Leaked Lies at Google
Google accidentally leaked their search API on Github, giving everyone insight into that they:
--Lied that they track users clicks as a factor for search rankings [1][3]
--Lied about using data from Chrome browser for search, including clicks. This contradicted their sworn testimony to the Department of Justice on anti-trust. [1][3]
--Lied about having a sandbox (to prevent "some" new sites from ranking) [1][2][3]
--Purposefully gave smaller "personal" sites their own category which ranked lower, EVEN IF they had more relevant information. To favor larger brands. [3]
They after removed the leaked data, but it was already published under an Apache open source license. [2] So now anyone can do whatever with it. The irony of Google having crappy privacy.
What should you use instead? Use a variety of engines.
Mojeek: Best privacy, but they aren't as well-funded. You gotta know what you want in advance
MetaGer: On Hetzner, so if you're coming through Tor which Hetzner dominates, its a conflict of interest
SearXNG: FOSS front-end for an aggregate. Farside.link has many instances.
Duckduckgo: They are not that private, but it pains me to say the results are not that bad.
Brave's Search: It's on Amazon AWS, but not bad indepedent results. As a heads up, if you use the Tor Onion it lets you do it without JavaScript.
And for Fs sake man, avoid Chrome browser.
(Sources in the comments from a burner account)
when they post ideas, we'll debate ideas
Could it be checking for a new version? I suppose though F-droid would be doing that tho
We answered you via the Session group right ? Session is better at censorship for a server, SimpleX is better at security/privacy for an individual.
Session is marketed wrong. The DNS makes it better for censorship on a VPS, as we documented here: simplifiedprivacy.com/uncensored
Well the CIA is here. Of course a censorship resistant protocol would be used by them. And the FSB too I'm sure will be here soon. The more the merrier I guess. Let's orange pill them all.
There are blurred lines here. Many people working for the CIA don't know they are working for the CIA. They are trying to free people. And while I support freedom and enlightenment principles, I'm not so sure about democracy (but I'm not against democracy because I'm not sure what is best), but I very much don't appreciate how freedom is abused in order to topple regimes for power projection purposes. Isn't the current level of blowback enough? Or do we need a global thermonuclear war before "they" finally see the blowback has become too much?
Most people don't want to topple their governments in the hopes of becoming America, only to find their country goes straight into the shitter. They are tricked into it by organisations like this. Iran is theocratic *because* of the 1953 coup and Reza Shah dictatorship that followed.
Does anybody think Gary Kasperov is going to topple Russia and make it the 51st American state so that America can harvest its natural resources?
Welcome to nostr. I get to say what I think too, you fucks.
nostr:nevent1qqs2vpkt79y6rusmf43sfg3jh20x9ujnunxh3tk53d9hjymxftg2vxgzduty2
CIA is on Nostr.
As nostr:npub1acg6thl5psv62405rljzkj8spesceyfz2c32udakc2ak0dmvfeyse9p35c brought to my attention, the CIA just started using Nostr for propaganda to legitimatize their coups. If you are unfamiliar with the worldlibertycongress.org it's a Washington DC bullshit front to legitimize the overthrow of any dictator the empire wants out. (Iran, Venezuela, ect.)
What will be different about this over Twitter, is this time, they can't get our side removed.
No sorry its just transition due to the provider changing datacenters. We'll have an update on that shortly. thanks
IPFS PGP directory updated
You can verify your software against uncensored DNS.
Brave Browser:
SimplifiedPrivacy.sol (landing page)
SimplifiedPrivacy.x (pgp directory)
PrivacyFreedom.x (articles)
Here's the guide on how to view it on Brave:
https://simplifiedprivacy.com/ipfs-brave-browser/index.html
You should resolve the domains because the hash will change on the next update. But here's the directory hash for the IPFS browser extension:
ipfs://QmTSyyZ1Rxq2YNfHvBTusKFmZ9MRHtHepSwtA4JkVbVZ49
The fact I’m even doing this (even if unpopular) is a threat (in and of itself) to keep Github in line.
