![](https://lemmy.ml/pictrs/image/c5d69289-72c1-4bde-9437-1fb665354aa4.jpeg)
![](https://lemmy.ml/pictrs/image/f4a8a699-27b5-406c-a15c-aa96a0acf5a9.webp)
Not in the US. A phone “purchased” on contract is carrier locked and you can’t unlock the bootloader, which needs to be done in order to install a different OS.
Security and privacy professional. Currently testing and evaluating Signal username staging application.
Not in the US. A phone “purchased” on contract is carrier locked and you can’t unlock the bootloader, which needs to be done in order to install a different OS.
I believe NetGuard will act as a VPN. This will prevent you from using an actual VPN.
Since it is a free phone from a carrier it will be locked until the phone is “paid off” by keeping their service for a specified amount of time. Once that time has passed, then your best option is to have the carrier unlock it and install Graphene OS. Until then, there is not much you can do.
“helped” is very misleading. Companies can’t refuse to provide information they have when served a search warrant / court order. These companies DID NOT choose to provide the info on their own.
Can I add it to my Amazon wish list?
Why would you want to??
Doubt it is a watch issue, only started when the Bluetooth bug started with Graphene OS
The update did not fix the issue for me. Using a Pixel 6a with Graphene OS and a Samsung Galaxy Watch 5 Pro. The watch had been working just fine with Graphene OS until the recent OS changes.
Since the most recent update, nothing really improved. The watch had to be factory reset in order to get it to connect the the phone via Bluetooth. That worked for less than 5 hours and it lost connection to the phone and would not reconnect.
Still the only way to get it to reconnect it to factory reset the watch and re-pair it to the phone. Since that connection still only lasts less than 5 hours (sometimes on an hour or so), I’m tired of doing that and have quit wearing the watch.
Regarding: “On Android you can use [Stealth] . That’s what I use for searches that pull up Reddit posts.”
The stealth protocol does not have anything to do with accessing individual sites or services. The purpose of stealth is when trying to estata VPN connection to a provider that does not allow VPNs. For example, a public wifi that blocks VPN connections or some countries that require ISPs to block VPN connections.
Anytype has responded and I had a couple other clarifying questions. Their first response:
“Hi! In our privacy policy we include Amplitude & Sentry & explain why we work with them: anytype.io/app_privacy. Currently, you can opt-out by electing local-only or self-hosted network Mode”
Sentry is only used for bug tracking and I don’t have any issue or privacy concerns with that.
I had already looked on their website for a privacy policy and the only one I could locate was a website only privacy policy. I learned later that the application privacy policy is buried as a link somewhere within the website privacy policy. This is not very easy to find.
I reviewed the application privacy policy and it conflicted with their answer stating that a user could opt out of information sharing with Amplitude by using “local only” or “self-hosted”. So I pointed this out and posted this reply to them:
“Also, app privacy policy section for Amplitude states: Amplitude Analytics Purpose: deliver behavioral and app usage data. Opt-out possible: NO”
This is the response I received:
“Indeed this is outdated information, as it was written before self-hosting and local-only mode were properly configurable. Opt-out is now possible using these methods, and we will be updating the policy accordingly.”
Reach out to the job sites directly and report these as fraudulent. Ask them to remove the resume postings.
Also consider making accounts for her on these sites, may make it easier to prevent future posting and to remove any that do appear.
Then, since it sounds like you are her lawyer. Subpoena these sites for information on account, email address, IP address used for the fraudulent posts.
Agreed, grab AntennaPod from the f-droid store.
Well, when they have fake user data and can’t access any data from others apps…it means more than nothing.
The app sandboxing in Graphene is the perfect place to use them. All you need is the Galaxy Wear app. Maybe Samsung Health, but I think that is optional.
Along with the protections built into Graphene, I use an always on VPN; and 99% of my accounts use unique email addresses, usernames, and passwords for each account.
Has it fixed it? I shut off my Galaxy Watch 5 Pro since I had to reset and re-pair it multiple times a day. Now I’m on vacation and didn’t even bring it with me.
I looked at some of these on my own and found:
graylog provides data privacy and protection services for companies offering software as a service (SaaS). So this seems legit to me and needed for their core functionality. It is not a marketing or data analytics company.
amplitude appears to be a data analytics company and on the surface is not needed and Anytype should explain this.
sentry appears to be an application error tracking company and this seems a legit connection
api2 seems like a generic server name and likely needed for their core functionality, this seems legit to me
telemetry also seems like a generic server name; however, the purpose, based on its name does not seem to be needed. Anytype should explain this as well.
I’ve contacted Anytype about this and will post their response.
I run Graphene OS on my phone and have an always on VPN connection. Plus I use a different email address, username, and password for 99% of my accounts. So I don’t worry about telemetry, analytics, or data marketing anymore.
Agreed, they are continually improving it
I use Anytype (anytype.io) on my phone and desktop. I make a page for each trip and add screenshots of confirmations, maps, itinerary, etc.
Anytype is similar to Notion but is open source and encrypted locally.
Apparently not, I have a Pixel 8 Pro that I got free on a promotion from AT&T. The bootloader is locked on it and grayed out.