• 1 Post
  • 5 Comments
Joined 3 years ago
cake
Cake day: September 9th, 2021

help-circle
  • Maybe(to add): https://searx.neocities.org

    Policies:

    • Redirects users directly to a random selection of any known running server after entering query.
    • Requires Javascript.
    • Excludes servers with user tracking and analytics or are proxied through Cloudflare.

    I found this random Searx/SearXNG search engine redirector at https://searx.space under the About tab.

    To use it, I save the search redirector as a bookmark at https://searx.neocities.org/#q=%s&category_general=on

    I also turn on javascript on at searx.neocities.org because otherwise I have to type in my search query manually into a specific search instance.

    However if your threat model requires it, you can also go to the no-javascript version of searx.neocities.org. You will not be automatically redirected to a random Searx instance when using no-JS version.

    I type in a keyword in the url bar and then the service redirects me to a random Searx/SearXNG instance. For load balancing purposes, it seems great since no single server will be stressed significantly. The searches are spread across multiple instances.

    Sometimes the redirected Searx/SearXNG instances output bad results(e.g. errors). In that case, just use the Searx redirector again to have new random Searx/SearXNG instance.


  • There are Google Analytics trackers on The Intercept website, so here is an excerpt:

    Source: https: / / theintercept(dot)com/surveillance-catalogue/stingray-iii/

    “Ensnares bystanders, drains batteries, blocks calls”

    Review by Nathan Wessler

    Staff Attorney with the American Civil Liberties Union’s Speech, Privacy, and Technology Project

    This dragnet surveillance workhorse has been deployed for years by numerous local law enforcement agencies across the United States. Don’t worry about the six-figure price tag: A federal grant will cover that. Upside: fierce name. Downsides: ensnares bystanders’ phones within up to 200 meters, drains phones’ batteries by forcing them to broadcast at full power for greater surveillance potential, and can block calls placed by nearby phones. But don’t worry too much: Ready-made non-disclosure agreements from the FBI and Harris Corp. will provide a pretext for concealing these features from the public. If you like the Stingray, you’ll love Harris Corp.’s next-generation Hailstorm, a must-have for cracking the 4G LTE network.


    Stingray I/II

    Ground Based Geo-Location (Vehicular)

    Capabilities

    • Ground GSM/CDMA stimulation device
    • Replicates BTS to STIM handset into RF SDCCH allowing for DF
    • Passive and active modes of operation
    • Optional 5 Watt Amp available

    Limitations and Planning Factors

    • Approx ground distance 200 Meters
    • Target Handset must be on & not engaged in a call
    • Cannot DF with Gjallar or Datong system
    • Locking handset into SDCCH drains battery and raises signal strength
    • Use of system requires deconfliction w/ other geo elements in AO
    • Network can identify rogue BTS
    • Improper use can impact network

    Vendor

    Harris Corporation Melbourne, Florida-based Harris Corp. makes the most well-known cell-site simulator technology, the Stingray, used in cellphone surveillance by military intelligence and law enforcement. The company’s May 2015 acquisition of Virginia-based Exelis moved it toward domestic government business, according to industry experts. — Margot Williams, The Intercept

    Protocols

    900Mhz, 1800Mhz, 850Mhz and 1900Mhz and CDMA (multi-protocol and requires antenna)

    Approval

    Title 10

    Cost: $134,952.00 USD




  • If I am not mistaken, aren’t dumbphones/flip phones/ feature phones vulnerable to stingray phone trackers?

    If one is not encrypting their messages, then Law Enforcement Officers, nation-state actors and criminals can easily intercept SMS messages and phone calls.

    Wikiless( an alternative front-end for Wikipedia):

    https : / / wikiless(dot)org/wiki/Stingray_phone_tracker

    Articles on Stingray phone tracker/imsi-catchers/ cell-site simulators:

    https : / / www(dot)eff(dot)org/pages/cell-site-simulatorsimsi-catchers

    https : / / theintercept(dot)com/surveillance-catalogue/stingray-iii/

    Even more crazy(read the bolded statement, from The Intercept article):

    Stingray I/II

    Ground Based Geo-Location (Vehicular)

    This dragnet surveillance workhorse has been deployed for years by numerous local law enforcement agencies across the United States. Don’t worry about the six-figure price tag: A federal grant will cover that. Upside: fierce name. Downsides: ensnares bystanders’ phones within up to 200 meters, drains phones’ batteries by forcing them to broadcast at full power for greater surveillance potential, and can block calls placed by nearby phones. But don’t worry too much: Ready-made non-disclosure agreements from the FBI and Harris Corp. will provide a pretext for concealing these features from the public. If you like the Stingray, you’ll love Harris Corp.’s next-generation Hailstorm, a must-have for cracking the 4G LTE network.


  • And if you don’t want your searches to be tracked by Google, Whoogle is an alternative front-end to access Google Search.

    https : / / github (dot) com / kroy94 / whoogle-search

    Description: Get Google search results, but without any ads, javascript, AMP links, cookies, or IP address tracking. Easily deployable in one click as a Docker app, and customizable with a single config file. Quick and simple to implement as a primary search engine replacement on both desktop and mobile.

    You may notice some features are lacking in Whoogle that you would find in Google Search, but for some people it’s probably good enough. Whoogle Search includes Google News(as a tab) on the bottom of the search bar after you type in a query and press enter.


    Searx is a privacy respecting metasearch engine. You can also search for news there.

    Github: https : / / github (dot) com / searx / searx

    Searx Instances: https : / / searx (dot) space

    Searx Instances(onion link): http : / / searxspbitokayvkhzhsnljde7rqmn7rvoga6e4waeub3h7ug3nghoad(dot)onion/

    Disclaimer: It is probably not a good idea to self-host Whoogle/Searx, since it is obvious the traffic to Google/some other non-privacy respecting search engine operator is from one person. But depending on your threat model maybe it can work.