Recent comments in /f/Privacy

Rambler OP wrote (edited )

It's just a simple, lightweight and more privacy focused way to access pre-existing YouTube videos.

Unfortunately YouTube is still where the wealth of content exist. I still look at alternatives such as BitChute, Odysee, Tv.gab.com, etc however none of them have the 'normal, every day content' that I'm seeking. It's like 80% political / news, with the rest gaming or tech / crypto talk that I don't care about. Hard to find good content on them for things like music, weird hobby stuff, or just general DIY projects. I recently had to do a bit of work on my car. I found only one video on YouTube to show me what all I needed to do to complete the task at hand. Only one, and it wasn't even for the model I had but a similar one that was 'close enough'. The other sites just don't have that content unfortunately.

Don't get me wrong, I'd love to ditch YouTube and not look back. But unlike Google search, for Youtube, there is just no great alternative. There are some good ones, but they're not great, and they're only good for a very particular type of content right now. At least with virtually all other Google products they're easily replaceable. OpenStreetMaps, any other email provider, DuckDuckgo or other search engines, I dont' need cloud storage so Drive doesn't matter to me, etc. But YouTube... Just can't be replaced yet.

Example: Let's find videos on how to frame a wall when building a house.

Bitchute: Nothing

Odysee (Lbry): Nothing

Gab TV: Blocks VPNs, so fuck them.

YouTube/Invidiouos instances: TON OF RESULTS

Case in point: The alternatives just don't have the content to be considered real alternatives. Yeah, they may not ban you from the platform like YouTube will for certain things, but "normal content" that isn't political, news, gaming, crypto, commentary, etc just doesn't exist on them.

2

smartypants wrote (edited )

I believe Apple, too many rogue libertarian workers exist inside.

however, the real problem is INSERTED AND DELETED lines of checked in code to add NSA backdoors to the code and chips.

NSA already in the past bribed engineers to cleverly make strange "MISTAKES" in legacy working code not written by the engineer or under their domain, just to add exploits to SSL in Apple OS and iOS devices.

NSA provable bribes software engineers at apple to delete error routine jumps in SSL code, that no human mind would notice because humans suck at reading MISSING lines of code, vs inserted BAD lines of code. The exploit would only have been spotted by fanatics reading the code base check-ins.

The CIA or China also hacked Dominion Voting machines to install Biden Regime by ADDING WEAK CRYPTO to 10 different leveragable attack angles, and only I , just me, seems to have noticed.

I published once though, totally ignored by anyone on earth, here a krypt truth bomb enraged at the DISINFO by fake-patriots being shoveled, via court documents from SHILL FAKE CRYPTO SECURITY CONTRACTORS, that I responded to in massive truth bomb here :

https://searchvoat.co/v/news/4125573/26586156

If that link above ever made it to Trumps legal team then...

TRUMP WOULD HAVE BEEN SWORN IN

I typed that research of mine IMMEDIATELY AFTER ELECTION and it never once hit 4chan , 8chan, or anywhere. I basically posted it to appease myself. Mankind can fuck itself, but I did my part.

But, though 100% factual and shocking no one even commented on that link above of generous facts regarding Dominion voting machine exploits that a simpleton, certainly myself, could leverage 10 different ways.

I LISTED THE JUICY FACTS and none of it allowed SCOTUS to investigate voter fraud?

Too many low IQ people on earth. And as far as I know, of all the social sites on this planet this month, the only one with the highest average IQ of all registerred active accounts is ramble.pw... a so called "toy 2 dollar a month" VPS instance test bed of grander things to come one day.

I feel so fucking alone in this universe.

But trust me, as a longtime expert on Apple culture... the M1 chip and even Big Sur (latest OS) are very very secure, but could be more secure if all lines of code were open source.... so I could spot all the infiltration by NSA bribers.

APPLE IS SECURE

That being said, I rooted Mac operating systems and stole ram from root via user space four different times in my life using miraculous hacks, but thats nothing compared to my Windows bragging rights. But I doubt Apples fuckups I leveraged were on purpose or even by bribery.

Have I been trying to attack M1 this month? You can sure fucking bet I have.

