So nostr:npub1tmsm8rquag9d5yjw5tg2dy790a06l643z23z7aehxm94jk6mgcyqts208a is asking how spam email reputation works for self-hosting email.
First off, it's NOT true that self-hosting doesn’t work, or that there’s no way to avoid spam block lists. And for the email setups we do, we guarantee you're off spam or your money back.
There's 2 main aspects to avoiding spam lists,
1. Having the correct domain name (DNS) entries, and using a program that gives you those entries.
Mail-in-a-box is good for beginners, it’s a script that does the setup and then spits out the DNS information. But the downside is that uses the whole VPS for just email. Luke Smith has scripts as well. For the setups we do, we put Mailu in a docker container, so it can be moved from VPS to VPS easily, and other services can be using the same VPS.
2. Having a provider that isn't on the block lists.
This is a tough game because the KYC providers are more likely to be off the list than the anon crypto ones, but it does exist. Also with most providers, even if you're on the spam list, you can request to get off it. Spamhaus will demand you fill out a form on their site, and you have to use a residential proxy, and not a datacenter VPN. Further, not only does the VPS provider matter, but also the domain name registrar, and their nameservers. Make sure to ask them before you buy it, and then check in the Spamhaus database as soon as you get the IP to complain/dispute.
Important point: ALL domains will be on the spam list for 1 month when they are first registered. This is NOT a permanent ban, it’s an unavoidable 1-month thing. So if you’re doing it on your own, first buy the domain, and then the VPS a month later.
And if you don’t feel like reading the docs, consider our program, you get email, XMPP, Cryptpad docs, and whatever else you want (Nostr relays, SimpleX relays) on there, and then we hand the whole thing over to you, https://simplifiedprivacy.com/email-cloud-combo/index.html
There's also many email solutions in-between complete self-sovereignty and utter dependence on Big Tech.
Exanples include PurelyMail, Namecheap PrivateEmail, Zoho Business, all around $1/month.
Nothing in particular. Just saw some fonts and images weren't loading as #PrivacyBadger was completely blocking a cloudinary subdomain.
#Cloudinary, along with #Wix, #Viber, #Fiver, etc are well known Israeli companies formed by former spies and cyberwarfare agents from Unit 8200.
All public info from Wikipedia, Forbes, etc.
The problem with Israeli startups in general is not of course that they're Israeli or Jewish, but because most if not all of them are former military/intelligence. This is not the case for other countries' tech startups.
Don't forget Israeli Cloudinary loading assets on their web apps
Protonmail has a BTC wallet?!
Yup it's Bitcoin-only Layer-1-only tied to your email.
So now all I need is your email and I can see all your transactions. They claim it makes a new address, but this is propaganda if the input/outputs are being used together. This is the worst of both email and Bitcoin privacy.
You shouldn't be using a web app in a browser for your L1 Bitcoin, it should be in a local wallet like Electrum. Just like their email, you don't know what's going on in the cloud. They write "not your keys, not your coins", but they don't even let you use your own PGP key for email.
Further, they called everything else other than Bitcoin a shitcoin. Even if we ignore Monero, they still don't even accept lightning for their vpn/email. Lightning is far better at privacy than L1, and more economical.
This shows they are basically a honeypot propaganda outlet, with a World Economic Forum rep on their board, that hands over thousands of emails a year. Now they can add bitcoin transactions to give context to those compromised emails.
Once again, I urge you to consider self-hosting your email. Any small VPS is barely more money than proton's paid plans, and we have cheap plans to set it up for you if you're uninterested in reading technical docs, https://simplifiedprivacy.com/email-cloud-combo/index.html
Stop living in web apps. You can really be self-sovereign.
On top of that, some of their web assets are loaded from Israeli #Cloudinary...
Don't worry nothing in the background except #Israeli #Cloudinary for direct #NSO / #Netanyahu access!
The last part is probably FUD btw. Emphasis on probably.
#Israel #proton #protonmail #protonwallet #backdoor

### RaspPi Alternatives
There are many great alternatives to Raspberry Pi's popping up all over the place.
Here are a few Single Board Computer (SBC) manufacturers we discovered trying to find something that would run a Nextcloud server, or a KODI media center.
