Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 23 |
Nodes: | 6 (0 / 6) |
Uptime: | 54:37:07 |
Calls: | 583 |
Files: | 1,139 |
D/L today: |
179 files (27,921K bytes) |
Messages: | 111,801 |
... to update the group at large, here are VPN's I'm testing.
We can use our conversation here as an example of something.
First, as a 'basis' of the non-privacy end of things; I don't use a
privacy browser at all. I also use an NSP which not only requires reg,
it also requires payment annually. OK fine.
You instead are using blueworldhosting as your NSP to post here and like most other people including me, do not expose your IP to the 'world' via
the NSP nor your name and email. OK fine. We aren't that different.
Your NSP has excellent retention and no reg.
If someone wants to 'uncover' your persona, they would start w/ the IP
you connect to blueworldhosting and the 'clarity' of your handwriting
which I have observed in your messages for years.
I don't think it would be that hard to uncover you; not that I am any
kind of fan of dox/ing, but it could be part of a conversation about
privacy that involves who is the/your adversary and who isn't.
My 'philosophy' is that I don't have adversaries who need to know who I
am and so I don't have to go to any trouble for 'severe privacy'.
To me, the only people who need severe privacy are criminals and those
who are actively fighting against an oppressive state actor; that is, if
you do dev a strong adversary w/ some kind of power, you have a problem.
Typically the people who discuss privacy in such as the privacy groups
don't actually *state* why they are so interested to go to so much
trouble and inconvenience. I do NOT believe that people do that just
for the fun or challenge of it, but I also do NOT know what other
reason/s they could possibly have besides the ones I mention here.
Completely free anonymity on the internet comes at a price to someone.
Various providers who can 'easily' accommodate anonymity w/ their
services do so for whatever their own 'personal' reasons. Free/open
NSPs, free mail2news, a 'certain amount' of free VPN, free tor.
There's not much (hardly any) free connectivity; there used to be a free local dialup provider but that went away, there is some free wifi and it
is possible to 'steal' some wifi.
So, given that it is likely /easier/ to anonymize payment, it is
/perhaps/ easier to anonymize one's whole persona at a relatively low
cost, than to try to get some kind of 'perfect' free anonymity online.
I'm frugal, but I'm also practical. I'm also a skeptic; watch out for
those who are providing you a free product, you may BE the product.
There are two golden rules for privacy on the net, and one is to never
register for anything (the other is never pay with a traceable method).
Anyone doing either of those forbidden actions (especially nowadays with
even throwaway emails requiring phone or a second email validation) will
never stand a snowball's chance in hell to have any privacy, even with VPN.
While I choose not to actually /do/ it, I have done some 'thought experiments' in resolving what is 'troubling' privacy above.
You need an anonymous persona. There are a number of ways to create
that; I think the most practical approach is the concept of a 'burner' phone, so solve the 'connectivity' problem along w/ the anonymous
persona problem; that is, first step.
The other thing you need is anonymous 'finances' in the form of a
cryptocoin which aids anonymizing. Personally I haven't dev/d a full 'background' on the coins, but I don't much like the ones which are too speculative. You can't really 'get' a true stablecoin which is also anonymizing, but you can get coins which /are/ anonymizing and much less speculative than such as bitcoin.
Since this thread is *actually* more of a 'severe' privacy issue than it
is a 'browser' issue, except that the thread is about wanting a Ffx type browser (if possible) AND severe privacy, you HAVE TO solve the severe privacy first, and that requires an identity/persona w/ the ability to
pay for things. There is no such thing as a free ride when you impose
all of the restrictions you have decided upon.
Mike Easter wrote :
My 'philosophy' is that I don't have adversaries who need to know who I
am and so I don't have to go to any trouble for 'severe privacy'.
My adversary is Google. Microsoft. Apple. Meta. Amazon. et al.
To me, the only people who need severe privacy are criminals and those
who are actively fighting against an oppressive state actor; that is, if
you do dev a strong adversary w/ some kind of power, you have a problem.
Luckily you added "severe privacy", as if you just used the regular privacy word, that's something *EVERYONE* is entitled to. Basic privacy is a right.
Snowden often compares privacy to free speech.
Marion wrote:
Snowden often compares privacy to free speech.
I don't 'read' Snowden; I don't concur w/ Snowden's beliefs. I am more
in favor of the surveillance 'benefits' than I am in favor of what ES did.
While he would rather be in the US or somewhere like Germany,
Snowden said it helped that Russia viewed him as useful publicity.
If you want to have some kind of activist as a hero, I recommend
Aaron Swartz instead; he was a lot smarter, but a sadder case who
gave up and died instead at 26 y/o.