I cant back-image or downgrade the flashram easily, i cant even image the multi-layered boot os and back-version, so its fucking not fun to hack on a m1 laptop, you might end up having to own multiple machines to get work done. $$$ !!!!!!

I usually write anti-brick technology in all my hacking that looks to see if a power cord is plugged in or not plugged in as a birary swtich to skip all over my kernel patches to avoid soft-bricking an iphone or android but in this case... though i can see power-cord of m1 apple secure laptop... i can still technically mess up the fun by not being able to back flash older revs unless I do what the nintendo-switch hackers (r.i.p.) did and focus on flas imaging tools that look for jumper pads to activate out-of-band flas-ram micropartition flash imagers, without having to resort to microscopic wavesolder clamps.

Just using the flash of a m1 mac burns up the 50,000 transitions allowed before you have to throw the laptop away from "ssd rot" :

Turning off virtual RAM, if you have 16 gig ram m1 mac, allows the flash ram to not get burned up, but you still get ZERO-PAGE compression of zeros in ram, but not on disk, thankfully.

you modify a flag for 40A0DDD2-77F8-4392-B4A3-1E7304206516
"Apple System Boot" or "iBoot namespace" :
https://github.com/apple/darwin-xnu/blob/main/iokit/Kernel/IONVRAM.cpp#L152-L275

sudo nvram 40A0DDD2-77F8-4392-B4A3-1E7304206516:boot-args=vm_compressor=2

Then reboot to recovery, select "Utilities > Terminal" from the top menu and run:

bputil -a
reboot

Once rebooted, you can verify that mode 2 is being used:

sysctl vm.compressor_mode

This way, your m1 mac will not have to be thrown into trash because a 4 line javascript exploit on web or a naughty task, generates random noise pages to burn up your drive (flash) forever.

This makes the memory pager only compress pages if pressure is high and never write them to disk, just like iOS already does. Just like Windows 7 and Windows 10.. disabling unlimited infinite virtual memory can make IMPROPERLY WRITTEN kernel drivers crash. Even CLICKING ON A MENU tries to create kernel memory on a mac if you have italian languages installed as unselected optional user preference by trying to create a ioctl file hook when new files not allowed, even if your menu press is trying to click a tool of your own to FREE UP MORE KERNEL RAM. catch 22... fucking apple tranny coders try to allocate kernel memory on a menu mouse press.

Warning!!! FairPlay decryption of protected internet porn DRM fails if you listen to my tip above!

FairPlay decryption FAILS!!!

Apple thought they were clever by trying to put DRM sensitive RAM outside the kernel space and further using memroy manager paging to make DRM porn videos from the internet people buy to be unprobable from kernel or user space and DISABLING VIRITUAL MEMORY using THIS TRICK :

bputil -a
reboot

... will castrate Apple FairPlay DRM which normally hid only doing DTRACE or loading a attached known-name debugger.

If you want your porn from Apple DRM back, or want virtual memory back because you were a pauper and bought a M1 8 gig laptop instead of m1 16 gig laptops or 16 gig macmini m1s.. then do the...

RESTORE VIRTUAL RAM to normal:

sudo bputil -f
sudo reboot

It restores mac back at "full security" and full normal infinite-ram VM

That typing can be run from a normal boot even!

Anyways... I am realizing that people here dont even know how important turning off virtual RAM is sometimes... its because of this poor guy wo in one day or too discovered all his flash ram storage was 90% permanently dead and damaged because of a task swapping too much virtual memory in a loop :

He typed the brew (homebrew) installed SSD command :

sudo smartctl --all /dev/disk0

pissed his pants!?

.. and pissed his pants, because he, and just he, saw a result indicating his new m1 mac was nearly dead. (you cannot boot a mac m1 from a external USB it boots first from the internal damaged flashram FIRST, and has no separate firmware flash, because iOS flash is stored as 13 gigabyte blob on the internal ssd vmeram (tenically its 67 gigaBYTE per second special flashram, not vme) the regualy cache ram is 510 gigabytes (yes 510 to 511 gigabytes) per second to the ram seen by all 8 cpu cores.

