-08-15T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/mfa-explained/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/PV39P6aeyCc" target="_blank">Video Link</a></h2>
<hr />
<h2 id="mobile-privacy-guide">Mobile privacy guide</h2>
<ul>
<li><a class="text-break" href='https://sideofburritos.com/docs/setup-guides/mobile-privacy/' target="_blank">https://sideofburritos.com/docs/setup-guides/mobile-privacy/</a></li>
</ul>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://privsec.dev/knowledge/multi-factor-authentication/' target="_blank">https://privsec.dev/knowledge/multi-factor-authentication/</a> - PrivSec.dev article - great read</li>
<li><a class="text-break" href='https://www.yubico.com/product/yubikey-5c-nfc/' target="_blank">https://www.yubico.com/product/yubikey-5c-nfc/</a> - YubiKey 5C NFC I purchased</li>
<li><a class="text-break" href='https://www.dongleauth.com/' target="_blank">https://www.dongleauth.com/</a> - Check the services you use for MFA support</li>
<li><a class="text-break" href='https://portswigger.net/daily-swig/researchers-trick-duo-2fa-into-sending-authentication-request-to-attacker-controlled-device' target="_blank">https://portswigger.net/daily-swig/researchers-trick-duo-2fa-into-sending-authentication-request-to-attacker-controlled-device</a> - Duo 2FA article</li>
<li><a class="text-break" href='https://fidoalliance.org/fido2/' target="_blank">https://fidoalliance.org/fido2/</a> </li>
<li><a class="text-break" href='https://blog.cloudflare.com/2022-07-sms-phishing-attacks/' target="_blank">https://blog.cloudflare.com/2022-07-sms-phishing-attacks/</a> - Cloudflare stopping phishing scam with hardware tokens</li>
</ul>
How your phones' wallpaper can be used to track you2022-08-07T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/wallpaper-privacy/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/cwLRiadmfaQ" target="_blank">Video Link</a></h2>
<hr />
<h2 id="mobile-privacy-guide">Mobile privacy guide</h2>
<ul>
<li><a class="text-break" href='https://sideofburritos.com/docs/setup-guides/mobile-privacy/' target="_blank">https://sideofburritos.com/docs/setup-guides/mobile-privacy/</a></li>
</ul>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://fingerprint.com/blog/how-android-wallpaper-images-threaten-privacy/' target="_blank">https://fingerprint.com/blog/how-android-wallpaper-images-threaten-privacy/</a> - privacy.com main article referenced</li>
<li><a class="text-break" href='https://github.com/fingerprintjs/blog-android-wallpaper-id-demo' target="_blank">https://github.com/fingerprintjs/blog-android-wallpaper-id-demo</a> - WallpaperID App used in demo</li>
<li><a class="text-break" href='https://developer.android.com/reference/android/app/WallpaperManager#getWallpaperColors(int)' target="_blank">https://developer.android.com/reference/android/app/WallpaperManager#getWallpaperColors(int)</a> - Android source code - getWallpaperColors</li>
<li><a class="text-break" href='https://cs.android.com/android/platform/superproject/+/master:frameworks/base/core/java/com/android/internal/graphics/palette/VariationalKMeansQuantizer.java;l=31?q=KMeansQua&ss=android%2Fplatform%2Fsuperproject' target="_blank">https://cs.android.com/android/platform/superproject/+/master:frameworks/base/core/java/com/android/internal/graphics/palette/VariationalKMeansQuantizer.java;l=31?q=KMeansQua&ss=android%2Fplatform%2Fsuperproject</a> - getWallpaperColors source code - K-means clustering</li>
<li><a class="text-break" href='https://www.clear.rice.edu/elec301/Projects02/artSpy/patmac/RGB.jpg' target="_blank">https://www.clear.rice.edu/elec301/Projects02/artSpy/patmac/RGB.jpg</a> - 3D color cube</li>
<li><a class="text-break" href='https://clarle.github.io/yui3/yui/docs/color/rgb-slider.html' target="_blank">https://clarle.github.io/yui3/yui/docs/color/rgb-slider.html</a> - RGB sliders</li>
</ul>
FULL reveal of what apps I use on my personal phone | GrapheneOS2022-07-31T12:57:39+00:002022-08-10T12:57:39+00:00https://sideofburritos.com/blog/app-i-use-on-my-personal-phone/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/FEN_NvKsVBc" target="_blank">Video Link</a></h2>
<hr />
<h2 id="mobile-privacy-guide">Mobile privacy guide</h2>
<ul>
<li><a class="text-break" href='https://sideofburritos.com/docs/setup-guides/mobile-privacy/' target="_blank">https://sideofburritos.com/docs/setup-guides/mobile-privacy/</a></li>
</ul>
<h2 id="my-other-videos-i-referenced">My other videos I referenced</h2>
<ul>
<li><a class="text-break" href='https://youtu.be/NJzA9yRGgeM' target="_blank">π₯ Storing your contacts in the cloud</a></li>
<li><a class="text-break" href='https://youtu.be/ocwznyrMVwE/' target="_blank">π₯ Storing your calendar events in the cloud</a></li>
<li><a class="text-break" href='https://youtu.be/9R6M4NuBTi4' target="_blank">π₯ Calling a scammer</a></li>
<li><a class="text-break" href='https://youtu.be/IzpVI4zaso0' target="_blank">π₯ You should uninstall F-Droid - Part 1</a></li>
<li><a class="text-break" href='https://youtu.be/lAbgeJau3eE' target="_blank">π₯ You should uninstall F-Droid - Part 2</a></li>
<li><a class="text-break" href='https://youtu.be/FFz57zNR_M0' target="_blank">π₯ You should use this instead of F-Droid | How to use app RSS feed</a></li>
</ul>
<h2 id="full-list-of-apps-i-have-installed-as-of-2022-07-31">Full list of apps I have installed (as of 2022-07-31)</h2>
<ul>
<li>1Password</li>
<li>Aegis</li>
<li>AntennaPod</li>
<li>Aurora Store</li>
<li>Briar</li>
<li>Burner</li>
<li>Cube ACR</li>
<li>DAVxβ΅</li>
<li>Geometric Weather</li>
<li>Google Camera</li>
<li>Magic Earth</li>
<li>Mullvad VPN</li>
<li>NewPipe</li>
<li>Nextcloud</li>
<li>OpenVPN</li>
<li>Play Store</li>
<li>Plex</li>
<li>Read You</li>
<li>Signal</li>
<li>Simple Calendar Pro</li>
<li>Sonos</li>
<li>Spotify</li>
<li>Syncthing</li>
<li>Todoist</li>
<li>Twidere</li>
<li>UniFi Network</li>
<li>UniFi Protect</li>
<li>UptimeRobot</li>
<li>Vanadium</li>
</ul>
F-Droid, Droid-ify, Aurora Droid, Neo Store, Google Play, Aurora Store - What should you use?2022-07-17T12:57:39+00:002022-08-10T12:57:39+00:00https://sideofburritos.com/blog/app-stores-explained/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/JMSiTFLpUP8" target="_blank">Video Link</a></h2>
<p><a href="Diagram from video.png" target="_blank">Full Size Diagram from video</a> -
To download a full-size copy of the image, <code>Right-Click</code> the <code>Full Size Image</code> link and select <code>Save Link As</code> (or just click it to view)</p>
<hr />
<h2 id="mobile-privacy-guide">Mobile privacy guide</h2>
<ul>
<li><a class="text-break" href='https://sideofburritos.com/docs/setup-guides/mobile-privacy/' target="_blank">https://sideofburritos.com/docs/setup-guides/mobile-privacy/</a></li>
</ul>
<h2 id="my-previous-f-droid-videos">My previous F-Droid videos</h2>
<ul>
<li><a class="text-break" href='https://youtu.be/IzpVI4zaso0' target="_blank">You should uninstall F-Droid - Part 1</a></li>
<li><a class="text-break" href='https://youtu.be/lAbgeJau3eE' target="_blank">You should uninstall F-Droid - Part 2</a></li>
<li><a class="text-break" href='https://youtu.be/FFz57zNR_M0' target="_blank">You should use this instead of F-Droid | How to use app RSS feed0</a></li>
</ul>
<h2 id="app-store-links">App Store Links</h2>
<ul>
