Recent comments in /f/Privacy
spc50 wrote
Reply to comment by quandyalaterreux in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
I encourage people to hold these projects accountable.
Auditing is a normal thing in the real world. Transparency is necessary to some level.
Tor will never be clean trustworthy project. Government directly invested in it. There are shortcomings in design and not enough nodes to mix things up by default, thus prior endpoint hacker data collection.
It's just a piece of a solution. Wear your web condom with a VPN, then Tor...
spc50 wrote (edited )
Reply to Report: TikTok Harvested MAC Addresses By Exploiting Android Loophole | SecurityWeek.Com by Rambler
Another day and more known but unfixed security issues.
Funny that it is in Android, which Google owns.
The same Google dumping sh%t on open source the other day and talking about making themselves a gateway for open source published projects that are core.
Got news you wealthy tards in Mountain View --- worry about how badly your code sucks and how lousy your company has become as citizens.
Censor this you big dummies.
As for TikTok BOOM. Worst app. When you have 15 second attention span and endlessly swiping. Yeah, that might be good approach for your masturbation fodder but it isn't smart for hours a day, for a developing young person's brain, etc.
Nevermind the obvious spying and leaking - which is all the tech tards know how to do. The all knowing fake godplex is what is all about. They are in cahoots. Companies not on the team get blacklisted and downed - i.e. Parler.
spc50 wrote
Reply to Firefox ESR leaks a single word search request entered in the address bar? by RandomlyGeneratedUsername
This has been a 'feature' in Firefox and likely other browsers.
I would test but I am lazy right now and I disable and mutate browsers to pretend they could be privacy adhering (in reality they are lying, cheating, c*nts who report to everyone whatever).
Chromium just recently cleaned up their version of this stupidity:
https://www.theregister.com/2021/02/04/chromium_dns_traffic_drop/
Chromium cleans up its act – and daily DNS root server queries drop by 60 billion That’s a 41 per cent traffic relief for all concerned Simon Sharwood, APAC Editor Thu 4 Feb 2021 // 08:01 UTC The Google-sponsored Chromium project has cleaned up its act, and the result is a marked decline in queries to DNS root servers.
As The Register reported in August 2020, Chromium-based browsers generate a lot of DNS traffic as they try to determine if input into their omnibox is a domain name or a search query.
Verisign engineers Matthew Thomas and Duane Wessels examined the resulting traffic and reached the conclusion that it accounted for up to 60 billion DNS queries every day.
Wessels has since penned a new post that went unreported when it appeared on January 7 – the day after the US Capitol riot – but was today resurfaced by APNIC, the Regional Internet Registry for the Asia-Pacific region.
In the post he says the Chromium team redesigned its code to stop junk DNS requests, and released the update in Chromium 87.
spc50 wrote (edited )
F-off to reddit and other control NAZIS (as opposed to my kosher friends - at least the genuine ones of faith).
This gatewaying of all information and only calling something valid when it is admitted by a head of pyramid is tired.
This is why people sit on 0 day exploits for years and drop things strategically. Because too many people out there in power positions are abusive and in denial that their sh!t stinks.
Brave is an ugly baby.
I went back and found I tagged Brave leaking to plain DNS back on February 6th. Was new to me. Working on other stuff involving Tor and had just spun up Brave to check it out. Wondered why strange stuff in my DNS logs (you log your DNS lookups, don't you? You should).
Now who can point me to all the bundled Brave releases? Cause they are all fronted to feed you latest one. I want to selectively install and test and see how many releases they've been outing .onion addresses and putting normies at risk.
spc50 wrote (edited )
It's more secure than Brave :) Just look at how Brave has been leaking addresses to regular DNS for how long? (who can feed me a URL with their old releases so I can test?)
Seriously you should be running Tor browser with javascript off. JS is a nuisance and privacy sewer and by design. Javascript creator should be charged with crimes against humanity.
