<p>Israel has been oppressing Palestinians for decades now. They have taken their land and resources. I refuse to support such a country and you should too. It is not just about preventing yourself from buying Israeli products but also buying products from companies that support Israel. These companies may be providing military aid, tracking technology or just money in general. I noticed that there are no sources which have an extensible list of companies that support Israel. This is why I wrote this post to make supporting the Palestinian cause easier.</p>
<p>Keep in mind that Israeli products' barcodes start with 729. However, this may not always be the case. Be sure to check with the supplier.</p>
<p>Keep in mind that Israeli products&#39; barcodes start with 729. However, this may not always be the case. Be sure to check with the supplier.</p>
<p><strong>THIS LIST WILL KEEP BEING UPDATED. SOURCES FOR EACH COMPANY SUPPORTING ISRAEL WILL BE ADDED.</strong></p>
<title>Domain, Email & PGP Keys Changed</title>
<link>https://sufyaan.me/domain/</link>
<guid>https://sufyaan.me/domain/</guid>
<pubDate>Thu, 06 Oct 2023 17:53:00 GMT</pubDate>
@ -218,8 +218,8 @@
<pubDate>Thu, 22 Sep 2023 14:42:30 GMT</pubDate>
<description>
<p>Your smartphone keyboard is an astoundingly sensitive piece of software. You use it to type everything from the most innocent of messages to the most crucial passwords. In terms of messaging on encrypted chat applications like Session or Signal, your smartphone keyboard bypasses encryption. They could know what you are searching about even on private search engines like SearX. This is because your keystrokes are unencrypted. With respect to passwords, your smartphone keyboard, if invasive, can potentially view your bank account details. This means that an individual who can access your smartphone keyboard does not need to utilize advanced techniques to view your data. Therefore, in terms of trust, you should make sure you absolutely trust your smartphone keyboard not to store your written text.</p>
<p>When you keep the above statements in mind, it gets unhealthily fear-inducing when you read how <ahref="https://www.androidauthority.com/swiftkey-suspends-service-data-leak-706680/">SwiftKey had a cloud syncing glitch which led to users being able to view other users' email addresses.</a> It is also scary how <ahref="https://www.zdnet.com/article/600m-samsung-galaxy-phones-at-security-risk-due-to-pre-installed-keyboard-flaw/">SwiftKey that shipped by default on 600M Samsung Galaxy smartphones had a vulnerability that allowed hackers to setup a proxy server to access sensors and install apps without the user knowing.</a> There was also a keyboard called ai.type that had over 40M users. Out of these, <ahref="https://www.zdnet.com/article/popular-virtual-keyboard-leaks-31-million-user-data/">31M users had their data leaked because the MongoDB database had no password.</a> This included information like <ahref="https://mackeeper.com/blog/data-breach-reports-2017/">phone numbers, full names, device names and models, screen resolution, Android version, IMSI and IMEI numbers, email addresses, country of residence, social media profiles, IP addresses and even locations.</a></p>
<p>What is the solution to this madness? Fortunately, if you are on Android, you have <ahref="../definitions/free-software"style="color:#50fa7b">free software</a> options. By using <ahref="../definitions/free-software"style="color:#50fa7b">free software</a> keyboards, you can ensure that none of your keystrokes are stored or sent to a server. This brings us to <ahref="https://anysoftkeyboard.github.io/">AnySoftKeyboard</a>. AnySoftKeyboard is a free, libre and open-source keyboard for Android that has multiple modes, layouts, theme customizations and more. It has all the features you would expect. Gesture typing, keyboard effects, corrections, emojis, you name it. Most importantly, it does not track any of your keystrokes. I have been using it for almost an year. It has been fast and efficient due to the minimalism and has saved me a lot of time. It has many niche features like a terminal layout that has arrows, tabs, pipes and forward slashes for ease of use in Android terminal emulators like <ahref="https://termux.dev/en/">Termux</a>.</p><p>If you are on an iPhone, the best option is ironically Gboard. You can block Gboard's tracking using iOS' tracker blocking. Gboard does not log the text you store and instead uses federated learning to improve its autocorrect. There are no private options for an iPhone so it is better to choose the best out of two evils.</p>
<p>When you keep the above statements in mind, it gets unhealthily fear-inducing when you read how <ahref="https://www.androidauthority.com/swiftkey-suspends-service-data-leak-706680/">SwiftKey had a cloud syncing glitch which led to users being able to view other users&#39; email addresses.</a> It is also scary how <ahref="https://www.zdnet.com/article/600m-samsung-galaxy-phones-at-security-risk-due-to-pre-installed-keyboard-flaw/">SwiftKey that shipped by default on 600M Samsung Galaxy smartphones had a vulnerability that allowed hackers to setup a proxy server to access sensors and install apps without the user knowing.</a> There was also a keyboard called ai.type that had over 40M users. Out of these, <ahref="https://www.zdnet.com/article/popular-virtual-keyboard-leaks-31-million-user-data/">31M users had their data leaked because the MongoDB database had no password.</a> This included information like <ahref="https://mackeeper.com/blog/data-breach-reports-2017/">phone numbers, full names, device names and models, screen resolution, Android version, IMSI and IMEI numbers, email addresses, country of residence, social media profiles, IP addresses and even locations.</a></p>