<li><a class="text-break" href='https://github.com/NeoApplications/Neo-Store' target="_blank">Droid-ify (Now Neo Store)</a></li>
<li><a class="text-break" href='https://auroraoss.com/' target="_blank">Aurora Store</a></li>
<li><a class="text-break" href='https://f-droid.org/' target="_blank">F-Droid</a></li>
<li><a class="text-break" href='https://gitlab.com/AuroraOSS/auroradroid' target="_blank">Aurora Droid</a></li>
</ul>
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://wonderfall.dev/fdroid-issues/' target="_blank">Blog post on F-Droid Security (Great read)</a></li>
<li><a class="text-break" href='https://f-droid.org/en/docs/Inclusion_Policy/' target="_blank">F-Droid Inclusion Policy</a></li>
</ul>
You should use this instead of F-Droid2022-07-10T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/use-this-instead-of-f-droid/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/FFz57zNR_M0" target="_blank">Video Link</a></h2>
<hr />
<h2 id="mobile-privacy-guide">Mobile privacy guide</h2>
<ul>
<li><a class="text-break" href='https://sideofburritos.com/docs/setup-guides/mobile-privacy/' target="_blank">https://sideofburritos.com/docs/setup-guides/mobile-privacy/</a></li>
</ul>
<h2 id="my-previous-two-f-droid-videos">My previous two F-Droid videos</h2>
<ul>
<li><a class="text-break" href='https://youtu.be/IzpVI4zaso0' target="_blank">https://youtu.be/IzpVI4zaso0</a> - You should uninstall F-Droid - Part 1</li>
<li><a class="text-break" href='https://youtu.be/lAbgeJau3eE' target="_blank">https://youtu.be/lAbgeJau3eE</a> - You should uninstall F-Droid - Part 2</li>
</ul>
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://en.wikipedia.org/wiki/RSS' target="_blank">https://en.wikipedia.org/wiki/RSS</a> - RSS Feeds</li>
<li><a class="text-break" href='https://github.com/Ashinch/ReadYou' target="_blank">https://github.com/Ashinch/ReadYou</a> - Read You Github page</li>
<li><a class="text-break" href='https://discuss.grapheneos.org/d/16-f-droid-auto-updates/5' target="_blank">https://discuss.grapheneos.org/d/16-f-droid-auto-updates/5</a> - Forum post about using RSS reader</li>
</ul>
Period tracking app Roe v Wade | Cloud vs Local Storage2022-07-03T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/period-tracking-app-roe-v-wade/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/2wxI6GtdspI" target="_blank">Video Link</a></h2>
<hr />
<h2 id="app-downloads-android">App Downloads Android</h2>
<ul>
<li><a class="text-break" href='https://bloodyhealth.gitlab.io/' target="_blank">https://bloodyhealth.gitlab.io/</a> - Drip</li>
<li><a class="text-break" href='https://play.google.com/store/apps/details?id=de.arnowelzel.android.periodical' target="_blank">https://play.google.com/store/apps/details?id=de.arnowelzel.android.periodical</a> - Periodical</li>
<li><a class="text-break" href='https://play.google.com/store/apps/details?id=com.kollectivemobile.euki' target="_blank">https://play.google.com/store/apps/details?id=com.kollectivemobile.euki</a> - Euki</li>
</ul>
<h2 id="app-download-ios">App Download iOS</h2>
<ul>
<li><a class="text-break" href='https://apps.apple.com/us/app/euki/id1469213846' target="_blank">https://apps.apple.com/us/app/euki/id1469213846</a> - Euki</li>
</ul>
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://transparencyreport.google.com/user-data/overview?hl=en' target="_blank">https://transparencyreport.google.com/user-data/overview?hl=en</a> - Google Transparency Report</li>
<li><a class="text-break" href='https://theintercept.com/2022/06/29/crypto-coinbase-tracer-ice/' target="_blank">https://theintercept.com/2022/06/29/crypto-coinbase-tracer-ice/</a> - Coinbase Providing βGeo Tracking Dataβ to ICE</li>
<li><a class="text-break" href='https://www.youtube.com/watch?v=8FDIef7tVFg' target="_blank">https://www.youtube.com/watch?v=8FDIef7tVFg</a> - 'The Hated One - My Phone Is Anonymous Now' Video</li>
<li><a class="text-break" href='https://lers.google.com/signup_v2/landing' target="_blank">https://lers.google.com/signup_v2/landing</a> - Google | Law Enforcement Request System</li>
<li><a class="text-break" href='https://www.facebook.com/records/login/' target="_blank">https://www.facebook.com/records/login/</a> - Facebook | Law Enforcement Request System</li>
<li><a class="text-break" href='https://help.twitter.com/en/forms/law-enforcement' target="_blank">https://help.twitter.com/en/forms/law-enforcement</a> - Twitter | Law Enforcement Request System</li>
<li><a class="text-break" href='https://www.npr.org/2022/07/01/1109467942/tiktok-china-data-privacy' target="_blank">https://www.npr.org/2022/07/01/1109467942/tiktok-china-data-privacy</a> - TikTok says it's putting new limits on Chinese workers' access to U.S. user data</li>
<li><a class="text-break" href='https://www.businessinsider.com/tiktok-confirms-us-user-data-accessed-in-china-bytedance-2022-7' target="_blank">https://www.businessinsider.com/tiktok-confirms-us-user-data-accessed-in-china-bytedance-2022-7</a> - TikTok Confirms US User Data Can Be Accessed in China</li>
<li><a class="text-break" href='https://www.theverge.com/2022/6/24/23181851/t-mobile-browsing-data-app-insights-marketing-opt-out' target="_blank">https://www.theverge.com/2022/6/24/23181851/t-mobile-browsing-data-app-insights-marketing-opt-out</a> - T-Mobile is happily selling customersβ app habits to advertisers</li>
<li><a class="text-break" href='https://www.cio.com/article/402208/data-science-drives-big-decisions-at-kohls.html' target="_blank">https://www.cio.com/article/402208/data-science-drives-big-decisions-at-kohls.html</a> - Data science drives big decisions at Kohl's</li>
<li><a class="text-break" href='https://www.theregister.com/2022/06/20/captial_one_wire_fraud/' target="_blank">https://www.theregister.com/2022/06/20/captial_one_wire_fraud/</a> - Capital One fraudster got in via 'misconfigured' AWS storage</li>
<li><a class="text-break" href='https://twitter.com/alexjyong/status/1542184851532423168' target="_blank">https://twitter.com/alexjyong/status/1542184851532423168</a> - Tweet regarding Drip iOS release</li>
<li><a class="text-break" href='https://floridaphoenix.com/2020/11/25/u-s-appeals-court-oks-use-of-third-party-app-data-to-track-down-suspected-child-molester/' target="_blank">https://floridaphoenix.com/2020/11/25/u-s-appeals-court-oks-use-of-third-party-app-data-to-track-down-suspected-child-molester/</a> - U.S. appeals court OKs use of third-party app data to track down suspected child molester</li>
<li><a class="text-break" href='https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html' target="_blank">https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html
</a> - Google is a dragnet for police</li>
<li><a class="text-break" href='https://www.ftc.gov/business-guidance/blog/2021/01/health-app-broke-its-privacy-promises-disclosing-intimate-details-about-users' target="_blank">https://www.ftc.gov/business-guidance/blog/2021/01/health-app-broke-its-privacy-promises-disclosing-intimate-details-about-users
</a> - Health app broke its privacy promises by disclosing intimate details about users</li>
</ul>