[Orange Pi](http://www.orangepi.org/html/hardWare/computerAndMicrocontrollers/index.html)
[O Droid](https://www.hardkernel.com/product-category/odroid-board/)
[Pine64 (ARM & RISC V)](https://pine64.com/product-category/single-b[oard-computers//)
[Libre Computer](https://libre.computer/products/)
[RockPi (ARM & Intel)](https://rockpi.org/)
[LattePanda (Intel)](https://www.lattepanda.com/)
[Milk V (RISC V)](https://milkv.io/)
[BeagleBoard](https://beagleboard.org/boards)
Most of these single board computers will may very likely NOT run Nextcloud, but they do have potential to replace Raspberry Pis in many other areas.
[⚡️ Follow Freedom Tech](https://primal.net/p/npub1fkluklzamwpyn7w8awxzrcqe7z8mldlvthk4gz9kz3vsh6udz62s9qj48l)
#RaspberryPiAlternatives #RaspberryPi #Linux #FOSS #SBC #SingleBoardComputers #OrangePi #ODRoid #Pine64 #LibreComputer #RockPi #LattePanda #BeagleBoard
Can also you do good Intel NUC x86 mini PC alternatives? Thanks.
Exactly what I was thinking. If you're late to the party, undercutting your rivals by making it #opensource is pretty much all you can do.
- Footer social follow link on websites.
- Or create a FOSS #WordPress theme with it included.
- A wordpress plugin for #Nostr comments.
I think I saw nostr comments integration on nostr:nprofile1qqsfzm94lura8dguaalkk6ml23umzqqmgqwqaqj43ms6yfgycl2s0jgpremhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet59uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tcpr3mhxue69uhkummnw3ez6ur4vgh8xetdd9ek7mpwv3jhvtcv28n4t website.
And yes the astronaut and elephant are both apparently running away from the ostrich in opposite directions. Completely unintentional or my subconscious at work?

Monero Nostr Client Out
It's not made by our team, it's Retrnull doing a fork of Amethyst for Android, he's named Garnet.
I can't vouch for this because I didn't make it. I tried it w/ a burner, but I could not fund the burner:
"Failed to construct transaction: Invalid destination address"
https://github.com/retrnull/garnet
Ask him questions or complain:
https://bounties.monero.social/posts/94/42-420m-nostr-client-for-monero
He has multiple tipping modes for different privacy options (public, anon, ect), and it can search bios for XMR addresses.
[BUG] app cannot be installed alongside amethyst
Agreed. TV of any kind is not even worth having any more. I never connected to TV once I discovered the internet. Computer + "dumb" TV screen. "Smart" TV apps are actually handicapped in comparison.
How you can be deanonymized through Tor
Tor is an excellent tool for privacy, and we do not recommend you avoid it. However, there are many limitations to be aware of and ways of using it that can compromise your anonymity on Tor. This post will discuss just a few of the ways, but there may be others that the public is unaware of. For example in 2017, the FBI dropped a case against a school worker accused of downloading child pornography because the FBI would have rather let him go than reveal the source code for how they deanonymitized him through Tor. [1]
The techniques we will cover include:
1) JavaScript based attacks
2) Cookies
3) Compromised Exit Nodes
4) Compromised Middle Relays
5) Compromised Entrance Guards
6) Opening Files Outside Tor
7) Ultrasonic Sounds
JavaScript Attacks
JavaScript can be used to identify a user through Tor in a number of different ways. This is why Tor Browser comes pre-bundled with the “NoScript” plugin. This plugin can either reduce or disable JavaScript’s ability. When the plugin is set on the “Safest” setting, JavaScript is completely disabled. This level of security is required to completely stay anonymous and secure on Tor.
The first way that JavaScript can identify a user is if a malicious website were to inject code into Mozilla Firefox (the foundation upon which the Tor Browser bundle is built). An example of this exploit was demonstrated as recently as 2022 by Manfred Paul at a Pwn2Own hacking contest of getting a user’s real IP address through Tor. [4a] [4b]
But this is not a one time bug or incident, as Mozilla Firefox has a history of being vulnerable to these types of malicious JavaScript injections. Malicious script hacks caused Tor to have to patch to correct them in 2019 [5], 2016 [6], and 2013 [8].