You can check your m1 machine yourself, though installing bre installs 200 exploits hackers can leverage :

brew install smartmontools && sudo smartctl --all /dev/disk0

"&&" just means run another line of bash code, I typed it on one line just to be fancy

Sorry for rambling....

I guarantee, the current Apple and current Microsoft DO NOT WILLINGLY or KNOWINGLY allow any nation state but China, any favors related to security of OS or cloud

As for skype? .... no comment.

I just realized that anyone on ramble.pw looking at my entire post history here would start to think I am even more of a spook than a spook can be.

Fear not, I am not currently a CIA Glow Nigger (CIA/NSA/NRO/FBI/DIA/USDOJ/State Dept INR/USAFISR/DOE/DHS/TFI/ONSI/NSF/ etc)

NSF too in list?

Yes ... millions to spy on ramble.pw and Gab by NSF budget too :
https://www.breitbart.com/tech/2020/03/01/federal-funds-used-to-research-hate-speech-on-gab/

How paranoid am I myself? I'm so paranoid I hop out of commercial cable residential boxes to hit the net when relaxing instead of vpns. vpns make you look guilty. they paint you and mark you. I use VPNs only for targeted actions involving lots of setup and physical travel and separate laptops. sigh... I hate coffee shop wifis and libraries wifi life, though am fond of older mc donalds parking lots in recent years.

that being said, rule number 1 in being a newly hired fed contractor is to constantly DENY being a fed openly (really)... so beware hackers protesting too much at not being a Fed. If they go out of way too often joking about it or accusing others... then they are a either a paid fed contractor or a "sentence postponed ex-black-hat mole"

except me...

not me... I was referring to other hackers in that remark.
not me.
you can trust me, even if you are paranoid, like me.

0

smartypants wrote

claim to "strip" it are probably "accidentally" forgetting something

True, especially not just protecting against steganographic high freq noise , but imparting a color table inefficiency of color pallete to encode guid info and simple checksum.

always be wary of the "optimized color table" of compressed images.

The best solution is to have a tool rerender and image, rotate slightly, recrop slightly, add high contrast checkboard border, and over-mix clumpy white noise blended speckle and then save using your own (not the graphics card library) jpeg or png compression for color table choices.

.... not that I ever have anything to hide or anything.

1

smartypants wrote (edited )

HILARIOUS!

I honestly think Google is lying.
Remember Google's official ACTUAL true corporate motto? I Do.

For years, Google's official actual true corporate motto , which Google lawyers termed a 'corporate code of conduct' was :

'Don't Be Evil'!

I Do not believe at all that not being evil is Google's prime directive!

https://gizmodo.com/google-removes-nearly-all-mentions-of-dont-be-evil-from-1826153393

Google will poison their binary built browser itself with identifying GUIDs that get xferred to their services somehow. Less than a month ago they mentioned in press Google is making more large portions of Chrome CLOSED SOURCE.

You would be fascinated that the NSA decades ago even documented how to permit half bit per pulse communication technologies for long haul telegraphy data leaks.

GOOGLE CAN setup browser and its system authorized binaries to XFER GUID outside view of Wireshark packet grab!!!! No way to see the leak of your GUID!...

Basically you never complete a ack-nak , just a outgoing connect attempt partial handshake, and the TIMING over many seconds of each half-hearted failed connect attempt becomes a bit, and you include a few error correct bits. Then you can transfer 128 bits.

Why is 128 bits so important from a persona on a IP? Because you can store the official Macintosh/Windows/LinusSATABootDevice GUID or Intel or AMD GUID in 128 bits, or at least hash up a approximate 128 de facto GUID.

https://en.wikipedia.org/wiki/Universally_unique_identifier

Leaking data covertly done since the 1950s!!!

half binary communication has been done across CONTINENTS by NSA since 1950s.

YOU basically have low bit rate, but you try to setup a type of ACK-NAK without a NAK and the ACKs have time lag between attempts, no data to study, no visible data to log or capture, but ATTEMPTING to get ready to send is the communication channel.

