Post 9mde0qTsGD1UIM2QZE by hackervoice@witches.live
(DIR) More posts by hackervoice@witches.live
(DIR) Post #9mdXnT4DOyhCBlH3tQ by cat@witches.live
2019-09-06T05:04:01Z
1 likes, 2 repeats
Don't use Private Internet Access. Don't trust their parent company London Trust Media.This toot is prompted by #isolategab, but I've been saying this for a long time, and I'll say the same thing even if they end up kicking Gab out of their affiliate program.
(DIR) Post #9mdXnTCMufDYb35ZbM by anna@witches.live
2019-09-06T05:04:49Z
0 likes, 0 repeats
@cat have more info on them? also what do you suggest for alternatives
(DIR) Post #9mdXnTLwL4sF4jZDWK by cat@witches.live
2019-09-06T05:24:43Z
0 likes, 0 repeats
@anna first part:PIA's parent is basically the holding company for a tech bro who got rich off bitcoin and buys things when he's bored.Some consequences:It doesn't help the companies that it buys. One of them just got dumped and is going out of business again with no prior warning to its employees.Buying up bits of ecosystems that the owner likes centralizes those ecosystems. LTM's involvement in IRC is a great example, though they started dropping of those now too (see also (1))They hired Mark Karpeles. And made him a CTO. After the MtGox fiasco.Lots of other stuff I can't go into, sorry. I know this is a bit annoying/useless.1/2
(DIR) Post #9mdXnTV9moFLXJsZt2 by cat@witches.live
2019-09-06T05:26:12Z
0 likes, 0 repeats
@anna second part:Most people don't need a VPN, it's just swapping spying by their ISP for spying by a centralized for-profit company based in the USA. Strongly consider not using anything and assume your network is hostile regardless (so use HTTPS, etc.)Use Tor for situations where you need to hide your origin or destination. Yes, it's sponsored by the US government. No, that doesn't mean much, it's sponsored because the USG uses it too.Use anything from Tor to sketchy free VPNs/proxies for filesharing, rights providers don't care enough to get around even basic indirection. I'm not willing to endorse any of them, they're all sketchy.2/2
(DIR) Post #9mdXnTgV6dJw6VBdZI by kaniini@pleroma.site
2019-09-06T06:05:37.859122Z
0 likes, 0 repeats
@cat @anna also the money in question may have been stolen from mt. gox in the first place. the LTM guy was a contractor for mt. gox.
(DIR) Post #9mdY5wMvCIzwHLpfW4 by kaikatsu@pleroma.site
2019-09-06T06:09:03.170727Z
0 likes, 0 repeats
@cat Is there a better cheap VPN with Socks5 support?
(DIR) Post #9mde0q8bXI0dEO5RPk by anna@witches.live
2019-09-06T06:12:50Z
0 likes, 0 repeats
@kaniini @cat steal bitcoins to make a VPN company? :GODLUL: now i almost want to use it :dvalul:
(DIR) Post #9mde0qL0n9vxqrtLkm by hackervoice@witches.live
2019-09-06T07:01:35Z
0 likes, 0 repeats
@anna @kaniini @cat honestly I'd endorse Mullvad since they are their own company and aren't owned by a holding corp with 30 other providers- not sure about their politics but they're Swedish and let you pay cash + your account is just a 12 digit number with no name/contact linked unless you use plastic. For sure though don't use VPNs to avoid surveillance, but they're helpful if you're concerned about sniffing on public LAN
(DIR) Post #9mde0qTsGD1UIM2QZE by hackervoice@witches.live
2019-09-06T07:02:41Z
0 likes, 0 repeats
@anna @kaniini @cat also TOR is a mixed bag. It lets you hide from mortals, but tor users have weird/classified enough traffic that state actors love sitting on exit nodes
(DIR) Post #9mde0qgHW4woupqKuG by anna@witches.live
2019-09-06T07:06:22Z
0 likes, 0 repeats
@hackervoice @kaniini @cat yeah using TOR is basically announcing everything you're doing to the NSA, its good for some things but i definitely would not recommend it if the US government is your biggest concern
(DIR) Post #9mde0qryoaIzV7Jg8m by u@infinite.pink
2019-09-06T07:08:26.039329Z
0 likes, 0 repeats
@anna I thought it was a FBI thing :O
(DIR) Post #9mde0r3K8PNa4Icjp2 by anna@witches.live
2019-09-06T07:13:38Z
0 likes, 0 repeats
@u they all suck, thought that tor exit nodes were owned by NSA/DARPA or something tho
(DIR) Post #9mde0rEfSESAdTvnVI by kaniini@pleroma.site
2019-09-06T07:15:21.874802Z
0 likes, 0 repeats
@anna @u anyone can run an exit node. the TOR compromises done by FBI were achieved by compromising the endpoint. for example, they installed a RAT on the silk road dude's computer out-of-band which allowed them to verify that he was the silk road dude.
(DIR) Post #9mdf7p2S7ZPHnr6Q7c by animeirl@social.homunyan.com
2019-09-06T07:22:26Z
0 likes, 0 repeats
@anna @hackervoice @kaniini @cat Tor is absolutely your best bet for hiding what you're doing from someone including the usg. it's far from perfect but unless you're being specifically targeted or visiting non https clearnet sites you are pretty safe
(DIR) Post #9mdf7pIl8wS0cQjRXU by hackervoice@witches.live
2019-09-06T07:24:21Z
0 likes, 0 repeats
@animeirl @anna @kaniini @cat people can't see what you're doing but they can see you're using tor, and that can definitely be a liability depending on your threat model
(DIR) Post #9mdf7pWwIDnFKPMldo by animeirl@social.homunyan.com
2019-09-06T07:27:24Z
0 likes, 0 repeats
@hackervoice @anna @kaniini @cat yes but that is about as suspicious as using a foreign vpn and still definitely preferable to anyone seeing what you're actually doing.
(DIR) Post #9mdf7piHc2rptafpK4 by kaniini@pleroma.site
2019-09-06T07:27:53.277010Z
0 likes, 0 repeats
@animeirl @hackervoice @anna @cat untag pls