You should uninstall F-Droid - Part 12022-06-19T10:00:00+00:002022-12-26T10:00:00+00:00https://sideofburritos.com/blog/you-should-uninstall-fdroid-pt1/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/IzpVI4zaso0" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://privsec.dev/posts/android/f-droid-security-issues/' target="_blank">https://privsec.dev/posts/android/f-droid-security-issues/</a> - Main article referenced on F-Droid</li>
<li><a class="text-break" href='https://en.wikipedia.org/wiki/Android_version_history#Android_7.0_Nougat' target="_blank">https://en.wikipedia.org/wiki/Android_version_history#Android_7.0_Nougat</a> - Android version history</li>
<li><a class="text-break" href='https://developer.android.com/studio/releases/platforms' target="_blank">https://developer.android.com/studio/releases/platforms</a> - SDK Releases</li>
<li><a class="text-break" href='https://gitlab.com/fdroid/fdroidclient/-/blob/2a8b16683a2dbee16d624a58e7dd3ea1da772fbd/app/build.gradle#L33' target="_blank">https://gitlab.com/fdroid/fdroidclient/-/blob/2a8b16683a2dbee16d624a58e7dd3ea1da772fbd/app/build.gradle#L33</a> - F-Droid code showing legacy SDK</li>
<li><a class="text-break" href='https://github.com/NeoApplications/Neo-Store' target="_blank">https://github.com/NeoApplications/Neo-Store</a> - Droidi-fy</li>
<li><a class="text-break" href='https://f-droid.org' target="_blank">https://f-droid.org</a> - F-Droid homepage</li>
<li><a class="text-break" href='https://discuss.grapheneos.org/d/16-f-droid-auto-updates/4' target="_blank">https://discuss.grapheneos.org/d/16-f-droid-auto-updates/4</a> - F-Droid discussion on auto-updates</li>
</ul>
Apple is still tracking you.2022-06-05T14:51:16+00:002022-08-10T14:51:16+00:00https://sideofburritos.com/blog/apple-is-still-tracking-you/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/5oJAjXLaN7k" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://www.emarketer.com/content/apple-ad-revenues-skyrocket-amid-its-privacy-changes' target="_blank">https://www.emarketer.com/content/apple-ad-revenues-skyrocket-amid-its-privacy-changes</a> - Apple ad revenues skyrocket amid its privacy changes</li>
<li><a class="text-break" href='https://www.ft.com/content/074b881f-a931-4986-888e-2ac53e286b9d' target="_blank">https://www.ft.com/content/074b881f-a931-4986-888e-2ac53e286b9d</a> - Appleβs privacy changes create windfall for its own advertising business</li>
<li><a class="text-break" href='https://www.ft.com/content/69396795-f6e1-4624-95d8-121e4e5d7839' target="_blank">https://www.ft.com/content/69396795-f6e1-4624-95d8-121e4e5d7839</a> - Apple reaches quiet truce over iPhone privacy changes</li>
<li><a class="text-break" href='https://developer.apple.com/app-store/app-privacy-details/' target="_blank">https://developer.apple.com/app-store/app-privacy-details/</a> - App privacy details on the App Store</li>
<li><a class="text-break" href='https://jamesfriend.com.au/pce-js/pce-js-apps/' target="_blank">https://jamesfriend.com.au/pce-js/pce-js-apps/</a> - Classic Mac terminal emulator</li>
<li><a class="text-break" href='https://blackkite.com/data-breaches-caused-by-third-parties/' target="_blank">https://blackkite.com/data-breaches-caused-by-third-parties/</a> - Data breaches caused by third parties</li>
</ul>
iCloud Private Relay explained WITH demo2022-05-29T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/icloud-private-relay-explained/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/S6_PgcykP10" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF' target="_blank">https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF</a> - iCloud Private Relay Technical Overview</li>
<li><a class="text-break" href='https://blog.cloudflare.com/icloud-private-relay/' target="_blank">https://blog.cloudflare.com/icloud-private-relay/</a></li>
<li><a class="text-break" href='https://developer.apple.com/support/prepare-your-network-for-icloud-private-relay/' target="_blank">https://developer.apple.com/support/prepare-your-network-for-icloud-private-relay/</a></li>
<li><a class="text-break" href='https://support.apple.com/guide/icloud/set-up-icloud-private-relay-mm7dc25cb68f/icloud' target="_blank">https://support.apple.com/guide/icloud/set-up-icloud-private-relay-mm7dc25cb68f/icloud</a> - How to setup on Apple devices</li>
<li><a class="text-break" href='https://mask-api.icloud.com/egress-ip-ranges.csv' target="_blank">https://mask-api.icloud.com/egress-ip-ranges.csv</a> - iCloud Private Relay IP Ranges</li>
<li><a class="text-break" href='https://www.ftc.gov/news-events/news/press-releases/2021/10/ftc-staff-report-finds-many-internet-service-providers-collect-troves-personal-data-users-have-few' target="_blank">https://www.ftc.gov/news-events/news/press-releases/2021/10/ftc-staff-report-finds-many-internet-service-providers-collect-troves-personal-data-users-have-few</a> - US ISP's collecting user data</li>
<li><a class="text-break" href='https://www.ftc.gov/reports/look-what-isps-know-about-you-examining-privacy-practices-six-major-internet-service-providers' target="_blank">https://www.ftc.gov/reports/look-what-isps-know-about-you-examining-privacy-practices-six-major-internet-service-providers</a> - US ISPs privacy practices</li>
</ul>
GrapheneOS Profiles - Work Profiles vs User Profiles | Shelter & Insular2022-05-22T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/grapheneos-profiles-work-vs-user/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/20C0FD7mGDY" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://www.reddit.com/r/GrapheneOS/comments/g0ly0j/islandshelter_on_grapheneos/' target="_blank">https://www.reddit.com/r/GrapheneOS/comments/g0ly0j/islandshelter_on_grapheneos/</a></li>
<li><a class="text-break" href='https://developer.android.com/work/managed-profiles' target="_blank">https://developer.android.com/work/managed-profiles</a> - Android Work Profile Details</li>
<li><a class="text-break" href='https://www.reddit.com/r/GrapheneOS/comments/fpc2av/apps_are_meant_to_be_able_to_enumerate_other_apps/' target="_blank">https://www.reddit.com/r/GrapheneOS/comments/fpc2av/apps_are_meant_to_be_able_to_enumerate_other_apps/</a></li>
<li><a class="text-break" href='https://grapheneos.org/faq#encryption' target="_blank">https://grapheneos.org/faq#encryption</a></li>
</ul>
Most Secure Phone 2022 | DeGoogle Your Phone | Google Pixel 6?2022-05-22T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/most-secure-phone-2022/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/1nj3vnHvn84" target="_blank">Video Link</a></h2>
<hr />
<center>
<img src="Pixel Secure Environments.webp" alt="Pixel Secure Environments">
<figcaption>Pixel Secure Environments - <a href="https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html" target="_blank">Source</a></figcaption>
<br>
</center>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html" target="_blank">https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html</a> - Pixel 6 New Security Features</li>
<li><a href="https://source.android.com/security/biometric" target="_blank">https://source.android.com/security/biometric</a></li>
<li><a href="https://www.wired.com/story/google-pixel-6-tensor-chip-security/" target="_blank">https://www.wired.com/story/google-pixel-6-tensor-chip-security/</a></li>
<li><a href="https://www.engadget.com/google-tensor-soc-pixel-6-chip-170059466.html" target="_blank">https://www.engadget.com/google-tensor-soc-pixel-6-chip-170059466.html</a></li>
