Recent comments

Veritas0 OP wrote

I guess I should use Void because I have used it and know the package manage (and even the OS) is fast. Past experience with OpenBSD has been slightly slow (at the cost of security), so it could also negatively impact the service. But then, should security be prioritised or performance on a overlay network like I2P? I don't know, what are your thoughts? I personally am leaning towards security.

1

jackal wrote

I have no experience with mixing Raspberry Pi and OpenBSD, but my default go-to is Void Linux, in my experience the best operating system you can install on a RPI, Void has a really fast package manager, even on slow SD cards. One of my redundant I2P routers is running on an RPI4 like yours, though I got 4GiB of RAM, works like a charm.

1

cumlord wrote

you can run some stuff off of that, i'd look for things that are light on memory requirements.

  • IRC servers run light, probably other chat servers minus matrix
  • java/i2p+ can host personal sites and have plugins for blog and zzzot open tracker with no extra overhead. You can reduce the wrapper memory usage. new zzzot uses less memory so i think if you give the router 256mb it should do fine, but can't confirm
  • js-free filehost or pastebin
  • books
  • radio
  • privacy frontends: we have lots of reddit ones now, how about a more rare one like libermbd or soundcloak
1

kuro wrote (edited )

He clearly lied about the police. If you want to know how things really are, here are some websites in English:

  • thebarentsobserver.com (I know the editors, some of them are from Russia)
  • meduza.io/en
  • en.zona.media
  • themoscowtimes.com
  • ovd.info/en
  • novayagazeta.eu
1

smallcat wrote

For me, the experience having tested i2p and tor I wonder why this is so unknown. We all need privacy after all. Also once you have the client it's pretty easy to use if you have basic tech skills (like knowing how to setup a proxy in your browser). I tried using outproxies for ease use (it's kinda annoying having to go back and forth from another window or browser to go to clearnet stuff) but I acknowledge tor is better for that and intended for it.

1

jackal wrote (edited )

Can we trust the Tor Foundation?

tldr: The Tor Foundation can't be trusted, the Tor network however can be trusted so long as you use it properly.

No, or at least that's what their public relations are telling me. They've been pushing hard to turn Tor into something else than an actual darknet. They keep pushing to turn the Tor network into a VPN to access clearnet "privately or anonymously" which makes less and less sense as time goes on.

Tor should be used the same way I2P is, privacy and anonymity exist so long you don't touch exit nodes or outproxies, and it seems their effort is more aimed at making sure people do not make the network bigger but rather they just use it as a VPN proxy for clearnet.

On the topic these videos discuss, it seems like all of these issues have to do precisely with the misuse of Tor as a proxy/VPN solution rather than as a darknet, I got a small comment on the useragent spoofing thing, though, that one seems sketchy, really sketchy, and apparently everyone involved seems to be throwing back bullshit reasons to justify why not even general.useragent.override is working (as I realized a moment ago).

2

jackal wrote (edited )

Privacy in the real world has less to do with buying fancy gadgets and more to do with habits and what kind of clothing you wear.

An few obvious suggestions are that you wear hats and sunglasses when outside, trucker hats are widespread and make you harder to identify, they're a good choice to obfuscate your face while not drawing too much attention, if you wear or use IR devices which will deliberately tamper or make identification harder you will draw a lot of attention, those should be reserved for riots or similar scenarios where confrontation is expected, not for daily use. Along with this suggestion comes another good one of avoiding "eye contact" with surveillance cameras; whenever you enter a public spaces and buildings or a big private business, always assume you're being surveilled, don't look for cameras because if you can see them clearly they can also see your face features, Luigi Mangione got easily identified because he did this exact mistake, multiple times, even though he did try to obfuscate his face.

