• 0 Posts
  • 31 Comments
Joined 4 years ago
cake
Cake day: March 21st, 2021

help-circle

  • its very easy to install via docker as mentioned above. Mumble is very lightweight. You could run the server on your desktop in the background easily or even on your router, there is a package for openwrt. The sound quality is awesome, voice is e2e encrypted and bandwidth should not be a problem either for a couple of people in the chat while you are playing.







  • I have been using ps3 controllers on Linux for a couple of years now. They are dead cheap used but you might need to replace the batteries if you need to use them wirelessly. The drivers were included in popos, so plug and play basically. Just get a compatible bluetooth USB dongle, or maybe the deck already has Bluetooth? The original ps3 controllers are very sturdy and work reliably. I would still be using my old ps2 controllers, which are basically the same, but the usb adapters seem to brake way to often and wireless play is rather convenient.




  • Could you explain why you wouldn’t use it?

    I’ve been using it for a couple of years and am happy with it, it grants an extra layer of security I think, if you can wipe the device when lost/stolen. Also very handy if you misplaced the phone and its set to not ring, as with this it will ring at full volume. You don’t need to use their server for the app to function, if that is your concern. I use a secondary device from my household. You can send a text message to your phone to let it ring even when its set to silent mode/get its location/or even wipe it remotely.


  • Ok, yeah, you’ve got a point I think. But one could argue if microg is enabled by default, at least some info might leak to google as their push servers are contacted and a device id is created (even if the data is anonymized to some extend.). (Depending on if these settings are enabled by default in microg which I am not sure of).

    Here’s some info from the divestOS faq (cmp.: https://divestos.org/pages/faq):

    "Anything important I should know about microG?¶

    The 'Google device registration' and 'Google SafetyNet' options WILL make microG connect to Google servers.
    The 'Cloud Messaging' option WILL make microG maintain a persistent connection to Google servers.
    The 'Cloud Messaging' option does NOT require a Google account.
    The 'Google SafetyNet' option WILL download and execute proprietary obfuscated code from Google and is strongly NOT recommended.
    While microG itself is open source, any apps talking to it will do so using the proprietary Google Play Services library."
    

    It goes on to provide some guidelines if you want to use microg:

    How should I configure microG?¶

    "Depending on the apps you want to use there are a few different ways you can use microG.

    Some apps don't need microG but check that they were installed via Play, in this case you only need microG Companion/FakeStore and to install the app via `Aurora Store` (via session installer) or `Obtainium`. This mechanism only works on 18.1+ currently, adb workaround still necessary on older versions.
    Some apps will work with microG simply installed without any Google connections, in this case it is strongly recommended to revoke Network permission from the microG app.
    Some apps need push notifications via Google, for them you must let microG maintain a persistent identifiable connection to Google. Enable 'Google device registration' and 'Cloud Messaging' in microG.
    Some apps require a captcha to be performed by the user, for them you can enable the 'Google SafetyNet' option.
    Some apps require SafetyNet to work, while the option to enable it currently exists it will not work in the unprivileged mode that DivestOS uses and will be removed in a future update."
    

    So depending on your thread model, you still would want to disable some of the options in microg to have absolutely no leakage of data to google. For example I am not comfortable any more with using push notifications since it was revealed that state actors use this info to tail users communications.