What defines retarded? Because it usually has a left-wing bias
RebelNet.me is open to anyone. But you can self-host it on an onion and only tell who you like
Weâre rebranding our Nostr forums,
Meet, the Rebel Net,
https://rebelnet.me/news/0xad937afc3901f9e4c6
The focus of this instance will be:
-Libertarian news
-CypherPunk Tech
-Agora networking & Meeting new Nostr people
Firefox/Tor? Nos2fx extension
Brave/Chromium? Nos2x or Flamingo
Mobile? Kiwi Browser w/ Nos2x or Flamingo.
Donât trust anything? Make a new keypair, thatâs fine. You get heard regardless of followers.
DM me to get your npub whitelisted for new threads.
You can reply or like without a whitelist, or even as a guest without an extension.
How does a Tor Onion work?
Well Nostr is a public/private encryption keypair to prove who you are. So is a Tor Onion. The Onion address is the public key, and it works by exposing the public key to the network, so people can find you. But the big negative of Onions is one has to keep the private key on the server itself. This means if the location of the Onion is discovered, itâs game over.
But Nostr relays can be hosted with Tor Onions, which makes the network essentially impossible to stop. Since the individual posters wouldnât be bound to those physical locations, PLUS those locations arenât easily known. Also in Whonix, it would find a new Tor circuit for each Nostr relay.
~
Why are Tor Onions so slow?
Normally Tor is 3 hops, but Onions take 6. This is because you take 3 hops, and then you meet the âserviceâ or other person who also took 3 hops at a ârendezvous pointâ. This hides the location of both the server and the visitor.
~
You ever wonder why Protonmailâs Tor Onion is so damn slow?
Itâs because they use SSL encryption AND tor encryption. You see all websites have httpS or SSL encryption. But Tor has its own layers of encryption as well, these are peeled away âlike the skin of an onionâ on each hop. But the Protonmail developers are negligent and donât understand that the httpS encryption just slows down the encryption already provided by Tor, without adding anything of value.
Was this confusing? You might like our animated video on âhow Tor worksâ for beginners:
nostr:npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 nostr:npub1f6ugxyxkknket3kkdgu4k0fu74vmshawermkj8d06sz6jts9t4kslazcka Iâm new to exploring Linux. Are there a few simple tips on buying a box store laptop that Linux can replace the windows as the base OS?
Hello, thanks for your reply. You might find System76 interesting.
Hello, thanks for your reply. IPFS is an excellent choice for something of this nature because it is immutable. Once you upload something, the CID or âidentifierâ becomes permanent. Therefore, the locations of the servers hosting it around the world are a commodity that canât make decisions. We are not hosting the IPFS pinning on unstoppable.
Unstoppable domains does it on Polygonâs blockchain, but their API is fairly centralized yes. This is why we also use Solana and Ethereum domains also pointed to the same CIDs. I encourage you to visit the website to gain a better understanding.
Privacy software is flawed.
When developers make software, they cryptographically sign it to prove that they are the creator and it has no backdoor. Just like Nostr posts.
But unlike Nostr, we trust Microsoftâs Github and Cloudflare to give us the correct public key to begin with. This means all Github privacy software is potentially compromised. Even if you could convince all these open source devs to come on Nostr, their posts with the hashes would scroll off their feeds. Ideally, you want a website.
Thatâs where our PGP directory comes in. Weâve pointed blockchain domain names to websites that arenât tied to a particular location or server (IPFS), to have a neutral third party source of information for you to compare to.
Itâs easy to go to this website in Brave Browser, and verify your software with one command:
SimplifiedPrivacy.sol or SimplifiedPrivacy.x
And if you donât know how to go to blockchain domain websites, hereâs a tutorial:
Hello, thanks for your time.
We're looking to use Session's network to hide and change the the location of the sender upon discovery of the server. Jami is peer to peer, so ties encryption keys to a given device. Yes it's true that Session depends on its network, but the same can be said for Nostr.
You can find our writing on this here:
Thanks for your time. When developers make software, they cryptographically sign it to prove that they are the creator. Just like Nostr.
But the public key for that encryption is on the same big cloud companies (Github) as the software itself. So people have no way to verify that the developer made it.
One answer is everyone comes on Nostr, but this has things scrolling off the feed and requires each dev to have an account. Instead, we have laid out all developer public keys on a 2nd new internet called IPFS that is even more difficult than Nostr to backdoor. So it's a website, instead of a twitter feed for keys. Hit up our tutorial with Brave Browser:
IPFS site is back up!
Verify your critical open source software without government domains, using multiple blockchain DNS and IPFS CIDs.
I struggled to get this working before, and to fix it, I had to made my own CDN with multiple VPS & broke it down into smaller groups. Then to avoid link breaking people out, I used multiple domains. Iâve been at this for like 3 days now, here it is.
