• 1 Post
  • 187 Comments
Joined 4 months ago
cake
Cake day: December 23rd, 2024

help-circle

  • Of course, and I’m saying that while turning JS on for Bob’s website is maybe acceptable, leaving it turned off for gstatic, googleadmamager, etc. also on Bob’s website is easier than the other way around. Layers of defense. Don’t count on canvas blocker.

    Though this is just for what you want to obscure. It doesn’t make any sense to openly interact with Google or Meta products with all this going on. Use for your socials, anything tied to your name or face, regular vanilla FF with containers for safety. Let G associate that IP/geography and fingerprint with what you HAVE to do publicly visible. Then you close FF, change VPN locations, and open private mode Librewolf. It’s full plausible deniability. Or use TOR, same same.

    Convenience and security are a trade off. Find the balance that works for you based on your threat model. It’s different for everyone.


  • You can. Libreworlf with canvas blocker, Chameleon, and a JS blocker.

    Canvas blocker and a JS blocker limits a lot of what Google can see and fingerprint per page. And you’ll be shocked at first how many pages have google trackers that a JS blocker kills. It’s easier to turn things on one at a time than claw back data once it’s out of your hands.

    Chameleon spoofs a lot of other details, like browser, system time, languages, headers, etc. So for what can be seen, it’s always changing and harder to corroborate. This plus moving VPN locations is what is needed.

    Also, TOR does the job, but not the most fun internet experience.


  • Yeah, the Republic fell a month ago with the first times they ignored the courts and some people seem to think they can give it TV style CPR and get right back to where we were on Jan 18 like nothing ever happened.

    Babies, the damage is done. And it’s not even over yet. Place your bets now on 2040 turning the corner back to stability. A lot will come to pass between now and then. That’s 15 years from now. We have passed a generational level of work to rebuild after only 80-some days.

    If you don’t already have an actionable plan for what to do next, with defined tripwires of when to do what, you’re very late to the party. Not too late, but late.

    Source: career in the developing world. Rome wasn’t built in a day, but it only took one day to sack it it ruin.










  • There’s not enough info in here to know how Google was involved if he sent the emails from Proton. Proton absolutely does not cotton to illegal shit, and actionable threats would be up there with LEO compliance.

    My guess is he was on a VPN and had logins from a Proton account, validated with a burner phone he kept, and was also logging on to a personal Gmail or using some Google service that identifies him while in the same VPN location. Proton and the VPN give up an IP address that corroborates to what Big G tracks to him.

    Edit: even a no-log VPN would likely be compelled to confirm a user at an IP address at a certain time. That’s not a a “log” per se…

    Idiot should have known to change his VPN location between instances and/or use TOR like a big boy, but mental health issues seem to be there driving force, not rationality.


  • Sadly not. Super common, and the obvious result of RIFing everyone without a care for who does what or why. Strategy was apparently on the DEI forbidden words list.

    These people have zero idea how the government works, they only operate on “loyalty.” Which is simply not having the audacity to speak up when something is profoundly stupid, lest it harm their ego. Everything else is scams inside of scams for personal benefit at the taxpayer’s expense.

    The pattern repeats over and over. Hundreds of embarassing court cases, constant incompetence beyond anything rank and file government ever did before, blatant lies the only way to save face. Clowns elected by fools to spin up a circus to entertain them all while the crops rot in the fields, with no one willing to harvest them.




  • Rubio called this fake news and gloated about how easily the NYTimes fell for it. I’ve seen a copy, and it’s flat out bonkers. Missing even mentioning entire segments of what State does. Not formatted for an EO, and at 16 pages, would be one of the longest EOs ever.

    What’s most likely is that Pete Marocco drafted this months ago while high on himself, and when he was fired last week, he “leaked” this to prove that he was the MAGA purist and that Rubio isn’t a true believer.




  • The concern is that even encrypted communicatons, intercepted via the heavily Chinese-tapped US telecommunications company networks, can be used to gain access to other systems. Unencrypted data, sure, that’s a legit concern. China can likely read every SMS sent to any US phone number and no one seems to care at all. Things like downgrade attacks, other man-in-the-middle attacks, and skimming SMS 2FA codes are likely possible with poorly defended systems.

    If the data it’s encrypted, then it’s more about the paranoia that China is collecting everything and planning to decrypt later with quantum processors. Not exactly a huge and urgent worry, but one day they will crack how to decrypt what they collect and will have a record of everything said online.