![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.magnor.ovh/api/v3/image_proxy?url=https%3A%2F%2Ffry.gs%2Fpictrs%2Fimage%2Fc6832070-8625-4688-b9e5-5d519541e092.png)
Thanks, that’s a bit more meat. Should probably look for their publications.
Thanks, that’s a bit more meat. Should probably look for their publications.
Paywalled.
Happily, I’m abnormal that way. I also dabble in PV DIY. Building houses from scratch, no. Servicing a modern car is also not worth it. Sadly, no open source EVs yet available.
HA for personal MTA is way overkill, just run a second instance with higher MX record value. Antispam is a given, backups are snapshots, maintenance is just system updates. Of course, you could just run an appliance which does it all for you. I’d say it’s way easier than in 1990s.
Email in the 1990s and email in 2020s is the same if you’re running your own MTA.
You just use https. There are extensions like HTTPSEverywhere, but they potentially add bits to your fingerprint. DuckDuckGo also offers their search interface as a hidden service, perhaps worth bookmarking.
TLAs, LEOs and criminals are both Tor end users and have an interest in attacking Tor users.
Everybody has the resources to run Tor relays and even exits, though the latter can become a massive legal nuisance. Servers are cheap. Read the Tor mailing list archives.
As to ‘mostly used by hackers and pedos’, please provide the evidence. Factual one, not non-sequiturs based on faulty assumptions.
I typically don’t have the time to watch videos but I did in this case. It’s not wrong. The question is: what is your threat model?
First, Tor is not designed to protect you from a global passive adversary nevermind an active one. Global network probes can be used to identify individual sessions by traffic timing correlations. Locating hidden services is quite easy that way, since they’re sitting ducks. It is fairly easy to remotely compromise hidden service marketplaces for TLA players and/or use physical access to hardware and/or operators to make them cooperate with LEOs.
If you are trying to avoid ISP level snooping and blocking, advertisers, Google and national scale actors then Tor is the right tool to use. And by all means, do run your own relays to help the network. The more relays we have, the harder the attack.
I’ve been using it since the early days and ran relays and exits. It’s good for anonymity against your ISP, advertisers and lesser adversaries than being targeted by TLAs. Can be a bit slow. Make sure to use encryption to protect against bad exit nodes.
Evidence for your claims, please.
VPN tunnels don’t magically become transparent when packets pass UK fiber and routers. And legislation doesn’t translate well into which software people are allowed to run, for endpoints in UK. They can try to become North Korea of course, good luck with that.
10 MUSD boats made from graphite epoxy composite and quite a few tons of lithium batteries. And the support infrastructure. And the sum of activities on the cruise. Plus other stuff people who buy such trinkets engage in.
There are peer reviewed publications quantifying that, with some surprising numbers in them. The golden billion has an outsized footprint, but the elites have a hockey stick shaped contribution distribution there.
Does ecosystem carrying capacity overshoot ring a bell? Individual footprint matters, especially if massively oversized.
Usenet and mailing lists always had threaded view.
You need to exploit an OS vulnerability or use suitable baseband processor as a backdoor, facilitated by the cellular operator. To exploit the OS or an a service on it you need a network connection. You can’t inject through an ad if there is no browser or email if there is no client.
Yes, you can spearphish but this can’t mass-target French mobile users as the article seems to claim. France isn’t North Korea, not just yet.
Mobile operators have baseband which is why we have modem isolation. And some of us can see quite a bit on our end, too.
This isn’t even wrong. What is the attack vector? They send a magic message that 0wns Signal, and then cleans up? At scale? With nobody noticing? This doesn’t happen.
Have you operated your own MTA and tried to get reliable mail delivery to Google, Microsoft or Yahoo? If not, you should try.
I know not a single one who has that. My wife uses WhatsApp and Instagram though.
Lineage OS user. Don’t care.