Avatar
SimplifiedPrivacy.com
ac3f6afe17593f61810513dac9a1e544e87b9ce91b27d37b88ec58fbaa9014aa
Give me Liberty, or Give me Death. HydraVeil is our Revolutionary New Linux app that allows you to create different isolated profiles, to resist AI Browser Fingerprinting from Cloudflare & Big Tech. Another feature of HydraVeil is routing your traffic though your choice of WireGuard or a Tor->Socks5 proxy (to evade Tor blocks), and to fool CDN packet speed tracing with different IPs for each profile. Additionally, we provide VPN service for Android, iPhone, Windows, Mac, and Routers. Tune in to our Podcast to combat Big Tech surveillance. Help me, help you. Hashtags: #Cypherpunk, Open source, #Linux, DeGoogled Phones, self-hosted services, #Monero, #Security, and more!

We’re rebranding our Nostr forums,

Meet, the Rebel Net,

https://rebelnet.me/news/0xad937afc3901f9e4c6

The focus of this instance will be:

-Libertarian news

-CypherPunk Tech

-Agora networking & Meeting new Nostr people

Firefox/Tor? Nos2fx extension

Brave/Chromium? Nos2x or Flamingo

Mobile? Kiwi Browser w/ Nos2x or Flamingo.

Don’t trust anything? Make a new keypair, that’s fine. You get heard regardless of followers.

DM me to get your npub whitelisted for new threads.

You can reply or like without a whitelist, or even as a guest without an extension.

How does a Tor Onion work?

Well Nostr is a public/private encryption keypair to prove who you are. So is a Tor Onion. The Onion address is the public key, and it works by exposing the public key to the network, so people can find you. But the big negative of Onions is one has to keep the private key on the server itself. This means if the location of the Onion is discovered, it’s game over.

But Nostr relays can be hosted with Tor Onions, which makes the network essentially impossible to stop. Since the individual posters wouldn’t be bound to those physical locations, PLUS those locations aren’t easily known. Also in Whonix, it would find a new Tor circuit for each Nostr relay.

~

Why are Tor Onions so slow?

Normally Tor is 3 hops, but Onions take 6. This is because you take 3 hops, and then you meet the “service” or other person who also took 3 hops at a “rendezvous point”. This hides the location of both the server and the visitor.

~

You ever wonder why Protonmail’s Tor Onion is so damn slow?

It’s because they use SSL encryption AND tor encryption. You see all websites have httpS or SSL encryption. But Tor has its own layers of encryption as well, these are peeled away “like the skin of an onion” on each hop. But the Protonmail developers are negligent and don’t understand that the httpS encryption just slows down the encryption already provided by Tor, without adding anything of value.

Was this confusing? You might like our animated video on “how Tor works” for beginners:

https://video.simplifiedprivacy.com/how-tor-works/

Replying to EnvEpi

nostr:npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 nostr:npub1f6ugxyxkknket3kkdgu4k0fu74vmshawermkj8d06sz6jts9t4kslazcka I’m new to exploring Linux. Are there a few simple tips on buying a box store laptop that Linux can replace the windows as the base OS?

Hello, thanks for your reply. You might find System76 interesting.

Hello, thanks for your reply. IPFS is an excellent choice for something of this nature because it is immutable. Once you upload something, the CID or “identifier” becomes permanent. Therefore, the locations of the servers hosting it around the world are a commodity that can’t make decisions. We are not hosting the IPFS pinning on unstoppable.

Unstoppable domains does it on Polygon’s blockchain, but their API is fairly centralized yes. This is why we also use Solana and Ethereum domains also pointed to the same CIDs. I encourage you to visit the website to gain a better understanding.

Privacy software is flawed.

When developers make software, they cryptographically sign it to prove that they are the creator and it has no backdoor. Just like Nostr posts.

But unlike Nostr, we trust Microsoft’s Github and Cloudflare to give us the correct public key to begin with. This means all Github privacy software is potentially compromised. Even if you could convince all these open source devs to come on Nostr, their posts with the hashes would scroll off their feeds. Ideally, you want a website.

That’s where our PGP directory comes in. We’ve pointed blockchain domain names to websites that aren’t tied to a particular location or server (IPFS), to have a neutral third party source of information for you to compare to.

It’s easy to go to this website in Brave Browser, and verify your software with one command:

SimplifiedPrivacy.sol or SimplifiedPrivacy.x

And if you don’t know how to go to blockchain domain websites, here’s a tutorial:

https://simplifiedprivacy.com/ipfs-brave-browser/

Hello, thanks for your time.

We're looking to use Session's network to hide and change the the location of the sender upon discovery of the server. Jami is peer to peer, so ties encryption keys to a given device. Yes it's true that Session depends on its network, but the same can be said for Nostr.

You can find our writing on this here:

http://simplifiedprivacy.com/uncensored

Thanks for your time. When developers make software, they cryptographically sign it to prove that they are the creator. Just like Nostr.

But the public key for that encryption is on the same big cloud companies (Github) as the software itself. So people have no way to verify that the developer made it.

One answer is everyone comes on Nostr, but this has things scrolling off the feed and requires each dev to have an account. Instead, we have laid out all developer public keys on a 2nd new internet called IPFS that is even more difficult than Nostr to backdoor. So it's a website, instead of a twitter feed for keys. Hit up our tutorial with Brave Browser:

https://simplifiedprivacy.com/ipfs-brave-browser/

IPFS site is back up!

