GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    racist teto (teto@cawfee.club)'s status on Monday, 17-Feb-2025 20:43:20 JST racist teto racist teto
    "you don't need a vpn"
    They get your address from your fucking ISP in Germany and then knock on your door. Use a fucking VPN.
    In conversation about 3 months ago from cawfee.club permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 20:43:15 JST 翠星石 翠星石
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @sally @teto A VPN is often useless for privacy, as really VPNs log everything (even if the VPN host doesn't log, the datacenter and/or the NSA logs) and all your browsing is tied to a single VPN account that can be used to correlate all your internet activities.

      If you want privacy, you want to use Tor Browser.

      The main practical use of a VPN is to get away with unauthorized copying.
      In conversation about 3 months ago permalink
    • Embed this notice
      𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 (sally@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 20:43:16 JST 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      in reply to
      @teto

      It won't protect you if you connected for the last decade using clear IP to a proprietary social media, they have everything logged, if feds see the IP is from a datacenter in Thailand but the guy is obviously a german citizen they'll just politely demand Facebook/Twatter/Jewgle for it.

      The best course of action is first and foremost don't share opinions on a honeypot, don't have accounts bound to any real identifiable identity, and then you can go and get yourself a reputable VPN such as Mullvad to mask your fingerprint.
      In conversation about 3 months ago permalink
    • Embed this notice
      racist teto (teto@cawfee.club)'s status on Monday, 17-Feb-2025 20:43:17 JST racist teto racist teto
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @sally IPs here are shared among many people. I have the same public IP as other Germans.
      In conversation about 3 months ago permalink
    • Embed this notice
      racist teto (teto@cawfee.club)'s status on Monday, 17-Feb-2025 20:43:17 JST racist teto racist teto
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @sally a vpn protects your from feds seeing your ISP. And they get all other info from them
      In conversation about 3 months ago permalink
    • Embed this notice
      𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 (sally@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 20:43:18 JST 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      in reply to
      @teto

      Same deal. If you post opinions from Facebook, Twatter or 4chan that you posted on for the last decade using your real IP it won't matter if you use a VPN.
      In conversation about 3 months ago permalink
    • Embed this notice
      racist teto (teto@cawfee.club)'s status on Monday, 17-Feb-2025 20:43:19 JST racist teto racist teto
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @sally they raid you for opinions here not torrents
      In conversation about 3 months ago permalink
    • Embed this notice
      𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 (sally@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 20:43:20 JST 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      in reply to
      @teto

      Or ideally torrent through I2P, right now the only drawback is bandwidth and that has easy solution, the more routers the better bandwidth.
      In conversation about 3 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 20:54:41 JST 翠星石 翠星石
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @teto @sally >blind to how govs actually "get" you and arrest you.
      The glowers get you by deanonymizing you, which is trivial for a clearnet connection, harder for a VPN connection and very difficult for a tor connection.

      >Tor browsers are too slow for daily use.
      Skill issue. Works on my machine.

      >VPNs already make it too complicated for the police to find you.
      VPNs may make the police give up on finding you, but if they really want to find you, they will find you despite using a VPN.

      >prove your case with an IRL raid that happened in Germany.
      Why would the glowers publicly announce their covert glowing activities?
      In conversation about 3 months ago permalink
    • Embed this notice
      racist teto (teto@cawfee.club)'s status on Monday, 17-Feb-2025 20:54:42 JST racist teto racist teto
      in reply to
      • 翠星石
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @Suiseiseki
      Your extremism makes you blind to how govs actually "get" you and arrest you. Tor browsers are too slow for daily use. VPNs already make it too complicated for the police to find you. Just fucking believe it or prove your case with an IRL raid that happened in Germany.
      @sally
      In conversation about 3 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 21:01:50 JST 翠星石 翠星石
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      • 夜化
      @Yoruka @teto @sally Indeed - it doesn't help if the tools you have deliver perfect anonymity if you go and dox yourself anonymously.
      In conversation about 3 months ago permalink
    • Embed this notice
      夜化 (yoruka@eientei.org)'s status on Monday, 17-Feb-2025 21:01:52 JST 夜化 夜化
      in reply to
      • 翠星石
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @Suiseiseki @teto @sally it all comes down to your OPSEC and behaviour online, how much do you reveal about you. Just the right tools isn't everything
      In conversation about 3 months ago permalink
    • Embed this notice
      Marshall1Banana :verified: (marshall1banana@poa.st)'s status on Monday, 17-Feb-2025 21:13:01 JST Marshall1Banana :verified: Marshall1Banana :verified:
      in reply to
      • 翠星石
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @Suiseiseki @teto @sally if the glowies want you they have other ways to get you- like project Bluebeam or w/e it was called. It was a thing on the PRISM leaks where they have the capacity to plant evidence on your PC with a remote connection.
      In conversation about 3 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 21:13:01 JST 翠星石 翠星石
      in reply to
      • Marshall1Banana :verified:
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @Marshall1Banana @teto @sally >where they have the capacity to plant evidence on your PC with a remote connection.
      Of course they would trivially have such capability if you run a proprietary OS with a built-in backdoor.

