> centralized VPNs are not safe anymore, they can be easily targeted and taken down by governments, the only solution is to start developing and supporting open source and decentralized software activism.net/cypherpunk/crypto-anarchy.html
We are sliding into a dystopian censored world, our duty as sovereign individuals with a strong online community is to inform and educate ourself on how to circumvent goverment restrictions, and spread alternative narratives trough red pills ,memes. This thread purpose is offering solutions to censorship and surveillance by central authoritys trough tech and tips:
brave is not the best privacy wise as the article above shows, use hardened firefox (custom user.js) , dissenter forked brave btw and is going to remove this backdoor and add bitcoin payements instead of brave shitcoin
Charles Hall
Long term user of PIA don't trust VPN anymore so decided to look for alternatives and sentinel is my choice for now, anonymous teach and great product
Jeremiah Perez
afetr choosing a secure decentralized vpn keep also in mind to harden your firefox and switch away from windows if you are using it. check out also sentinel relay net for multiple hops
David Bell
i will add a search engine list probably mainly Ixquick/startpage and duckduckgo
Anthony Howard
>dissenter is that the gab guys? I saw something about them forking brave and removing its shitcoin, they intend to use lightning if I recall it correctly?
Samuel Cox
yeap gab understands that forcing to use a shitcoin adds friction to the product, bitcoin is the superior choice
Owen Miller
for sure, but hey, they had to justify the ICO somehow, getting all that money in exchange to crippling the browser is totally worth it kek
Hunter Roberts
yeah BAT is one of those project that got huge amount of money in ico and fucked the investors, true grassroots projects don't need huge amounts of money to be succesfull
Cooper Ramirez
What is a relay net?
Hudson Thompson
Bump
Parker Edwards
Imagine your door having double or triple lock on it, additional security layers that makes it imposible to trace back to original IP address Basically you will connect through multiple vpn nodes
Josiah Barnes
it works like tor you route your encrypted data through multiple nodes so no one can know if you are the first node of a chain or in the middle you need just one honest node and you will be safe
Julian Gonzalez
The Crypto Anarchist Manifesto Timothy C. May A specter is haunting the modern world, the specter of crypto anarchy.
Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re- routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation.
The technology for this revolution--and it surely will be both a social and economic revolution--has existed in theory for the past decade. The methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication, and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security Agency. But only recently have computer networks and personal computers attained sufficient speed to make the ideas practically realizable. And the next ten years will bring enough additional speed to make the ideas economically feasible and essentially unstoppable. High-speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will be some of the enabling technologies.
Hudson Ward
The State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be trade freely and will allow illicit and stolen materials to be traded. An anonymous computerized market will even make possible abhorrent markets for assassinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy.
Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally alter the nature of corporations and of government interference in economic transactions. Combined with emerging information markets, crypto anarchy will create a liquid market for any and all material which can be put into words and pictures. And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property.
Arise, you have nothing to lose but your barbed wire fences!
“A capitalist system cannot function without a free market in capital, where the price of capital emerges through the interaction of supply and demand and the decisions of capitalists are driven by accurate price signals”
“the central bank’s meddling in the capital market is the root of all recessions and all the crises which most politicians, journalists, academics, and leftist activists like to blame on capitalism”
“Imagining that central banks can “prevent,” “combat,” or “manage” recessions is as fanciful and misguided as placing pyromaniacs and arsonists in charge of the fire brigade”
“Central planning of credit markets must fail because it destroys markets’ mechanisms for price-discovery providing market participants with the accurate signals and incentives to manage their consumption and production”
“Only when a central bank manipulates the money supply and interest rate does it become possible for large-scale failures across entire sectors of the economy to happen at the same time, causing waves of mass layoffs in entire industries”
Xavier Jackson
Are there any recommended methods/tools to use for backing up an iPhone without using icloud? Want to switch out the phone but don't know if there is a secure way to back up everything on my current device.
Chase Long
sorry im not an iphone user, can't help with that
Jordan Diaz
What VPN should I get for basic bitch torrenting and daily internet surfing?
Colton Cruz
im usually using senitnle dVPN (you can try it out for free till its being tested and audited) or a vps (but its more difficult to set up)
Chase Morgan
* sentinel dVPN
Bentley Ramirez
just youtube that shit up
Daniel Davis
Is there ultimately any way to solve the problem though? How do platforms (eg this site) protect themselves from bad actors in the age of algorithms, without being able to target users?
How do you defend yourself in a crypto-anarchic environment without resorting to a whitelist?
Blake Lewis
Jow Forums is blocking all vpn's from posting. bad actors is another case not sure how to tackle those
Samuel Roberts
>Jow Forums is blocking all vpn's from posting. Nope. Integrity is still ok for Jow Forums, and they use openVPN.
Noah Powell
decentralized platform where the content is hosted on no central server and user moderated threads where no content gets censored but only hidden if flagged