<li><a href="https://cpl.thalesgroup.com/2014/01/14/random-numbers-and-cryptography" target="_blank">https://cpl.thalesgroup.com/2014/01/14/random-numbers-and-cryptography</a></li>
<li><a href="https://www.androidcentral.com/what-titan-security-module" target="_blank">https://www.androidcentral.com/what-titan-security-module</a></li>
<li><a href="https://www.androidcentral.com/how-does-google-titan-m2-and-tensor-security-core-work" target="_blank">https://www.androidcentral.com/how-does-google-titan-m2-and-tensor-security-core-work</a></li>
<li><a href="https://www.androidcentral.com/what-titan-security-module" target="_blank">https://www.androidcentral.com/what-titan-security-module</a></li>
<li><a href="https://source.android.com/security/trusty" target="_blank">https://source.android.com/security/trusty</a></li>
<li><a href="https://arstechnica.com/gadgets/2021/11/pixel-6-review-google-hardware-finally-lives-up-to-its-potential/" target="_blank">https://arstechnica.com/gadgets/2021/11/pixel-6-review-google-hardware-finally-lives-up-to-its-potential/</a></li>
</ul>
Secure Contacts Storage | Free Cloud Storage Android | Nextcloud2022-05-22T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/secure-contacts-app/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/NJzA9yRGgeM" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://nextcloud.com" target="_blank">https://nextcloud.com</a> Nextcloud Homepage</li>
<li><a href="https://nextcloud.com/signup/" target="_blank">https://nextcloud.com/signup/</a> - Nextcloud Account Signup</li>
<li><a href="https://www.howtogeek.com/448829/how-to-export-apple-icloud-and-iphone-contacts-to-windows-10/" target="_blank">https://www.howtogeek.com/448829/how-to-export-apple-icloud-and-iphone-contacts-to-windows-10/</a> - How to export iCloud contacts</li>
<li><a href="https://support.google.com/contacts/answer/7199294?hl=en&co=GENIE.Platform=Desktop" target="_blank">https://support.google.com/contacts/answer/7199294?hl=en&co=GENIE.Platform=Desktop</a> - How to export Google Contacts</li>
</ul>
You should uninstall F-Droid - Part 22022-05-22T10:00:00+00:002022-08-22T10:00:00+00:00https://sideofburritos.com/blog/you-should-uninstall-fdroid-pt2/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/lAbgeJau3eE" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://privsec.dev/posts/android/f-droid-security-issues/' target="_blank">https://privsec.dev/posts/android/f-droid-security-issues/</a> - Main article referenced on F-Droid</li>
<li><a class="text-break" href='https://github.com/signalapp/Signal-Android/issues/127' target="_blank">https://github.com/signalapp/Signal-Android/issues/127</a> - GitHub issue regarding Signal/TextSecure</li>
<li><a class="text-break" href='https://en.wikipedia.org/wiki/Moxie_Marlinspike' target="_blank">https://en.wikipedia.org/wiki/Moxie_Marlinspike</a> - Moxie Marlinspike</li>
<li><a class="text-break" href='https://www.digicert.com/blog/certificate-pinning-what-is-certificate-pinning' target="_blank">https://www.digicert.com/blog/certificate-pinning-what-is-certificate-pinning</a> - Certificate Pinning</li>
<li><a class="text-break" href='https://f-droid.org/en/docs/Reproducible_Builds/' target="_blank">https://f-droid.org/en/docs/Reproducible_Builds/</a> - F-Droid build process</li>
<li><a class="text-break" href='https://arxiv.org/pdf/1904.05572.pdf' target="_blank">https://arxiv.org/pdf/1904.05572.pdf</a> - Android Playform Security Model</li>
<li><a class="text-break" href='https://forum.f-droid.org/t/why-does-the-f-droid-website-nearly-always-host-an-outdated-f-droid-apk/6234' target="_blank">https://forum.f-droid.org/t/why-does-the-f-droid-website-nearly-always-host-an-outdated-f-droid-apk/6234</a> - f-droid.org hosting out of date APK</li>
</ul>
So you just installed GrapheneOS, now what?2022-05-14T14:51:16+00:002022-08-10T14:51:16+00:00https://sideofburritos.com/blog/just-installed-grapheneos/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/to67NVB7qo8" target="_blank">Video Link</a></h2>
<hr />
<h2 id="other-tutorial-videos-referenced">Other tutorial videos referenced</h2>
<ul>
<li><a class="text-break" href='https://youtu.be/ocwznyrMVwE' target="_blank">https://youtu.be/ocwznyrMVwE</a> - GrapheneOS calendar setup</li>
<li><a class="text-break" href='https://youtu.be/NJzA9yRGgeM' target="_blank">https://youtu.be/NJzA9yRGgeM</a> - GrapheneOS contacts setup</li>
<li><a class="text-break" href='https://youtu.be/eyWmcItzisk' target="_blank">https://youtu.be/eyWmcItzisk</a> - GrapheneOS phone backup</li>
<li><a class="text-break" href='https://youtu.be/SZ0PKtiXTSs' target="_blank">https://youtu.be/SZ0PKtiXTSs</a> - GrapheneOS Google Play Services install</li>
</ul>
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://attestation.app/about' target="_blank">https://attestation.app/about</a> - Auditor App details</li>
<li><a class="text-break" href='https://github.com/GrapheneOS/Vanadium' target="_blank">https://github.com/GrapheneOS/Vanadium</a> - Vanadium Browser details</li>
<li><a class="text-break" href='https://f-droid.org' target="_blank">https://f-droid.org</a> - F-Droid Store</li>
<li><a class="text-break" href='https://auroraoss.com' target="_blank">https://auroraoss.com</a> - Aurora Store</li>
</ul>
UPDATED - GrapheneOS Google Services | Sandboxed Play Services | How to install2022-05-08T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/grapheneos-google-services-updated/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/SZ0PKtiXTSs" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://grapheneos.org/usage#sandboxed-google-play" target="_blank">https://grapheneos.org/usage#sandboxed-google-play</a> - GrapheneOS - Sandboxed Play Services Instructions</li>
<li><a href="https://twitter.com/GrapheneOS/status/1514199657362169861" target="_blank">https://twitter.com/GrapheneOS/status/1514199657362169861</a> - Tweet about new features</li>
</ul>
I tried the DuckDuckGo Privacy Browser :( - My first impressions2022-05-01T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/duckduckgo-privacy-browser-first-impressions/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/Oc6GqapVyz4" target="_blank">Video Link</a></h2>
<hr />
<h2 id="how-to-apply-to-the-browser-beta">How to apply to the browser beta</h2>
<ol>
<li>Install the DuckDuckGo mobile app</li>
<li>Open the app β select the 3 vertical dots in the upper right corner β click Settings</li>
<li>Scroll down to the section labeled <code>More From DuckDuckGo</code></li>
<li>Select <code>DuckDuckGo Desktop App</code> β press <code>Join waitlist</code></li>
</ol>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://spreadprivacy.com/introducing-duckduckgo-for-mac/' target="_blank">https://spreadprivacy.com/introducing-duckduckgo-for-mac/</a> - Official DDG blog post</li>
<li><a class="text-break" href='https://twitter.com/yegg/status/1501716484761997318' target="_blank">https://twitter.com/yegg/status/1501716484761997318</a> - DDG Tweet about down-ranking</li>
<li><a class="text-break" href='https://torrentfreak.com/duckduckgo-removes-pirate-sites-and-youtube-dl-from-its-search-results-220415/' target="_blank">https://torrentfreak.com/duckduckgo-removes-pirate-sites-and-youtube-dl-from-its-search-results-220415/</a> - TF article about DDG removing pirate sites from results</li>
<li><a class="text-break" href='https://en.wikipedia.org/wiki/Do_Not_Track' target="_blank">https://en.wikipedia.org/wiki/Do_Not_Track</a> - Do Not Track HTTP header</li>
</ul>
uBlock Origin - Bounce Tracking Prevention | Browser Privacy2022-04-24T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/ublock-origin-bounce-tracking-prevention/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/DZQvTc-t9js" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://github.com/gorhill/uBlock/wiki/Strict-blocking' target="_blank">https://github.com/gorhill/uBlock/wiki/Strict-blocking</a> - uBlock Origin example documented</li>
<li><a class="text-break" href='https://www.pcgamingwiki.com/wiki/Dead_Rising_2' target="_blank">https://www.pcgamingwiki.com/wiki/Dead_Rising_2</a> - You can click the "Green Man Gaming" link here if you want to follow along</li>
<li><a class="text-break" href='https://www.dpbolvw.net/click-6723194-10912384?url=https://www.greenmangaming.com/games/dead-rising-2/?tap_a=1964-996bbb&tap_s=341948-7fd0d2' target="_blank">https://www.dpbolvw.net/click-6723194-10912384?url=https://www.greenmangaming.com/games/dead-rising-2/?tap_a=1964-996bbb&tap_s=341948-7fd0d2</a> - <strong>Direct link to click tracker, only click if you have uBlock Origin installed</strong></li>
<li><a class="text-break" href='https://en.wikipedia.org/wiki/Query_string' target="_blank">https://en.wikipedia.org/wiki/Query_string</a></li>
<li><a class="text-break" href='https://brave.com/privacy-updates/8-grab-bag-2/' target="_blank">https://brave.com/privacy-updates/8-grab-bag-2/</a></li>
<li><a class="text-break" href='https://arstechnica.com/information-technology/2022/03/brave-has-a-plan-to-stymie-websites-that-override-your-privacy-settings/?comments=1' target="_blank">https://arstechnica.com/information-technology/2022/03/brave-has-a-plan-to-stymie-websites-that-override-your-privacy-settings/?comments=1</a></li>
<li><a class="text-break" href='https://brave.com/privacy-updates/16-unlinkable-bouncing/' target="_blank">https://brave.com/privacy-updates/16-unlinkable-bouncing/</a></li>
<li><a class="text-break" href='https://brave.com/privacy-updates/8-grab-bag-2/' target="_blank">https://brave.com/privacy-updates/8-grab-bag-2/</a></li>
<li><a class="text-break" href='https://www.pcgamingwiki.com/wiki/Dead_Rising_2' target="_blank">https://www.pcgamingwiki.com/wiki/Dead_Rising_2</a></li>
<li><a class="text-break" href='https://forums.tomshardware.com/threads/http-www-dpbolvw-net-whenever-i-click-a-link-it-redirects-me-here.940336/' target="_blank">https://forums.tomshardware.com/threads/http-www-dpbolvw-net-whenever-i-click-a-link-it-redirects-me-here.940336/</a></li>
</ul>
<h2 id="ublock-origin-download-links">uBlock Origin Download Links</h2>
<ul>
<li><a class="text-break" href='https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm' target="_blank">https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm</a> - Chrome/Chromium</li>
<li><a class="text-break" href='https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/' target="_blank">https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/</a> - Firefox</li>
<li><a class="text-break" href='https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak?node=10232440011' target="_blank">https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak?node=10232440011</a> - Microsoft Edge</li>
</ul>
Browser Privacy | Cookieless Tracking - ETag2022-04-17T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/browser-privacy-cookieless-tracking-etag/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/rsET1-e0acc" target="_blank">Video Link</a></h2>
<hr />
<h2 id="firefox-users">Firefox Users</h2>
<p>For some reason, I wasn't able to get Firefox to send a blank header even with the <code>Empty header mode</code> enabled. Perhaps it's something with the browser. As a workaround, enter a <code>space</code> in the <code>Value</code> box once you get to step 5. Click the <code>Value</code> box, and hit your space bar once. After that, everything should work as expected. If you know why it's not working, please [reach out]({{< ref "contact/index.md" >}}).</p>
<hr />
<h2 id="how-to-send-an-empty-if-none-match-http-header">How to send an empty 'If-None-Match' HTTP header</h2>
<ol>
<li>Download and install the extension/add-on <code>ModHeader</code> for your browser (links below)</li>
<li>After the install has completed, click the icon in the menu bar.</li>
<li>Click the <code>+</code> and click <code>Request Header</code>.</li>
<li>In the <code>Name</code> box enter <code>If-None-Match</code>. Since we want to send an empty header, leave the <code>Value</code> box empty (Firefox users enter a space).</li>
</ol>
<h3 id="in-order-to-send-an-empty-header-we-much-enable-the-option-in-the-extension-add-on">In order to send an empty header, we much enable the option in the extension/add-on.</h3>
<ol>
<li>Click the 3 vertical dots in the top right corner of the extension/add-on settings box.</li>
<li>Scroll to the bottom where you will see the heading <code>Empty header mode</code>.</li>
<li>Select the <code>Send empty header</code> option.</li>
</ol>
<p>Your configuration should look similar to the following image:
<img src="Browser Privacy Cookieless Tracking - ETag - ModHeader Config.webp" alt="Browser Privacy Cookieless Tracking ETag - ModHeader Config"></p>
<p>At this point your browser is now configured to send an empty <code>If-None-Match</code> HTTP Header. To test, visit the follow URL - <a href='https://hinternesch.com/page1.html' target="_blank">https://hinternesch.com/page1.html</a>. If everything is working as expected, you should see <code>Your ID is .</code> if you see something else, then it's not working as expected.</p>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://levelup.gitconnected.com/no-cookies-no-problem-using-etags-for-user-tracking-3e745544176b' target="_blank">https://levelup.gitconnected.com/no-cookies-no-problem-using-etags-for-user-tracking-3e745544176b</a> - Main article referenced</li>
<li><a class="text-break" href='https://hinternesch.com/page1.html' target="_blank">https://hinternesch.com/page1.html</a> - ETag tracking example website from article</li>
<li><a class="text-break" href='https://www.wendys.com/cookies-and-tracking-2020' target="_blank">https://www.wendys.com/cookies-and-tracking-2020</a> - Wendy's Cookies and Tracking Policy</li>
<li><a class="text-break" href='https://developer.mozilla.org/en-US/docs/Web/HTTP/Caching' target="_blank">https://developer.mozilla.org/en-US/docs/Web/HTTP/Caching</a> - Mozillia HTTP caching wiki</li>
</ul>
<h2 id="modheader-download-links">ModHeader Download Links</h2>
<ul>
<li><a class="text-break" href='https://chrome.google.com/webstore/detail/modheader/idgpnmonknjnojddfkpgkljpfnnfcklj' target="_blank">https://chrome.google.com/webstore/detail/modheader/idgpnmonknjnojddfkpgkljpfnnfcklj</a> - Chrome/Chromium</li>
<li><a class="text-break" href='https://addons.mozilla.org/en-US/firefox/addon/modheader-firefox/' target="_blank">https://addons.mozilla.org/en-US/firefox/addon/modheader-firefox/</a> - Mozillia Firefox</li>
<li><a class="text-break" href='https://microsoftedge.microsoft.com/addons/detail/modheader/opgbiafapkbbnbnjcdomjaghbckfkglc' target="_blank">https://microsoftedge.microsoft.com/addons/detail/modheader/opgbiafapkbbnbnjcdomjaghbckfkglc</a> - Microsoft Edge</li>
</ul>
Browser Cookies and Privacy2022-04-09T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/browser-cookies-and-privacy/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/qI2EDsBurQQ" target="_blank">Video Link</a></h2>
<hr />
<h2 id="blocking-cookies">Blocking Cookies</h2>
<h3 id="how-to-block-third-party-cookies-in-firefox">How to block Third-Party Cookies in Firefox</h3>
<ol>
<li>Click the hamburger (settings) menu in the top right β select settings.</li>
<li>Select <code>Privacy & Security</code> on the left.</li>
<li>Under <code>Enhanced Tracking Protection</code> select <code>Custom</code></li>
<li>Check the <code>Cookies</code> box, click the dropdown next to it, and select <code>All third-party cookies</code></li>
<li>BONUS - Also check the boxes for <code>Tracking content</code>, <code>Cryptominers</code>, and <code>Fingerprinters</code>.</li>
</ol>
<h3 id="how-to-block-third-party-cookies-in-chrome-chromium">How to block Third-Party Cookies in Chrome/Chromium</h3>
<ol>
<li>Click the vertical 3 dot menu in the top right β select settings.</li>
<li>Select <code>Privacy and Security</code> on the left.</li>
<li>Click <code>Cookies and other site data</code></li>
<li>Under <code>Generatl settings</code> select the <code>Block third-party cookies</code> radio button.</li>
</ol>
<h3 id="how-to-block-third-party-cookies-in-safari">How to block Third-Party Cookies in Safari</h3>
<ol>
<li>Click <code>Safari</code> in the top menu bar and select <code>Preferences...</code>.</li>
<li>Select the <code>Privacy</code> tab.</li>
<li>Check the box next to <code>Website tracking:</code> that says <code>Prevent cross-site tracking</code></li>
</ol>
<h3 id="how-to-block-third-party-cookies-in-microsoft-edge">How to block Third-Party Cookies in Microsoft Edge</h3>
<ol>
<li>Download <a href="https://www.mozilla.org/en-US/firefox/new/" target="_blank">Firefox</a>...just kidding.</li>
<li>Click the horizontal 3 dot menu in the top right β select settings.</li>
<li>Select <code>Cookies and site permissions</code> on the left.</li>
<li>Under <code>Cookies and data stored</code> click <code>Manage and delete cookies and site data</code>.</li>
<li>Click the button next to <code>Block third-party cookies</code>.</li>
</ol>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href='https://www.facesofopensource.com/person/lou-montulli/' target="_blank">https://www.facesofopensource.com/person/lou-montulli/</a> - Stunning photos of individuals who contributed to the development and advancement of Open Source Software.</li>
<li><a class="text-break" href='https://www.techopedia.com/definition/8207/magic-cookie' target="_blank">https://www.techopedia.com/definition/8207/magic-cookie</a></li>
<li><a class="text-break" href='https://www.cnet.com/tech/services-and-software/aol-buys-netscape-for-4-2-billion/' target="_blank">https://www.cnet.com/tech/services-and-software/aol-buys-netscape-for-4-2-billion/</a></li>
<li><a class="text-break" href='https://www.cookiepro.com/knowledge/what-is-a-session-cookie/' target="_blank">https://www.cookiepro.com/knowledge/what-is-a-session-cookie/</a></li>
<li><a class="text-break" href='https://www.invisibly.com/learn-blog/companies-selling-your-personal-data' target="_blank">https://www.invisibly.com/learn-blog/companies-selling-your-personal-data</a></li>
<li><a class="text-break" href='https://www.cloudflare.com/learning/privacy/what-are-cookies/' target="_blank">https://www.cloudflare.com/learning/privacy/what-are-cookies/</a></li>
<li><a class="text-break" href='https://en.wikipedia.org/wiki/Shopping_cart_software' target="_blank">https://en.wikipedia.org/wiki/Shopping_cart_software</a></li>
<li><a class="text-break" href='https://en.wikipedia.org/wiki/HTTP_cookie' target="_blank">https://en.wikipedia.org/wiki/HTTP_cookie</a></li>
</ul>
Privacy Online | Apple and Meta Shared User Data with Hackers2022-04-03T14:51:16+00:002022-08-10T14:51:16+00:00https://sideofburritos.com/blog/apple-meta-shared-data-with-hackers/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/mW3a1R1T_vA" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a class="text-break" href="https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/" target="_blank">https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/</a> - Main article referenced, highly suggest you give it a read</li>
<li><a class="text-break" href="https://www.statista.com/statistics/191694/number-of-law-enforcement-officers-in-the-us/" target="_blank">https://www.statista.com/statistics/191694/number-of-law-enforcement-officers-in-the-us/</a> - United States Police Stats</li>
<li><a class="text-break" href="https://www.bloomberg.com/news/articles/2022-03-30/apple-meta-gave-user-data-to-hackers-who-forged-legal-requests" target="_blank">https://www.bloomberg.com/news/articles/2022-03-30/apple-meta-gave-user-data-to-hackers-who-forged-legal-requests</a></li>
<li><a class="text-break" href="https://www.fakenamegenerator.com/" target="_blank">https://www.fakenamegenerator.com/</a> - Fake Name Generator</li>
</ul>
<h2 id="articles-shown-in-intro">Articles shown in intro</h2>
<ul>
<li><a class="text-break" href="https://www.medianama.com/2022/03/223-nidhi-suresh-twitter-instagram-hack/" target="_blank">https://www.medianama.com/2022/03/223-nidhi-suresh-twitter-instagram-hack/</a></li>
<li><a class="text-break" href="https://blockworks.co/the-ronin-hacker-made-off-with-625m-of-crypto-but-cashing-out-isnt-so-easy/" target="_blank">https://blockworks.co/the-ronin-hacker-made-off-with-625m-of-crypto-but-cashing-out-isnt-so-easy/</a></li>
<li><a class="text-break" href="https://www.securityweek.com/lapsus-claims-hack-it-giant-globant-after-arrests-alleged-members" target="_blank">https://www.securityweek.com/lapsus-claims-hack-it-giant-globant-after-arrests-alleged-members</a></li>
</ul>
3 Best Open Source Android Apps2022-03-27T12:57:39+00:002022-08-21T12:57:39+00:00https://sideofburritos.com/blog/3-best-open-source-android-apps/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/GucI1BgpgkU" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://www.bromite.org/" target="_blank">https://www.bromite.org/</a> Bromite Homepage</li>
<li><a href="https://github.com/bromite/bromite" target="_blank">https://github.com/bromite/bromite</a> - Bromite GitHub</li>
<li><a href="https://github.com/xarantolus/filtrite" target="_blank">https://github.com/xarantolus/filtrite</a> - Bromite Alternate Blocklist</li>
<li><a href="https://newpipe.net/" target="_blank">https://newpipe.net/</a> - NewPipe Homepage</li>
<li><a href="https://github.com/TeamNewPipe/NewPipe/" target="_blank">https://github.com/TeamNewPipe/NewPipe/</a> - NewPipe GitHub</li>
<li><a href="https://github.com/TeamNewPipe/NewPipe/issues/7734" target="_blank">https://github.com/TeamNewPipe/NewPipe/issues/7734</a> - NewPipe GitHub Issues Example</li>
<li><a href="https://trackercontrol.org/" target="_blank">https://trackercontrol.org/</a> - TrackerControl Homepage</li>
<li><a href="https://github.com/TeamNewPipe/NewPipe/" target="_blank">https://github.com/TrackerControl</a> - TrackerControl GitHub</li>