Its all covered in typical introductory RED-BLACK comms education for mil training courses, but possibly not in technician courses (CTI , CTM) but rather 'Signal Officer' or 'Cyber Operations Officer 17A' and predecessor courses.

A big 1993 non-classified Ft Meade pamphlet : NCSC-TG-030 :

National Computer Security Center A Guide To Understanding Covert Channel Analysis Of Trusted Systems :

https://fas.org/irp/nsa/rainbow/tg030.htm

Basics are in that 1993 pamphlet I am certain, though I have not read it or related 26 thick "color NSA" books in over 15 years.

Jews in 2019 published REDISCOVERY of 1950s NSA method!

Ben-Gurion University of the Negev Jewish researchers published timing-based covert channels setup between routers to leak GUID from hacked routers to NSA or Mossad outsiders, and proved its implementation. They mainly were interested in LAN leaks in large defense labs, not WAN leaks, but its trivial to extend the link below from LAN to WAN half-bit telegraphy. See here for lay person pop press coverage :

https://www.bleepingcomputer.com/news/security/router-network-isolation-broken-by-covert-data-exfiltration/

I seriously doubt they never read the "color books" from NSA before, and are being glory hounds. Sometimes researchers publish this way for getting hired, or for WARNING PEOPLE of existing NSA hacks in routers without being explicit.

A decent MOSTLY color-complete leaked set of rainbow books on a honey-potted router site is here in complete glory....

YES GLORIOUS NSA books to snag..

https://fas.org/irp/nsa/rainbow.htm

NCSC-TG-005, NCSC-TG-011, NACSIM 5203 were the most significant to posses in late 1980s , but even now the Red book was further watered down after 2003. RED BOOKs were still highly selectively edited prior to 2003 even in the 1980s. The most eye popping, and the OMITTED tradecraft and OMITTED means, documented in other Navy Mil books is shocking to me to prove that that these RED color books above were only 95% complete at the time, in case leaked. Prophetic... because as seen... the color books of NSA (rainbow book cover set) WAS LEAKED, including red-black!

In fact its been leaked over a decade here : https://fas.org/irp/nsa/rainbow.htm

And now, Jew comp-sci researchers at universities read them to create undergrad experiments and publish as novel discoveries of principles. As I proved above.

All should read those books. And then never trust any electromagnetic device anywhere near you again! Hell, even your US currency in your wallet contains remote tuned "L Shape" specific harmony angles pulsed by microwaves, and 20 dollar bills are not even thought of as an electromagnetic device, yet provably, they reflect specific microwave tune-able signatures and can be further leveraged to coherently glean human voice range vibrations imparted on the microwave energy from the mylar strip containing the L-SHAPE aluminum embedded in a 20 dollar bill, seen against a bright light.

Trade press lies and claims currency detectors travellers walk through at airports detect magnetic ink from currency (you can LIFT a one dollar bill using a magnet, I did it all the time in front of friends using a rare-earth tiny little magnet). The real money detectors you walk through at airports are only interested in 20s, 50s, 100s and use a microwave pulse on the aluminum L-SHAPES :

https://www.newscientist.com/article/mg21328576-100-metal-detector-knows-how-much-cash-is-in-your-wallet/

that link above is classic disinfo.

The US gov uses disinfo to lie to this day how they caught the black hate crime hoax arsonist of black baptists churches across the south, claiming "tire tread database" when in fact it was the top secret (at the time) gasoline BATF taggant system employed on the fuel. 30 black churches were burned by blacks to blame Whitey in an 18-month period in 1995 and 1996, resulting in even more anti-White federal laws proposed (20 years prison if white!) despite being hoaxes by jews and negros. The black arsonists caught are all clevery exempt under these Jew laws because hate-crime hate-THOUGHT laws are only for Whitey to suffer. https://en.wikipedia.org/wiki/Church_arson#Church_Arson_Prevention_Act

taggant:

taggant lay person overview : https://en.wikipedia.org/wiki/Taggant

So much fucking disinfo... and now Jew researchers are lifting their thesis from USA NSA color books, to muddy origins of discoveries.

Sorry for rambling.... Google press headlines bring out my tizzy-fit rages of apoplexy and foaming at the mouth.

4

BlackWinnerYoshi wrote

TL;DR: Slave Search is not the first privacy focused search engine, the Slave Search Survey is bullshit.


Like searX. Yes, most instances are trash, but so is Slave Browser and their scams. And unlike this bullshit search engine, you can selfhost searX, which should work better.

Also, I would like to point out the survey that's available when you give your e-mail address (Tor v2 mirror) - if you want to see it for yourself, prepare your Riseup aliases.

There are some uninteresting questions - what's your primary browser, preferred search engine, device you search the most on - but then there's a question whenever you would pay for an ad-free and private search experience, although it should actually be "do you want to support capitalism to use a search engine that has hidden ads that will not be blocked by your ad blocker and that will steal your private info because we don't give a shit about GDPR?"... or something like that. By the way, who was stupid enough to choose yes? Search engines should be free.

Then there are other uninteresting questions - country you live in, language you perform searches, gender you identify with (I would like to point out these and those uninteresting questions were probably made to collect your data, but IDK) - and then there's a question about your age, along with a note that only people over 18 will be able to participate in the beta. Guess how many people have NOT chosen the option "below 18".

4

Rambler OP wrote

3

BlackWinnerYoshi wrote

Obviously, Goolag wrote about this only to try to keep their privacy concious users - they'll still track them. There are other ways to track users besides third-party cookies, after all.

3

Rambler OP wrote (edited )

LOL. Imagine thinking you're the first privacy focused search engine when countless others already exist.

EDIT: It's even funnier. This appears to be a PAID service, with a free service available where you will see ads (Brave approved) and won't be able to earn your precious shitcoin BAT.

Or you can use the paid version for all the privacy features, no ads, can earn BAT by using it...

Or you can just use DuckDuckGo, any SearX or YaCy search engine, etc.

It's crazy how when you offer the slightest monetary incentive you can build a mass following who get excited over dumb stuff like this.

4

smartypants wrote (edited )

Thanks!

Nearly all of these download reuploaders may work still in 2021, and some work with age restricted videos too, but most are not for anonymous vpn or tor probably:

  • youtubepp.com
  • yewtu.be
  • invidious.snopyta.org
  • invidiou.site
  • invidious.fdn.fr
  • invidious.ggc-project.de
  • vid.mint.lgbt
  • nsfwyoutube.com
  • tube.incog.host

https://youtubepp.com/watch?v=kddQ_uhcbZg
https://yewtu.be/watch?v=kddQ_uhcbZg
https://invidious.snopyta.org/watch?v=kddQ_uhcbZg
https://invidiou.site/watch?v=kddQ_uhcbZg
https://invidious.fdn.fr/watch?v=kddQ_uhcbZg
https://invidious.ggc-project.de/watch?v=kddQ_uhcbZg (DOWN for now in march 2021)
https://vid.mint.lgbt/watch?v=kddQ_uhcbZg
https://tube.incog.host/watch?v=kddQ_uhcbZg
https://nsfwyoutube.com/watch?v=kddQ_uhcbZg

2

Wingless wrote

SPECTACULAR! Runs great over Tor, do NOT have to enable the script, CAN watch "Little Fighter" without a VPN, and CAN save .mp4.

This is computing the way it should be. Whoever built it is a hero. We will see them dragging the cross down the main street in a couple of weeks that they'll be nailed to, so LET NOT THEIR SACRIFICE BE IN VAIN GO THERE RIGHT NOW! You can whistle the music you watch now, the day we finally get tired of all this shit and let the world burn.

4

Wingless wrote

Does anybody believe this story about how they're not granting governments access? Because it's easy to say no to the CIA. Because there's nothing that could be leveraged against them. Because corporations hate money. Uh-huh.

These are slave devices for slaves.. If we're going to have a society where nobody has computers, then fuck, let's get Ted Kaczinsky out of jail, into the White House, and do it PROPER - so we don't have ransomware in our hospitals, hackers controlling our banks, and foreign agents putting poison in the drinking water all by remote. Why have all the drawbacks of the corrupted Electronics Age, and none of the benefits?

3