Replying to Avatar Khanto Blackhand

GrapheneOS isn't tied specifically to Pixels. They're working with other manufacturers. You can ask nostr:nprofile1qqstnr0dfn4w5grepk7t8sc5qp5jqzwnf3lejf7zs6p44xdhfqd9cgsppemhxue69uhkummn9ekx7mp0qywhwumn8ghj7mn0wd68ytnzd96xxmmfdejhytnnda3kjctv9ulj6hdh for more details on it.

Also tor and the internet was made by DARPA, regardless its still protocols that we use and must work on supporting and defending them.

Also no one knows which wallet is mine. Also Bitcoin is still being used for P2P transactions. Lightning helps support the network for micro payments.

Can you tell me how much I just paid on lightning and to who? If you can't then my point is proven. Nothing is fully private, but it can be more difficult to identify whose who. Lightning makes it near impossible for someone to guess who is who.

Close, Onion routing research was by the Naval Research Lab. The NSA also made Linux's mandatory access control modules, and Ghidra (fantastic). And yes, we're making an own device.

The person you're replying to places themselves in a fantasy world where everyone became idiots except a super hacker intel agency pulling the strings. Notice the gymnastics into conclusions. They take me posting a beta app (tech news) as an endorsement. The reach!

You can see replies get ignored any time I or someone else shows replies to them (btw, we posted ages ago Tor isn't a great solution people are over-reliant towards and they ignored that too).

https://xcancel.com/GrapheneOS/status/1945623621457600929

Please feel free to tell your friends to find any Pixel vulnerabilities then show everyone. I encourage it! Every hacker in the world can't be covering these supposed gaping security holes up (like every space agency in the globe has covered up the Earth being flat, lmao). You can make money finding this stuff, it's called vulnerability research, we get paid bounties for it when we find them on Android and Pixels.

Also FYI, that Tor forum link is an exploitative call to appeal by some individual who seeks attention online. They spun a trivial legal case to be about something else for attention. They posted on Tor Reddit (on my page) too. Google that OPs Reddit user with speech marks... They have a pretty messy online footprint. HN caught on quickly about how suspicious this is but obviously Redditors kinda don't know how to read.

I posted some of their legal documents. Their legal case is ACTUALLY about violating their bond when he was charged for hacking a company. He shouldn't have been operating Tor nodes past the incident because the terms stated he shouldn't have been using computers not authorised by his parole officer. You have to be a real dumbass to do that...

Obviously, they were monitored because he was on bond for a cyber crime. Nothing to do with Tor at all, it's a person making a sob story because they failed to game the feds.

The biased narrator of the story (his wife) never posted evidence of the excuses on why the bond was violated beyond words once questioned, even in the Tor thread.

Not read into the lightning talk. I'm not a maxi.

Reply to this note

Please Login to reply.

Discussion

I greatly appreciate your reply and helping me educate myself better. I am used to TOR because that's what I've used most. But have been running I2P as of late. GrapheneOS is my main and I try my best to find any issues on it so I can help support not just monetarily but also some elbow grease to keep it going as a community project.

Do you have any alternatives to TOR or I2P that you recommend to research?

Don't worry about the lightning part. It was just for them. 😅

Keep being amazing and I appreciate all the work you do at Graphene. ⚡🤝

I like I2P, there's the official app, a lot of people I know seem to use InviZible though on Android.

Other alternatives to them are small and far between. There is Lokinet but it's tied to some other cryptocurrency for some reason. Any network where you participate in will obviously have participant nodes who are operated with a malicious intent. Splitting connections apart like onion routing does and encryption is the best you can do. It's also more susceptible to this problem the less participants there are.

I appreciate you sharing that with me! I'm going to look into using invisible now. I've seen the lokinet and was turned off by the cryptocurrency part.

Well I'll do my best to teach others on how to use TOR and how to support it by running nodes and using it more as their net.