<li><a href="https://f-droid.org" target="_blank">https://f-droid.org</a> - F-Droid App Store</li>
</ul>
<hr />
<h2 id="how-to-add-bromite-f-droid-repository">How to add Bromite F-Droid Repository</h2>
<ol>
<li>Open F-Droid</li>
<li>Select <code>Settings</code> on the bottom</li>
<li>Under the <code>My Apps</code> section, select <code>Repositories</code></li>
<li>Click the <code>+</code> in the upper right corner</li>
<li>Go to the following URL in your browser and copy the <code>Address</code> listed on the page - <a href="https://www.bromite.org/fdroid" target="_blank">https://www.bromite.org/fdroid</a></li>
<li>Go back to F-Droid and add the <code>Address</code> you copied in the <code>Repository address</code> box</li>
<li>Optional (but suggested) - go back to the webpage in step 5 and copy the <code>Fingerprint of the signing key</code></li>
<li>Go back to F-Droid and paste the <code>Fingerprint of the signing key</code> in the <code>Fingerprint</code> box</li>
<li>Go back to the main page on F-Droid, pull down to manually refresh the repositories</li>
<li>Once the refresh has finished, search for <code>Bromite</code> and install the app</li>
</ol>
Secure Calendar Storage | Free Cloud Storage | Android Nextcloud2022-03-20T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/secure-calendar-app/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/ocwznyrMVwE" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://nextcloud.com" target="_blank">https://nextcloud.com</a> Nextcloud Homepage</li>
<li><a href="https://nextcloud.com/signup/" target="_blank">https://nextcloud.com/signup/</a> - Nextcloud Account Signup</li>
<li><a href="https://f-droid.org" target="_blank">https://f-droid.org</a> - F-Droid App Store</li>
<li><a href="https://www.akruto.com/backup-phone-contacts-calendar/export-icloud-calendar-as-ical/" target="_blank">https://www.akruto.com/backup-phone-contacts-calendar/export-icloud-calendar-as-ical/</a> - How to export iCloud calendar</li>
<li><a href="https://support.google.com/calendar/answer/37111?hl=en" target="_blank">https://support.google.com/calendar/answer/37111?hl=en</a> - How to export Google Calendar</li>
</ul>
OSI Model Explained | 7 Layer | CCNA | Computer Network2022-02-14T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/osi-model-explained/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/knPRYkd_WWc" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://www.osi-model.com/" target="_blank">https://www.osi-model.com/</a></li>
<li><a href="https://bytexd.com/osi-model/" target="_blank">https://bytexd.com/osi-model/</a> - Very detailed article</li>
<li><a href="https://medium.com/swlh/understanding-the-osi-model-fa429397324" target="_blank">https://medium.com/swlh/understanding-the-osi-model-fa429397324</a></li>
<li><a href="https://en.wikipedia.org/wiki/OSI_model" target="_blank">https://en.wikipedia.org/wiki/OSI_model</a></li>
<li><a href="https://www.cloudflare.com/learning/network-layer/what-is-a-packet/" target="_blank">https://www.cloudflare.com/learning/network-layer/what-is-a-packet/</a></li>
<li><a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/" target="_blank">https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/</a></li>
</ul>
OUTDATED - GrapheneOS Google Services | Sandboxed Google Play | How to install2022-02-06T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/grapheneos-google-services/<hr />
<h3 id="this-guide-is-out-of-date-please-watch-the-movie-camera-updated-video">This guide is out of date. Please watch the π₯ <a href="https://youtu.be/SZ0PKtiXTSs" target="_blank">updated video</a></h3>
CalyxOS Review | 3 weeks with a DeGoogled Phone | Secure & Private Mobile OS2022-01-30T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/calyxos-review/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/_yyKNJrI71k" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://calyxos.org" target="_blank">https://calyxos.org</a> - CalyxOS Homepage</li>
<li><a href="https://microg.org" target="_blank">https://microg.org</a> - microG Homepage</li>
<li><a href="https://www.chromium.org/" target="_blank">https://www.chromium.org</a> - Chromium Homepage</li>
<li><a href="https://tarnkappe.info/interviews/microg-android-almost-without-google-our-interview-with-the-developer-41258.html" target="_blank">https://tarnkappe.info/interviews/microg-android-almost-without-google-our-interview-with-the-developer-41258.html</a> - Interview with microG developer</li>
<li><a href="https://www.statista.com/statistics/1224510/time-spent-per-day-on-smartphone-us/" target="_blank">https://www.statista.com/statistics/1224510/time-spent-per-day-on-smartphone-us/</a> - Phone Usage Statistics</li>
<li><a href="https://forum.xda-developers.com/t/index-how-to-get-signature-spoofing-support.3557047/" target="_blank">https://forum.xda-developers.com/t/index-how-to-get-signature-spoofing-support.3557047/</a> - Signature Spoofing</li>
</ul>
How to Install Stock Android on Google Pixel2022-01-23T12:57:39+00:002022-08-23T12:57:39+00:00https://sideofburritos.com/blog/how-to-install-stock-android-on-pixel/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/TIHG1j0yylc" target="_blank">Video Link</a></h2>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://flash.android.com" target="_blank">https://flash.android.com</a> - Android Flash Tool</li>
<li><a href="https://grapheneos.org/install/web" target="_blank">https://grapheneos.org/install/web</a> - GrapheneOS Web Install (Used to remove non-stock key)</li>
</ul>
How to install GrapheneOS on Google Pixel 6 (Pixel 6 Pro) | DeGoogled Phone2022-01-16T12:57:39+00:002022-08-23T12:57:39+00:00https://sideofburritos.com/blog/how-to-install-grapheneos-on-pixel6/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/ro5OsVk8OfE" target="_blank">Video Link</a></h2>
<hr />
<h2 id="commands-referenced-in-video">Commands referenced in video</h2>
<p>If you're on Arch Linux or Debian/Ubuntu, use the following commands to install as non-root:</p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">sudo pacman -S android-udev
</code></pre>
<p>Arch Linux</p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">sudo apt install android-sdk-platform-tools-common
</code></pre>
<p>Debian/Ubuntu</p>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://grapheneos.org" target="_blank">https://grapheneos.org</a> - GrapheneOS Homepage</li>
<li><a href="https://grapheneos.org/install/web" target="_blank">https://grapheneos.org/install/web</a> - GrapheneOS Web Install</li>
<li><a href="https://www.chromium.org/getting-involved/download-chromium/" target="_blank">https://www.chromium.org/getting-involved/download-chromium/</a> - Download Chromium</li>
<li><a href="https://developer.android.com/studio/run/win-usb" target="_blank">https://developer.android.com/studio/run/win-usb</a> - Windows Users - Google USB Driver - Fastboot</li>
<li><a href="https://developer.android.com/studio/run/oem-usb#InstallingDriver" target="_blank">https://developer.android.com/studio/run/oem-usb#InstallingDriver</a> - How to install Windows Drivers with Device Manager</li>
</ul>
Best Secure Messaging App | FBI Document Leaked2021-12-13T10:00:00+00:002022-12-24T10:00:00+00:00https://sideofburritos.com/blog/best-secure-messaging-app-2021/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/wj-aR96FOA0" target="_blank">Video Link</a></h2>