The Brilliant Life and Tragic Death of Aaron Swartz
He was a child prodigy, an Internet pioneer and an activist who
refused to back down - even when the feds tried to break him
ikclbgejgcbdlhjmckecmdljlpbhmbmf : HTTPS Everywhere : version 1_0
ikclbgejgcbdlhjmckecmdljlpbhmbmf : HTTPS Everywhere : version 1_0
<https://www.eff.org/https-everywhere>
<quote>
You no longer need HTTPS Everywhere to set HTTPS by default! Major
browsers now offer native support for an HTTPS only mode.
Any others?
I already stated this in another posting: what about fingerprinting?
What about fingerprinting? Not only your browser can be unique, but also
the way you type.
<https://amiunique.org/>
(results in a server error atm)
<https://coveryourtracks.eff.org/>
I already stated this in another posting: what about fingerprinting?
Thanks for that suggestion, where I don't know if there's a single
well-known commonly suggested "fingerprinting prevention" extension.
Marion wrote:Websites can't [directly] tell which add-ons you have installed.
I don't know if there's a single
well-known commonly suggested "fingerprinting prevention" extension.
What I actually meant was: aren't you making your browser more and more /unique/ by using all those add-ons? I feel like it's only going to make
your browser more and more unique and recognizable, so it would make fingerprinting easier.
Websites can't [directly] tell which add-ons you have installed.I don't know if there's a single
well-known commonly suggested "fingerprinting prevention" extension.
What I actually meant was: aren't you making your browser more and more
/unique/ by using all those add-ons? I feel like it's only going to make
your browser more and more unique and recognizable, so it would make
fingerprinting easier.
IME it's almost impossible to not show a unique fingerprint ID.
I've tried making changes, such as finding the "most unique" identifiers
and getting my FF to use "less unique" alternatives, such as a popular Chrome version user-agent, making my language preference and location
USA rather than UK
But how many of us have actually used a crypto coin in our lives?
I haven't.
Have you?
I have not.
But I have enough 'academic' interest in this privacy
business that I would consider 'devising' an anonymous persona,
including that persona having a cellphone/number/account.
There is also a problem about strategies to use that coin to pay for
things; not all useful providers accept the type of coin one might want;
you have to have one of /these/ kinds of coins to pay for one of /those/ kinds of coins because the provider doesn't accept one of them.
So, while you are trying to puzzle out the free browser privacy
business, I'm trying to figure out paying for a connectivity provider for/with a bogus persona.
But, 'my' topic or interest is OFF topic for this Ffx group.
For some
reason, it also seems off-topic in the privacy groups because those
people don't even like to use conventional agents to post to
conventional NSPs, so we are very far apart in our interests.
1. User-Agent Switcher and Manager : version 0_6_4
2. uBlock Origin : version 1_65_0
3. NoScript : version 13_0_8
4. Cookie AutoDelete : version 3_8_2
5. Font Fingerprint Defender : version 0_1_6
6. WebRTC Control : version 0_3_3
7. Location Guard (V3) : version 3_0_0
8. Referer Control : version 1_35
9. Skip Redirect : version 2_3_6
10. StayInTab : version 1_0
11. ClearURLs : version 1_26_0
12. Decentraleyes : version 3_0_0
13. LocalCDN : version 2_6_79
14. Trace - Online Tracking Protection : version 3_0_6
15. Canvas Blocker - Fingerprint Protect : version 0_2_2
16. Browsec VPN - Free VPN for Chrome : version 3_92_2
17. Privacy Badger : version 2025_5_30
18. CthulhuJs (Anti-Fingerprint) : version 8_0_6
Meanwhile, I've been testing the VPN extensions which passed the initial tests, where my fungible test-rating system puts them in this order:
1_browsec
2_1clickvpn
3_1vpn
4_vpnly
5_xvpn
6_securefreeedgevpn
7_setupvpn
there is no longer a 'VPN Guy' like there used to be to 'investigate' VPNs.
It's ironic that I needed to add an "extension manager" to this list, as I test each and every extension above in detail against privacy test sites.
Marion wrote:
It's ironic that I needed to add an "extension manager" to this list, as I >> test each and every extension above in detail against privacy test sites.
It is not my 'idea' to argue w/ you 'against' privacy, but just because >privacy is a worthwhile concept does not mean that 'people' should
engage in some particular aspect of privacy *for NO purpose*.
That is, if you are going to 'junk up' your browser w/ all kinds of >extensions and *slow down* your connectivity because you think it is >/better/ to have /more/ privacy, FOR NO PURPOSE, that makes no sense.
You can't just say, the purpose is privacy, and privacy is good, so
everyone should have more privacy.
That is not correct. Any measure that you take should have a *REAL*
purpose, that benefits you, and particularly not /someone else/ instead.
Each individual must make some assessment of his own 'need' for privacy, >what is important to HIM, not some kind of notion that someone else has >'sold' to him.
I think /most/ VPN services are not needed by the people who are using
them, either free or pay, because 'everyone' is selling the idea of VPN.
I have yet to be 'convinced' that I should be using a VPN 'regularly'
for /anything/ w/ the possible exception of accessing some site that I
am blocked from because of my geolocation.
In summary, we're pretty close to making a DIY browser, in both
Mozilla-land and Chromium land, that is distinct from the mothership
browser in terms of inherent privacy as tested against privacy test sites.
In summary, we're pretty close to making a DIY browser, in both
Mozilla-land and Chromium land, that is distinct from the mothership
browser in terms of inherent privacy as tested against privacy test sites.
FYI <https://amiunique.org/> is up again.
Meanwhile, I've been testing the VPN extensions which passed the initial tests, where my fungible test-rating system puts them in this order:
browsec
1clickvpn
1vpn
vpnly
xvpn
securefreeedgevpn
setupvpn
Bearing in mind these all failed the most basic initial VPN tests.
hotspotshieldvpn
itopvpn
protonvpn
urbanvpn
hidemevpn
hiddenbatvpn
tunnelbearvpn
windscribevpn
I ditched the VPN extensions in order to test a SOCKS5 proxy tunnel.
How to add Socks5 to your Windows 10 browser sessions:
1. Start Psiphon & make a note of the SocksV5 port in the log output
2. Start Freecap & add the Socks5 port for Brave into the settings
3. Add Brave (or any browser) into the Freecap settings
4. In Freecap, add any command-line performance flags for the application
ungoogled-chromium --proxy-server="socks5://127.0.0.1:1080" ungoogled-chromium --proxy-server="http=127.0.0.1:8080"
I ditched the VPN extensions in order to test a SOCKS5 proxy tunnel.
If all the proxies slow down after a few days, are they trying to be
caching proxies? Can they just operate as "direct" proxies without caching?
I note you said "if all the proxies slow down", where I think you had meant "if all the VPN extensions slow down",
I note you said "if all the proxies slow down", where I think you had meant >> "if all the VPN extensions slow down",
Well, you said you were ditching the VPN extensions, and had switched to SOCKS5, and then gave a long list of "X slows down", "Y slows down" ...
dir /b .\vpn_extension\working\.browsec
dir /b .\privacy_extensions\.fontfingerprintdefender
hotspotshieldvpn ==> fails the initial VPN extension test conditions
itopvpn ==> fails the initial VPN extension test conditions
protonvpn ==> fails the initial VPN extension test conditions
urbanvpn ==> fails the initial VPN extension test conditions
hidemevpn ==> fails the initial VPN extension test conditions
hiddenbatvpn ==> fails the initial VPN extension test conditions
tunnelbearvpn ==> fails the initial VPN extension test conditions
windscribevpnv ==> fails the initial VPN extension test conditions
At the moment, we have 3 options for a privacy browser with IP obfuscation.
1. System-wide VPN + the 18 browser-privacy extensions listed above
2. Browser VPN extensions (any of the 8 above that passed initial tests)
3. Local open-source SOCKS5 Proxy Tunnel (Psiphon + FreeCap)
All three methods worked for me, so far, for my privacy purposes.
OMG. Everything I touch in Windows has needlessly unnecessary complexity.
psiphon3.exe -mode=socks <== this doesn't exist... bummer
gvim C:\path\to\register_dummy_browser.reg
I never messed with proxies before, but darn'it, Windows splatters proxy settings all over the place, such that I needed a quick testing script.
brave.exe --proxy-server="http=127.0.0.1:30884;https=127.0.0.1:30884;socks=127.0.0.1:1080"
Network Settings) to point directly to Psiphon's SOCKS5 port, skippingFreeCap entirely.
Chromium ==> respects Windows proxy settings (which Psiphon sets for you)
Mozilla ==> ignores Windows proxy settings (but has their own settings)
netsh winhttp import proxy source=ieNow system services (which often ignore WinINET) will use
nul') do set ProxyEnable=%%Bfor /f "tokens=2,* skip=2" %%A in ('reg query %KEY% /v ProxyServer
nul') do set ProxyServer=%%Bif "%ProxyEnable%"=="0x1" (
nul') do set PACurl=%%Bfor /f "tokens=2,* skip=2" %%A in ('reg query %KEY% /v AutoDetect 2^>nul')
Unfortunately, I've run into this proxy setup complexity due to using
A. VPN, which encrypts traffic and changes routing;
B. Psiphon, which tunnels & encrypts SOCKS5 & HTTPS traffic;
C. FreeCap, which redirects app traffic through SOCKS proxie
Socks5 Vs. VPN - WhatrCOs the Difference?
You tend to prioritize the 'free' aspect of things
If you are going to trust your connectivity provider w/ your identity,
why not find a privacy service that you are willing to trust?-a It seems like the same thing.
Why Proton VPN does not offer a SOCKS5 proxy
I would consider that opinion 'biased' in that it doesn't mention the
fact that socks5 is faster for certain purposes in which speed trumps encryption.