The Online Privacy/Security Thread

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.
I know I talk about this a lot but have you guys reviewed the FreedomBox stuff?

www.freedombox.com

I know enough about computers to get in trouble but not enough to know if that does a decent job.
 
I know I talk about this a lot but have you guys reviewed the FreedomBox stuff?

www.freedombox.com

I know enough about computers to get in trouble but not enough to know if that does a decent job.
Dead link, I think you meant freedombox.org

It seems to be an easy way for normies to host free services like MediaWiki, Gitweb, my fav I2P, and more
It's a good project, hope it gets popular
 
Out of curiosity: what chromebook with which SoC?
I've done this with a Lenovo Chromebook past ChromeOS EOL.

There's a guy who does coreboot FW development in an easy package for a wide variety of Chromebooks. Possibly the only coreboot developer who isn't a MTF tranny. You generally have to open 'er up and toggle a jumper or remove a screw to open up FW flashes to allow this, which I would recommend researching for a specific model especially if you're buying it to do this with, but it's all done in quite an easy way.
Now, the fact that these things will boot doesn't mean that fiddly things like graphics or wireless or cellular components are fully supported. Though everything on mine seems to work fine. And while battery percentage indications work on mine, I suspect that processor throttling type stuff may not be fully supported. So you might not get the full Chromebook battery life.
 
What makes you think that? I've heard a lot of people say it's a botnet and full of spyware, but I genuinely want to know why?
What is? Neither one really can be to my knowledge.
Ungoogled Chromium is debotnetted, it does not phone in to google or anyone else for that matter and its code is up on github for all to see.
Ublock is a adblock script manager, and a powerful one at that. Vital to security on the modern web. I imagine it does phone home, but only to keep itself and its scripts updated.
 
  • Like
Reactions: bippu_as_fuck_ls400
What is? Neither one really can be to my knowledge.
Ungoogled Chromium is debotnetted, it does not phone in to google or anyone else for that matter and its code is up on github for all to see.
Ublock is a adblock script manager, and a powerful one at that. Vital to security on the modern web. I imagine it does phone home, but only to keep itself and its scripts updated.
Sorry I meant to specify about Brave. I had a look at some stuff about Brave having spooky spyware on it, but all it was was external libraries, fonts, and the Brave BAT system doing affiliate link checks from time to time. Although the section about telemetry was slightly concerning, it can be manually turned off (using Wireshark you can see there's no more messages being sent out to static1.brave.com anymore).

Plus Brave is open-source also.
 
I've heard a lot of people say it's a botnet and full of spyware
I get the feeling that people who claim that are turbo autists who value theoretical privacy over pragmatism. I'm all for infosec but I'm not gonna avoid 90% of the modern Internet because muh spyware botnet concerns.
 
A few easily actionable steps you can take that I didn't see mentioned here:
  1. Disable WebRTC, because it can reveal your real IP address, it can even evade VPN software in some cases. The website has to decide to use it but if someone can trick you into going to a webpage they control, they can get your IP address.
  2. Regular DNS is plain-text, so anyone who can observe your traffic (your ISP, government, etc) can trivially find out what domain name you are going to, even if you see HTTPS in the browser bar
  3. You can use DNS over HTTPS if you think you can trust the providers of the services in question. You probably can't fully but it's probably better if the service is in another jurisdiction.
  4. Use a separate browser profile for browsing you don't want connected to your main profile - use your personal gmail account on a different browser profile to the one you browse KF on for example. Of course, you're still browsing from the same IP address but it could be someone else on your network so it's not as likely for the traffic to be linked to your profile.
To find out what you are leaking please see the Mullvad connection check site.
 
I don't have much to add, but if you are talking about paying crypto to certain VPNs I would nominate Mullvad as the best VPN for anonymity, you can literally just send them money by post for your account (or use crypto if that's your thing). No email and no card (unless you wanted to pay by card) required, if there are any other companies with that model by all means list them, but I would say Mullvad > Nord.
I know someone who torrented a Game of Thrones file both with and without Mullvad.

He got a notice from his ISP without Mullvad on, and no notice when he used Mullvad.
 
