• 13 Posts
  • 297 Comments
Joined 2Y ago
cake
Cake day: Jun 17, 2023

help-circle
rss

You’ll have to desolder the WiFi card inside. Check teardowns of TVs from now when deciding to buy a new one


It’s a bit difficult, you’ll need be good with your solder.


To be safe: paper wallets.

The rest: YMMV


That is indeed a disadvantage of PGP. Unfortunately, it is the most portable method of encryption text at rest at the moment. The moment somebody manages to figure out a way to use the Diffie-Hellman algorithm in a portable manner, I’m sure a lot of people will consider that a viable alternative. Till then, learn about disk encryption to keep your keys safe


I2p states on there website that it has potentially serious weaknesses.

The only relevant pages I found are I2P’s threat model and the comparison between I2P and TOR:

Please cite your sources so everyone can understand the reasoning for your claims of I2P being weaker than TOR.

Oh, and A LOT of the attacks mentioned in the page on threat models is/was possible on TOR. The I2P project follows TOR carefully and implements some of their features/mitigations too.

If we’re talking specifically about brute-force DDOS, BOTH TOR and I2P faced these issues. The good thing about I2P is that it is more decentralized than TOR which can sometimes make it easier to mitigate.

Your points about I2P’s directory (not sure what you mean by DNS here) can be lumped together with your complaints about usability. This DOES NOT make TOR inherently more private, secure and anonymous than I2P, it just means that somebody on Windows can download the TBB and start browsing (in albeit a not-very-secure way). Unless you missed the news, I2P now has a slick Windows installer so people don’t have to fiddle too much with it.

You’re going to have to give me evidence for me to believe that using I2P makes a substantial dent in your available bandwidth. Yes you’re a router in the network but it doesn’t mean that you’re passing through traffic at GB/s speeds.

i2p is somehow a replacement for Tor

I never said that. Again, I’m not comparing I2P and TOR based on their usability (which has changed in the recent years), I’m comparing them in terms of anonymity on the wider internet when browsing using either protocol. Both TOR and I2P are great projects, the problem is that TOR is significantly more centralized.

However, if you are in a critical situation use Tor not i2p as today it is the best for bypassing censorship while still trying to stay safe.

Cite your sources for this. This is mere conjecture unless you have proof of metadata leakage on I2P but not on TOR/actual people getting caught using I2P but being safe on TOR. I’m sure the I2P Devs would be very interested too. If you’re in restrictive regimes like Iran and China where TOR/I2P traffic is flagged - use a bridge or a VPN disguised as HTTPS traffic and hope for the best (it’s a perpetual cat and mouse game).

Again, please cite your sources when making claims about technical shortcomings of I2P


Shared key??? PGP works on a public-private key-pair, and unless you’re giving out your private key, it’s not shared with anyone. This is blatant misinformation


And using these apps is not always an option. I like simplex, but sometimes email is one of the only options. PGP can be used agnostic of the technology used for transmission, and that’s exactly what we need to keep more people private instead of forcing them into a few select applications. If Diffie-Helman can’t be used in a transport-agnostic fashion then I do not see much progress in this direction.


OpenVPN -> I2P.

I2P has been around for 20 years, it is plenty battle-tested. I do not see why you’re wanting to put down I2P in favor of TOR, I still do not see how I2P is in anyway inferior in its privacy (and for the most part, anonymity) features compared to TOR. The OpenVPN addition solves your need for something akin to snowflake/TOR bridges. It is not what I2P was meant for but there’s a way if you want to use it.

If your complaint is about I2P needing some configuration and time to use properly; that’s a trade-off the end-user needs to decide. This doesn’t have any effect on its features regarding anonymity in the I2P network. Please give me technical reasons why you think TOR can preserve your anonymity better on the TOR network than I2P can do so on its network (I have arguments in favor of I2P that I would like TOR to implement but I don’t think they can)


This is a good read. I think it’s a good solution if it can be implemented properly. Are there applications you know of that allow you to personally (manually) encrypt text and communicate with another person like GPG does?


Use OpenVPN configured to look like HTTPS if you really need it. I2P is meant to be its own network, not a gateway to the clearnet. I still do not see how it has less measures in place for privacy and anonymity.


TOR is obvious too to someone snooping on your network, unless you’re using bridges (and that’s hit or miss). If you don’t want someone to know you’re using I2P, use OpenVPN and mask your traffic as HTTPS.

You’re going to have to explain better about “I2P not masking your traffic” and especially about “someone identifying you” - timing attacks are possible in both cases and the I2P Devs have mitigations against it. Please provide sources which define how I2P is weaker and more susceptible to TOR against network forensics


Please mention the “advanced features” it lacks compared to TOR. I have read the FAQ


I don’t think I understand what you’re implying. Are you arguing that PGP implements less secure operations because it doesn’t have perfect forward secrecy? As far as I know there’s not much out there in terms of encryption schemes for data at rest which includes PFS. Even AGE didn’t have it last time I checked. If you know about something that does provide PFS for data at rest, let me know


PGP is the protocol, GPG is the implementation. People tend to use GPG because it is FOSS.


Possiblylinux127 seemed like he had founds faults in PGP’s encryption which got me interested


Confirmed the troll.

From the FAQ:

Before you use I2P, use Basic Computer Hygiene Always! Apply your OS vendor provided software updates in a prompt manner. Be aware of the state of your firewall and anti-virus status if you use one. Always get your software from authentic sources.

It may be dangerous to use I2P in what the project calls “Strict Countries”

Most I2P peers are not in those strict countries and the ones that are, are placed in “Hidden Mode” where they interact with the rest of the network in more limited ways, so that they are less visible to network observers.

Unlike Tor, “exit nodes” - or “outproxies” as they are referred to on the I2P network - are not an inherent part of the network. Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. There are very, very few of these.

There is an outproxy guide available on our forums, if you would like to learn more about running an outproxy.

If you are hosting something sensitive, then your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to real-world events could probably de-anonymize you with enough effort.

I2P has defenses available against this like multihoming or Tahoe-LAFS

I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination.

In addition, you may be vulnerable to collusion between the outproxy operator and operators of other I2P services, if you use the same tunnels (“shared clients”).

In theory, if you’re accessing the clearnet, then it is no better or worse than TOR. It is a little better if you’re stay in I2P land.

Don’t listen to me or him. If you’re reading this, go to the FAQ (https://geti2p.net/en/faq) and make your own decisions.



That’s for encrypting text, regardless of the medium. Explain “not very good”?


If I understand correctly, stream isolation will route different connections through different circuits. If you’re doing two different things of a sensitive nature, open different browsers and applications, use random user-induced delays in your actions/responses and PGP-encrypt everything. And listen to what the TOR project says about the mitigations. I have some reading to do myself I guess



The police are stupid (how did they think they could catch any criminal by raiding an exit node operator? Did they manage to compromise TOR completely? Didn’t think so), and I hope the people of the NGO are alright.


Instead of having a central server, consumers interact with each other directly. That’s P2P Vs centralization.



Well, time to teach Malaysians about DNS and anarchy then



These guys ever heard of Mozilla and good old ECH along with DoH? Just lol at these noobs.

And if the Malaysian government wants to try fucking with American tech they’ll get what’s coming for them



Better repairibility and no useless features like they’re pushing. Graphene is good but it’s not the only privacy-focused Android distribution


Take the Fairphone over the Pixel since you’re in Europe


Just use Librewolf + Mullvad with extensions. Problem solved


Get a domain against XMR from Njalla/NiceVPS/IncogNET.

Purchase a VPS with XMR.

Host website on it along with a WAF, Fail2ban, and maybe Cloudflare free account if you’re OK with that (there are ways to not use Cloudflare but they’re a bit more advanced).

Host it over the clearnet, TOR, I2P and FreeNET for universal access.


Somebody teach the kids to pentest: get into their REST API and ring it for every desk this stupid sensor is placed in. If you’re better than average, get into the operations of the electric controller which these sensors are powered through and fry them. Cost the school millions and they’ll (maybe) come to their senses


Apologies, yes Threema and Molly are centralized since they depend on proprietary servers. SimpleX and Briar are FOSS and P2P over TOR


Everybody needs to switch to Simplex/Briar/Threema/Molly ASAP. I’d like to see them try and ban F-droid LMAO




If you’re interested, I’d be open to DMing about privacy and security. I would like to learn more about your situation and your threat model and what measures you’ve taken


Most of them older devices. This is not the fault of the Lineage OS devs, but companies just aren’t allowing it anymore. So if you have a new device, Lineage OS is not an option, if you’re in the US


Most of them older devices. This is not the fault of the Lineage OS devs, but companies just aren’t allowing it anymore. So if you have a new device, Lineage OS is not an option, if you’re in the US



How to randomly pad files before encryption to prevent file fingerprinting?
Hi, I was planning to encrypt my files with GPG for safety before uploading them to the cloud. However, from what I understand GPG doesn't pad files/do much to prevent file fingerprinting. I was looking around for a way to reliably pad files and encrypt metadata for them but couldn't find anything. Haven't found any recommendations on the privacyguides website either. Any help would be appreciated! Thanks
fedilink

Donate to people/communities who run I2P/TOR/Freenet infrastructure?
I'd like to be able to contribute financially to people/communities who run infrastructure, such as nodes, for layers like I2P and Freenet. Where do I find them, and does contributing directly to the projects themselves help in this regard? Thanks!
fedilink


How do you take deliveries anonymously?
I realise that this question is subject to local trends (and I'm in the US), but I encourage people in other countries to submit their methods! How do you accept packages/deliveries anonymously? Of course, there are mail redirection services, but a third party which corroborates with different parts of the chain can likely figure out your identity and what you have purchased/have incoming. I haven't been able to find a good solution to this yet, and I believe the new rule in the US is that the receivers identity must be reported to the government? This (or a variation of this, I don't remember) is a recent event. Thanks!
fedilink

How do online marketplaces like Amazon and Ebay track electronics sales?
Say I purchase a laptop from Amazon/Walmart/any big box store. I assume they note down the unique identifier for the device and link it to the purchase, which has my credit card information. How would Ebay do this? I'm curious about the extent of information that the marketplace giants have of consumers purchasing electronics from them. Cheap Chinese gizmos might not have unique identifiers but a Dell Laptop certainly has a few. I'm sure some here can imagine the technical reason for the question. Have a good day ahead!
fedilink

What is the community’s opinion on Session and Session Automated Software?
As most people here might know, Session utilises a TOR-like onion routing system with some changes to route traffic. The username is the public key whilst the password is the private key. Recently, a new project built on top of this seems to be in the works: https://simplifiedprivacy.com/freespeech/ I'd like to know the community's opinion of session and how much would you trust its technology. Thanks!
fedilink

The recent problem of maintaining privacy on the Internet (includes Networking)
If any of you have been browsing r/privacy lately you would have come across the British student who had the Air-force literally swarm the flight he was on. This is because he made some joke about a bomb sitting in an airport. Current speculation suggests that Snapchat has a word-filter and could locate the IP as that of an airport, and notified authorities immediately. Another, somewhat less plausible reason posited is that the government holds the private keys for TLS-encrypted traffic for Snapchat and could decrypt and read the message and that's how they knew. ~~For the paranoid people here: the latter claim, even if it is not true, poses great concern to us. If im may be permitted to run with it; It essentially means that using a public CA isn't exactly safe anymore. For all of you homelabbers using Let's Encrypt - think again.~~ Don't listen to me, I don't understand certificates well. Talking on a tangent: let us consider the position of TOR. It has been said that TOR devs accommodate the government and the government has backdoors built in TOR. And even if they didn't, the technique of owning a majority of instances running TOR nodes will allow them to identify and associate traffic. TOR is not safe if you want to really keep your content private. On a similar vein, I am a bit skeptical of the privacy advantages of using session, but I have yet to read their whitepaper. I haven't read much about i2p, but I wouldn't be surprised if the government has their paws in there too. What are you doing to browse and communicate privately today?
fedilink

