GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Ash Chapel (ashchapelsghost@poa.st)'s status on Monday, 09-Dec-2024 07:50:41 JST Ash Chapel Ash Chapel
    You DEFINITELY need to get a VPN.
    In conversation about 6 months ago from poa.st permalink

    Attachments


    1. https://i.poastcdn.org/a5a03de88f45e40bac27b37b9fe4cb6d69bd6c779762a0cfa2c2037b3869095c.png
    • Embed this notice
      Fish of Rage (sun@shitposter.world)'s status on Monday, 09-Dec-2024 07:50:40 JST Fish of Rage Fish of Rage
      in reply to
      @AshChapelsGhost a bnch of commercial vpns are owned by the same company that is run by a guy who worked for intelligence in the IDF
      In conversation about 6 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 09-Dec-2024 23:46:33 JST 翠星石 翠星石
      in reply to
      @AshChapelsGhost It is correct you don't need to rely on VPNs anymore to secure a connection with websites, since TLS.

      Too bad many TLS connections are MiTM'd by clownflare or google (but a VPN won't help with that).

      If you want any possibility of anonymity, a VPN will not do - you'll need to use Tor Browser.
      In conversation about 5 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 09-Dec-2024 23:53:53 JST 翠星石 翠星石
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @sally @AshChapelsGhost Unfortunately not enough people use i2p or GNUnet to build up a big enough anonymity set, although they're pretty good.

      Tor is focused on exiting, while i2p and GNUnet are focused on in-network.
      In conversation about 5 months ago permalink
    • Embed this notice
      𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 (sally@freesoftwareextremist.com)'s status on Monday, 09-Dec-2024 23:53:54 JST 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      in reply to
      • 翠星石
      @Suiseiseki @AshChapelsGhost

      > If you want any possibility of anonymity, a VPN will not do - you'll need to use Tor Browser.

      Or I2P, or Gnunet.
      In conversation about 5 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Tuesday, 10-Dec-2024 00:03:26 JST 翠星石 翠星石
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @sally @AshChapelsGhost >something the Tor project strongly discourages for some mysterious reason.
      Torrenting uses a lot of Tor's limited exit bandwidth, especially when using TCP, causes exit hosts to receive copyright complaints and most torrent clients work out your IP and sends that to either a tracker (many trackers only work over UDP and most torrent clients opt to bypass the SOCKS proxy for UDP so trackers work) or to the DHT, thus the intended goal of anonymous torrenting usually ends up failing.

      i2p and GNUnet meanwhile happily tunnels UDP, which bittorrent works great over.
      In conversation about 5 months ago permalink
    • Embed this notice
      𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 (sally@freesoftwareextremist.com)'s status on Tuesday, 10-Dec-2024 00:03:28 JST 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      in reply to
      • 翠星石
      @Suiseiseki @AshChapelsGhost

      I2P in my experience is enough robust that torrent is possible, something the Tor project strongly discourages for some mysterious reason. I would hope the future of free internet was taken over by I2P or Gnunet rather than Tor to be honest, exit nodes being so built into the network is an unacceptable compromise.
      In conversation about 5 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Tuesday, 10-Dec-2024 00:09:42 JST 翠星石 翠星石
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @sally @AshChapelsGhost Exit nodes are opt-in - if you connect to an .onion, your packets do not exit.

      Glowers host some guards and some exits, but they're removed when they're discovered as they only make up a small percentage of the network.


      i2p does not have in-protocol support for exiting, although one group is hosting exit tunnels that can be accessed via an .i2p address.
      In conversation about 5 months ago permalink
    • Embed this notice
      𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 (sally@freesoftwareextremist.com)'s status on Tuesday, 10-Dec-2024 00:09:43 JST 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      in reply to
      • 翠星石
      @Suiseiseki @AshChapelsGhost

      Yeah, that's a problem started because of exit nodes being opt-out rather than opt-in like on I2P, it's no surprise some users go around claiming Tor is compromised by corporate and federa agents.
      In conversation about 5 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Tuesday, 10-Dec-2024 00:22:55 JST 翠星石 翠星石
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @sally @AshChapelsGhost You can configure tor to not build circuits with exit nodes, although there is no Tor Browser setting for that - but you can just configure the bundled tor, or configure a separate tor and get Tor Browser to use that instead.
      In conversation about 5 months ago permalink
    • Embed this notice
      𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 (sally@freesoftwareextremist.com)'s status on Tuesday, 10-Dec-2024 00:22:56 JST 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      in reply to
      • 翠星石
      @Suiseiseki @AshChapelsGhost

      > Exit nodes are opt-in

      Is there any setting on the browser to block exit nodes entirely?
      In conversation about 5 months ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.