<hr />
<p><a href="FBIs-Ability-to-Legally-Access-Secure-Messaging-App-Content-and-Metadata.png" target="_blank">Full Size Image</a> -
To download a full-size copy of the image, <code>Right-Click</code> the <code>Full Size Image</code> link and select <code>Save Link As</code></p>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://www.npr.org/2018/06/07/588068536/wikipedia-jimmy-wales" target="_blank">https://www.npr.org/2018/06/07/588068536/wikipedia-jimmy-wales</a> - Podcast interview with Jimmy Wales (Wikipedia Founder)</li>
<li><a href="https://www.foia.gov/about.html" target="_blank">https://www.foia.gov/about.html</a> - What is a FOIA request</li>
<li><a href="https://therecord.media/fbi-document-shows-what-data-can-be-obtained-from-encrypted-messaging-apps/" target="_blank">https://therecord.media/fbi-document-shows-what-data-can-be-obtained-from-encrypted-messaging-apps/</a> - Transcribed FBI Document</li>
<li><a href="https://propertyofthepeople.org/document-detail/?doc-id=21114562" target="_blank">https://propertyofthepeople.org/document-detail/?doc-id=21114562</a> - Original FBI Document Disclosure</li>
<li><a href="https://www.law.cornell.edu/uscode/text/18/2703" target="_blank">https://www.law.cornell.edu/uscode/text/18/2703</a> - 18 U.S. Code Β§ 2703 - Required disclosure of customer communications or records</li>
<li><a href="https://faq.whatsapp.com/general/chats/about-end-to-end-encrypted-backup" target="_blank">https://faq.whatsapp.com/general/chats/about-end-to-end-encrypted-backup</a> - WhatsApp E2EE</li>
<li><a href="https://faq.whatsapp.com/iphone/chats/how-to-turn-off-icloud-backup" target="_blank">https://faq.whatsapp.com/iphone/chats/how-to-turn-off-icloud-backup</a> - WhatsApp turn off iCloud Backup</li>
<li><a href="https://telegram.org/faq" target="_blank">https://telegram.org/faq</a> - Details about telegrams E2EE</li>
<li><a href="https://signal.org" target="_blank">https://signal.org</a> - Signal Messaging App</li>
</ul>
How to install CalyxOS on Android using Microsoft Windows (Google Pixel)2021-11-29T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/how-to-install-calyxos-on-android-windows/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/cgpAvce1mLI" target="_blank">Video Link</a></h2>
<hr />
<h2 id="commands-referenced-for-video">Commands referenced for video</h2>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">cd Downloads
</code></pre>
<p>Change to the directory of the files we downloaded earlier β <a href="https://youtu.be/cgpAvce1mLI?t=345" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">dir
</code></pre>
<p>Show the contents of the directory β <a href="https://youtu.be/cgpAvce1mLI?t=354" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">CertUtil -hashfile device-flasher.exe SHA256
</code></pre>
<p>OPTIONAL β Verify device-flasher β <a href="https://youtu.be/cgpAvce1mLI?t=360" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">CertUtil -hashfile redfin-factory-202112110.zip SHA256
</code></pre>
<p>OPTIONAL β Verify CalyxOS image β <a href="https://youtu.be/cgpAvce1mLI?t=423" target="_blank">Link to section in video</a></p>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://calyxos.org" target="_blank">https://calyxos.org</a></li>
</ul>
How to install CalyxOS on Android using Linux Ubuntu (Google Pixel) 2021-11-22T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/how-to-install-calyxos-on-android-linux/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/wSv_KH6pfts" target="_blank">Video Link</a></h2>
<hr />
<h2 id="commands-referenced-for-video">Commands referenced for video</h2>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">sudo apt update
</code></pre>
<p>Update local repositories β <a href="https://youtu.be/wSv_KH6pfts?t=184" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">sudo apt install android-sdk-platform-tools-common
</code></pre>
<p>Install required packages β <a href="https://youtu.be/wSv_KH6pfts?t=200" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">sudo apt install adb
</code></pre>
<p>Install Android Debug Bridge β <a href="https://youtu.be/wSv_KH6pfts?t=206" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">cd ~/Downloads
</code></pre>
<p>Change directory to where files were downloaded β <a href="https://youtu.be/wSv_KH6pfts?t=264" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">sha256sum device-flasher.linux
</code></pre>
<p>OPTIONAL β Verify device-flasher β <a href="https://youtu.be/wSv_KH6pfts?t=254" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">sha256sum redfin-factory-202112110.zip
</code></pre>
<p>OPTIONAL β Verify CalyxOS image β <a href="https://youtu.be/wSv_KH6pfts?t=327" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">chmod +x device-flasher.linux
</code></pre>
<p>Make device-flash executable β <a href="https://youtu.be/wSv_KH6pfts?t=388" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">./device-flasher.linux
</code></pre>
<p>Execute device-flasher.linux β <a href="https://youtu.be/wSv_KH6pfts?t=400" target="_blank">Link to section in video</a></p>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://calyxos.org" target="_blank">https://calyxos.org</a></li>
</ul>
How to install CalyxOS on Android using a Mac (Google Pixel)2021-11-15T12:57:39+00:002022-08-22T12:57:39+00:00https://sideofburritos.com/blog/how-to-install-calyxos-on-android-mac/<h2 id="movie-camera-video-link">π₯ <a href="https://youtu.be/OYpeRlYEmns" target="_blank">Video Link</a></h2>
<hr />
<h2 id="commands-referenced-for-video">Commands referenced for video</h2>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">cd ~/Downloads/calyxos
</code></pre>
<p>Change Directory (if stored in your downloads folder). If you named the folder differently, then change βcalyxosβ to what you named it β <a href="https://youtu.be/OYpeRlYEmns?t=178" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">shasum -a 256 device-flasher.darwin
</code></pre>
<p>OPTIONAL β Verify device-flasher β <a href="https://youtu.be/OYpeRlYEmns?t=196" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">shasum -a 256 redfin-factory-number_in_file_name.zip
</code></pre>
<p>OPTIONAL β Verify CalyxOS image β <a href="https://youtu.be/OYpeRlYEmns?t=265" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">pwd
</code></pre>
<p>Print Working directory β <a href="https://youtu.be/OYpeRlYEmns?t=331" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">cd ~/Downloads/calyxos
</code></pre>
<p>Change to the directory of the files we downloaded earlier β <a href="https://youtu.be/OYpeRlYEmns?t=344" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">chmod +x device-flasher.darwin
</code></pre>
<p>Make device-flasher.darwin executable β <a href="https://youtu.be/OYpeRlYEmns?t=381" target="_blank">Link to section in video</a></p>
<pre data-lang="bash" class="language-bash "><code class="language-bash" data-lang="bash">./device-flasher.darwin
</code></pre>
<p>Execute device-flasher.darwin β <a href="https://youtu.be/OYpeRlYEmns?t=395" target="_blank">Link to section in video</a></p>
<hr />
<h2 id="links-referenced-for-video">Links referenced for video</h2>
<ul>
<li><a href="https://calyxos.org" target="_blank">https://calyxos.org</a></li>
</ul>