He got a notice from his ISP without Mullvad on, and no notice when he used Mullvad.
Perhaps you know this already but for those that don't, the systems that do this are largely automated these days. Effectively it works like so:
  1. Someone uploads a torrent
  2. Anti-piracy firm connects to the tracker and sees you downloading a torrent they care about
  3. They find the IP address, look up the ISP's ASN and send an email to an abuse or anti-piracy contact (I assume the message has an attachment follows some sort of data driven format like CSV that is easily parseable)
  4. The ISP automatically sends you a message to knock it off
  5. Optionally the anti-piracy firm subpoenas the ISP and tries to sue you but this doesn't seem to happen so much these days
If you use a VPN, at stage 4, the VPN company just routes it to /dev/null and continues with their day.

I would trust a VPN for my regular thoughtcrime posting and for civil offences like torrenting but you must know that nothing is bulletproof and if you use it to perform acts that are actually illegal then you are still taking a serious risk. I would expect intelligence organisations to attempt to compromise major VPN services (by turning individual employees for example), and there are potential temporary takeover methods on Tor, although I don't know how workable they are today.
 
You can use dnscrypt-proxy to send encrypted DNS requests to a customizable list of DNS servers.
You can use public invidious, nitter, libreddit, and searx instances to proxy requests to popular websites and search engines. If you're autistic enough you can hop instances for each thing you do (search, video watch, etc.) so the people hosting each instance have only get a fragment of your activity.

Tangentially related but firejail (linux only) can isolate programs into sandboxes that have very fine-grained customization (deny access to the network, allow access to certain files, replace certain folders with other folders, allow only certain binaries to be executed, etc.). Useful for denying programs the ability to phone home if you're suspicious, and I assume it can mitigate the impact of any security holes in software by denying it access to your filesystem or the internet.
 
  • Informative
Reactions: Aidan
Never use your IRL credit card information online, unless you absolutely have to.
duh
If you're lucky enough to live in the USA,
lol
Privacy.com exists for you to create virtual debit/gift cards with specified limits so you can pay for your Netflix, Hulu, or other such online purchases.
yes, you could use it for normie shit like that if youj must, but obviously it isn't real protection for anything important
 
I get the feeling that people who claim that are turbo autists who value theoretical privacy over pragmatism. I'm all for infosec but I'm not gonna avoid 90% of the modern Internet because muh spyware botnet concerns.
You don't have to, but there are more and more hoops necessary to balance convenience and privacy.
  • VPN
  • Secured browser (lots of room for personal preference)
  • Picky on software and services used on personal devices due to telemetry
  • Track all online accounts you have and their account details
  • Block ads
  • Block trackers
  • Use a javascript whitelist
  • Don't use Windows
  • Don't use certain online services (social media, linkedin (aka job facebook), discord, google, etc)
  • Don't use stock Android (limits phones you can buy)
  • Block bullshit DNS requests (another form of online tracking)
  • Varied email accounts for varied services
The list goes on and gets retarded but if you jump through enough hoops you can use the internet pretty normally without many inconveniences. It may seem ridiculous but a lot of people don't even use adblockers and think that's too techy.

If you’re super into privacy this setup is as good as you can get and be on the internet


they also have a great wiki for good opsec for just about any case.

Played around with this after Mental Outlaws video on it and it's pretty cool, I like it. It's like a comfy blanket reassuring me that anything I do in the VM is definitely going through Tor and it's super easy to set up. The only downside is it is relatively resource-heavy since you have to run 2 VMs but neither of them need much to work well.
 
Last edited:
Unearthing this to ask some questions. The fat Linux fag deciding he's a tranny made me decide to learn some Linux stuff because I want to be as cool as a morbidly obese Linux tranny. Since KF went fullw Tor I got into the habit of using the brave Tor tab for almost everything I do on the internet but I want to become more paranoid and my motivation is pure spite (glowies seethe if you're invisible)

My main thing is that I want to procure a separate laptop and give it a maximum schizo setup. This is my plan:

1. Buying a X230 (16gb ram)
2. Using 1vyrain to remove the Intel spyware shit
3. Installing Qubes OS and configuring it to move ALL network through Whonix/Tor. Ideally I want this laptop to remain a clearnet virgin forever and only connect to the Internet via Tor

Is everything up to this point correct or am I forgetting something?

Now the next thing that might be problematic is that I would still be connectting to the internet through my normie router plus my ISP would see that I'm a dangerous schizo using tor 24/7. This is probably not that much of a problem but still seems suboptimal. How can I counteract it? I was thinking about buying one of these fancy WiFi antennas and le epic hacking into one of my neighbors wifi, is that feasible long-term?

(please note that I'm a windows user and I don't know absolutely anything about Linux or how the internet works, this will be an edutainment project)
 
Back