Back in 2016, cybersecurity researcher Jose Carlos Norte revealed ways that JavaScript could be used to identify Tor users through its hardware’s limitations. These advanced techniques fingerprinted the user’s mouse movements, which are tied to hardware restrictions and potentially unique operating system settings. Norte additionally warned how running CPU intensive code could potentially identify the user’s PC based on how long it takes to execute. [7]
The point of all of this is that all of these vulnerabilities did not work when NoScript was set to the safest mode of disabling JavaScript.
Browser Alone doesn’t stop cookies
Another security issue with Tor is pre-existing cookies, which could compromise your anonymity. For example, let’s say you previously signed on to your Amazon account from the same computer you are now using Tor Browser in (but using a different browser). If you now visit an Amazon page using Tor Browser (or maybe even receive a forwarded Amazon URL), you could potentially be connected to the Amazon cookie already on your computer and be deanonymized instantly. This would immediately connect the Tor traffic with you.
Remember though that Tor Browser is only one of a few options for using Tor. The way around this cookie issue is to use Tor in a virtual machine with the Whonix operating system or the USB operating system version of Tor called Tails.
Compromised Tor Exit Nodes
Your traffic enters Tor encrypted and stays encrypted through its journey throughout the mixnet until it gets to the final stop, which is the exit node. Here the exit node communicates with the “regular” clearnet without Tor’s onion encryption to access a website on your behalf.
Outside of Tor on the “regular” clearweb internet, most websites use httpS encryption. This is shown with a padlock in the top by the URL. If the website is http, without the “s,” then it’s unencrypted plain text data. Anything you do using an unencrypted http website with a Tor exit node can be snooped on and seen. However, this risk is relatively low because of the high percentage of websites that use httpS.
The biggest risk is that the httpS encryption can be removed using SSL stripping. This is when the Tor Exit node acts as a man in the middle, faking the server with which you’re trying to authenticate and downgrading the connection to httpS. For example in 2020, a malicious actor took control of over 23% of all Tor exit nodes and started doing SSL stripping to steal Bitcoin being sent on mixing websites. [9] [10]
To prevent against these types of attacks, upgrade the Tor security level to safest, which requires the use of HTTPS encryption with “HTTPS-Only”. Also pay attention to the top icon by the URL bar, to make sure there’s always a padlock showing it’s using this encryption.
You can click on the icon to see your Tor connection route and the certificate authority. Certificate authorities are the entities that validate the authenticity of the HTTPS encryption to this IP address. On a side note, these certificate authorities can act as a censor by removing an entry’s IP address, and this is one of the flaws that many cryptocurrency blockchains are actively working to solve.
Another way to prevent malicious Tor exit nodes from stealing your data or cryptocurrency is to avoid using exit nodes by using primarily Onion services. If you only login to Onion websites, then you never exit Tor. This doesn’t mean completely avoiding clearweb sites, but try to only browse them and not login. It’s the login/password credentials that malicious exit nodes steal with SSL stripping.
Malicious Middle Relays
The next type of risk is malicious middle relays — the hop between an entrance guard and an exit node. For example, the malicious group KAX17 had been identified as having run up to 35% of the middle relays and 10% of the overall Tor network before the official Tor project removed 900 of its servers. [15] [16]
While malicious exit nodes often want to steal Bitcoin or data, the goal of malicious middle relays is to deanonymatize users by seeing the path of their traffic. This is especially true on Onion hidden services because it doesn’t even use exit nodes.
There are a few things you can do to reduce this risk. We will go over them in the entrance guard section, because they are the same methods.
Malicious Entrance Guards
Entrance guards can see what IP address is connecting to the Tor network, but can’t see the traffic itself as it’s onion layer encrypted. However, they can gather some information, such as the time, size, and frequency of the data packets.
Researchers from Massachusetts Institute of Technology and Qatar Computing Research Institute wrote in a 2015 paper that if one of their malicious machine learning algorithm servers gets randomly picked to be a user’s entrance guard, then it may be able to figure out what website that user is accessing. The MIT researchers are able to do this by analyzing the patterns of packets from a pre-determined list of websites and seeing if they match the traffic their malicious entrance guard snoops. [17] [18]
According to MIT News, the MIT machine learning algorithm has above an 80% chance to be able to identify what hidden services a given Tor participant is hosting, but there are two conditions. First the host has to be directly connected to its malicious entrance guard and second the hosted site was on MIT’s predetermined list. [18] And finding who is the host of controversial materials is often of more interest to oppressive regimes than just who are the website’s visitors.
