Recent comments

overvalley OP wrote

There's an example and description at Mullvad for the two-hop connection: http://xcln5hkbriyklr6n.onion/en/help/wireguard-and-mullvad-vpn/ [Forgive the onion link, but search "wireguard-and-mullvad-vpn" for clearnet]

"Each WireGuard server is connected to all the other WireGuard servers through WireGuard tunnels."

The user gets confirmation that their target website sees the IP of the second node, but what does the ISP see? Aren't they routing to the first node (at least physically), and is it masked as the second node? Does the tunnel between nodes become redundant as the user connection tunnels through the entry node to the exit node?

Nodes/servers
Is it wrong to use "nodes" in this scenario

1

smartypants wrote

I tested it with 20 far-right domains and ZERO were blocked.

THANKS! I completed my tests.

Quad9 does not censor on behalf of ADL, JIDF, nor SPLC yet.

The sites it blocks that they claim they block are truly scam domains that phish from your retarded older relatives.

In case a public DNS blocks, you can use some others as fallbacks :

  • 8.8.4.4 < google fast fast fast, but spys and logs you for making money
  • 64.6.64.6 < verisign open
  • 208.67.222.222 < OpenDNS
  • 9.9.9.9 < Quad9 public DNS in europe

One of those on occasion blocked a famous far-right site that agitated the (((ADL)) but it was not permanent.

Quad9 is far too far from me to use it in all my routers and machines, but I will use it as a secondary and parallel search. I measure everything in my life in fractions of milliseconds and though I also have many of my own DNS servers, and caching, I do not live in Switzerland, though I love visiting it often.

1

smartypants wrote

I have mixed feelings on this type of mix. (no pun intended)

mainly, as a big fan, and a person that toured a little on road with Green Day in 1994... they year they got famous... I tend to only like punkier stuff, but my brain also likes novelty in general.

As for trance,goa,shoegazer,dub step,dream pop,house,acid trance,hard style trance, bubble,Darkpsy, and fast electronica... all have their place in moderation.

1

smartypants wrote

Good for you!

Alternatives to Cloudflare DDoS protection:

BitMitigate (one time banned a domain, but bans far less than CloudFlare)
Digital ocean
Imperva Incapsula
Dynu Dynamic DNS
ClouDNS.net
Neustar SiteProtect
JavaPipe
ArvanCloud
CloudLayar

Cloudflare censor bans sites with no warning, (23 hours sometimes).

Cloudflare also demands no private jevascript cryptography of payloads, and all traffic must be in clear and use an evil CLOUDFLARE SSL KEY on your behalf!!

Its true! NOt one actual private person to person message was ever sent on voat.co in history, because voat.co used Cloudflare and thus, ceded all actual true https ability and cloudflare stores and copies all traffic for feds, as Cloudflare often revealed.

3

smartypants wrote (edited )

Thank you for posting this story!

It has immense interest to me, from my ancient career of exploiting these chips and other related chips via renting scanning electron microscopes and peeling off obfuscation grid atop the good parts, and also "runtime glitching" (voltage, temp, amperage, clock jitter) to glean internal keys of production runs.

Not for fraud, but for selling crypto services... I was a white hat and part of a team of guys... or at least I mostly a white hat, but not a gray hat, nor black hat.

2

SmokeyMeadow wrote

Blacks can use the internet, they just need an app to connect them to whatever service they're using. Typing in www addresses is like the digital equivalent of a restaurant dress code.

1

RandomlyGeneratedUsername OP wrote (edited )

Funding can influence a project pretty significantly. Even mastodons like Linus Torvalds had to obey politics. Tor Project has been subjected by the diversity politics pretty quickly. You would expect more independence from rebellious cryptopunks.

2

Wahaha wrote

If you put effort in you can also make Chrome privacy friendly (ungoogled-chromium), but I thought the point of this list should be to find stuff you don't have to expend such effort.

Searx has pretty good results.

Also, these things are just what leaked about DDG. Who knows what else there is we don't know about.

2

bransonmagee wrote

It looks like the passports would actually report vaccine status, so getting a new passport now wouldn't help, because other countries could still bar you entry if you don't have proof that you're vaccinated.

They aren't planning to deny people new passports, just that without a vaccination you're not getting that special stamp that lets you travel most places.

The UK will not be requiring vaccines domestically, but the rest of the the world might require it if you want to visit.

2

smartypants wrote (edited )

NO!!! Tor browser dangerous to trust!

