Skip Navigation

Posts
18
Comments
890
Joined
2 yr. ago

  • To add to the question, what about using a selfhosted privacy frontend behind a VPN. Does this shrink the need for a crowd.

  • Can't anymore, cus the woke 🤕

  • Stop, warhammer time

  • Rule

    Jump
  • Def

  • Obsidian farm, ez

  • Rule

    Jump
  • DMT

  • It doesn't matter if they are encrypted if you can sell the data about what the user is doing (eg if your connecting to a shopping website your probably shopping their). Better to obfuscate the source by choosing an endpoint that isn't geographically related and associated with your identity. I only would ever recommend using a VPN that is open source and well audited by a renowned 3rd party auditor(s). https://luxsci.com/blog/what-is-really-protected-by-ssl-and-tls.html

  • Usually means in 99.9% of typical configurations unless you are a techy or an enterprise.

  • Yeah, I don't trust proprietary server backend. Also I2P is a good option that should be less slow under the traffic of thousands of users.

  • That is just as true of your ISP, who when raided by the police will happily send it all over in a jiffy.

  • Encryption doesn't mean perfectly hidden. Metadata isn't encrypted for HTTPS iirc. And the ISP knows who your sending traffic to since they are routing you there and are usually your DNS. When connected to a good and trusted VPN, all that is hidden, your DNS can't give away your location, and the only server you contact is the VPN

  • Cromite is available on PC (Linux and Windows) and Ungoogled Chromium is chromium without any google (drop in replacement)

  • Use LibRedirect or Redirector to auto-redirect to RedLib public instances.

  • Or isolate discord with a tab container in Firefox. Invidious is still preferable though.

  • Try having your self hosted services backup to an external (or at least a separate) drive, where each service has its own folder.