Avatar
Islamic Audiobooks Central
51013526828bac6a18e07b94a0b4f3c3d337c9604fb5cd7bc9b3f444afbc96e1
Audiobook publisher and distributor. Find our books on Google Play (DRM-free), Apple Books, Spotify and Audible as well as in public libraries, our website and our YouTube and Odysee channels. We love and use #Linux and #OpenSource / #FreeSoftware for professional audio production! Looking in from the Fediverse? You're seeing a #Nostr profile via a bridge. Full profile at: https://primal.net/p/npub12yqn2f5z3wkx5x8q0w22pd8nc0fn0jtqf76u677fk06yftaujmsscfkjum XMR: 87T3MhEThNNDmGxRrPPUvW76upi4RzeAq2nVYErCgeJKdssoWiQWttegvCkzFvxCZBCXFzAjfrCBXF88rebjfFqP2F1pYty

Yes but automatic unattended #security upgrades should be enabled by default.

Do you know of any #Linux distros which have that out of the box?

I mean besides Android...

Thanks.

10 Quick Tips to become Invisible

1. Avoid VPNs that don’t accept cryptocurrency, but remember they see your home IP. So it's not anonymous without Tor or it's alternatives

2. Avoid Big Tech, but if you have to, then use the LibRedirect browser extension and/or Farside.link service to use Tor or LibreWolf without JavaScript

3. If a website blocks you, try Vanilla Firefox with your VPN set to Port 443 TCP. Modify Firefox to reduce telemetry by setting "block dangerous and deceptive content" and "provide search suggestions" both to off

4. Linux isn’t as hard as you think. You don't need the command line.

5. Keep passwords in offline storage, such as KeePass. Then keep that in VeraCrypt

6. Wear a Bitcoin logo shirt at local public events, then get the info of people who approach you, so you can buy/sell for in-person cash

7. Avoid SMS, but if you have to, then use VoIP and never the number of the SIM card you get service from, to hide your physical location

8. Avoid email, but if you have to, then go for open source software you control.

It's not as hard as people make it out to be.

9. If a friend refuses to use privacy tech (such as Signal/Session), instead of cursing them out, increase the value your friendship offers, to make it worth it to install a new app

10. Be aware that Cloudflare sees ALL content on their network, including passwords.

Check DNS record tools (such as bgp.tools) or Ombrello to see if the site uses them:

ombrelo.im5wixghmfmt7gf7wb4xrgdm6byx2gj26zn47da6nwo7xvybgxnqryid.onion

Consider sharing this so freedom doesn't die

Thanks for the post. Is it only Cloudflare that can do that or other CDNs too? What about Bunny or Gcore, for instance?

Where so-called normies are concerned, if a guide is necessary, a redesign of the UX is too :)

No it's #Lbry that going away although it still works atm. #Odysee will switch to something else in the future.

Well I give thumbs up, smiles, reactions, etc IRL as well even though there's no algorithm... is there?

🤔

5 Android Apps to turn you into a Ghost

1. ClassyShark3xodus

ClassyShark3xodus is used to detect if another app you downloaded has spyware or trackers. ClassyShark3xodus scans the app for DNS requests or communication with Big Tech.

2. Fake Traveler

Some apps require GPS location, even when you don’t want to reveal it. Fake Traveler allows you to spoof your location to a place of your choosing to fool apps into thinking you’re there. Smaller community banks will fall for this, but for large ones, the bank’s app won’t load.

3. Scrambled Exif

Smartphones automatically tag pictures with GPS location metadata called “Exif.” So when you post a photo to Instagram or Facebook, the company knows where you live even though you’re using a VPN. Scrambled Exif allows you to remove this metadata conveniently before you post or send it.

4. Duress

Duress automatically wipes your phone when you enter a particular 2nd passphrase. Now, we discourage criminal activity, however some governments in some countries around the world may act illegally or against their own constitution to search devices they are not permitted to. Therefore, to honor and respect these human rights laws, as well as to protect whistleblowers globally, we recommend you tell corrupt police officers asking you to unlock your phone your 2nd Duress password.

5. andOTP

Two factor authentication is often a source of leaking your geolocation. AndOTP is way better than Google Authenticator because Google’s is proprietary and even though it works offline, may connect to Google accounts. Google is evil and locks you in where you can’t transfer to a different app because there’s no backup code. But andOTP works on any site that says “Google Auth” or TOTP.

(KeePass XC on Linux is better than both of these btw.)

All of these are in the open source F-Droid Store. Follow us on Nostr for more tips!

What do you think of InviZible Pro?

Pro/Con of “Private” Email

Protonmail

Pro: Allows Tor, Many use it so network effect of proton to proton encryption

Con: Huge increases in data handoffs to governments makes you question how much data they can get, some question if it’s a honeypot. Even if not, you’re potentially targeted for even being there, and they have a bad track record.

Tutanota

Pros: Better track record than Protonmail

Cons: Bans Tor and many VPNs. Severe Browser fingerprinting annoyance when signing up. They auto-delete your account if you don’t login for 6 months, but you can get around this by adding 2-factor authentication TOTP with KeePass XC

Skiff

Pro: Fast sign-ups, very easy to get a burner account

Con: They use Cloudflare. Cloudflare intercepts all traffic, so 0% private. This company is essentially propaganda.

Mail in a Box (software)

This is self-hosting using open source software on a VPS

Pro: More private than any provider. It does most of the setup work for you

Con: Requires $5 to 15 a month on a VPS (but can be split among friends). VPS provider can still access emails by snapshots of memory. Unless you put it in a docker container, you can’t do anything else on the VPS

Luke Smith Scripts (software)

Pro: Fast way to get an email VPS setup

Con: Requires it to be put directly on the server, which can mess up OTHER things you got going on there, like using aaPanel

aaPanel (software)

Pro: Easy to manage a lot of services going on, including WordPress or databases with your email

Con: Not worth setting up this whole thing up for JUST email.

Follow on Nostr for more!

Can you review #mailcow and #stalwartlabs mail server as well please? Also, #murena cloud's fork of nostr:npub1d68csfa6zedqy8snkapyavfgsfv07szsj304w5h3eerh7k3v7y6q36zk0pincludes a mail server...

Pro/con for each encrypted messenger

XMPP:

Pro: Speed & Decentralization. Easy to self-host

Con: Low adoption & reliant on government DNS

Matrix:

Pro: Institutional adoption

Con: Decentralized in theory, but centralized in practice to the matrix.org server with Google captchas. Like XMPP, it uses Government DNS

Session:

Pro: Uncensored Identity with onion routed delivery

Con: No rotating keys & despite rising adoption of the messenger, their cryptocurrency is dramatically falling in price, which relays have to stake

SimpleX:

Pro: Anonymous identity for each conversation, your identity is not tied to any one server, and you can self-host.

Con: No multi-device sync. No backup of account if you lose the physical device. Group chats don’t scale. You have to manually find and add servers not hosted by the developer.

Briar:

Pro: Uncensored identity, no servers, Direct Peer to Peer onion routed on Tor, or works without internet via bluetooth

Cons: Other person has to be online. No phone calls. While open source, keep in mind the CIA made Briar for foreign regime change.

Keet:

Pro: Uncensored identity, no servers, peer to peer like Briar, and it’s great for video chat and large file transfers

Con: Like Briar, the other person has to be online, but unlike Briar, Keet won’t connect over Tor.

Signal:

Pro: Easy to use, wide adoption

Con: Centralized Amazon server, no self-hosting, identity is connected to government phones which leaks metadata and can be censored. “Sealed Sender” has been academically proven to leak metadata unless you turn off “read receipts”. Group chats leak phone numbers if members accept new incoming messages.

#Briar Mailbox is supposed to solve that problem...

Pro/con for each encrypted messenger

XMPP:

Pro: Speed & Decentralization. Easy to self-host

Con: Low adoption & reliant on government DNS

Matrix:

Pro: Institutional adoption

Con: Decentralized in theory, but centralized in practice to the matrix.org server with Google captchas. Like XMPP, it uses Government DNS

Session:

Pro: Uncensored Identity with onion routed delivery

Con: No rotating keys & despite rising adoption of the messenger, their cryptocurrency is dramatically falling in price, which relays have to stake

SimpleX:

Pro: Anonymous identity for each conversation, your identity is not tied to any one server, and you can self-host.

Con: No multi-device sync. No backup of account if you lose the physical device. Group chats don’t scale. You have to manually find and add servers not hosted by the developer.

Briar:

Pro: Uncensored identity, no servers, Direct Peer to Peer onion routed on Tor, or works without internet via bluetooth

Cons: Other person has to be online. No phone calls. While open source, keep in mind the CIA made Briar for foreign regime change.

Keet:

Pro: Uncensored identity, no servers, peer to peer like Briar, and it’s great for video chat and large file transfers

Con: Like Briar, the other person has to be online, but unlike Briar, Keet won’t connect over Tor.

Signal:

Pro: Easy to use, wide adoption

Con: Centralized Amazon server, no self-hosting, identity is connected to government phones which leaks metadata and can be censored. “Sealed Sender” has been academically proven to leak metadata unless you turn off “read receipts”. Group chats leak phone numbers if members accept new incoming messages.

What about #Jami , #Cwtch , and #Qaul ?

Pro/con for each encrypted messenger

XMPP:

Pro: Speed & Decentralization. Easy to self-host

Con: Low adoption & reliant on government DNS

Matrix:

Pro: Institutional adoption

Con: Decentralized in theory, but centralized in practice to the matrix.org server with Google captchas. Like XMPP, it uses Government DNS

Session:

Pro: Uncensored Identity with onion routed delivery

Con: No rotating keys & despite rising adoption of the messenger, their cryptocurrency is dramatically falling in price, which relays have to stake

SimpleX:

Pro: Anonymous identity for each conversation, your identity is not tied to any one server, and you can self-host.

Con: No multi-device sync. No backup of account if you lose the physical device. Group chats don’t scale. You have to manually find and add servers not hosted by the developer.

Briar:

Pro: Uncensored identity, no servers, Direct Peer to Peer onion routed on Tor, or works without internet via bluetooth

Cons: Other person has to be online. No phone calls. While open source, keep in mind the CIA made Briar for foreign regime change.

Keet:

Pro: Uncensored identity, no servers, peer to peer like Briar, and it’s great for video chat and large file transfers

Con: Like Briar, the other person has to be online, but unlike Briar, Keet won’t connect over Tor.

Signal:

Pro: Easy to use, wide adoption

Con: Centralized Amazon server, no self-hosting, identity is connected to government phones which leaks metadata and can be censored. “Sealed Sender” has been academically proven to leak metadata unless you turn off “read receipts”. Group chats leak phone numbers if members accept new incoming messages.

There are other large free Matrix servers like the one by Mozilla. Anyone with a Firefox account can sign up. Also good "paid" ones like the one by FSFE.