If you are an Android user, consider using Gadgetbridge. It's a free and cloudless app that can replace the vendor's closed source application, allowing you to use it without an account to transmit your data to the vendor's servers. So you check their list of supported devices and take a look at any model that you might like, read its wiki and decide for yourself.
>Most search engines—even supposedly “neutral” or “private” ones—don’t have their own index. They’re just façades that rely exclusively on third-parties. At Brave, we want to build our own search index, because this means independence. And independence means choice. Choice for the user to have alternatives, and choice that allows Brave to not be beholden to the policies of third parties (e.g. censorship, biases, economic interests, etc).
>Brave Search beta is based on an independent index, the first of its kind. However, for some queries, Brave can anonymously check our search results against third-party results, and mix them on the results page. This mixing is a means-to-an-end toward 100% independence. F*or full transparency and to measure Brave’s progress toward that goal, Brave provides a “Results independence” metric. This anonymous calculation shows the % of search results that come from Brave versus these third parties. Note that no matter the independence metric, your privacy will always be 100%*.
Looks quite legit to me. Go Brave!!
(perhaps quite better than https://www.qwant.com if they manage to pull this index thing)
They recently added a feature, Sandboxed Play Services, that may help you, instead of using microG: https://grapheneos.org/usage#sandboxed-play-services
I've not tried it myself, as I don't need it, but I read it's working pretty well, maybe you could give it a try.
There's a blog post from Proton, you can read it here. Basically, one person got things wrong and shout really loudly. Sadly there's no accountability for that :/
https://protonmail.com/blog/martin-steiger-false-statements/
>You can use a VPN, like ProtonVPN. But again, many services don't like VPNs. Trial and error.
Is it very difficult to setup your own vpn? I don't want to use these VPN that are provided by some websites.
How much time and money will it take to setup your own VPN Server? I don't need to be located at another place to watch content of other nations. Would be sufficient if I could start from scratch and free myself of all the big companies who know everything about me.
I guess such a self made VPN Server would even allow to bypass websites which won't allow registration via TOR or VPN servicess, right?
Our software that does that is the Portmaster.
It's hard to summarize my feelings to Microsoft, but I'll give you some thoughts:
🤷♂️ some thoughts
Apple's marketing have been harmful on the privacy community.
iOS is proprietary software, which means that you can't check or modify the source code. That means that Apple can be potentially spying on you without anyone knowing it.
Anyway, it has been proved that Apple spy on their users.
You may like to read their Terms of Service. They legally recognize that they sell their users data. Here's a human readable summary: https://tosdr.org/en/service/158
Some quotes:
"This service may collect, use, and share location data"
"Many different types of personal data are collected"
"The service may use tracking pixels, web beacons, browser fingerprinting, and/or device fingerprinting on users"
"Voice data is collected and shared with third-parties"
"This service tracks which web page referred you to it"
"This service may use your personal information for marketing purposes"
"Your personal data is used for advertising"
"Tracking pixels are used in service-to-user communication"
I remind you that this is directly extracted from Apple's privacy policy.
I'd also suggest reading this article made by a security researcher: https://gist.github.com/iosecure/357e724811fe04167332ef54e736670d
I am hearing these concerns. I might approach NordVPN and ask them for explanation since I promote their service with an affiliate link in most of my videos.
If you could save me some time researching this, could you please send some more information on those mobile apps? I also don't like the fact that NordVPN has tons of trackers on their website. Mullvad doesn't have that.
14 eyes isn't necessarily the bright line to determine your VPN of choice. Many countries aren't in the 14 eyes but the US has special relationships with them, mainly through establishing military bases with NSA outposts.
So just because NordVPN is outside of the known 14 eyes alliance, that doesn't necessarily make its jurisdiction any more secure than Sweden's.
I fear NordVPN is too powerful with their affiliate marketing since they even got Pewdiepie to promote their service. They might not listen to my concerns. Wonder if I could try to form an alliance with Techlore and other YouTubers to push back.
My stance is to never put too much trust in any VPN. If you are serious about privacy, use Tor. I only use a VPN for high-bandwidth stuff that Tor network can't handle very well, e.g. watching videos.
I decide to affiliate with NordVPN simply because I know that some people are going to:
1.) look for a VPN service
2.) ways to support my channel.
I think from all VPNs that provide affiliate links, VPN is the best: outside of 14 eyes, best "no logs" policy, recommended by .
If you want to use a VPN as safely as possible, change your VPN provider every month. Will cost you more but you will compartmentalize your digital life over time.
As far their customer service goes - I am not aware of any issues there. But if you have problems with NordVPN then I recommend you don't use it.
I use ProtonVPN and think it's really good. It's based in Switzerland which is known for its good privacy regulations.
I've never had an issue with speed unless I'm routing it through tor or multiple servers and since they don't enforce a speed limit I can (almost) fully utilize my 250/100 connection without a problem (with a small decrease since it isn't as much of a direct route to the server, but hey, they're doing what they can).
I feel like I can trust them even more based on their other service, ProtonMail, which proves that they care about privacy even further.
They have a good amount of options, here are some:
Country/specific server selection with a great variety
Possibility to use Tor
Secure core (first routing your traffic to a secure server entirely owned by ProtonVPN and then sent to another regular endpoint)
Profiles to quickly select a server for a specific purpose
Special P2P optimization on some servers
Check their website for more.
Feel free to ask more questions about my experience.
On a personal sidenote: I don't really trust NordVPN because of them trying to target a really large demographic and their ads kinda feel like "Hey, pay $5 a month (or whatever it costs) to be completely anonymous" and it seems (to me at least) like ProtonVPN is more focused on actually providing a good service with the advertised protection without deceiving their customers.
Where did you hear that? Because I don't think that seeing an occasional bad example is something to worry about, no service is ever perfect. In fact I would be even more skeptical of services that look flawless. I use NordVPN myself and of course there are some rare instances of bad connectivity, but for the majority of the time it works just the way I need it to work. I pick a nearby server and the speed is great. I haven't tried to get a refund so can't comment about that.
It's not a VPN. It just works as a vpn to route your DNS requests to 1.1.1.1 instead of your ISP's name server. So while it provides some privacy improvements it's not a lot. The Warp product that they will be launching in the near future will be more akin to a VPN.
You are better off using ProtonVPN's free tier which is unlimited browsing but no peer to peer (like torrents) or Windscribe's free tier which is 10GB a month. A paid option in a non-14 eyes country is better obviously. Alternatively if you are fine with sacrificing some speed, use Orbot to connect to the Tor network. It is entirely free and the best security/privacy solution for Android.
This is all bullshit.
For 1#, Tesonet doesn’t own ProtonVPN, they just have offices near each other.
2#, The reason the APK For the Android app is tesonet is because proton hired a person from tesonet and they wanted to give them benefits, and for some reason they signed the APK With tesonet and because of google/android’s rules, you can’t change the APK unless you build a new app from scratch.
3# ProtonVPN and Protonmail are owned by the same company, however, ProtonVPN is operated by a different entity, ProtonVPN AG Technologies, this is for legal and security reasons.
4# How would the P.I.A. Rep who spread the rumors know that tesonet even had anything to do with ProtonVPN Or NordVPN besides the APK For the Android app?
Tor is the most trusted anonymity solution that is available for the general public. Another is I2P but it is not as popular as Tor for some reason.
I'm using Tor 24/7 for regular browsing. When I'm watching video, I switch to naked internet with another browser.
Using Tor even for set of specific topics (like news, health) can improve your privacy greatly.
Edit: I know you don't trust VPNs like rest of us, but Private Internet Access and ProtonVPN has good reputations. Do research and decide.
I would love to use librewolf but I have trouble install it in my kali linux. I even go far as to follow direction on how to download librewolf. I prefer to use librewolf through my kali linux.
If the router can run OpenWRT or freshtomato it can do the same. With OpenWRT you can add a terminal page and use it to install and control the ProtonVPN cli (stable, the beta doesn’t support headless systems yet; you can probably use others as well as long as they have a Linux cli).
Because you have to reach your audience somehow. If he was only posting on peertube you would have never seen any of his videos.
This is also why Tor, Protonmail, Tutanota, Mullvad and a plethora of other privacy focus companies are on Twitter, even though Twitter collect a lot of user data to profile them.
We're talking about making a Google account here. Signing into a brand new Google account over Tor just after creating will very likely get your account flagged. I speak from experience.
And on the topic of trust with VPNs, you still have to trust that the Tor nodes you connect to aren't compromised and run by a single entity.
I use Mullvad within Qubes with three different endpoints to obfuscate my traffic. Then run Tor through one of those VPNs to hide my Tor usage from my ISP. It's all a matter of threat model.
I've used a lot of VPN providers Ivacy, Torguard, ProtonVPN, NordVPN and PIA before deciding on Mullvad, Which at the time of me writing this is the only VPN to get a "TOP CHOICE" badge from I'm very happy with Mullvad and have absolutely no complaints. They're great. And you know that I'm not affiliated with them because they don't actually have an affiliate program.
You can learn more at
Exactly what's wrong with Mullvad? I paid them with cash and didn't have to offer any personal info including email. They also don't rely on any of the shitty affiliate programs like Nord and Windscribe do.
The absolute best thing Mullvad does is their account registration. You just get a generated account number, no email or any other details about you are required, and you can even send them cash. This is a diamond standard that all reputable VPNs should be upholding, but sadly they don't.
The second best thing about Mullvad is their pricing. It's just $5 a month, no matter how many days/months/years you want to take. That's very transparent and customer friendly, as they don't incentivize customers to sign up for longer periods for a discounted price (something most other VPN providers do).
Beware that Mullvad is based in Sweden, which is part of the 14 eyes.
OpenVPN for Android could be a solution. Although, I hear your concern, it makes you wonder if the company actually cares about privacy.
Personally I use MullvadVPN, which offers payment by cash, Bitcoin etc. No logs. It is based in Sweden though, which is a part of the fourteen eyes.
Bloatware is anything you don't use or want on your phone. It usually comes pre installed on your phone and some of it can be uninstalled.
If you want to degoogle that means you can live without google apps and google play services. Right? Check if you use any google apps or apps that rely on play services. Use opensource alternatives to your existing apps. Find alternatives here and filter the results by clicking on opensource (if you want open source only).
I would suggest using a custom rom. It does not have any bloatware and it is also open source. You can also choose if you want to use google play services or not. There are many benefits of custom roms like:
Your device will run faster as there no unnecessary processes running in the background and also longer battery life.
You will get latest android and security updates.
And many more.
You can start by going to xda and searching for your device. There you will find available roms for your device and how to install them.
> Versus all the Time and Work to buying a Pixel and installing Graphene.
Using our WebUSB installer only takes about ~20 minutes from start to finish with a few clicks of a button. Makes no sense whatsoever to pay so much money for a device preloaded with GrapheneOS. When you can simply install it yourself and help the actual project by donating to GrapheneOS.
Signal isn't bad it's just getting worse, THO still recommends it over Whatsapp, Facetime, etc.
Session is a Signal fork that uses onion routing like Tor (but not Tor) so they don't know your IP. It's a bit buggy though but the UI is great.
THO says the best one is Matrix matrix.org which is more like discord than IM. He recommends Element the default client but I would recommend you use a non-default client since the default one has a bit of tracking and a small non-libre part.
No it's not because he literally tells you to not trust any VPN he is not telling you to utilize any VPN
I should also add: 1) On the promoting VPN: In his videos about VPN he never promoted a VPN, instead promoting ThatPrivacySite and and telling the viewer to check out the discourse around VPNs 2) I've checked and didn't see the links on to NordVPN on his videos
You need to be more specific because there are many linux variations. One thing for sure is that it’s safer than using TOR with windows and macosx.
TAILS is one of the most secure live bootable linux systems by erasing activity since it doesn’t write to the disk. However, it can be hacked and compromised. Here’s an example.
Whonix separates the gateway and workstation aside to minimize malware attacks and routes all traffic through the TOR network. It’s pretty secure as long as you don’t make idiotic mistakes.
Heres the documentation of Whonix for more info on what it can do and cannot do: https://www.whonix.org/wiki/Documentation
If your hardware is really that old it would make sense that Whonix is unable to run on that machine. In that case just use Tor browser if your threat model permits.
If you're insistent with Whonix, you might wanna check these out: https://www.whonix.org/wiki/System_Requirements & https://www.whonix.org/wiki/RAM
You should disable unwanted app permission Yes it possible that the dev's could use the mic and storage like google uses your mic to record specific keywords like for instance you are talking to your friend about buying a laptop and you get ads related to laptop so yes it is possible and for storage if you enable storage for Google photos it will start syncing your photos to google cloud then it is used to for face recognition and the metadata of the image is used to find the location of the place the picture is taken etc
In my case i am using crdroid which is a custom ROM with some privacy enhancements like sensor off mode which disables mic and camera and other sensors , and it also has no gapps pre installed and other stuff
You should also install a custom ROM in your device if you have not installed yet
Sorry for bad English :)
Graphene OS and Calyx OS are only available for google pixels:
Calyx OS: https://calyxos.org/get/ Graphene OS: https://grapheneos.org/faq#supported-devices
But I suggest Lineage, it's a strong option and I have people around me who use it on a daily basis and like it for it's provacy option and functional use.
Usually there's a one time boot menu option. Usually pressing the F12 key. Might be different depending on the computer you have. Also I like to use balena etcher.
They're great for privacy, but they get their results from Google. As is DDG, but they get their results from Bing and Yandex primarily. If you're looking for a unique source of information which doesn't come from a monopoly tech giant, I can vouch for www.mojeek.com (as a member of the team). Completely independent, a genuine alternative thats crawls and indexes the web and doesn't track you.
Understand what you want to protect and hide. Then be very aggressive about it.
Compartmentalize everything (definitely have more than 1 email).
Work, personal (strictly personal, nothing else) and signing up for stuff.
Get an anonaddy.com account for aliases and link it to your 'signing up' email. Use that for spam and non important stuff. Don't use it for important stuff.
Yahoo definitely doesn't delete anything. They keep everything. Try deleting those emails if possible. Otherwise move on.
Like I said, it depends on your threat model (what you want to hide, what you want to give).
Be shamelessly private from now on. Give info on a need only basis, and delete/encrypt stuff as far as possible
It's all right for you to do anything you'd like - privacy is as strong as how the user sets it to be! You're free to do that, but just in case you'd like to mask your ProtonMail address, you can use publicly-recommended and open-sourced e-mail aliasing services (like SimpleLogin and AnonAddy)!
You should read up on Session before talking.
No, Session no longer uses Signal protocol.
https://getsession.org/session-protocol-technical-information/
They've also always routed over Loki. That's always been the point, to use their nodes on their network. Though before sometime last year, the nodes never changed.
Don't get me wrong though, I'm certainly not defending their decisions and no longer have much faith in Session. I would prefer they used tried and true technologies rather than rolling their own.
One plus 8 pro
If u don't have those settings, can also use a firewall
If your phone isn't rooted (Netguard)
Make sure to disable all analytics and share data options in gboard settings
https://play.google.com/store/apps/details?id=instaconnect.app&hl=en
This either sounds like a scam (read the ridiculous description and fake 5 star reviews on the play page) or it's a genuine social media app where the developers have little PR skills and are buying 5 star reviews.
heck out /u/mmattix2017's feed. It's all about this app. Spam.
