Avatar
SimplifiedPrivacy.com
ac3f6afe17593f61810513dac9a1e544e87b9ce91b27d37b88ec58fbaa9014aa
Give me Liberty, or Give me Death. HydraVeil is our Revolutionary New Linux app that allows you to create different isolated profiles, to resist AI Browser Fingerprinting from Cloudflare & Big Tech. Another feature of HydraVeil is routing your traffic though your choice of WireGuard or a Tor->Socks5 proxy (to evade Tor blocks), and to fool CDN packet speed tracing with different IPs for each profile. Additionally, we provide VPN service for Android, iPhone, Windows, Mac, and Routers. Tune in to our Podcast to combat Big Tech surveillance. Help me, help you. Hashtags: #Cypherpunk, Open source, #Linux, DeGoogled Phones, self-hosted services, #Monero, #Security, and more!

Leaked Lies at Google

Google accidentally leaked their search API on Github, giving everyone insight into that they:

--Lied that they track users clicks as a factor for search rankings [1][3]

--Lied about using data from Chrome browser for search, including clicks. This contradicted their sworn testimony to the Department of Justice on anti-trust. [1][3]

--Lied about having a sandbox (to prevent "some" new sites from ranking) [1][2][3]

--Purposefully gave smaller "personal" sites their own category which ranked lower, EVEN IF they had more relevant information. To favor larger brands. [3]

They after removed the leaked data, but it was already published under an Apache open source license. [2] So now anyone can do whatever with it. The irony of Google having crappy privacy.

What should you use instead? Use a variety of engines.

Mojeek: Best privacy, but they aren't as well-funded. You gotta know what you want in advance

MetaGer: On Hetzner, so if you're coming through Tor which Hetzner dominates, its a conflict of interest

SearXNG: FOSS front-end for an aggregate. Farside.link has many instances.

Duckduckgo: They are not that private, but it pains me to say the results are not that bad.

Brave's Search: It's on Amazon AWS, but not bad indepedent results. As a heads up, if you use the Tor Onion it lets you do it without JavaScript.

And for Fs sake man, avoid Chrome browser.

(Sources in the comments from a burner account)

Could it be checking for a new version? I suppose though F-droid would be doing that tho

We answered you via the Session group right ? Session is better at censorship for a server, SimpleX is better at security/privacy for an individual.

Session is marketed wrong. The DNS makes it better for censorship on a VPS, as we documented here: simplifiedprivacy.com/uncensored

CIA is on Nostr.

As nostr:npub1acg6thl5psv62405rljzkj8spesceyfz2c32udakc2ak0dmvfeyse9p35c brought to my attention, the CIA just started using Nostr for propaganda to legitimatize their coups. If you are unfamiliar with the worldlibertycongress.org it's a Washington DC bullshit front to legitimize the overthrow of any dictator the empire wants out. (Iran, Venezuela, ect.)

What will be different about this over Twitter, is this time, they can't get our side removed.

No sorry its just transition due to the provider changing datacenters. We'll have an update on that shortly. thanks

IPFS PGP directory updated

You can verify your software against uncensored DNS.

Brave Browser:

SimplifiedPrivacy.sol (landing page)

SimplifiedPrivacy.x (pgp directory)

PrivacyFreedom.x (articles)

Here's the guide on how to view it on Brave:

https://simplifiedprivacy.com/ipfs-brave-browser/index.html

You should resolve the domains because the hash will change on the next update. But here's the directory hash for the IPFS browser extension:

ipfs://QmTSyyZ1Rxq2YNfHvBTusKFmZ9MRHtHepSwtA4JkVbVZ49

The fact I’m even doing this (even if unpopular) is a threat (in and of itself) to keep Github in line.

So think twice before you talk shit. These are the versions covered:

KeePassXC

2.7.8

Feather

2.6.7

GetMonero Official

0.18.3.3

Session

1.12.3

SimpleX

he's got 3 keys,

so I just put up keys

Tor Browser, Linux

13.0.15

VeraCrypt

1.26.7

Whonix

Oracle Vbox

17.1.3.1

Whonix KVM

17.0.3.0

Interesting. thanks for sharing. you try a DNS block on it? you're sure that the DNS call is coming from that app? what tool are you using?

SimplifiedPrivacy.com is moving servers. And will be down for 1-2 day(s)

In the meantime,

SimplifiedPrivacy.net is a placeholder

It's also being turned into a static site for load-speed.

Our Tor Onion is changing as well:

privacyy3tsy4mge4qmg4nsid2vnhl7szzupphhkfsxvayx5tl2ztbqd.onion

Also SimplifiedPrivacy.sol is updated on IPFS

You can access this with Brave Browser or the IPFS extension using:

ipfs://QmVPsvEXqoyiiZteT1kgfDdBRfNhxZ29Fj2pwj24F7D8LG

(I will post more on both IPFS and Tor later for education)

Finally, RebelNet.me is already transitioned.

So you got:

RebelNet.me (Nostr)

SimplifiedPrivacy.net

privacyy3tsy4mge4qmg4nsid2vnhl7szzupphhkfsxvayx5tl2ztbqd.onion (Tor)

SimplifiedPrivacy.sol (IPFS)

ipfs://QmVPsvEXqoyiiZteT1kgfDdBRfNhxZ29Fj2pwj24F7D8LG

Love you bro,

See you on the other side of the move.