Verify your critical open source software without government domains, using multiple blockchain DNS and IPFS CIDs.

I struggled to get this working before, and to fix it, I had to made my own CDN with multiple VPS & broke it down into smaller groups. Then to avoid link breaking people out, I used multiple domains. I’ve been at this for like 3 days now, here it is.

Landing Page w/ links:

SimplifiedPrivacy.sol

or

ipfs://QmfY9hcVKmc63SzVUaLYAdtZbvfqVkwaJm7g2JDKbfLFr8

PGP directory:

SimplifiedPrivacy.x

Summary of content:

PrivacyFreedom.x

Do you not know how to visit IPFS or resolve blockchain names?

Hit up our tutorial with Brave Browser:

https://simplifiedprivacy.com/ipfs-brave-browser/

Privacy Checklist

Step 1. Learn Linux

It’s easier than you think. You don’t need the command line, and the software compatibility isn’t as big a deal as it used to be, because a lot is in a web browser now. Over the last 10 years, Linux has improved dramatically, while as Microsoft Windows has gotten worse due to their increased surveillance wasting more and more resources.

Step 2. Get a DeGoogled Android

It’s as easy to use as a regular Android! You can have all the same apps (although you should ditch some of them). You don’t need the newest and most expensive model, Pixel 6a or 7a are just fine. We sell them cheap, or do it on your own.

Step 3. Slowly learn about open source alternatives.

There is a lot of alternative software out there, and our site covers most of them. Kdenlive is just as good as Adobe Premier for 90% of stuff. GIMP is just as good as photoshop for most people. Try to replace one app a week or month, you’ll get there. Patience.

Step 4. Get a VoIP line.

Stop using the number on the real SIM card of your phone, otherwise the phone company sees what you’re doing. If you use VoIP with a VPN, then the phone company sees just a VPN tunnel. And the VoIP company just sees a VPN exit. The data is still unencrypted, but this is a huge separation of knowledge.

Step 5. Transition to Crypto.

Bitrefill, coincards, cake wallet, and many more vendors have a huge variety of stuff. This depends on your country and needs. But no country has no options. Don’t let pessimism keep you trapped in fiat.

Step 6. Consider self-hosted email.

If you’re not going to just use a bunch of burners, and you actually have real content going through email, then self-host on a VPS is the best way. It’s true that the VPS provider can still access it, but if you need business email, then this is your best choice. We offer to do the setup for you, or you can read guides on your own.

Step 7. Start on-boarding your friends and family

It takes two to tango. It helps to have the other side of your conversation secure as well. Our site has guides on how to approach them, but the answer usually lies in increasing your value proposition and friendship. And never in cursing them out. Target your pitch on what they know and care about.

Step 8. Type your name in search engines.

See what comes up. Are these accounts you can clean up, change, or delete?

Step 9. Make the plunge: Delete Facebook.

It’s a tough one. And most won’t do it. But I did, and I kept all the people I actually talked to in the real world in my life via different tools. Good time to pitch Nostr.

Conclusion:

When you first see this list, it will be overwhelming with what you ought to do. But I’m here today to tell you that I was once just like you, and I felt powerless with all this technical jargon I had to overcome. But remember, to some people Nostr or Bitcoin is complex. So it’s all what you’re used to. If you go through this list slowly over the course of a few months, I promise you that one day you’ll look back, and be surprised that you ever let it intimidate you.

Now I need you to return the favor, and spread the knowledge you just learned. For the more people that walk this trail, the easiest the path becomes.

US Senate FISA fight on-going now

[before expiration tomorrow]

Quote Alexander Bolton:

“The Senate voted 67-32 to advance a motion to begin debate on the bill, the first of at least three procedural steps needed before holding a final vote on the legislation”

Dramatic expansion of government power on who has to collect data...

Quote Reason Magazine:

"including grocery stores, department stores, hardware stores, laundromats, barber shops, fitness centers, and—perhaps most disturbingly—commercial landlords that rent out the office space where tens of millions of Americans go to work every day, including news media headquarters, political campaign offices, advocacy and grassroots organizations, lobbying firms, and law offices."

Tell your Senator no! And if you think it’s hopeless, then start fixing what you can control. Get your ass on Linux. Get a DeGoogled phone. Start persuading friends to switch to encrypted messengers.

Maybe you can’t change Senate votes, but you can change your life.

Yes, can I whitelist your npub?

FISA expands?!

The US FISA surveillance program was supposed to be reformed to prevent abuse,

Instead, a new version of the bill being voted on this week dramatically EXPANDS government power to:

a) Force ANY business to aid in wiretapping, not just direct ISPs. For example if you use WiFi at McDonalds, then they are required to log your data for government review. Quote Wired: "The text could be interpreted to extend to “delivery personnel, cleaning contractors, and utility providers.”

b) Vague scope: "Americans’ emails, phone calls, and text messages—so long as one side of the communication is foreign" As long as they think you MIGHT be talking to a non-American.

c) The goal is to stop foreign adversaries, but it ironically aids foreign IT companies. Quote Wired: "many customers will “likely look to foreign competitors,” Miller says, companies whose technologies are viewed as less exposed to clandestine government requests."

Reach out to your Senate representative and tell them you don’t want your freedoms trampled!

Get the full story:

https://linked-out.me/news/4dde82b0dca8f05254d0