• 2 Posts
  • 66 Comments
Joined 3M ago
cake
Cake day: Aug 18, 2024

help-circle
rss

In countries where you MUST show your proof of identity to get a number, pray tell me what kind of OPSEC can you employ to not do that?





The problem is, if you’re in Europe, your phone number is associated with your identity


Arguable in it being “the best app for privacy”. Can you link to a source which shows that phone numbers are not linked to accounts? (Why do they need them anyway?)



TBH I would just use email over TOR and encrypt communication with PGP. Rotate identities every now and then and you should be fine. Yes it doesn’t have forward secrecy but it removes the effort to find the “right messaging” service and is instead ubiquitous (and you can sign up for anonymous email addresses online too, which makes it even better).


Sure they don’t log the IPs, but it is technically impossible to not know the IP when you’re running a centralized service.


Good idea overall, unfortunately they still have your IP and phone number which means Europeans are still implicated


Is Libgen even an entity? What constitutes “Libgen”? I think there might be a way to make this claim invalid by a round-about shrug: “what’s libgen”?


You’re not there for fun lol, you’re there to pirate stuff. Sure, using Signal to pirate would be fine too but your anonymity depends on how long they honor their word of “no logs”. Use a desktop version/ run a VM if you’re on MacOS or something.

Everybody hates me when I say it but Apple users should really reconsider their choices if they are at all interested in privacy. Go get a cheap Android device, hope it has a kernel beyond 5.10 and KernelSU it.




I still don’t see the point.

If religion showed you a method to get to God (praying, doing good deeds etc) and then someone came along who proved that there was a significantly easier way of attaining Nirvana without all the hassle; man would be afraid. “What if we get found out?” But when they see a LARGE and growing community of people ABLE to attain nirvana in exactly the same manner as described (i.e. without the pain) and while fighting the borderline criminal requirements that religion set - many would agree and leave the supposed “set” path and embark towards the easier solution. Some may do it out of greed, some desperation, and many more through sheer curiosity.

Why are people afraid of piracy? Use a damn no-log VPN and attain whatever it is you want without corporate monkeys in your brain. Get a seed box to give back to the community. Give a coffee to the people doing the hard work for the extra seretonin.

The only reason why someone would be arbitrarily afraid is if they don’t have a clue. Such people should be getting into a habit of RTFM; they’re going to need it.



In religion, people are:

  1. Forced to believe unconditionally
  2. Based on this programming, they are told never to disobey

How exactly is YouTube doing that?




It’s not about the website. Unless they have blocked access to the “connection” endpoint that Mullvad operates, you should still be able to connect to it.

Use TOR bridges. I don’t know how good their firewall is; can they deal with Obsf4/Snowflake too? If they can, I’ll admit that they are taking this seriously.

Use OpenVPN with Mullvad/IVPN if you can, OpenVPN can be disguised as HTTPS traffic. I wouldn’t rely on a free VPN because of the data mining, and it’s only a matter of time before Proton gets banned too


Does the UAE have something similar to China?

Unless they’re doing some serious DPI (no idea how they would do that on Wireguard traffic other than plain metadata mining), the only ways they can stop traffic is by stopping anything to certain IP spaces, or certain types of traffic through certain ports, or a combination of both. If they have truly blocked the Mullvad IP space, then no this will not work, but OP mentioned using a different app to access them, which lets me assume that it was a problem with the client.





Nobody is hacking your computer LMAO. It just lets them establish a connection to your computer to leech the file(s), nothing more



What you’re talking about is supposed anonymity in obfuscation, and that has been proven to not work.

Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement


I can understand the argument against bandwidth, but how do you conclude that it is not anonymous enough? Even against a VPN?


Maybe I should have said “it’s not anonymous based on your threat model”


Technically speaking, VPN logs tend to include the IP address of clients connecting to them, after which the good VPN providers like Mullvad, IVPN and maybe PIA tend to purge them somewhere in their process. Now, if the VPN is running in a RAM-only node, then these logs probably don’t touch storage, which means there’s not much need to shred information from hard drives for the VPN provider.

With that said, an ISP can technically log your traffic and see that you’re connecting to the IP range associated with a VPN. That and perhaps some more covert side-channel/correlation attacks can, in theory, compromise your identity.

Of course, this is going deep into OPSEC and forensics, and I don’t think the NSA is that interested in the average Billy torrenting “The Office” to go through that many logs, even if the studios sue in court. Hence, technically your privacy is somewhat maintained with the good VPN providers, but you’re definitely not anonymous


For anonymity, yes. Sure you might fool Google trying to match your IP to your traffic but that’s about it


SFTP over TOR. This should be a requirement at this point.

If you’re not doing that, then yes you’re technically right in that seedbox companies can be subpoenaed too. I usually use TOR to copy over what little I torrent.


That shouldn’t be possible in theory unless I don’t know it well enough. Care to provide a screenshot?



Man, why is everyone like this? Please read the documentation, the traffic is encrypted and metadata cannot identify you. Unless the NSA has an active hack for I2P lying around, NO-ONE IN THIS WORLD can find out what chunks of traffic just went flying by your internet connection


As he said, paid with crypto and managed with his own keys. I don’t see how the seedbox provider can trace you if you do that, so there’s not that much to worry about


Unless you PGP-encrypt everything by hand you’ve just lost the fight





The big ISPs should band together and fight the studios
Imagine if Verizon, AT&T, T-Mobile and Cox banded together for a showdown against the studios accusing them of liability? AT&T runs an NSA stronghold in Manhattan, they're not going to let their darlings go down in a teeny lawsuit like this. I really want to see this happening. Let them fight.
fedilink