Oh isn't that fellow the lad behind Brave?
overvalley OP wrote
Reply to comment by smartypants in Multi-hop vpn and port forwarding by overvalley
This analysis is good for my edification. I'm reading some of the sources and will have some related questions later on.
overvalley OP wrote
Reply to comment by RAMBLE1 in Multi-hop vpn and port forwarding by overvalley
There's an example and description at Mullvad for the two-hop connection: http://xcln5hkbriyklr6n.onion/en/help/wireguard-and-mullvad-vpn/ [Forgive the onion link, but search "wireguard-and-mullvad-vpn" for clearnet]
"Each WireGuard server is connected to all the other WireGuard servers through WireGuard tunnels."
The user gets confirmation that their target website sees the IP of the second node, but what does the ISP see? Aren't they routing to the first node (at least physically), and is it masked as the second node? Does the tunnel between nodes become redundant as the user connection tunnels through the entry node to the exit node?
Nodes/servers
Is it wrong to use "nodes" in this scenario
smartypants wrote
Reply to Quad9 public domain name service moves to Switzerland for maximum internet privacy protection | Quad9 by Rambler
I tested it with 20 far-right domains and ZERO were blocked.
THANKS! I completed my tests.
Quad9 does not censor on behalf of ADL, JIDF, nor SPLC yet.
The sites it blocks that they claim they block are truly scam domains that phish from your retarded older relatives.
In case a public DNS blocks, you can use some others as fallbacks :
- 8.8.4.4 < google fast fast fast, but spys and logs you for making money
- 64.6.64.6 < verisign open
- 208.67.222.222 < OpenDNS
- 9.9.9.9 < Quad9 public DNS in europe
One of those on occasion blocked a famous far-right site that agitated the (((ADL)) but it was not permanent.
Quad9 is far too far from me to use it in all my routers and machines, but I will use it as a secondary and parallel search. I measure everything in my life in fractions of milliseconds and though I also have many of my own DNS servers, and caching, I do not live in Switzerland, though I love visiting it often.
RandomlyGeneratedUsername OP wrote (edited )
Reply to comment by Wahaha in Awesome Privacy: A curated list of tools and services that respect your privacy by RandomlyGeneratedUsername
Searx has multiple engines. If you're lucky enough, you can even get Google results. It must be Google bans Searx instances quickly because of heavy traffic or automated requests.
Wingless wrote
Reply to Report: TikTok Harvested MAC Addresses By Exploiting Android Loophole | SecurityWeek.Com by Rambler
We built the internet around having a special individualized identification code in every single computer whenever it tries to communicate ... but, nobody was going to use it, of course! Damn those Chinese for stealing the U.S. Government's intellectual spy property!
quandyalaterreux wrote
Reply to comment by RandomlyGeneratedUsername in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
Funding can influence a project pretty significantly.
Not when done in a completely transparent manner in which the funding's objectives are clearly stated (e.g. https://gitlab.torproject.org/legacy/trac/-/wikis/org/sponsors/Sponsor58 ).
RandomlyGeneratedUsername OP wrote (edited )
Reply to comment by quandyalaterreux in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
Funding can influence a project pretty significantly. Even mastodons like Linus Torvalds had to obey politics. Tor Project has been subjected by the diversity politics pretty quickly. You would expect more independence from rebellious cryptopunks.
RandomlyGeneratedUsername OP wrote
Reply to comment by smartypants in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
Well, there are three points: the Tor network, the Tor Browser and the Tor Project. Tor Browser is a patched Firefox with all its potential vulnerabilities, yep.
Wahaha wrote
Reply to comment by RandomlyGeneratedUsername in Awesome Privacy: A curated list of tools and services that respect your privacy by RandomlyGeneratedUsername
In that case you might also enjoy: https://github.com/mayfrost/guides/blob/master/ALTERNATIVES.md
Wahaha wrote
Reply to comment by BlackWinnerYoshi in Awesome Privacy: A curated list of tools and services that respect your privacy by RandomlyGeneratedUsername
If you put effort in you can also make Chrome privacy friendly (ungoogled-chromium), but I thought the point of this list should be to find stuff you don't have to expend such effort.
Searx has pretty good results.
Also, these things are just what leaked about DDG. Who knows what else there is we don't know about.
smartypants wrote
Reply to comment by Kalchaya in What features do you look for in a VPN? by Rambler
aka ..... ExpressVPN (in carribean domicile)
smartypants wrote
Reply to comment by RandomlyGeneratedUsername in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
OP did not talk about TOR, he talked about the often backdoor exploited TOR BROWSER
TOR BROWSER is not Tor!
