• 1 Post
  • 3.38K Comments
Joined 1 year ago
cake
Cake day: February 10th, 2025

help-circle




  • You can’t.

    Social media is public, period.

    If you want private social interactions then use end-to-end encrypted communication services.

    Any oppressive regime will have multiple tools that can identify your access to social media services and determine who the human is behind the keyboard. Assume that everything you post on public social media has your real life name and address attached to it.

    Unless you’re an expert and taking extreme measures (and you wouldn’t be asking this question if you were such an expert) then anonymous access to online services with respect to a sovereign power with an intelligence service is impossible.








  • Yes, surely TOR will protect us from government surveillance…

    I don’t get the sarcasm. Everything that you’ve posted suggests that it will.

    Simply pointing out public funding doesn’t make it less secure. It’s implying (or allowing others to imply) some hidden conspiracy that breaks TOR in some way that we don’t know about. If this is a source of vulnerability, it has not been demonstrated.

    Based on what we do know:

    “We will never be able to de-anonymize all Tor users all the time”, but “with manual analysis we can de-anonymize a very small fraction of Tor users”.

    when used in conjunction with other privacy tools such as OTR, Cspace, ZRTP, RedPhone, Tails, and TrueCrypt was ranked as “catastrophic,” leading to a “near-total loss/lack of insight to target communications, presence…”

    TOR is open source and the protocol is well understood. The software has been audited multiple times by multiple different sources.

    The TOR network itself is secure.

    The people who get ‘caught using TOR’ are caught based on other failures of their personal security. Like forgetting to enable TOR once and logging into an IRC channel, connecting to a malicious site with a javascript enabled browser, running TOR on an exploitable phone or running a business who’s payments travel through financial networks viewable by the adversary.

    There’s more to cybersecurity than simply installing the TOR browser bundle. If you are not familiar with this field, do not risk your freedom or safety trying to do things on TOR which would cause you to come to the attention of intelligence services or other bad people.







  • Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone.

    It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children.

    The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities.

    It is two electric power plants, each serving a town of 60,000 population.

    It is two fine, fully equipped hospitals. It is some 50 miles of concrete highway.

    We pay for a single fighter plane with a half million bushels of wheat.

    We pay for a single destroyer with new homes that could have housed more than 8,000 people.

    This, I repeat, is the best way of life to be found on the road. the world has been taking.

    This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron.