zlacker

[parent] [thread] 4 comments
1. qualud+(OP)[view] [source] 2021-06-06 04:28:08
Yeah I like tor because the tor browser has built in fingerprinting protection.

Otherwise you could use a privacy hardened firefox version along with some kinda proxy.

I would say you could rent your own vps, use a vpn service that maintains their own servers, use a decentralized vpn (these are a new development) or just use someone else’s wifi that you don’t also use with your „real“ identity.

Opsec can be hard to maintain but boy is doing so fun.

replies(1): >>hannia+ru
2. hannia+ru[view] [source] 2021-06-06 12:28:08
>>qualud+(OP)
Haven't heard of decentralized vpn yet, have any suggestions to look into?
replies(1): >>qualud+0G
◧◩
3. qualud+0G[view] [source] [discussion] 2021-06-06 14:27:10
>>hannia+ru
Two providers that I know of are Sentinel vpn and Mysterium vpn.

They‘re like tor where anyone can run their own node, but unlike tor there is a financial incentive to run them because they come with built in payment processing solutions via cryptocurrencies.

Some people are skeptical of cryptocurrencies but I consider this to be an excellent use case:

Securing coordination between actors that don’t necessarily trust each other through market incentives.

This would incentivize people to run their own nodes and it would be less like tor where most exit nodes are allegedly run by intelligence agencies.

replies(1): >>hannia+W62
◧◩◪
4. hannia+W62[view] [source] [discussion] 2021-06-07 04:09:41
>>qualud+0G
I suppose nothing is stopping nodes from logging activity from each ip address?
replies(1): >>qualud+De2
◧◩◪◨
5. qualud+De2[view] [source] [discussion] 2021-06-07 05:46:25
>>hannia+W62
I don’t know. Maybe there’s a hash value for the code that you can look at to make sure it’s the right code. Haven’t personally looked into this.
[go to top]