Well, are you a millionaire yet? We're all dying to know!
/s
ISPs are generally all equally as bad (except for Spectrum. They're probably the worst.). I stay with my ISP because they've never once complained about any of the torrenting I've done.
Having worked in penetration testing before, one tool I used to query SQL databases represented unknown characters as an underscore (_
) before the character gets brute forced.
Bonus story: I used to set the hostname for my phone as a transparent character, so it wouldn't visibly show up if someone ever did a network scan. I accidentally fooled myself with this while doing a network scan, and got frustrated why the "mystery device" wouldn't load a hostname.
I'm going to parrot what people in the GrapheneOS community would say: "The most secure place to get apps from is Accrescent. If an app isn't available there, the next best place is the Play Store itself with an anonymous Google account." Some bother to add that Obtainium+AppVerifier can be used if it isn't available for either of those methods. Anyways, they're very stingy about where they get their apps from.
Here is my take: Despite claims of F-Droid and Aurora Store having security issues, I don't care. It's based on your threat model and personal preference. Google may soon be forced to open up Play Store apps to more third parties, so more secure methods of getting them may crop up in the future. You'll really never have a 100% private way to get apps, that's the unfortunate reality of how things are. If your threat model is against Google and supply chain attacks, those limit your options down to some less-than-convenient methods. If you do decide to use AppVerifier, do note that you only need to verify the hash once and you're good for the rest of your phone's life.
Thank you! I tried my best to get things back on track ASAP, but GitHub's support ticket system was in an outage at the time. I'm just happy to get it resolved.
The fork you are thinking of is Tenacity. They explain in their history why it was made. Yes, Audacity was bought by Muse Group. There were talks of adding trackers, but nothing ever actually got added. They changed the privacy policy at one point, but reverted it after backlash. The reason I am keeping Audacity there is because I believe it is better to have quick security/feature updates from upstream (Audacity) so long as the upstream project does not have any current code issues that warrant a fork (Tenacity). If Audacity ever does add any telemetry, etc. I will absolutely change it to Tenacity.
Good to know, thanks for the insight!
Trail Sense mentioned in my list has options for tracking hiking progress. Unfortunately, open source health apps are few and far between.
Vorta is made in 99.2% Python, I wouldn't give it such a hard time!
Edit: calibre and SearXNG also both have Python as the majority language
What would keep people from just taking a stolen phone to t-mo to have them unlock it without this?
Phones can be marked as lost/stolen by reporting the device's IMEI number, but this one was not flagged under any suspicious activity. The owner simply didn't carrier unlock it, for whatever reason.
You need to make sure the phone is unlocked before you buy it.
The reason I ended up with a carrier locked phone is because of miscommunication that wasn't on my end. The phone I intended to buy was carrier unlocked.
It financially supports OpenWrt, for one :)