<p>What is the solution to this madness? Fortunately, if you are on Android, you have <ahref="../definitions/free-software"style="color:#50fa7b">free software</a> options. By using <ahref="../definitions/free-software"style="color:#50fa7b">free software</a> keyboards, you can ensure that none of your keystrokes are stored or sent to a server. This brings us to <ahref="https://anysoftkeyboard.github.io/">AnySoftKeyboard</a>. AnySoftKeyboard is a free, libre and open-source keyboard for Android that has multiple modes, layouts, theme customizations and more. It has all the features you would expect. Gesture typing, keyboard effects, corrections, emojis, you name it. Most importantly, it does not track any of your keystrokes. I have been using it for almost an year. It has been fast and efficient due to the minimalism and has saved me a lot of time. It has many niche features like a terminal layout that has arrows, tabs, pipes and forward slashes for ease of use in Android terminal emulators like <ahref="https://termux.dev/en/">Termux</a>.</p><p>If you are on an iPhone, the best option is ironically Gboard. You can block Gboard&#39;s tracking using iOS&#39; tracker blocking. Gboard does not log the text you store and instead uses federated learning to improve its autocorrect. There are no private options for an iPhone so it is better to choose the best out of two evils.</p>
<p>All in all, the keyboard you use should be a factor for everyone. Use a different keyboard and do not use the default one unless you are on <ahref="https://lineageos.org/">LineageOS</a> or <ahref="https://grapheneos.org/">GrapheneOS</a>.</p>
</description>
</item>
@ -413,13 +413,13 @@
<h2>3-2-1 Backup Rule</h2>
<p>The 3-2-1 backup rule is a rule that many people recommend following to remember to take proper backups. Here is the meaning of each of the numbers:</p>
<ol>
<li><strong>Three Copies</strong>: The "3" in the rule means that you should at least three copies of your data. This includes your original data, so you should have at least your original data along with two other copies. The advantage of having these many copies is that it is the perfect balance of simplicity and redundancy.</li>
<li><strong>Two Different Media</strong>: The "2" in the rule means that you should have your backups on at least two different media types. This may include physical (external SSD, NAS) and digital (server you own, cloud storage) backups.</li>
<li><strong>One Off-site Copy</strong>: The "1" in the rule means that you should have at least one off-site copy. Off-site in this case means somewhere other than your main home or regular backup methods. This can be an encrypted external hard drive that you leave at your relative's house, for example.</li>
<li><strong>Three Copies</strong>: The &quot;3&quot; in the rule means that you should at least three copies of your data. This includes your original data, so you should have at least your original data along with two other copies. The advantage of having these many copies is that it is the perfect balance of simplicity and redundancy.</li>
<li><strong>Two Different Media</strong>: The &quot;2&quot; in the rule means that you should have your backups on at least two different media types. This may include physical (external SSD, NAS) and digital (server you own, cloud storage) backups.</li>
<li><strong>One Off-site Copy</strong>: The &quot;1&quot; in the rule means that you should have at least one off-site copy. Off-site in this case means somewhere other than your main home or regular backup methods. This can be an encrypted external hard drive that you leave at your relative&#39;s house, for example.</li>
</ol>
<p>It is important to note that these rules are not a plan for everyone, and are instead meant as a base for your backup plans. The least important data that you own should at least be backed up using the base 3-2-1 backup plan.</p>
<p>When it comes to using Big Tech's invasive services, you have to be extremely careful since they do not respect your privacy at all. At the bare minimum, you should be encrypting the files you upload if they are even of a little importance to you.</p>
<p>When it comes to using Big Tech&#39;s invasive services, you have to be extremely careful since they do not respect your privacy at all. At the bare minimum, you should be encrypting the files you upload if they are even of a little importance to you.</p>
<p>A popular program for file and drive encryption is VeraCrypt. To learn how to use it in detail, <ahref="https://yewtu.be/watch?v=cxo8xosH_TI">watch this video</a>. The overall process goes like this:</p>
<ol>
<li>Create a new encrypted file specifying the password and other details like total space.</li>