Tor browser is often proven to have exploits and backdoors. Read my posts from today.
quandyalaterreux wrote
Reply to comment by RandomlyGeneratedUsername in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
There is a big difference between outlining Tor's weaknesses and giving consideration to other alternative projects one the one hand, and making classic FUD points (such as the ones on funding, or OMG Roger Dingledine did a talk with law enforcement).
RandomlyGeneratedUsername OP wrote
Reply to comment by quandyalaterreux in Is Tor Browser Safe and Completely Anonymous to Use? by RandomlyGeneratedUsername
I think it's pretty balanced. Tor is one of the best privacy tools, no doubt, but we also should be on guard and consider alternative projects like I2P, Lokinet, etc.
smartypants wrote (edited )
NO!!! Tor browser dangerous to trust!
OVER three times Tor browser caught leaking hundreds of thousands of peoples IP addresses to FEDS, though the https traffic contents secure up to the endpoint.
TOR BROWSER in TAILS routinely has code inserted to subvert it, or borrows javascript code that has exploits in it known to FBI and NSA as proven in many federal court prosecution transcripts.
TOR BROWSER INSECURE FROM HOME, even if all javascript disabled (proven below)
HTTPS is secure, but sadly, once connected to https://ramble.pw or any https site, backdoor exploits added to tor browser , by NSA/CIA, in the form of "ACCIDENTAL CODE SUBMISSIONS" to tor browser used in TAILS, leaks your IP to the target. This means...
... that using one or even a chain of VPNS can have the ENDPOINT (https://ramble.pw or ISP of https://ramble.pw) exploit your TAILS tor browser via javascript (typically), or WebRTC (in the past) to LEARN YOUR ACTUAL TRUE IP ADDRESS!!!
This means that the HTTPS encrpyted traffic is still secure, end to end, but your IP address can still be logged using VPNS, by the endpoint.
Thse ways and means show up in federal court cases when FBI is forced to reveal tactics under a Judges order in court trials.
They for years tor browser in TAILS had hidden backdoors proven if you read the release notes of TAILS TAILS too? Yup, Even the famous https://tails.boum.org/
...had WebRTC enabled by accident (or by mossad on purpose) in past versions of TAILS, and if you read ALL THE CHANGE NOTES OF ALL VERSIONS you will learn I am telling the truth on the one little note they fessed up.
https://www.exploit-db.com/exploits/44403/
https://blog.ipvanish.com/webrtc-security-hole-leaks-real-ip-addresses/
https://thehackernews.com/2015/02/webrtc-leaks-vpn-ip-address.html
https://www.reddit.com/r/VPN/comments/2tva1o/websites_can_now_use_webrtc_to_determine_your/
That is NOT the only weakness in Tor browser, there were other non-WebRTC leaks!!!! Javascript (required for every free speech social site) and (required for Cloudflare) had exploits in summer 2019 that leaked endpoint IP addresses, and even allowed kernel level OS alteration on Mac OS using TAILS!!!!!! Many years of tails exploits prior too.
NO large web browser should EVER be trusted not to divulge IP addresses over VPN
Anyone trusting using TAILS along with its graphical browser, is a patsy. The rest are in prison already if they were criminals.
Only use text messaging , not a graphical web browser, when using TAILS, or tor services and VPNs! No fancy web browsers!
Even better, use a "one time visit" concealing gait and face, to a coffee shop.
Remember TOR/TAILS often runs unstoppable javascript using exploits by FBI, such as the infamous recent noscript vulnerability!...
https://www.netsparker.com/blog/web-security/noscript-vulnerability-tor-browser/
javascript code can cause lots of problems for your anonymity, and even root your machine , as in summer of 2019.
HTML5 fingerprints and indestructible cookies also thwart SOME VPN users too :
25% of sites fingerprint you using javascript (CloudFlare and others, require javascript to connect)
2020.08 : A quarter of the Alexa Top 10K websites are using browser fingerprinting scripts! https://www.zdnet.com/article/a-quarter-of-the-alexa-top-10k-websites-are-using-browser-fingerprinting-scripts/
In 2021, hundreds of research papers on novel fingerprinting techniques of browsers exist, and even I designed some using html5 graphics, not yet widely known by other researchers and not yet stopped in Google Chrome.