Thanks so much again for bringing this to my attention, Quad9 says we're off the black list. Let me know if it works on your end

lol you posting this cause monero town is talking about retroshare? I'm not familar with onionshare, but its like Briar right? If it's peer to peer, both parties have to be online at the same time. (like Briar)

I am not the dev behind SimpleX or Session. Session has onion routing built in. SimpleX can do Tor optionally. Onion routing is good, not just for privacy but also censorship, we also just got a new Tor Onion on a new VPS btw:

privacyy3tsy4mge4qmg4nsid2vnhl7szzupphhkfsxvayx5tl2ztbqd.onion

It’s offband, but more easily verified, remembered, and advertised.

Transferred from one keypair to another, kept offline in cold storage, and unstoppable.

If it's literally in your home, you have IP publicity issues, which you can solve with Tor Onion. Also most residential homes change IPs, which Tor helps with.

If you're talking about a VPS, then I'd recommend the official script from the SimpleX website

Replying to Avatar SimpleX Chat

No, not like Session at all.

We are not going to throw away double ratchet, and we are not going to create cryptocurrencies based on public blockchains. If we ever replace double ratchet with any other scheme, we would replace it with the more secure one, not with a less secure one like Session did.

We are moving to a very different direction from Session's: https://simplex.chat/blog/20240516-simplex-redefining-privacy-hard-choices.html

Also, the design of the private routing achieves the level of metadata privacy that onion routing in Session doesn’t provide - I can comment more on it, but here is the post: https://simplex.chat/blog/20240604-simplex-chat-v5.8-private-message-routing-chat-themes.html

I understand that Session fans might be angry about my criticism of Session, but its crisis is of their own doing - Session's decision to remove double ratchet was a wrong one - users who choose Session need double ratchet, at least.

The path for Session to regain users' trust would be:

1) get double ratchet back, with all its qualities, and figure out how to solve multidevice without compromising encryption security - I’d happily collaborate on that, as an acceptable solution doesn’t exist yet.

2) make node ownership optionally transparent and let clients choose nodes owned by known and different operators (to avoid unknown operators who potentially collude undermining onion routing promises - these promises only hold under the assumption that operators of nodes chosen for the circuit do not collude).

3) decentralise media storage in the same way messages are decentralised - Session may as well adopt XFTP protocol we designed - it's independent from messaging, and that can create some collaboration points too.

4) add a notification when another device access the same profile via recovery code.

5) protect access to recovery code in the app with PIN.

In its current state Session is simply dangerous to use for any scenarios requiring privacy and security.

Solving points 4 and 5 would remove Session from "dangerous" territory and make it simply “not too secure”. I don't understand why it wasn't already done after the public conversation with Keith several months ago, see the links here: https://x.com/SimpleXChat/status/1755216356159414602

Solving 1 would make it secure. Solving 2 and 3 would make it private.

It's correct to point out SimpleX network limitations, and we work on resolving them.

But by misleading the audience about Session level of privacy and security you are creating risks that may cost some people their lives or freedom - this is really bad for the community and detrimental for your reputation as well.

Yes I agree it sucks he removed forward secrecy.

Yes I agree that simpleX hides metadata better when BOTH parties want to be invisible.

Yes I agree that he should make the pin and notification on devices would be good.

Yes I agree it would be better if you could pick your entrance node like Tor.

This isn’t a real debate because I have no say in what KeeJef does. Remember, I am a USER of session, and NOT a developer. So my goal is to educate people on the pros and cons. We use a Session bot we made to distribute content, I’d like to do the same for SimpleX in the future. But I’m not going to do it if it’s a toxic culture.

What I do like about Session is a complete separation of physical locations from identity or communication, the ability to own your identity like a crypto wallet, and rotate the key to a new identity via the blockchain. As we outlined in our uncensored discussion for it’s use on a VPS.

http://simplifiedprivacy.com/uncensored

This makes Session more suited for pure censorship, unlike simpleX with government domain name identities.

If you think about it, SimpleX heavily relies on a secure off-band mode of communication to begin with, to prevent bogus URLs from being sent as man in the middle. Now, you said you’re adding PGP keys, and that’s great. I look forward to it. But I’m still relying on the regular government internet stack to deliver me the public key.

SimpleX excels at TWO way anonymity.

Session excels at ONE way anonymity, since anyone can quickly tap into your blockchain name and verify it easily. Many people in life may want to be invisible, but in most cases you don’t.

A journalist doesn’t want to be invisible, I want to know that I’m talking to the right journalist.

A crypto-trader doesn’t want to be invisible, I want to know that I’m sending funds to the right trader.

Additionally, users can achieve the same thing as SimpleX by having multiple Session identities on Linux.

I like SimpleX, and I’m excited you have made progress. I’m NOT saying don’t use it. I’ve just grown frustrated over the last few months with the simpleX linux clients having errors that caused me to abandon accounts, which makes the whole thing real vulnerable to phising attacks. As I mentioned in chat previously, SimpleX’s reliance on android first is one I disagree with as mobile devices are not secure. Also, the motivation to host your own server is somewhat confusing, if using your own server causes you to stand out. I hope your voucher system fixes this.

At the end of the day, I’m not looking to cause fighting for the sake of drama. I get excited about freedom technology for the love it. I wonder if you bashing Session 24/7 while adopting very similar features is in the same vein. I think KeeJef should be the one to debate with you, not me.

Hi I'm a developer with {insert fancy bullshit}

And our new revolutionary technology is going to remake the internet with blockchain and/or AI.

So because we are going to liberate all of humanity with this simple easy to use app,

We invite you on our AWS-Cloudflare website, to join our Discord and Telegram rooms,

Where you can fill out Discord's captchas, obey IP restrictions, SMS/email verify, and submit to surveillance, in the name of Web 3 Freedom!