My idea of maintaining E2EE between people in the age of the UK’s and EU’s anti-privacy laws
Before I say anything else, I should mention that this is nothing ground-breaking, neither is it terribly difficult to implement. This is simply how I envision a simple solution. Basically, the EU and the UK want the secret keys to your encrypted media/messages. Which essentially breaks encryption completely, ending E2EE usage. The alternative is, then, for the user to utilise their own form of E2EE. How though? The answer, in my opinion, is personal exchange of keys utilising asymmetrical encryption. Exchanging public keys in plaintext is fine as long as they don't have your private key. Which means unencrypted services like SMS could also be secured using this method (for example, have the public key of a user in their profile). I believe QKSMS employed encryption for SMSes for as long as it lasted, but no idea about the kind of encryption). Technically, if everyone started to use p2p messengers with asymmetrical encryption, the EU would have very little they could do without compromising every mobile in the region and preventing people from downloading APKs somehow (sorry iOS users but you're never going to have privacy anyway). However, this is only possible with a FOSS project, because a company would have to fork over the keys anyway to stay alive. A FOSS project can simply be forked once the OG maintainer stops working on it due to government pressure. That is where the problem comes, since FOSS projects can't really run their own servers to store media, making p2p the only viable option. But with some people behind CG-NAT, that becomes harder for non-technical users. I don't have a way to solve this other than the general population becoming tech-savvy enough to give a damn. Tl:dr; FOSS projects are best suited for implementing personal E2EE between users, but that makes p2p the only viable option without a back-end, which makes it difficult for people behind CG-NAT. Cheers
fedilink

How do I learn more about using RF to improve my privacy?
Hi, I have been having a look at utilising RF and trying to understand how every device around me emits RF. I recently came across RTL-SDR and HackRF, alongside software like SDR++, TempestSDR, `gqrx` etc. I know that I can spy on my monitor and record keyboard keys being pressed using RF, but what are some other ways I should be looking at to exploit my digital vulnerabilities, and trying to solve such problems? Thanks! --- Edit: I'm well aware that nothing I'm doing is that interesting to security agencies across the globe. With that said, I'm interested in maintaining my privacy, and this happens to be an avenue I find interesting. Any suggestions on how I can look to do so would be greatly appreciated!
fedilink

Is there a newer model of desktop/laptop/motherboard which supports Coreboot?
As far as I can see, the T440p is the latest Thinkpad to support Coreboot/skulls. If I wanted something newer (say, something from 2019-2022 or so) under $400, what could I even get? I want to run my own choice of linux distribution on it, so most chromebooks are out of the question (also I'd like something more powerful and upgradeable). Thanks.
fedilink

Can we prevent cars from sending data to servers if we remove their antennae?
I don't know anything about cars. Now that we have established that cars seriously undermine our privacy (look at the flurry of posts in this community in the last few hours), what can we do about it? From a networking POV, if you remove the ability to connect to the Internet, it doesn't matter what the car is recording as long as you can ensure there is no physical tampering. Depending on who you are, this is a good idea, and doable for the most part (very few people have the technical knowledge to pull out the right chip from a car). So, how do we achieve this? I implore the community to invite mechanical/car engineers who can help us on this matter, and to form methods to prevent vehicles from accessing the Internet without express consent from the user. Thanks!
fedilink

I just want to say that I’m so happy that people are taking notice of privacy concerns in cars
Mozilla released their studies, and I'm seeing a growing number of posts on the Internet about cars and the privacy nightmare they entail. I remember how this issue wasn't talked about earlier because "just buy an older car" was still prevalent. I'm so happy that people are taking notice. Thank you to this community and Mozilla for the work they are putting in!
fedilink

Which car to purchase to escape surveillance?
Just came across a post on Reddit asking about cars, thought I'd ask here too. The article the reddit post cited was: https://www.thankyourobot.com/2023/07/on-road-to-privacy-invasion-unmasking.html In short, if I'm in the market to purchase a new car, which one should I go for to improve privacy? And if we assume that such a thing is not possible anymore, what can we do for our (newer) cars to be more private? I was considering things like removing the radio antenna (if I can, that depends on the model of the car). I'm also interested in knowing just how would car companies mine information from a car if I haven't connected my mobile to it? Do cars have SIMs inside them that have free 4G/5G access and can send information that way? How would I check if my car is doing something like this? Thanks!
fedilink