Recent comments

kuro wrote (edited )

He clearly lied about the police. If you want to know how things really are, here are some websites in English:

  • thebarentsobserver.com (I know the editors, some of them are from Russia)
  • meduza.io/en
  • en.zona.media
  • themoscowtimes.com
  • ovd.info/en
  • novayagazeta.eu
1

smallcat wrote

For me, the experience having tested i2p and tor I wonder why this is so unknown. We all need privacy after all. Also once you have the client it's pretty easy to use if you have basic tech skills (like knowing how to setup a proxy in your browser). I tried using outproxies for ease use (it's kinda annoying having to go back and forth from another window or browser to go to clearnet stuff) but I acknowledge tor is better for that and intended for it.

1

jackal wrote (edited )

Can we trust the Tor Foundation?

tldr: The Tor Foundation can't be trusted, the Tor network however can be trusted so long as you use it properly.

No, or at least that's what their public relations are telling me. They've been pushing hard to turn Tor into something else than an actual darknet. They keep pushing to turn the Tor network into a VPN to access clearnet "privately or anonymously" which makes less and less sense as time goes on.

Tor should be used the same way I2P is, privacy and anonymity exist so long you don't touch exit nodes or outproxies, and it seems their effort is more aimed at making sure people do not make the network bigger but rather they just use it as a VPN proxy for clearnet.

On the topic these videos discuss, it seems like all of these issues have to do precisely with the misuse of Tor as a proxy/VPN solution rather than as a darknet, I got a small comment on the useragent spoofing thing, though, that one seems sketchy, really sketchy, and apparently everyone involved seems to be throwing back bullshit reasons to justify why not even general.useragent.override is working (as I realized a moment ago).

4

jackal wrote (edited )

Privacy in the real world has less to do with buying fancy gadgets and more to do with habits and what kind of clothing you wear.

An few obvious suggestions are that you wear hats and sunglasses when outside, trucker hats are widespread and make you harder to identify, they're a good choice to obfuscate your face while not drawing too much attention, if you wear or use IR devices which will deliberately tamper or make identification harder you will draw a lot of attention, those should be reserved for riots or similar scenarios where confrontation is expected, not for daily use. Along with this suggestion comes another good one of avoiding "eye contact" with surveillance cameras; whenever you enter a public spaces and buildings or a big private business, always assume you're being surveilled, don't look for cameras because if you can see them clearly they can also see your face features, Luigi Mangione got easily identified because he did this exact mistake, multiple times, even though he did try to obfuscate his face.

On the corporates collecting your data to study your purchase habits you can always pay on cash and refuse to pay with a credit or debit card, or a phone, because they (both businesses and banks) will use those transactions to guess your income and how much you spend and where, never buy anything on a business that doesn't accept cash, even if they accept cryptos which I doubt you'll find any, always buy in cash. If a business such as a supermarket offers you discounts with a membership card you can try to cheat the system by providing fake names and identities if they ask for one, if they do not allow an anonymous member card then you can assume those discounts are being paid with your purchase habits and you're giving your consent if you accept them, so reject those discounts at all times if possible.

Another good suggestion and more on the hardcore side is to never, ever tattoo yourself, and if you have tattoos that are on visible places such as arms or legs consider covering them or ideally getting rid of them. Cops love tattoos, because they're akin to fingerprints that can be used to consistently identify people even if they cover their faces.

3

fgFUKTG445F OP wrote

some people don't have a strong PC to use a virtual machine effectively and some people don't want to use there own computer to browse I2p and I used tails with I2p but it's not that effective to use and you need to connect to TOR which is not the best network for speed and you know the news about TOR and the USA and Europe and stuff like that.

1

fgFUKTG445F OP wrote

Hi. I'm back. sorry for being late. I have some stuff todo . and after some researching my stuff about my live os . it's mid and a$$ and I saw A lot of other live os like prestium and Obscurix (an arch based distro) and other distros and I decided to maybe to cancel my idea.

1

jackal wrote

Reply to comment by Saint_Cuthbert in Tor Browser on mobile by Gambino9

Will there be a choice to opt-out? Yeah, you'll probably get a button somewhere to express that you don't want to be spied at least if you're in Europe. Will there be any auditable method for them to prove that they do respect consent? Nope, they never truly cared about consent in the first place if they make these opt-out rather than opt-in, mostly because they know that if this was opt-in most people wouldn't use it as it doesn't benefit them.