Landing Page w/ links:
SimplifiedPrivacy.sol
or
ipfs://QmfY9hcVKmc63SzVUaLYAdtZbvfqVkwaJm7g2JDKbfLFr8
PGP directory:
SimplifiedPrivacy.x
Summary of content:
PrivacyFreedom.x
Do you not know how to visit IPFS or resolve blockchain names?
Hit up our tutorial with Brave Browser:
Shoutout nostr:npub1acg6thl5psv62405rljzkj8spesceyfz2c32udakc2ak0dmvfeyse9p35c for his great work with the new Gossip release. Humanity owes him big time
Privacy Checklist
Step 1. Learn Linux
Itâs easier than you think. You donât need the command line, and the software compatibility isnât as big a deal as it used to be, because a lot is in a web browser now. Over the last 10 years, Linux has improved dramatically, while as Microsoft Windows has gotten worse due to their increased surveillance wasting more and more resources.
Step 2. Get a DeGoogled Android
Itâs as easy to use as a regular Android! You can have all the same apps (although you should ditch some of them). You donât need the newest and most expensive model, Pixel 6a or 7a are just fine. We sell them cheap, or do it on your own.
Step 3. Slowly learn about open source alternatives.
There is a lot of alternative software out there, and our site covers most of them. Kdenlive is just as good as Adobe Premier for 90% of stuff. GIMP is just as good as photoshop for most people. Try to replace one app a week or month, youâll get there. Patience.
Step 4. Get a VoIP line.
Stop using the number on the real SIM card of your phone, otherwise the phone company sees what youâre doing. If you use VoIP with a VPN, then the phone company sees just a VPN tunnel. And the VoIP company just sees a VPN exit. The data is still unencrypted, but this is a huge separation of knowledge.
Step 5. Transition to Crypto.
Bitrefill, coincards, cake wallet, and many more vendors have a huge variety of stuff. This depends on your country and needs. But no country has no options. Donât let pessimism keep you trapped in fiat.
Step 6. Consider self-hosted email.
If youâre not going to just use a bunch of burners, and you actually have real content going through email, then self-host on a VPS is the best way. Itâs true that the VPS provider can still access it, but if you need business email, then this is your best choice. We offer to do the setup for you, or you can read guides on your own.
Step 7. Start on-boarding your friends and family
It takes two to tango. It helps to have the other side of your conversation secure as well. Our site has guides on how to approach them, but the answer usually lies in increasing your value proposition and friendship. And never in cursing them out. Target your pitch on what they know and care about.
Step 8. Type your name in search engines.
See what comes up. Are these accounts you can clean up, change, or delete?
Step 9. Make the plunge: Delete Facebook.
Itâs a tough one. And most wonât do it. But I did, and I kept all the people I actually talked to in the real world in my life via different tools. Good time to pitch Nostr.
Conclusion:
When you first see this list, it will be overwhelming with what you ought to do. But Iâm here today to tell you that I was once just like you, and I felt powerless with all this technical jargon I had to overcome. But remember, to some people Nostr or Bitcoin is complex. So itâs all what youâre used to. If you go through this list slowly over the course of a few months, I promise you that one day youâll look back, and be surprised that you ever let it intimidate you.
Now I need you to return the favor, and spread the knowledge you just learned. For the more people that walk this trail, the easiest the path becomes.
US Senate FISA fight on-going now
[before expiration tomorrow]
Quote Alexander Bolton:
âThe Senate voted 67-32 to advance a motion to begin debate on the bill, the first of at least three procedural steps needed before holding a final vote on the legislationâ
Dramatic expansion of government power on who has to collect data...
Quote Reason Magazine:
"including grocery stores, department stores, hardware stores, laundromats, barber shops, fitness centers, andâperhaps most disturbinglyâcommercial landlords that rent out the office space where tens of millions of Americans go to work every day, including news media headquarters, political campaign offices, advocacy and grassroots organizations, lobbying firms, and law offices."
Tell your Senator no! And if you think itâs hopeless, then start fixing what you can control. Get your ass on Linux. Get a DeGoogled phone. Start persuading friends to switch to encrypted messengers.
Maybe you canât change Senate votes, but you can change your life.
Yes, can I whitelist your npub?
FISA expands?!
The US FISA surveillance program was supposed to be reformed to prevent abuse,
Instead, a new version of the bill being voted on this week dramatically EXPANDS government power to:
a) Force ANY business to aid in wiretapping, not just direct ISPs. For example if you use WiFi at McDonalds, then they are required to log your data for government review. Quote Wired: "The text could be interpreted to extend to âdelivery personnel, cleaning contractors, and utility providers.â
b) Vague scope: "Americansâ emails, phone calls, and text messagesâso long as one side of the communication is foreign" As long as they think you MIGHT be talking to a non-American.
c) The goal is to stop foreign adversaries, but it ironically aids foreign IT companies. Quote Wired: "many customers will âlikely look to foreign competitors,â Miller says, companies whose technologies are viewed as less exposed to clandestine government requests."
Reach out to your Senate representative and tell them you donât want your freedoms trampled!
Get the full story:

