Schleuder is an encrypting mailing list manager with remailing-capabilities. Subscribers can communicate encrypted (and pseudonymously) among themselves, receive emails from non-subscribers and send emails to non-subscribers via the list.
Schleuder aims to be robust, flexible, and internationalized. It also provides an API to be used with schleuder-cli and/or schleuder-web.
@silverpill@stefano@sun@jeffcliff someone in DMs made a good point that "ublock should be configured in a way that makes browser fingerprint identical for all users"!
Is a good point because another addon #noScript doesn't do this. Is VERY different when you u manually install it, as opposed to the version built into torbrowser. Manual installing NoScript in say #iceWeasel or #librewolf has disappointing exceptions to blocking #javascript, they don't block js of 40 CAGeMAFIA, netflx, yahoo, and pay(Prowl) domains/disservices.... therefore ENTRENCHING the past 25 years of effective #colonialism and i would say #fascism. A person needs to manually untick each of the 40(!) CAGeMAFIA domains every time they install (and reset!) the addon. Whereas tor browser, in Safest Mode of course, at least begins to level the playing field and blocks all js by default not giving favorable treatment to #oligarchs. (tangential to this problem, I believe tor could be much more transparent in highlighting sites that entrench the #technocracy, maybe it should include #yandex and #bytedance too and put a warning in the corner that a site is on #bigtech??)
To my surprise, the https://tails.net page states that @torproject are the developers of tails (!!!) so we can ask them direct....
"Hi Tor Devs,
1)why is uBlock on Tails' Tor browser and not in other tor browser installs? That immediately creates a browser #fingerprint and your project is against #fingerprinting because it negatively affects #anonymity, have you considered asking people whether they want to disable uBlock when they open tor browser, as per my response to @ma10gan above? 2) does the built-in uBlock in #TailsOS differ in anyway from a manual install of the addon of the same version? 3) while failing at (1) but confirming (2), can a link to the latest version of ublock used by Tor be placed on this page where ublock is mentioned, so people using Tor outside of Tails can stay up to date?
Thanks and looking forward to hearing back from #TorProject on this fairly serious discrepancy.
Someone threw my use of anonymity up at me the other day, while objecting to a comment I'd made (it happens: I don't always get it right.). The implication was clear: Anonymity is harmful.
Respectfully, I disagree, and want to open this up for conversation because I think for some it's become frozen as Anonymity = Bad. General discourse around Troll behaviour seems to have cemented this idea in people's minds: "If you're not showing your whole identifiable/verifiable birth-self (#Truther) then you're doing it for nefarious reasons", backed up by cod-psychology around that mask liberating people to be their inner asshole.
This emphatically does happen but it's not always the case.
I've had more battles online than I can count, coming up for a quarter of a century's worth. I'm opinionated and like to set people straight - particularly if there's clear harm involved in someone's words or actions. Racism, Misogyny, TERFism...I've scars from fighting against all of them.
But I'm also quite a private person. Some people I clash with are pretty much evil (or behaving that way). I feel that requires protection; I need a level of protection. Over the years I've become very comfortable with creating a shield persona that keeps me safe. My Internet Name, Uraael, is part of this. I am Birth Name online only in certain circumstances, usually where I can't avoid it.
But this does not mean I change who I am, or how I deal with people. Perhaps I'm a touch bolder online? Perhaps conversations are easier to follow and interact with here instead of neuro-divergently puzzling them out in meat-space? These aren't things I have much control over, much as I might wish otherwise. But by and large I try hard to remain authentic to who I am everywhere.
Extrapolating outward, there could be any number of perfectly legitimate reasons why a person might want their identity shielded. The LGBTQIA community is a perfect example. Being who they/we are can have unpleasant and even life-threatening real world implication. Providing yourself some cover therefore makes perfect sense. If you don't need that then I'd suggest you enjoy a level of privilege that many others don't (my accuser was a white cishet male...), and would ask you consider what it's like in their world for a second before passing accusative judgement.
You might have to work a little harder to really truly know who I am but my heart and soul are right there every day in my posts and replies. Judge not a book by it's shiny animated cover.
Einer der größten Angriffe auf unsere Freiheit soll übermorgen beschlossen werden. Flutet doch mal die Postfächer eurer political party und sagt was ihr davon haltet.
“Australia’s spies and cops want ‘accountable encryption’ - aka access to #backdoors”
“he outlined an argument that a dynamic tension exists between security and technology, Burgess added “encryption protects our #privacy and enables our #economy…and creates safe spaces for violent #extremists to operate, #network and #recruit.” #Burgess labelled encryption “clearly a good thing, a positive for our democracy and our economy” because it “protects #privacy, it enables communications and transactions.” But he noted it also provides #criminals with #anonymity, which is why #Australia has laws that make it possible to access encrypted messages.”
@gnutelephony Torrenting #patches and updates over #I2P, is probably the closest thing to anonymous contribution.
The firewall that blocks #CAGEMAFIA, namely DigitalFeudalismCounterAction, was first distributed by #torrent, iwrc. Though I think the torrent tracker may have other issues based on what we've discussed above.
#Twitter recently obtained a subpoena compelling #GitHub to provide identifying information on a user who posted portions of the social network's source code, giving the company until April 3 to provide details on user "FreeSpeechEnthusiast".
“DICT’s ‘Project: SIM Check Mo’ puts subscribers at risk of number scraping, other attacks”
“The project lets any mobile user to text “SIM Check” plus the phone number of any subscriber to 1326 (DICT’s hotline), and they will receive the registration status of the number, the initials of its owner, and if the record of the number is in good standing.”
‘“Project: SIM Check Mo” is a “solution” looking for a problem that it can eventually become. Already, foreign numbers such as Malaysian ones are being used to spread spam and scam messages to Philippine mobile subscribers. SIM Check Mo simply cannot address that. As such, this project will be a failure from day one.’
“NTC, telcos checking legality of deactivating apps, services for unregistered SIM users”
"Let's say after the 60 days, you will lose your access to your Facebook accounts or our TikTok accounts, but you still can use your phone, you can still call, you can still text. And then after a certain period, you will lose your outgoing calls," Uy explained.
The official said the same tactic has been implemented in other countries.
In India, a number of Chinese mobile applications, like TikTok, are banned due to security concerns.
“The National Telecommunications Commission said Wednesday it did not give permission for telcos to use emergency alerts to remind their users to register their SIMs.”
"The SIM card registration is an invasion of privacy and the alert warning for this is not the disaster I envisioned when I authored the bill," Colmenares said.
“While we understand the importance of addressing crimes, misinformation, and scams, the Mozilla Philippines Community firmly believes that the policy neglects the critical role of online anonymity in safeguarding whistleblowers and promoting public discourse. Additionally, the deployment of digital identity systems may create security risks that could have catastrophic effects in the event of a data breach.”