Recent comments
smartypants wrote
smartypants wrote
Reply to I miss my old man. by RealDonaldTrump
Then you should not have pushed him over that fence rail!
smartypants wrote
Reply to Quad9 public domain name service moves to Switzerland for maximum internet privacy protection | Quad9 by Rambler
I tested it with 20 far-right domains and ZERO were blocked.
THANKS! I completed my tests.
Quad9 does not censor on behalf of ADL, JIDF, nor SPLC yet.
The sites it blocks that they claim they block are truly scam domains that phish from your retarded older relatives.
In case a public DNS blocks, you can use some others as fallbacks :
- 8.8.4.4 < google fast fast fast, but spys and logs you for making money
- 64.6.64.6 < verisign open
- 208.67.222.222 < OpenDNS
- 9.9.9.9 < Quad9 public DNS in europe
One of those on occasion blocked a famous far-right site that agitated the (((ADL)) but it was not permanent.
Quad9 is far too far from me to use it in all my routers and machines, but I will use it as a secondary and parallel search. I measure everything in my life in fractions of milliseconds and though I also have many of my own DNS servers, and caching, I do not live in Switzerland, though I love visiting it often.
smartypants wrote
Reply to Green Day - Holiday (Flash Jack Remix) by boobs
I have mixed feelings on this type of mix. (no pun intended)
mainly, as a big fan, and a person that toured a little on road with Green Day in 1994... they year they got famous... I tend to only like punkier stuff, but my brain also likes novelty in general.
As for trance,goa,shoegazer,dub step,dream pop,house,acid trance,hard style trance, bubble,Darkpsy, and fast electronica... all have their place in moderation.
smartypants wrote
Reply to comment by Rambler in Global Cloudflare outage reported. by Rambler
Good for you!
Alternatives to Cloudflare DDoS protection:
BitMitigate (one time banned a domain, but bans far less than CloudFlare)
Digital ocean
Imperva Incapsula
Dynu Dynamic DNS
ClouDNS.net
Neustar SiteProtect
JavaPipe
ArvanCloud
CloudLayar
Cloudflare censor bans sites with no warning, (23 hours sometimes).
Cloudflare also demands no private jevascript cryptography of payloads, and all traffic must be in clear and use an evil CLOUDFLARE SSL KEY on your behalf!!
Its true! NOt one actual private person to person message was ever sent on voat.co in history, because voat.co used Cloudflare and thus, ceded all actual true https ability and cloudflare stores and copies all traffic for feds, as Cloudflare often revealed.
smartypants wrote (edited )
Thank you for posting this story!
It has immense interest to me, from my ancient career of exploiting these chips and other related chips via renting scanning electron microscopes and peeling off obfuscation grid atop the good parts, and also "runtime glitching" (voltage, temp, amperage, clock jitter) to glean internal keys of production runs.
Not for fraud, but for selling crypto services... I was a white hat and part of a team of guys... or at least I mostly a white hat, but not a gray hat, nor black hat.
smartypants wrote
Is the driver really Sam Hyde!? Again!?
He can't keep getting away with it!:
https://files.catbox.moe/lexckd.mp4
https://v2.incogtube.com/watch?v=8iSXXL3Iz1E
SmokeyMeadow wrote
Reply to Checking your ability by BasedPatriot
Blacks can use the internet, they just need an app to connect them to whatever service they're using. Typing in www addresses is like the digital equivalent of a restaurant dress code.
RandomlyGeneratedUsername OP wrote (edited )
Reply to comment by Wahaha in Awesome Privacy: A curated list of tools and services that respect your privacy by RandomlyGeneratedUsername
Searx has multiple engines. If you're lucky enough, you can even get Google results. It must be Google bans Searx instances quickly because of heavy traffic or automated requests.
Wingless wrote
Reply to Report: TikTok Harvested MAC Addresses By Exploiting Android Loophole | SecurityWeek.Com by Rambler
We built the internet around having a special individualized identification code in every single computer whenever it tries to communicate ... but, nobody was going to use it, of course! Damn those Chinese for stealing the U.S. Government's intellectual spy property!
quandyalaterreux wrote
Reply to comment by RandomlyGeneratedUsername in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
Funding can influence a project pretty significantly.
Not when done in a completely transparent manner in which the funding's objectives are clearly stated (e.g. https://gitlab.torproject.org/legacy/trac/-/wikis/org/sponsors/Sponsor58 ).
RandomlyGeneratedUsername OP wrote (edited )
Reply to comment by quandyalaterreux in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
Funding can influence a project pretty significantly. Even mastodons like Linus Torvalds had to obey politics. Tor Project has been subjected by the diversity politics pretty quickly. You would expect more independence from rebellious cryptopunks.
RandomlyGeneratedUsername OP wrote
Reply to comment by smartypants in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
Well, there are three points: the Tor network, the Tor Browser and the Tor Project. Tor Browser is a patched Firefox with all its potential vulnerabilities, yep.
Wahaha wrote
Reply to comment by RandomlyGeneratedUsername in Awesome Privacy: A curated list of tools and services that respect your privacy by RandomlyGeneratedUsername
In that case you might also enjoy: https://github.com/mayfrost/guides/blob/master/ALTERNATIVES.md
Wahaha wrote
Reply to comment by BlackWinnerYoshi in Awesome Privacy: A curated list of tools and services that respect your privacy by RandomlyGeneratedUsername
If you put effort in you can also make Chrome privacy friendly (ungoogled-chromium), but I thought the point of this list should be to find stuff you don't have to expend such effort.
Searx has pretty good results.
Also, these things are just what leaked about DDG. Who knows what else there is we don't know about.
smartypants wrote
Reply to comment by Kalchaya in What features do you look for in a VPN? by Rambler
aka ..... ExpressVPN (in carribean domicile)
smartypants wrote
Reply to comment by RandomlyGeneratedUsername in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
OP did not talk about TOR, he talked about the often backdoor exploited TOR BROWSER
TOR BROWSER is not Tor!
Tor browser is often proven to have exploits and backdoors. Read my posts from today.
quandyalaterreux wrote
Reply to comment by RandomlyGeneratedUsername in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
There is a big difference between outlining Tor's weaknesses and giving consideration to other alternative projects one the one hand, and making classic FUD points (such as the ones on funding, or OMG Roger Dingledine did a talk with law enforcement).
nanoonanoo OP wrote
Reply to comment by Rambler in A working dark mode? by nanoonanoo
sorry foe late reply, don't come here much because of the white issue - hurts eyes
nanoonanoo OP wrote
Reply to comment by Rambler in A working dark mode? by nanoonanoo
site wide still getting areas of white behind panels of black, for instance rh side as you scroll down page turns white
bransonmagee wrote
Reply to comment by Kalchaya in Petition: Do not rollout Covid-19 vaccine passports by doginventer
It looks like the passports would actually report vaccine status, so getting a new passport now wouldn't help, because other countries could still bar you entry if you don't have proof that you're vaccinated.
They aren't planning to deny people new passports, just that without a vaccination you're not getting that special stamp that lets you travel most places.
The UK will not be requiring vaccines domestically, but the rest of the the world might require it if you want to visit.
RandomlyGeneratedUsername OP wrote
Reply to comment by quandyalaterreux in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
I think it's pretty balanced. Tor is one of the best privacy tools, no doubt, but we also should be on guard and consider alternative projects like I2P, Lokinet, etc.
smartypants wrote (edited )
NO!!! Tor browser dangerous to trust!
OVER three times Tor browser caught leaking hundreds of thousands of peoples IP addresses to FEDS, though the https traffic contents secure up to the endpoint.
TOR BROWSER in TAILS routinely has code inserted to subvert it, or borrows javascript code that has exploits in it known to FBI and NSA as proven in many federal court prosecution transcripts.
TOR BROWSER INSECURE FROM HOME, even if all javascript disabled (proven below)
HTTPS is secure, but sadly, once connected to https://ramble.pw or any https site, backdoor exploits added to tor browser , by NSA/CIA, in the form of "ACCIDENTAL CODE SUBMISSIONS" to tor browser used in TAILS, leaks your IP to the target. This means...
... that using one or even a chain of VPNS can have the ENDPOINT (https://ramble.pw or ISP of https://ramble.pw) exploit your TAILS tor browser via javascript (typically), or WebRTC (in the past) to LEARN YOUR ACTUAL TRUE IP ADDRESS!!!
This means that the HTTPS encrpyted traffic is still secure, end to end, but your IP address can still be logged using VPNS, by the endpoint.
Thse ways and means show up in federal court cases when FBI is forced to reveal tactics under a Judges order in court trials.
They for years tor browser in TAILS had hidden backdoors proven if you read the release notes of TAILS TAILS too? Yup, Even the famous https://tails.boum.org/
...had WebRTC enabled by accident (or by mossad on purpose) in past versions of TAILS, and if you read ALL THE CHANGE NOTES OF ALL VERSIONS you will learn I am telling the truth on the one little note they fessed up.
https://www.exploit-db.com/exploits/44403/
https://blog.ipvanish.com/webrtc-security-hole-leaks-real-ip-addresses/
https://thehackernews.com/2015/02/webrtc-leaks-vpn-ip-address.html
https://www.reddit.com/r/VPN/comments/2tva1o/websites_can_now_use_webrtc_to_determine_your/
That is NOT the only weakness in Tor browser, there were other non-WebRTC leaks!!!! Javascript (required for every free speech social site) and (required for Cloudflare) had exploits in summer 2019 that leaked endpoint IP addresses, and even allowed kernel level OS alteration on Mac OS using TAILS!!!!!! Many years of tails exploits prior too.
NO large web browser should EVER be trusted not to divulge IP addresses over VPN
Anyone trusting using TAILS along with its graphical browser, is a patsy. The rest are in prison already if they were criminals.
Only use text messaging , not a graphical web browser, when using TAILS, or tor services and VPNs! No fancy web browsers!
Even better, use a "one time visit" concealing gait and face, to a coffee shop.
Remember TOR/TAILS often runs unstoppable javascript using exploits by FBI, such as the infamous recent noscript vulnerability!...
https://www.netsparker.com/blog/web-security/noscript-vulnerability-tor-browser/
javascript code can cause lots of problems for your anonymity, and even root your machine , as in summer of 2019.
HTML5 fingerprints and indestructible cookies also thwart SOME VPN users too :
25% of sites fingerprint you using javascript (CloudFlare and others, require javascript to connect)
2020.08 : A quarter of the Alexa Top 10K websites are using browser fingerprinting scripts! https://www.zdnet.com/article/a-quarter-of-the-alexa-top-10k-websites-are-using-browser-fingerprinting-scripts/
In 2021, hundreds of research papers on novel fingerprinting techniques of browsers exist, and even I designed some using html5 graphics, not yet widely known by other researchers and not yet stopped in Google Chrome.
TAILS? use HiddenVM too
If you must try t connect to a https web site anonymously, use a hidden privacy VM OS and a set of privacy tools, at a public wifi :
https://github.com/aforensics/HiddenVM
https://news.ycombinator.com/item?id=22492343
There are many reasons why you may want to use HiddenVM.
whonix OS! inside HiddenVM, for TAILS on a USB, for coffeeshops or libraries: ...
I SUGGEST if you do not need OSX or Windows, to install Whonix secure Tor anonymization and TAILS inside your HiddenVM !!!
https://www.whonix.org/
TL/DR : Tor browser is not safe from home. NO CONNECTIONS MADE FROM YOUR HOME ARE SAFE FROM FBI/NSA if using a BROWSER, vs text chat. Hopping does nothing to protect HTTPS more than it already provides
quandyalaterreux wrote
This article is full of FUD. (e.g. whaaa Tor gets funds from DARPA! US gov is behind Tor!)
overvalley OP wrote
Reply to comment by RAMBLE1 in Multi-hop vpn and port forwarding by overvalley
There's an example and description at Mullvad for the two-hop connection: http://xcln5hkbriyklr6n.onion/en/help/wireguard-and-mullvad-vpn/ [Forgive the onion link, but search "wireguard-and-mullvad-vpn" for clearnet]
"Each WireGuard server is connected to all the other WireGuard servers through WireGuard tunnels."
The user gets confirmation that their target website sees the IP of the second node, but what does the ISP see? Aren't they routing to the first node (at least physically), and is it masked as the second node? Does the tunnel between nodes become redundant as the user connection tunnels through the entry node to the exit node?
Nodes/servers
Is it wrong to use "nodes" in this scenario