      That's why you run 100% free software - can't use a backdoor if there isn't any.
      In conversation about 3 months ago permalink
    • Embed this notice
      Marshall1Banana :verified: (marshall1banana@poa.st)'s status on Monday, 17-Feb-2025 21:21:02 JST Marshall1Banana :verified: Marshall1Banana :verified:
      in reply to
      • 翠星石
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @Suiseiseki @teto @sally Theres open source cellphone OS?
      In conversation about 3 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 21:21:02 JST 翠星石 翠星石
      in reply to
      • Marshall1Banana :verified:
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @Marshall1Banana @teto @sally I use a GNUbooted KGPE-D16.

      There is only one free software cellphone OS; https://replicant.us/ unfortunately that can't do anything about the proprietary malware that runs on every single mobile chipset.
      In conversation about 3 months ago permalink

      Attachments


    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 21:21:47 JST 翠星石 翠星石
      in reply to
      • Mancow Muller ?
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @cowanon @teto @sally The only fully source-available and also free software mobile OS is Replicant; https://replicant.us/

      Stuff like LineageOS and PostmarketOS is full of proprietary software and isn't even completely source-available.
      In conversation about 3 months ago permalink

      Attachments


    • Embed this notice
      Mancow Muller ? (cowanon@nicecrew.digital)'s status on Monday, 17-Feb-2025 21:21:48 JST Mancow Muller ? Mancow Muller ?
      in reply to
      • 翠星石
      • Marshall1Banana :verified:
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      Lots of them. Most of them barely work, and the rest just plain suck.
      In conversation about 3 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 21:36:57 JST 翠星石 翠星石
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      • GNU/Gabi
      @gabi @sally @teto >You should also disable JavaScript, do not load custom fonts, enable tracking protection, isolate requests to first-party domains, spoof referers, and block third-party requests. Make sure Geolocation and WebGL are disabled.
      Yes, that's what safest mode does - manually setting those things would make you uniquely identifiable.

      You need to also set javascript.enabled=false in about:config, otherwise JavaScript sometimes still gets run.

      >HTML and CSS can still be exploited in browser-targeted attacks.
      As far as I can tell, all of such attacks have needed to leverage JavaScript, as it's too difficult to convince the user to follow the exact sequence of steps required to trigger the attack otherwise.
      In conversation about 3 months ago permalink
    • Embed this notice
      GNU/Gabi (gabi@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 21:37:00 JST GNU/Gabi GNU/Gabi
      in reply to
      • 翠星石
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @Suiseiseki @sally @teto
      >If you want privacy, you want to use Tor Browser
      You should also disable JavaScript, do not load custom fonts, enable tracking protection, isolate requests to first-party domains, spoof referers, and block third-party requests. Make sure Geolocation and WebGL are disabled.

      Remember that the WWW is extremely vulnerable. Even CSS can pose a risk. Disabling JavaScript removes many threats, but HTML and CSS can still be exploited in browser-targeted attacks.

      https://bugzilla.mozilla.org/show_bug.cgi?id=574059
      In conversation about 3 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: bugzilla.mozilla.org
        574059 - (CVE-2010-2752) nsCSSValue::Array index integer overflow (can lead to remote code execution via CSS font-face) (ZDI-CAN-831)
        RESOLVED (dbaron) in Core - CSS Parsing and Computation. Last updated 2010-08-10.
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 17-Feb-2025 21:37:19 JST 翠星石 翠星石
      in reply to
      • 翠星石
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      • GNU/Gabi
      @gabi @sally @teto *although manually setting
      In conversation about 3 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Tuesday, 18-Feb-2025 00:15:51 JST 翠星石 翠星石
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      • Yomiel
      @yomiel @teto @sally >Like Tor is too slow for daily use.
      Tor Browser will be too slow if all you do is run proprietary slop JavaScript, but decent webpages will load just fine.

      There are certain cases where the performance of a guard degrades to worse than dial up, but improvements have been made to that and you can just temporarily change to a bridge.

      >obviously no point of using it for internet banking
      The bank has no business in knowing where you're connecting from, thus there is a point in using it - alas many banks will go lock the account if you try to access it via tor.

      In the age of NSA spying, all browsing should really be done via tor.

      >Even watching video is pretty reasonable
      It's perfectly reasonably to download a 1080p video via tor and watch it later.
      In conversation about 3 months ago permalink
    • Embed this notice
      Yomiel (yomiel@new.asbestos.cafe)'s status on Tuesday, 18-Feb-2025 00:15:53 JST Yomiel Yomiel
      in reply to
      • 翠星石
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @sally @teto @Suiseiseki
      It's funny to hear people repeat stuff the just heard online. Like Tor is too slow for daily use. It's peak Dunning Kruger, they watch one video on Tor that explains it's basic functions, then the video maker will slander it (often accidentally) by calling it slow.

