If you want to hide your IP on the Internet, use tor. Or a VPN you trust (I don't know how anyone trusts any VPN though for this purpose). VPNs are useful to trick Geo gated content, I wouldn't trust them for protecting your privacy. So for me its tor or you are just fooling yourself

nostr:npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z can you fix the backspace bug it is driving me apeshit.Thankss

Reply to this note

Please Login to reply.

Discussion

The only VPN can be trusted is one on your own server.

Yes. I used to wireguard to my VPS at data centre to tunnel past some dodgey hardware and my ISP both.

That has zero, privacy improvement though

Maybe negative

Hmm, how so?

Your ISP knows who you are and what IPs you visit. Depending on how you pay for your VPS, the provider would only know the IPs of websites you visit.

I agree the majority of benefits are not in the privacy department, but still I believe there are some.

A vps is not your own server. Whoever operates the hardware knows your ip address and all the addresses of the websites you visit

Should check out https://safing.io portmaster with SPN

On that note, have you looked at decentralized VPNs, like https://www.orchid.com/how-it-works/ or https://www.orchid.com/how-it-works/ ?

Same approach as Tor

If you are using Graphene, there is nothing I can do. You need a new keyboard. The default one doesn't work well with the new Android Jetpack Compose UIs.

OK. Thanks.

On graphene, I use Google Gboard with zero permissions granted: no network, camera, contacts, etc. I think in this state it can do no harm but it works way better than any of the oss keyboards I've tried (and I've tried many).

Glad to hear this is not defeating the whole point of being on GrepheneOS. I'm new to it and Gboard is far superior indeed.

Thank you!

I tried using tor, but its too slow and a considerable amount of posts cannot be retrieved, probably because the relays dont support it.

Do you have a workaround?

Thanks

I don't have a workaround.

I think nostr:npub1sn0wdenkukak0d9dfczzeacvhkrgz92ak56egt7vdgzn8pv2wfqqhrjdv9 has experienced similar issues with his client (iris/daisy/?). A relay doesn't need explicit support for tor, but it mustn't block tor exit nodes. I suppose some relays are run at ISPs which block tor exit nodes by policy. It would be good to determine which relays are like that.

Tor will be slower because the service of onion routing isn't free, and network traffic is the slowest part of modern computing.

I will attempt to make sure my relay is accessible via tor this week. That is in line with our operating values.

Are you on my relay Mike?

+1 id like to see nostr over I2P as well.

I think relays on i2p is a damn good idea

How can you determine if your relay talks to an exit node?

Some firewalls block known nodes automatically, and even better I will try to get a proper onion address set up as well. It’s more about testing that it works.

Tor is terrible with websockets, especially with many of them like what a Nostr clients does usually (many relays). Generally, you will never get the full experience with tor and you will always loose events. Btw. I am using a special raspberry AP (with tor on eth) when I want to tor with my phone.

Id like to use VPN for everyday browsing, and TOR for #nostr.

I use GrapheneOS and have #VPN always on, dont know if its a good idea as it mixes with #TOR.

By the way, which client do you use for TOR in #GrapheneOS? Is it #orbot?

I don't tor from my phone. I rarely tor. Generally I am not trying to hide my identity from spying governments or spying ISPs.

If I were to use tor (and I'm not saying that I do or don't), I would use something like qubes OS or tails OS and use dedicated hardware for it. Unless I was casually browsing in which case I'd use tor browser.

I run graphene.

I have orbot running on my phone but not in VPN mode. And I use Amethyst with it set up to connect via Tor through orbot's proxy on port 9050. (Thanks again nostr:npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z for adding that)

It works ok - well enough for my purposes. It is much slower than a direct connection and some events and images, videos etc don't download because a lot of stuff on the internet blocks traffic from Tor exit nodes because a lot of idiots do idiotic things through Tor.

You clever Nostr devs should look into Veilid if you havn't already. It sounds awesome and may solve all these issues with Tor.

https://veilid.com/docs/overview/

I suggest looking at the slides on that link for an explainer

x