Send me your proposition.

Reply to this note

Please Login to reply.

Discussion

I'm still trying to figure out how to get actual content on here. so far it's either small talk or mindless bitcoin circle jerk stuff. I keep following more and more people to try and diversify my portfolio but so far to no avail. I think a trending feature would be helpful.

nostr:npub1f6ugxyxkknket3kkdgu4k0fu74vmshawermkj8d06sz6jts9t4kslazcka ,

The approach most privacy browsers (such as Tor) have is to block certain kinds of JavaScript. But this has a huge negative of not only outright breaking websites, which use those flavors of JS, but also red flagging to the website you're trying to hide from them.

Other browsers other than Tor are completely vulnerable to fingerprinting, such as Brave, LibreWolf, Firefox, and Chromium-forks.

Instead of any of that,

Our new Linux app HydraVeil, is a VPN, browser-distro, and acts similar to a hypervisor to recreate a new graphical environment, but is faster than a full virtual machine. When combined with new IP addresses, a built-in browser distribution, fonts packages, isolated filesystem, and canvas modification, this revolutionary new app allows the user to effortless and rapidly use isolated browser fingerprint profiles in a single click, that are both completely undetectable and private from all other activity.

Even better, we are in the process of decentralizing the Wireguard VPN nodes, tied to Nostr keys via chain of trust encryption. So instead of Tor, where the nodes are a commodity that the end user has no way to evaluate if they are the government or not. With our system, the end-user can literally pick to route traffic through your node, verified by your Npub.

Not only does this help users be private in situations where they can not use Tor browser or exit Tor IPs,

Not only does this help spread Nostr's use,

But on top of all of that, you're getting a cut of crypto revenue, with no upfront risk. We're paying you upfront for the server cost. And you're not asking users to trust us, you're asking them to trust you as a VPN hop. The setup is as easy as pulling a docker container.

nostr:npub1f6ugxyxkknket3kkdgu4k0fu74vmshawermkj8d06sz6jts9t4kslazcka Did you get / see the proposition in this thread?

I did. I will look into it, and let you know if it's something I would be interested in.

Does it do anything to mitigate against keystroke and mouse deanonymization (behavioral biometrics), similar to using Whonix + kloak?

https://www.whonix.org/wiki/Keystroke_and_Mouse_Deanonymization

https://github.com/Whonix/kloak

It's a new keyboard/mouse & display, so this solves some of the isolation issues with Whonix (see below). And that would stop that kind of fingerprinting from the host to the profile. But not profile to profile, as they would respond the same, even to their own x11. However, if someone is really that concerned, they can run hydraveil in whonix.

https://simplifiedprivacy.com/why-whonix-is-perfect-for/hydraveil.html

The kinds of websites that Kloak would work on, such as Google Docs is a great example, would block and break Tor browser outright. And whonix is nothing special outside tor browser.