8f
8f8cd160
8f8cd16012432c2bbac21ba4f068a01710b763248e5a6a10b4a1d19a37ad55f9
Privacy and freedom entusiast. 85rXREt8gKBiGD1MyNydKJHGrw2YusbJdC62Nod3mnfW8sXit8f166hEfNuzXqHac4ELK3ZE8hi9qfzzjHAvkaT9HDECKd3

That is compared to ATH from what I can see, when 1 BTC was around 6M Doge. I'm not a trader so don't have precise charts.

Poor methodology. If you switch to eg. 1 Doge as base. Back in 2020 you could get 6M Doge for 1 BTC. Currently around 500k. So you method would call that -91.7% on BTC measured in Doge?

a + (b x row number) = 52

a + (b x a) = 96

Censored? Centralized? Closed to alternative clients? Blocking VPN? Ads?

I do not think it worthwhile to spend time trying to get the state to behave. Better spend it getting out of the walled gardens.

I use this kind of news to try to convince more people to install GrapheneOS, Linux etc. And if they use a cloud, do their own encryption on top.

I'm somewhat worried about compromised hardware though. No FOSS alternative there.

Replying to Avatar kidwarp

You can probably use https://www.trocador.app/en/ if you want to pay with xmr… I have no idea what a lighting decoder is or what it does.

I went to trocador, they also ask to provide a "Bitcoin (Lightning) address", not an invoice. I would guess that the part of the " invoice" that starts with LNBC1 is such an address, but I was not willing to bet 100000 SATs on it.

Replying to Avatar kidwarp

You can probably use https://www.trocador.app/en/ if you want to pay with xmr… I have no idea what a lighting decoder is or what it does.

I wanted to try that, but needed to pay a lighting invoice. The exchange services I found need a lightning address, not an invoice. Are there any services to pay ln invoice with xmr?

I put the invoice from Zeus into the lightning decoder linked intheis thread, it said "Not a proper lightning payment request"

It has this format:

bitcoin:BC1...?lightning=LNBC1...&amount=0.001

Will sending to either of those addresses pay the invoice?

I wasn't will to experiment with so many sats

Wanted to try it out. But AppVerifier gave me this code for the apk

darkfi.darkfi_app

89:49:33:C3:C2:B0:F4:76:A8:75:50:89:7A:BF:66:3E:DF:00:62:E3:08:50:A7:35:50:7E:A9:3F:73:E1:EE:DC

The release page says

Android: 4bb58f194544304b2ab97d25b830c88970cbad671c9d5794c96310b67ecbf6bc

Isn't those supposed to be identical?

I assume all these x accounts gets hacked because credentials are centralized and they get reset due to the service employees being scammed or bribed. Private keys only you have access to should lead to less compromised accounts.

When ice melts it uses energy, making the surrounding colder. By adding salt the freezing point is lowered, so it melts quicker. So it gets colder.

They don't want you to know about:

Socks5 Proxies vs VPNs:

These hushed elite secrets are more relevant now than ever.

Did you know that, LinkedIn makes more money off selling user data, then they do from paid job ads?

Or even worse, Twitter's valuation collapsed after Elon Musk's takeover, but then yet according to Fidelity, it got a rebound from Musk's training his AI startup on your data.

It should not surprise you then that both LinkedIn and Twitter, restrict many VPNs for new sign-ups. And more and more websites and services are banning Tor. How can you succeed with privacy under these conditions? In this note, I'll use Nostr's uncensored nature to teach you this critical knowledge, while it still works...

~~~

VPNs

When we think of VPNs, we usually think of protocols like WireGuard. WireGuard has public/private encryption keys, and the traffic is encrypted.

One potential issue with WireGuard is it's typically linked to a Datacenter. These datacenter IPs are then blocked by websites that often want to purposefully find out the identity of their users.

~~~

Socks5 Proxy

Socks5 Proxies simply forward the traffic to make requests from a new destination WITHOUT encryption. This typically is done only in a browser, but it could work in the command line or any app.

Many users wonder what the purpose of a Socks5 Proxy is, if there is no encryption. There are many use-cases.

Some websites may block VPNs coming from Datacenters. Socks5 Proxies are can be used to make the traffic appear to be coming from a residential home.

Speed

Since encryption slows down a VPN, a proxy is more lightweight, and thus faster than WireGuard.

Firewalls

Also WireGuard may have issues with residential firewalls, that socks5 helps avoid.

~~~

Tor Block

Another issue is some websites may block Tor. Tor exit IPs are published and known by all participants.

WireGuard + Tor = Fail

Since WireGuard uses UDP packets, it can't be used in front of Tor. Tor uses TCP only.

OpenVPN Slow

While OpenVPN, on port 443 (with TCP), in theory COULD be used in front of Tor. In reality, this is unbearably slow. Because you're doing 3 hops of Tor AND THEN a 4th encrypted hop on an external network.

To get around the speed issue, most users looking to hide Tor use, instead use Socks5 Proxies. These are fast because it has no encryption, but the ISP can't see anything because you're using Tor first.

Tor Exit Sees

The only one who the user isn't hiding from is the Tor exit. Tor exits still can't see through SSL/TLS or httpS website encryption. In other words, Tor exits can see WHAT domains you visit, but not your username, password, or what data you DO on those websites.

No Sudo

A huge advantage of Proxies is that they don't require sudo. They can just work in just the browser.

Simplified Privacy

Our Datacenter proxies exit the same servers and IP addresses as our WireGuard users. So the website won't know if you're using Tor or a VPN. I hope we make it financially through beta testing, to begin offering residential proxies as well.

Now do both me and humanity a favor, and slam the repost to aid our Nostr bros.

Regarding "WireGuard + Tor = Fail

Since WireGuard uses UDP packets, it can't be used in front of Tor. Tor uses TCP only."

So what happens when my router is set up to send all traffic throug WireGuard VPN? I can still connect to TOR.

My understanding is the WireGuard connection tunnel both UDP and TCP (over UDP).

I was wondering that too, not knowing American insurance system. But the article said 1 in 7 claims are denied. Guess the 6 of 7 are approved.

I didn't find on boarding hard. Main problem has been people getting new device or resetting. Then they expect to just put their name in and be reconnected with contacts. Database backup is not on their radar at all.