OVER three times Tor browser caught leaking hundreds of thousands of peoples IP addresses to FEDS, though the https traffic contents secure up to the endpoint.

TOR BROWSER in TAILS routinely has code inserted to subvert it, or borrows javascript code that has exploits in it known to FBI and NSA as proven in many federal court prosecution transcripts.

TOR BROWSER INSECURE FROM HOME, even if all javascript disabled (proven below)

HTTPS is secure, but sadly, once connected to https://ramble.pw or any https site, backdoor exploits added to tor browser , by NSA/CIA, in the form of "ACCIDENTAL CODE SUBMISSIONS" to tor browser used in TAILS, leaks your IP to the target. This means...

... that using one or even a chain of VPNS can have the ENDPOINT (https://ramble.pw or ISP of https://ramble.pw) exploit your TAILS tor browser via javascript (typically), or WebRTC (in the past) to LEARN YOUR ACTUAL TRUE IP ADDRESS!!!

This means that the HTTPS encrpyted traffic is still secure, end to end, but your IP address can still be logged using VPNS, by the endpoint.

Thse ways and means show up in federal court cases when FBI is forced to reveal tactics under a Judges order in court trials.

They for years tor browser in TAILS had hidden backdoors proven if you read the release notes of TAILS TAILS too? Yup, Even the famous https://tails.boum.org/

...had WebRTC enabled by accident (or by mossad on purpose) in past versions of TAILS, and if you read ALL THE CHANGE NOTES OF ALL VERSIONS you will learn I am telling the truth on the one little note they fessed up.

https://medium.com/@blackVPN/critical-windows-exploit-webrtc-can-expose-your-real-location-ip-address-even-when-using-a-vpn-4555d2fd280d

https://www.exploit-db.com/exploits/44403/

https://blog.ipvanish.com/webrtc-security-hole-leaks-real-ip-addresses/

https://thehackernews.com/2015/02/webrtc-leaks-vpn-ip-address.html

https://www.reddit.com/r/VPN/comments/2tva1o/websites_can_now_use_webrtc_to_determine_your/

That is NOT the only weakness in Tor browser, there were other non-WebRTC leaks!!!! Javascript (required for every free speech social site) and (required for Cloudflare) had exploits in summer 2019 that leaked endpoint IP addresses, and even allowed kernel level OS alteration on Mac OS using TAILS!!!!!! Many years of tails exploits prior too.

NO large web browser should EVER be trusted not to divulge IP addresses over VPN

Anyone trusting using TAILS along with its graphical browser, is a patsy. The rest are in prison already if they were criminals.

Only use text messaging , not a graphical web browser, when using TAILS, or tor services and VPNs! No fancy web browsers!

Even better, use a "one time visit" concealing gait and face, to a coffee shop.

Remember TOR/TAILS often runs unstoppable javascript using exploits by FBI, such as the infamous recent noscript vulnerability!...

https://www.netsparker.com/blog/web-security/noscript-vulnerability-tor-browser/

javascript code can cause lots of problems for your anonymity, and even root your machine , as in summer of 2019.

HTML5 fingerprints and indestructible cookies also thwart SOME VPN users too :

https://33bits.wordpress.com/2010/02/18/cookies-supercookies-and-ubercookies-stealing-the-identity-of-web-visitors/

25% of sites fingerprint you using javascript (CloudFlare and others, require javascript to connect)

2020.08 : A quarter of the Alexa Top 10K websites are using browser fingerprinting scripts! https://www.zdnet.com/article/a-quarter-of-the-alexa-top-10k-websites-are-using-browser-fingerprinting-scripts/

In 2021, hundreds of research papers on novel fingerprinting techniques of browsers exist, and even I designed some using html5 graphics, not yet widely known by other researchers and not yet stopped in Google Chrome.

TAILS? use HiddenVM too

If you must try t connect to a https web site anonymously, use a hidden privacy VM OS and a set of privacy tools, at a public wifi :

https://github.com/aforensics/HiddenVM

https://news.ycombinator.com/item?id=22492343

There are many reasons why you may want to use HiddenVM.

whonix OS! inside HiddenVM, for TAILS on a USB, for coffeeshops or libraries: ...

I SUGGEST if you do not need OSX or Windows, to install Whonix secure Tor anonymization and TAILS inside your HiddenVM !!!
https://www.whonix.org/

TL/DR : Tor browser is not safe from home. NO CONNECTIONS MADE FROM YOUR HOME ARE SAFE FROM FBI/NSA if using a BROWSER, vs text chat. Hopping does nothing to protect HTTPS more than it already provides

1