On the corporates collecting your data to study your purchase habits you can always pay on cash and refuse to pay with a credit or debit card, or a phone, because they (both businesses and banks) will use those transactions to guess your income and how much you spend and where, never buy anything on a business that doesn't accept cash, even if they accept cryptos which I doubt you'll find any, always buy in cash. If a business such as a supermarket offers you discounts with a membership card you can try to cheat the system by providing fake names and identities if they ask for one, if they do not allow an anonymous member card then you can assume those discounts are being paid with your purchase habits and you're giving your consent if you accept them, so reject those discounts at all times if possible.

Another good suggestion and more on the hardcore side is to never, ever tattoo yourself, and if you have tattoos that are on visible places such as arms or legs consider covering them or ideally getting rid of them. Cops love tattoos, because they're akin to fingerprints that can be used to consistently identify people even if they cover their faces.

1

fgFUKTG445F OP wrote

some people don't have a strong PC to use a virtual machine effectively and some people don't want to use there own computer to browse I2p and I used tails with I2p but it's not that effective to use and you need to connect to TOR which is not the best network for speed and you know the news about TOR and the USA and Europe and stuff like that.

1

fgFUKTG445F OP wrote

Hi. I'm back. sorry for being late. I have some stuff todo . and after some researching my stuff about my live os . it's mid and a$$ and I saw A lot of other live os like prestium and Obscurix (an arch based distro) and other distros and I decided to maybe to cancel my idea.

1

jackal wrote

Reply to comment by Saint_Cuthbert in Tor Browser on mobile by Gambino9

Will there be a choice to opt-out? Yeah, you'll probably get a button somewhere to express that you don't want to be spied at least if you're in Europe. Will there be any auditable method for them to prove that they do respect consent? Nope, they never truly cared about consent in the first place if they make these opt-out rather than opt-in, mostly because they know that if this was opt-in most people wouldn't use it as it doesn't benefit them.

The problem is that this software is proprietary, the phones are proprietary and they give far more control to Google, Apple, Samsung and manufacturers than users, that's exactly why we have the privacy and security nightmare we have today with smartphones, and they're trying the same moves on computers as well, albeit with less success.

Where could I research this matter further?

See every single top-notch/latest flagship smartphone being announced from any major brand: Samsung, Google and Apple are all selling local AI assistant as a feature on these upcoming phones.

1

jackal wrote

Tldr: Unless your phone is running Lineage, Graphene or similar, without Google/Facebook and such spyware you do not have privacy nor security.

The long explanation is that it depends on the phone and what operating system is running, a stock Android experience is not private nor secure by design so if you're doing something that could get you in trouble with the government you will want to do such on a proper computer running Linux. On the latest and upcoming phones surveillance is gonna get worse than merely big tech getting some telemetry data and profiling shenanigans, upcoming phones will have hardware acceleration to make LLMs and AI power efficient, they definitely can and will snoop through your shit 24/7, taking screenshots or even screen recording, piping them through the algorithm and sending the digested data directly to their servers, with high accuracy and bypassing computational constraints because your phone's hardware will be doing the heavy lifting.

3

cumlord wrote (edited )

yea use what you're gonna be most productive with. i2p+ has a good throttle/filter system that helps a lot, not a lot of problems because of that, but like if you try to host a wordpress site here with i2pd you're gonna have a bad time

sort of fun challenge for me to try doing stuff without js, depends what you wanna do though, but get pretty far using some combination of frames refresh and cookies. http://simp.i2p/chat is jank, no doubt, but, no js needed lmao. possibly relevant to your security outfit, the chat page http://simp.i2p/botcheck attempts to do a bot challenge with css. unless you're specifically worried about bot spam that's completely unnecessary, just giving some ideas for stuff that can be done without js

lots of neat css tricks out there, like http://simp.i2p/search the styled dropdown is a checkbox, and http://gatheryourparty.i2p has a star rating on the posts but the stars are radio buttons. snex has that one setup with a ruby backend

not so familiar with those ecosystems, but think it's a little slower getting started like this but once you've got some templates it gets faster ;)

2