How can you avoid this?
There are a few ways you can reduce your risks with malicious entrance guards and middle relays.
First, use your own hosted ob4s bridge as an entrance guard to avoid ever having both a malicious relay and guard. Our company can help you set this up on a cloud server (VPS) or you can do it on your own.
And second, you can enter Tor with a VPN first.
Opening Files Outside of Tor
If files are opened outside of Tor Browser, they could have code that executes and reveals back to an adversary your real IP address. To avoid this, one can use a dedicated virtual machine like Whonix, which forces all traffic in the VM through Tor. Another option is the Tails operating system on a USB stick, which automatically erases everything after you’re done.
However, if you want to use a PDF outside of Tor, then you’ll need to convert it to plain text. One great Linux tool to do this inside Whonix’s command line is PDFtoText. You can install it with this command:
sudo apt install poppler-utils
Then use it with this:
pdftotext -layout input.pdf output.txt
The -layout flag keeps the original layout. input.pdf is the original file, and output.txt is what you want the output to be named.
Ultrasonic Cross Device Tracking
As University of California Santa Barbara cybersecurity researchers presented at a BlackHat European conference, malicious websites can identify users through Tor using sounds invisible to the human ear. [20]
The way this works is that many popular phone apps use Silverpush’s ad system, which can receive high frequency audio without the phone’s owner being aware of it. Audio of this type could be broadcast maliciously from a Tor website.
Silverpush enables the sale of your location data
These doctoral researchers warned of the dangers Silverpush presents by being connected to wide-spread platforms such as Google Ads. To demonstrate this, the researchers played video of their lab experiment, which de-anonymatized a laptop through Tor Browser, as a result of an Android’s mic next to the laptop’s speakers, while being signed in to a Google account. [34]
While the researchers presented a Chrome browser app that can stop this, we do not recommend it for Tor use because of fingerprinting (and Tor Browser is Firefox based). The best solution is to turn off the speakers and any phones around you when visiting controversial or private websites. Also consider a degoogled phone with a custom operating system, such as Graphene or Calyx, which would allow you to modify when apps have microphone privileges.
Conclusion
In this article, we covered a variety of different ways your identity can be revealed through Tor. To summarize your best defenses are:
1) Disable JavaScript with Tor’s Safest Setting
2) Use a custom private entrance bridge (ob4s) for an entrance guard that you control. Our company can help you set this up, or do it on your own.
3) Use Whonix or Tails when you need JavaScript or for doing anything outside a browser, such as opening unknown software or files
4) Before connecting to Tor, first use a high quality VPN with OpenVPN (Wireguard won't be faster for Tor)
5) Avoid resizing Tor Browser because of fingerprinting
Consider sharing what you learned. And of course, here's the sources:
https://simplifiedprivacy.com/how-you-can-be-deanonymized-through-tor/index.html
Amazing information. Thanks. What do you think about nostr:nprofile1qqsz3eqkex6xwd5t6khymtwhrrhkdf5fl7uk8wr9x6ukvkmnamc3mjspz4mhxue69uhhyetvv9ujumt0wd68ytnsw43qzxthwden5te0wfjkccte9eeks6t5vehhycm99ehkuegpr4mhxue69uhkummnw3ez6atn9e3k76twve6kuerfwshxxmmdajdja5 for opening PDFs?
Isn't this the Parwezi guy who rejects the Sunnah?
#Nostr is nowhere near #censorship resistant in its current state.
I think B found A and just paved the way for him...
Any to the software or even the full video?
Holly Million stepping down from GNOME foundation
https://www.phoronix.com/news/GNOME-Holly-Million-Leaving
Discussions: https://discu.eu/q/https://www.phoronix.com/news/GNOME-Holly-Million-Leaving
#linux #unix
Now only if the #Mozilla execs would do the same...
The same type of people who trust Apple?
https://www.grc.com/sn/SN-955-Notes.pdf
https://www.grc.com/sn/SN-956-Notes.pdf
#CVE202338606 #operationtriangulation #backdoor #backdoors #hardwarebackdoor #kaspersky

