Mastodon | @Andromxda@hachyderm.io |
---|
Change your DNS resolver to one of these https://www.privacyguides.org/en/dns/
Yes, there are no limitations. I’ve been using it since January and it’s been fantastic. Just keep in mind that there are multiple versions of Molly, and UnifiedPush support is not included in the main version. You either need to pull the APK from the mollyim-android-unifiedpush repo, or add the Molly F-Droid repo and download the UnifiedPush version from there.
For the UnifiedPush client, you just need to download ntfy from F-Droid, GitHub or Google Play, go to the settings, set the server to https://ntfy.adminforge.de
, and set the Connection protocol to WebSockets. In the Molly-UnifiedPush app, go to Settings -> Notifications, set the server to https://molly.adminforge.de
and set the Delivery Method to UnifiedPush. I know that my explanation wasn’t particularly great, but it should work. Will soon post a better guide to !unifiedpush@lemmy.dbzer0.com
Try Molly, it’s a fork of the Signal client for Android, which improves battery life (even with WebSockets) or alternatively allows you to use UnifiedPush. Signal doesn’t support UP natively, but Molly has created a bridge called mollysocket, which takes Signal notifications and forwards them to your UnifiedPush server of choice. You can self-host it, or just use a public instance like https://adminforge.de/services/mollysocket/. They also host an instance of ntfy (UnifiedPush server) at ntfy.adminforge.de. If you have questions on how to set this up, feel free to DM me. But it’s pretty easy and you don’t need to self-host anything. And it’s perfectly secure, because although the mollysocket server is added as a linked device in Signal, it doesn’t get the encryption keys to your messages. So it can’t decrypt your messages or see the content of your notifications.
Signal has their own implementation of notifications, which uses WebSockets. It works, and it doesn’t rely on Google, but it eats up battery like crazy. If every app did this, you would have a battery life of an hour. That’s why UnifiedPush is a better solution.
I tried using Jerboa and found it to be incredibly buggy and poorly designed. Not sure what’s going on there, considering that it’s the official mobile app made by the Lemmy devs
Probably people who have been using Boost for Reddit before and now want the same experience but for Lemmy
That’s what you get for using a proprietary Lemmy app. Switch to Thunder, it doesn’t have ads, it’s open source and in my opinion has the best UI out of all Lemmy apps. Also support the development and join their community: !thunder_app@lemmy.world
I recommend NextDNS, it allows you to block ads, trackers and other unwanted stuff on the DNS level. Check out this video: https://neat.tube/w/19r4YnE6fpce6e2B9MepnB
Ok now I get what you mean - I fully agree. UserVoice really sucks as a platform, but there aren’t many good alternatives and I imagine they don’t let you migrate and move the existing feature requests, so Proton is stuck with them.
There is Sign in with SimpleLogin, which is a Proton subsidiary
Average DB experience
I wouldn’t go to Yandex directly, just enable it in SearXNG
It also has an option to search 1337x, The Pirate Bay, SolidTorrents and other sites directly
There’s AirVPN
No, they don’t have access to that
China has no IP
mildly amusing infuriating
Let’s not forget the dozens of big tech companies run by absolute morons that bring products that nobody wants or needs and only stay afloat due to legacy, stealing data & selling it, and/or venture capital.
You just described Twitter/X
Calyx is unfortunately pretty slow to release security patches, uses privileged apps with root access like microG and the F-Droid privileged extension by default and doesn’t really provide any unique features. All of the privacy features of Calyx are either already present or can be easily replicated in a better form on GrapheneOS. Take Datura Firewall, it’s yet another privileged app with root access which adds unnecessary attack surface, and is less secure than the Graphene equivalent. GrapheneOS implements a network permission toggle, which is embedded in Android’s native permission manager and uses the INTERNET permission to restrict network access. It disables both direct and indirect network access, including the local device network (localhost). GrapheneOS also has a bunch of unique security features, that can’t be found on any other Android ROM, like for example a hardened memory allocator, hardened kernel, secure app spawning, improved SELInux policies, Duress PIN/Password, driver-level USB-C control, Storage Scopes, Contact Scopes and soon App Communication Scopes. GrapheneOS also includes Sandboxed Google Play services, a better GMS implementation than microG, which doesn’t require root and has better app compatibility.