TAILS? use HiddenVM too
If you must try t connect to a https web site anonymously, use a hidden privacy VM OS and a set of privacy tools, at a public wifi :
https://github.com/aforensics/HiddenVM
https://news.ycombinator.com/item?id=22492343
There are many reasons why you may want to use HiddenVM.
whonix OS! inside HiddenVM, for TAILS on a USB, for coffeeshops or libraries: ...
I SUGGEST if you do not need OSX or Windows, to install Whonix secure Tor anonymization and TAILS inside your HiddenVM !!!
https://www.whonix.org/
TL/DR : Tor browser is not safe from home. NO CONNECTIONS MADE FROM YOUR HOME ARE SAFE FROM FBI/NSA if using a BROWSER, vs text chat. Hopping does nothing to protect HTTPS more than it already provides
quandyalaterreux wrote
This article is full of FUD. (e.g. whaaa Tor gets funds from DARPA! US gov is behind Tor!)
smartypants wrote (edited )
Reply to Multi-hop vpn and port forwarding by overvalley
Does the port-forward affect layered encryption?
hopping adds no real benefit, other than perhaps protecting you from COMPROMISED machines logging raw connections along the way. most VPN companies, excluding ExpressVPN, have been in the news as compromised by nation states, even NORD VPN last year.
HTTPS protocol, by design , prevents man in the middle, and not even VPNS or ISPs know anything about your URL you are using, not even the domain name, just the IP address and the fact that you are requesting a port 443 HTTPS connection.
DNS traffic deduces domain name target, but IP already zeros in target unless using VPNs.
HTTPS is secure, but sadly, once connected to https://ramble.pw or any https site, backdoor exploits added to tor browser , by NSA/CIA, in the form of "ACCIDENTAL CODE SUBMISSIONS" to tor browser used in TAILS, leaks your IP to the target. This means...
... that using one or even a chain of VPNS can have the ENDPOINT (https://ramble.pw or ISP of https://ramble.pw) exploit your TAILS tor browser via javascript (typically), or WebRTC (in the past) to LEARN YOUR ACTUAL TRUE IP ADDRESS!!!
This means that the HTTPS encrpyted traffic is still secure, end to end, but your IP address can still be logged using VPNS, by the endpoint.
Thse ways and means show up in federal court cases when FBI is forced to reveal tactics under a Judges order in court trials.
They for years tor browser in TAILS had hidden backdoors proven if you read the release notes of TAILS TAILS too? Yup, Even the famous https://tails.boum.org/
...had WebRTC enabled by accident (or by mossad on purpose) in past versions of TAILS, and if you read ALL THE CHANGE NOTES OF ALL VERSIONS you will learn I am telling the truth on the one little note they fessed up.
https://www.exploit-db.com/exploits/44403/
https://blog.ipvanish.com/webrtc-security-hole-leaks-real-ip-addresses/
https://thehackernews.com/2015/02/webrtc-leaks-vpn-ip-address.html
https://www.reddit.com/r/VPN/comments/2tva1o/websites_can_now_use_webrtc_to_determine_your/
That is NOT the only weakness in Tor browser, there were other non-WebRTC leaks!!!! Javascript (required for every free speech social site) and (required for Cloudflare) had exploits in summer 2019 that leaked endpoint IP addresses, and even allowed kernel level OS alteration on Mac OS using TAILS!!!!!! Many years of tails exploits prior too.
NO large web browser should EVER be trusted not to divulge IP addresses over VPN
Anyone trusting using TAILS along with its graphical browser, is a patsy. The rest are in prison already if they were criminals.
Only use text messaging , not a graphical web browser, when using TAILS, or tor services and VPNs! No fancy web browsers!
Even better, use a "one time visit" concealing gait and face, to a coffee shop.
Remember TOR/TAILS often runs unstoppable javascript using exploits by FBI, such as the infamous recent noscript vulnerability!...
https://www.netsparker.com/blog/web-security/noscript-vulnerability-tor-browser/
javascript code can cause lots of problems for your anonymity, and even root your machine , as in summer of 2019.
