I’ve found great success using a hardened ssh config with a limited set of supported Cyphers
/MACs
/KexAlgorithms
. Nothing ever gets far enough to even trigger fail2ban
. Then of course it’s key only login from there.
I’ve found great success using a hardened ssh config with a limited set of supported Cyphers
/MACs
/KexAlgorithms
. Nothing ever gets far enough to even trigger fail2ban
. Then of course it’s key only login from there.
Agree with others, Vaultwarden is probably your best bet. I’ve found the default app to be a little flaky, but ended up using Keyguard, which I’ve found really good.
I used to use Keypass+Syncthing, but found sync conflicts too often (due to Syncthing support for Android), hence the switch.
Completely aside from what he was doing in Russia, he gives me the same vibe as Ché Cook from The OC.
Ostensibly, that’s because the app wants Bluetooth and/or WiFi access so it can connect to the printer. Because you can use WiFi and Bluetooth to determine location (based on large crowd sourced databases of these data points that have been geolocated), the OS has to ask for location permission as well, even if you just need to see WiFi and Bluetooth.
That being said, once they have this permission, I have 0 doubt they log the actual location as well…
Mozilla used to run a free service for this, and collected that data in the background using mobile Firefox. A replacement is https://beacondb.net/, which is still building enough location data to become useful. Services like this aren’t nefarious, they’re actually really important in getting a quick GPS lock on mobile. Phone hardware actually have pretty poor GPS receivers, but if you can determine an approximate location prior, you get much better results, especially once supplemented with inertial measurements and snapping to mapped roads.