So think twice before you talk shit. These are the versions covered:
KeePassXC
2.7.8
Feather
2.6.7
GetMonero Official
0.18.3.3
Session
1.12.3
SimpleX
he's got 3 keys,
so I just put up keys
Tor Browser, Linux
13.0.15
VeraCrypt
1.26.7
Whonix
Oracle Vbox
17.1.3.1
Whonix KVM
17.0.3.0
Interesting. thanks for sharing. you try a DNS block on it? you're sure that the DNS call is coming from that app? what tool are you using?
Unfortunately AntennaPod has trackers, hope they remove them for next release, otherwise its malware
evidence?
SimplifiedPrivacy.com is moving servers. And will be down for 1-2 day(s)
In the meantime,
SimplifiedPrivacy.net is a placeholder
It's also being turned into a static site for load-speed.
Our Tor Onion is changing as well:
privacyy3tsy4mge4qmg4nsid2vnhl7szzupphhkfsxvayx5tl2ztbqd.onion
Also SimplifiedPrivacy.sol is updated on IPFS
You can access this with Brave Browser or the IPFS extension using:
ipfs://QmVPsvEXqoyiiZteT1kgfDdBRfNhxZ29Fj2pwj24F7D8LG
(I will post more on both IPFS and Tor later for education)
Finally, RebelNet.me is already transitioned.
So you got:
RebelNet.me (Nostr)
SimplifiedPrivacy.net
privacyy3tsy4mge4qmg4nsid2vnhl7szzupphhkfsxvayx5tl2ztbqd.onion (Tor)
SimplifiedPrivacy.sol (IPFS)
ipfs://QmVPsvEXqoyiiZteT1kgfDdBRfNhxZ29Fj2pwj24F7D8LG
Love you bro,
See you on the other side of the move.
Thanks so much again for bringing this to my attention, Quad9 says we're off the black list. Let me know if it works on your end
lol you posting this cause monero town is talking about retroshare? I'm not familar with onionshare, but its like Briar right? If it's peer to peer, both parties have to be online at the same time. (like Briar)
I am not the dev behind SimpleX or Session. Session has onion routing built in. SimpleX can do Tor optionally. Onion routing is good, not just for privacy but also censorship, we also just got a new Tor Onion on a new VPS btw:
privacyy3tsy4mge4qmg4nsid2vnhl7szzupphhkfsxvayx5tl2ztbqd.onion
It’s offband, but more easily verified, remembered, and advertised.
Transferred from one keypair to another, kept offline in cold storage, and unstoppable.
If it's literally in your home, you have IP publicity issues, which you can solve with Tor Onion. Also most residential homes change IPs, which Tor helps with.
If you're talking about a VPS, then I'd recommend the official script from the SimpleX website
My Session ID is "Support".
My SimpleX code is:
Which one is easier to verify or fake? Which one can I blast out and people type to easily reach me under the cover of a mixnet?
No, not like Session at all.
We are not going to throw away double ratchet, and we are not going to create cryptocurrencies based on public blockchains. If we ever replace double ratchet with any other scheme, we would replace it with the more secure one, not with a less secure one like Session did.
We are moving to a very different direction from Session's: https://simplex.chat/blog/20240516-simplex-redefining-privacy-hard-choices.html
Also, the design of the private routing achieves the level of metadata privacy that onion routing in Session doesn’t provide - I can comment more on it, but here is the post: https://simplex.chat/blog/20240604-simplex-chat-v5.8-private-message-routing-chat-themes.html
I understand that Session fans might be angry about my criticism of Session, but its crisis is of their own doing - Session's decision to remove double ratchet was a wrong one - users who choose Session need double ratchet, at least.
The path for Session to regain users' trust would be:
1) get double ratchet back, with all its qualities, and figure out how to solve multidevice without compromising encryption security - I’d happily collaborate on that, as an acceptable solution doesn’t exist yet.