The problem is that this software is proprietary, the phones are proprietary and they give far more control to Google, Apple, Samsung and manufacturers than users, that's exactly why we have the privacy and security nightmare we have today with smartphones, and they're trying the same moves on computers as well, albeit with less success.

Where could I research this matter further?

See every single top-notch/latest flagship smartphone being announced from any major brand: Samsung, Google and Apple are all selling local AI assistant as a feature on these upcoming phones.

1

jackal wrote

Tldr: Unless your phone is running Lineage, Graphene or similar, without Google/Facebook and such spyware you do not have privacy nor security.

The long explanation is that it depends on the phone and what operating system is running, a stock Android experience is not private nor secure by design so if you're doing something that could get you in trouble with the government you will want to do such on a proper computer running Linux. On the latest and upcoming phones surveillance is gonna get worse than merely big tech getting some telemetry data and profiling shenanigans, upcoming phones will have hardware acceleration to make LLMs and AI power efficient, they definitely can and will snoop through your shit 24/7, taking screenshots or even screen recording, piping them through the algorithm and sending the digested data directly to their servers, with high accuracy and bypassing computational constraints because your phone's hardware will be doing the heavy lifting.

4

cumlord wrote (edited )

yea use what you're gonna be most productive with. i2p+ has a good throttle/filter system that helps a lot, not a lot of problems because of that, but like if you try to host a wordpress site here with i2pd you're gonna have a bad time

sort of fun challenge for me to try doing stuff without js, depends what you wanna do though, but get pretty far using some combination of frames refresh and cookies. http://simp.i2p/chat is jank, no doubt, but, no js needed lmao. possibly relevant to your security outfit, the chat page http://simp.i2p/botcheck attempts to do a bot challenge with css. unless you're specifically worried about bot spam that's completely unnecessary, just giving some ideas for stuff that can be done without js

lots of neat css tricks out there, like http://simp.i2p/search the styled dropdown is a checkbox, and http://gatheryourparty.i2p has a star rating on the posts but the stars are radio buttons. snex has that one setup with a ruby backend

not so familiar with those ecosystems, but think it's a little slower getting started like this but once you've got some templates it gets faster ;)

2

jackal wrote

You can install i2pd over Termux, and then tweak and edit the config files using nano or vim from Termux as well so I assume adding keyrings must be trivial, you technically could even host an eepsite if you use i2pd running on top of Termux. I have no idea if the Java implementation can run over Termux as I never tried but it probably can.

1

jackal wrote (edited )

After the massive embarrassment they've made of themselves releasing a desktop machine that has no modular RAM I wouldn't have much hopes on them.

Framework always seemed like a big nothingburger, they get more credit and praise than they deserve, they're not that much into right to repair (as proven with the desktop they released) and they do the bare minimum to not get in the way to make machines serviceable, a barebones laptop design with I/O modules is just the bare minimum user-serviceable-friendly thing to do. Besides these machines use the latests CPUs and tons of spooky mystery proprietary software, I wish they started talking less about mimicking consumer slop tech like smartphones and more about alternative and open hardware such as RISCV.

1

dev OP wrote

Seems like PHP the way for darknet. As you mention, even I am using JS blockers on my browser while surfing on darknet. I never work with C# ecosystem but I heard about Blazor. Looks fine for darknet as long as not creating any JS on client side.

Thank you for sharing your experience.

2

dev OP wrote

Flask also good option on backend but it's been a while I don't use python, and don't feel productive the syntax :) Thank you for sending me scanners tools tho, I will definitely gonna check it out before publishing it.

Seems like PHP + HTML + CSS still solid option for my case. I still wanna figure out how can I find a way to become more productive on PHP. I like the Laravel ecosystem but seems like most of the frontend from JS tech which is not suitable for me. I checked the symfony but seems like they are also continue with some other JS tech on frontend.

Thanks for your comment and good projects

2

dev OP wrote

Looks promising but looks like cloudflare backed, in documentation they showing cloudflare and other cloud providers deployment ways. If I would create something on hidden service or i2p, i probably would host myself, i mean managing on linux server with Nginx. I assume you can do it with pm2 but still not like strong way to manage. In the other hand, I didn't find any template engine like pug on node.js, maybe I couldn't find it. Thanks for writing it tho, learned a new tech on JS ecosystem :)

1