      In reality, Tor is good for any task that's either non-personal (obviously no point of using it for internet banking). Even watching video is pretty reasonable under Tor at low resolutions (< =720p).
      In conversation about 3 months ago permalink
    • Embed this notice
      𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 (sally@freesoftwareextremist.com)'s status on Tuesday, 18-Feb-2025 00:15:54 JST 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      in reply to
      • 翠星石
      @teto @Suiseiseki

      Tor is reasonably fast nowadays, specially if you don't touch exit nodes which you really shouldn't in the first place, I2P is the slow side of darknet.
      In conversation about 3 months ago permalink
    • Embed this notice
      Yomiel (yomiel@new.asbestos.cafe)'s status on Tuesday, 18-Feb-2025 00:19:58 JST Yomiel Yomiel
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      @sally @teto
      >you connected for the last decade using clear IP to a proprietary social media
      a lot of people forget this, switching to a VPN won't automatically give you privacy. You have to delete old account and make new ones anonymously.

      Surprisingly easy, though. Many even proprietary online stores have methods of buying truly anonymously. For example, Steam, you can use a gift card to buy games with. Amazon, you can deliver to a Amazon locker and purchase with gift cards. eBay has gift cards too.

      Emails can be created without any phone number or verification too.
      In conversation about 3 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Tuesday, 18-Feb-2025 00:19:58 JST 翠星石 翠星石
      in reply to
      • 𝅙𝅙𝅙𝅙𝅙𝅙𝅙𝅙
      • Yomiel
      @yomiel @teto @sally >You have to delete old account and make new ones anonymously.
      The issue with doing that is if you ever log into the account with the VPN off, you've just burned any privacy.

      Meanwhile, you can't accidentally turn off tor in Tor Browser.

      >you can deliver to a Amazon locker and purchase with gift cards
      Don't the lockers have spy cameras?

      >Emails can be created without any phone number or verification too.
      That's actually now pretty rare - the only place that I know of that currently offers mail accounts to tor users with no phone number or other verification is pissmail.
      In conversation about 3 months ago permalink
    • Embed this notice
      Thomas Magnum (leyonhjelm@shitposter.world)'s status on Tuesday, 18-Feb-2025 20:22:54 JST Thomas Magnum Thomas Magnum
      in reply to
      @teto

      Don’t be in Germany at all. Unless you’re a Turk I guess
      In conversation about 3 months ago permalink
    • Embed this notice
      bronze (bronze@pl.kitsunemimi.club)'s status on Tuesday, 18-Feb-2025 20:23:23 JST bronze bronze
      in reply to
      @teto also install Linux with full disk encryption
      Every normie tier distro has this option in the installer
      What good is seizing laptops when the drives are useless without your password?
      In conversation about 3 months ago permalink

      Attachments


      ✙ dcc :pedomustdie: :phear_slackware: likes this.
    • Embed this notice
      david (david@thinkpad.cfd)'s status on Tuesday, 18-Feb-2025 20:23:38 JST david david
      in reply to
      @teto reading that thread and
      >I use nordvpn
      Lol. nordvpn would give logs to the feds if they asked for it.
      mullvad has been proven that they don't keep logs. they got raided by the feds and found nothing
      In conversation about 3 months ago permalink
      ✙ dcc :pedomustdie: :phear_slackware: likes this.
    • Embed this notice
      CapitalB (capitalb@noauthority.social)'s status on Tuesday, 18-Feb-2025 20:24:06 JST CapitalB CapitalB
      in reply to

      @teto then write Turkish and nobody cares hahahaha

      In conversation about 3 months ago permalink
      ✙ dcc :pedomustdie: :phear_slackware: likes this.
    • Embed this notice
      racist teto (teto@cawfee.club)'s status on Tuesday, 18-Feb-2025 20:24:07 JST racist teto racist teto
      in reply to
      • CapitalB
      @CapitalB server? We are talking about posting "hate speech" on social medias. If you're not on "the right side of fedi" they will get your address with a single email. They could technically find you by just checking urls in your history at the ISP too
      In conversation about 3 months ago permalink
    • Embed this notice
      racist teto (teto@cawfee.club)'s status on Tuesday, 18-Feb-2025 20:24:07 JST racist teto racist teto
      in reply to
      • CapitalB
      @CapitalB all of this crap is going to become automated soon
      In conversation about 3 months ago permalink
    • Embed this notice
      CapitalB (capitalb@noauthority.social)'s status on Tuesday, 18-Feb-2025 20:24:08 JST CapitalB CapitalB
      in reply to

      @teto who's they? And who's logs do "they" get?

      I am 100% sure nobody on the sane part of the fedi collaborates with an oppressive state.

      In conversation about 3 months ago permalink
    • Embed this notice
      racist teto (teto@cawfee.club)'s status on Tuesday, 18-Feb-2025 20:24:08 JST racist teto racist teto
      in reply to
      • CapitalB
      @CapitalB collaborates? I just live here. And I'm not a coward like your ancestors and would flee over something like this
      In conversation about 3 months ago permalink
    • Embed this notice
      CapitalB (capitalb@noauthority.social)'s status on Tuesday, 18-Feb-2025 20:24:08 JST CapitalB CapitalB
      in reply to

      @teto dunno what you mean by my ancestors, they were here for 500 years at least

      A Texas based server would hardly hand out IPs to the BKA.

      In conversation about 3 months ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.