HTML5 fingerprints and indestructible cookies also thwart SOME VPN users too :
25% of sites fingerprint you using javascript (CloudFlare and others, require javascript to connect)
2020.08 : A quarter of the Alexa Top 10K websites are using browser fingerprinting scripts! https://www.zdnet.com/article/a-quarter-of-the-alexa-top-10k-websites-are-using-browser-fingerprinting-scripts/
In 2021, hundreds of research papers on novel fingerprinting techniques of browsers exist, and even I designed some using html5 graphics, not yet widely known by other researchers and not yet stopped in Google Chrome.
TAILS? use HiddenVM too
If you must try t connect to a https web site anonymously, use a hidden privacy VM OS and a set of privacy tools, at a public wifi :
https://github.com/aforensics/HiddenVM
https://news.ycombinator.com/item?id=22492343
There are many reasons why you may want to use HiddenVM.
whonix OS! inside HiddenVM, for TAILS on a USB, for coffeeshops or libraries: ...
I SUGGEST if you do not need OSX or Windows, to install Whonix secure Tor anonymization and TAILS inside your HiddenVM !!!
https://www.whonix.org/
TL/DR : NO CONNECTIONS MADE FROM YOUR HOME ARE SAFE FROM FBI/NSA if using a BROWSER, vs text chat. Hopping does nothing to protect HTTPS more than it already provides
RandomlyGeneratedUsername OP wrote
Reply to comment by Wahaha in Awesome Privacy: A curated list of tools and services that respect your privacy by RandomlyGeneratedUsername
One of the reasons I like this list is that it contains things I've never heard of, including new search engines.
smartypants wrote
Reply to comment by RandomlyGeneratedUsername in Brave Browser leaks your Tor / Onion service requests through DNS. by Rambler
Bruce Schneier is/was a NSA plant in 1993, proven by ME!
I EXPOSED HIM IN 1993 with actual proof on cyberpunks hangouts, such as usenet
Main proof, was his deliberate subverting of his Blowfish algorithm , that infected over 43 crypto library products!
https://en.wikipedia.org/wiki/Blowfish_(cipher)
His Blowfish source code was deliberately subverted in a clever way by him to collapse a crypto key of 256 bits to merely 32 bits if it was derived from user entered text passphrase and the letters typed by user had the high bit set (in ANSI, the high bit is UNDEFINED, not zero, but additionally, mac and pc users can trivially type countless symbols on keyboards that have the highest bit set.
That wiki page, and most people who are not crypto experts in the early 1990s, do NOT KNOW OF NSA connection to Bruce Schneier to spread backdoors in crypto libraries!!!!
wayback machines for usenet used to exist, and could have shown a direct URL to my research proving Bruce Schneier to be under NSA control. NSA uses cash to subvert crypto libraries. Large cash payments are how NSA got engineers at apple to subvert Apples own source code "accidental changes" to SSL code in iOS.
Bruce Schneier is a FUCKING SHILL for NSA!
Remember, Bruce Schneier ALGORITHM for Blowfish was OK, it was his backdoor exploit in the free source code that he widely distributed that has the exploit to collapse and nullify all keyspace.
The high bit got erroneously smeared to all lower bits in each byte of the passphrase. This fact and exploit is still unknown out side of my typing here to you now, and the very rarely archived usenet group I posted too in 1993, 1994. I generally never publish my countless exploits I discover in hardware or software, but I am not wrong and anyone with a copy of Bruce Schneiers widely used blowfish source code promoted in 1994 can trivially verify all I wrote using a ANSI C conformant compiler.
BEWARE Bruce Schneier!
His backdoors in source code , PROVEN, may have toppled governments, promoted fraud, got political dissidents executed, and more.
spc50 wrote
Reply to Why Tech Companies Are Limiting Police Use of Facial Recognition : Short Wave by Rambler
... limiting it because their tech can't identify all people equally as well?
We call this a bias? I call it a bias against white people. Technologists are racists against whites.
No sane person wants any of this tech to get better than it is already. It is already a weapon and will be abused.