2) make node ownership optionally transparent and let clients choose nodes owned by known and different operators (to avoid unknown operators who potentially collude undermining onion routing promises - these promises only hold under the assumption that operators of nodes chosen for the circuit do not collude).
3) decentralise media storage in the same way messages are decentralised - Session may as well adopt XFTP protocol we designed - it's independent from messaging, and that can create some collaboration points too.
4) add a notification when another device access the same profile via recovery code.
5) protect access to recovery code in the app with PIN.
In its current state Session is simply dangerous to use for any scenarios requiring privacy and security.
Solving points 4 and 5 would remove Session from "dangerous" territory and make it simply “not too secure”. I don't understand why it wasn't already done after the public conversation with Keith several months ago, see the links here: https://x.com/SimpleXChat/status/1755216356159414602
Solving 1 would make it secure. Solving 2 and 3 would make it private.
It's correct to point out SimpleX network limitations, and we work on resolving them.
But by misleading the audience about Session level of privacy and security you are creating risks that may cost some people their lives or freedom - this is really bad for the community and detrimental for your reputation as well.
Yes I agree it sucks he removed forward secrecy.
Yes I agree that simpleX hides metadata better when BOTH parties want to be invisible.
Yes I agree that he should make the pin and notification on devices would be good.
Yes I agree it would be better if you could pick your entrance node like Tor.
This isn’t a real debate because I have no say in what KeeJef does. Remember, I am a USER of session, and NOT a developer. So my goal is to educate people on the pros and cons. We use a Session bot we made to distribute content, I’d like to do the same for SimpleX in the future. But I’m not going to do it if it’s a toxic culture.
What I do like about Session is a complete separation of physical locations from identity or communication, the ability to own your identity like a crypto wallet, and rotate the key to a new identity via the blockchain. As we outlined in our uncensored discussion for it’s use on a VPS.
http://simplifiedprivacy.com/uncensored
This makes Session more suited for pure censorship, unlike simpleX with government domain name identities.
If you think about it, SimpleX heavily relies on a secure off-band mode of communication to begin with, to prevent bogus URLs from being sent as man in the middle. Now, you said you’re adding PGP keys, and that’s great. I look forward to it. But I’m still relying on the regular government internet stack to deliver me the public key.
SimpleX excels at TWO way anonymity.
Session excels at ONE way anonymity, since anyone can quickly tap into your blockchain name and verify it easily. Many people in life may want to be invisible, but in most cases you don’t.
A journalist doesn’t want to be invisible, I want to know that I’m talking to the right journalist.
A crypto-trader doesn’t want to be invisible, I want to know that I’m sending funds to the right trader.
Additionally, users can achieve the same thing as SimpleX by having multiple Session identities on Linux.
I like SimpleX, and I’m excited you have made progress. I’m NOT saying don’t use it. I’ve just grown frustrated over the last few months with the simpleX linux clients having errors that caused me to abandon accounts, which makes the whole thing real vulnerable to phising attacks. As I mentioned in chat previously, SimpleX’s reliance on android first is one I disagree with as mobile devices are not secure. Also, the motivation to host your own server is somewhat confusing, if using your own server causes you to stand out. I hope your voucher system fixes this.
At the end of the day, I’m not looking to cause fighting for the sake of drama. I get excited about freedom technology for the love it. I wonder if you bashing Session 24/7 while adopting very similar features is in the same vein. I think KeeJef should be the one to debate with you, not me.
Hi I'm a developer with {insert fancy bullshit}
And our new revolutionary technology is going to remake the internet with blockchain and/or AI.
So because we are going to liberate all of humanity with this simple easy to use app,
We invite you on our AWS-Cloudflare website, to join our Discord and Telegram rooms,
Where you can fill out Discord's captchas, obey IP restrictions, SMS/email verify, and submit to surveillance, in the name of Web 3 Freedom!
