Recent comments

spc50 wrote

Reply to comment by burnerben in privacy conscious VPS? by burnerben

You have a lot of attack vectors as a customer using a VPS.

Providers can really easily peek on what you do with stuff like OpenVZ virtualization.

So I'd avoid OpenVZ if privacy is necessity (it rocks for other stuff though).

KVM is likely what you will want to use.

Best to get ISO install of OS from legit distro. Pre bundled easy to install options providers have there for 1 click style installs should be avoided. Might find users in there already by default as backdoors (this just happened this week with OpenVZ template for Debian 10 - and from the official source allegedly - meaning many providers were backdoored).

You also want a provider who is accustomed to and appreciative of privacy conscious customers. Most providers want nothing to do with such. They are all about in creepy way often knowing their customers too well (but they never say to you that are profiling and spying on you).

For payment, shield yourself with prepaid cards (Visa, Mastercard, etc.).

Drop your personal details. Create a persona with info that checks out long before signing up. Give your little foot soldier their own Twitter and randomly pile stupidity in there. Create a free privacy email address just for this use.

Location is another thing. 5/19/14 eyes are to be avoided. However, there is legal nexus between any business doing biz anywhere and then also doing biz in one of those countries. Meaning the shop with 5 locations, one of which is private while 4 are in 5/9/14 countries has little to do but comply with 'authorities'.

Basically on provider side you end up dealing with either totally privacy focused companies or one of a handful of long time in the trench companies. Those companies can be good. But know you are moving into a sketchy neighborhood. If you are hosting legit content there, might be algorithmic bias and rank drop in search and other punishments from the corporate net controllers.

As far as naming a company, not endorsing anyone freely or otherwise. I have a few I have used for a decade plus. Emphasis on long term existence and durability of shops vs. cheap hobby hosts that come and go and are useless unless downloading piracy and bulk data and onto the next one quickly.

Storage - that's big deal with VPS. Make sure your OS is boot time encrypted so it's not simple to spin it up. LUKS is solution for this and baked into many OS installs today as option.

BUT! That's solution for boot. You need a second volume otherwise encrypted for your critical data. Isolation is a thing. Different crypto, different keys.

Providers that offer mapable storage - block or other forms of storage are good for your use. Confuses things a bit more and can bring those up and down often in short notice. So you decouple to some extent your vital stuff from the OS itself.

Lots to consider.

3

Rambler wrote (edited )

What specifically are you looking for?

Privacy in the registration process, privacy friendly VPS location(s)? Not many providers (willingly) allow you to sign up without non-identifiable information. Most of the "privacy web hosts" think that just allowing BitCoin as a payment option is somehow "privacy" but then ask you for your name, address, phone number, etc.

Find a server location outside of the 5/9/14 eyes ( https://restoreprivacy.com/5-eyes-9-eyes-14-eyes/ ) and a provider offering KVM or Xen based Virtual Servers (Though KVM is more popular nowadays). Don't use their premade Linux images, install your own ISO and VNC in and encrypt the disk via LUKS.

I plan on writing up a guide for /f/webguides eventually on installing Debian 10 on a VPS with LUKS disk encryption which will be the same process for virtually any KVM VPS provider. It's been on the to-do list with like 500 other items.

2

Rambler OP wrote

Weird. Some folks were very vocal on both sides of the coin in private. Not so much in public.

Today the front page looks fine to me. Sometimes it gets a bit vile.

I think the solution moving forward is proper tagging of posts with [NSFW] which I can add to submission titles if users don't do it themselves. If any particular default forum is too heavily NSFW it may be removed as a default forum simply for the fact that newcomers to the site don't always want to be met with that, but they're free to seek it out or post it themselves.

4

Wingless wrote

I have no faith in Gab, but I am curious what would have been done to them by governments and supragovernmental authorities had they not taken steps to protect Musk's ransomware stocks.

1

Wahaha wrote (edited )

Maybe something like each forum only can have a few of their posts per day appear on the front page? So even if someone creates 100 posts in A, forums B, C, D, E and F with about five posts per day would still be visible.

I'm mostly looking at https://ramble.pw/all/new so I don't care too much either way, other than being interested in optimizing the front page to attract more users.

And as a new user, it would probably be nice to easily see all the forums with some activity instead of just the most active ones. But even then, should there be a point where 5000 forums are active, you again will have a hard time figuring things out.

But for now that's my idea at balancing.

Maybe the front page should even show the few posts from each forum at random. So each time you reload the front page, you get something different, if there are enough posts in the pool. Prevents gaming the front page, too. At least to a degree.

7

smartypants wrote (edited )

I kind of meant not to run any browser or if so avoid javascript. but... Lynx?

for safety, Lynx doesn't support Javascript, but many web sites, including dark net ones, idiotically require javascript.

Links...?

Lynx and elinks does not support JavaScript, but Links does: sudo apt-get install links then to compile Links with JavaScript support, use the configure option --enable-javascript ... etc

https://softwarerecs.stackexchange.com/questions/11678/text-based-browser-that-runs-javascript

I would avoid the javascript entirely if possible, or use a remote proxy doing all the javascript and rerendering back through tor to your location

1

smartypants wrote (edited )

Thank you!!!!!!

This is quite brazen of them.

Some of it might be laziness of checking out mods to chrome source they depend on, rather than their possibly obfuscated source alterations.

No way to tell probably without compiling or downloading chromium yourself and confirming what they try to patch over : https://github.com/brave/brave-browser
and https://github.com/brave/brave-core

And now I think you are on to a money avenue they are seeking....

.... if a program is Free... then YOU are the Product

DNS LEAKAGE spotted 23 hours ago from ramble research and formally reported 23 hours ago !:

.onion request in regular window should also avoid DNS leakage #14261:
https://github.com/brave/brave-browser/issues/14261

1

Rambler wrote

Good read, for sure.

Do you have any trouble using these cards anywhere? Do you use them for normal online bill pay, online ordering from stores (or ebay/amazon, etc)?

What happens if you, say... Put $200 on a card to pay some bills and you have a $1.28 balance left over or something on the card. Anyway to transfer that to another card or do you just lose it if you can't find a small purchase to apply that balance towards? (So in a way, an added fee to the original card purchase?)

2