"A complete social app at its best. Very user friendly, 100% RECOMMENDED to everybody."
"Searching world wide, country specific or even a particular zone. That is just awesome and unique!"
"has a lot of potential i will gladly keep it and see whats next for the great app"
Text book case of how not to promote an app.
Thank you for your reply. I am considering 2 VPN provide rs ProtonVPN and ExpressVPN and because of that I would like to aks you a few questions regarding your experience with ProtonVPN if I may. To start off do which plan do you have? And could you give me numbers in terms of speeds? (please test with server closest to your demographic location) And finally does it work well with Linux if I'm not mistaken support for Linux is really poor as of right now.
When a Porn website makes a VPN that claims its secure and protects your traffic but is under US jurisdiction, you know that shit is unsafe.
Take IPVanish for example: IPVanish is under U.S. Jurisdiction and a person collecting child porn or selling child porn (Not sure) was Using IPVanish. So, The Governemt requested IPVanish the User’s stuff (Real IP, Stuff like that) and at first, IPVanish refused but at the second time, they gave in and the criminal was caught and arrested.
Even though they did it for good as selling or having child porn isn’t good at all, but even though they did it for good, it’s a great example of how jurisdiction is big in things like VPN selection.
As for PornHub’s VPN, Don’t trust it. It’s in U.S. Jurisdiction, and if you must use a free VPN, Use ProtonVPN as it’s your best bet. ProtonVPN is under Swiss jurisdiction, OpenVPN Protocol, Usually fast internet speeds when connected and more awesome privacy benefits!
And as a another con, the porn on pornhub is not good at all.
First of all if you want to prove a point you don't have to use such pathetic insulting language, cos it's a real turn off for having a constructive discussion.
Second, who said anything good about FB, Microsoft and Yahoo? This is not a battle of tech Giants vs email Providers, it's pro-privacy email providers vs pro-privacy email providers. Hope you understand the difference.
Lastly, if you do a little bit of research online you can find all the info in question. To give you a heads up, you can start here:
Who the hell are you to give you authorise someone if he is VPN reviewer or not? Oh sorry I must have forgot about your Self Proclaimed title the
> Biggest vpn reviewer on YouTube
With what less that 1000 views?
>Push to a product he know nothing about?
Tell me one time He promoted NordVPN to users. There a difference between promoting though a video and sharing a affiliation link in description, which your 5 year Experienced (read as outdated) mind is finding difficult to perceive.
Or perhaps THO viewers are actually understanding the VPN gimmicks so well that The Biggest VPN on Youtube has fallen irrelevant and he has to attack THO personally
What other VPN's are more secure and what criteria do you base this on? I'm not talking about ones that are faster, even though I think Mullvad faster than most (and I've had subscriptions to the majority of the big name players over the years), or whether they have the simplest or cutest client.
There's a reason why GrapheneOS doesn't come with things like microG or enable signature spoofing. When microG is enabled apps can intercept each other's data via security flaws in it, to say the least.
Please read this thread for detailed information https://twitter.com/GrapheneOS/status/1437380576055541761
Also, for users convenience, GrapheneOS's website has a excellent guide on usage page explaining the how to install and use the sandboxed play services. https://grapheneos.org/usage#sandboxed-play-services
LastPass is a good password manager. However it is not good privacy wise. It is based in the USA and it is closed source software. Chose an alternative from - https://www.privacytools.io/software/passwords/
For email, one of the most important things you can do (aside from encryption) is to install and use your own email client that downloads and removes the emails from the server, instead of leaving them on the server and using webmail.
Even when using clients, the default these days is to communicate with the server using the IMAP protocol, which allows the email to be downloaded and left on the server (as opposed to the old POP3 protocol that downloaded the email and removed it from the server). Even with IMAP you can set up a rule on most clients to move the email to a local folder from your Inbox automatically. As with running your own cloud storage NAS, you do become responsible for backing up your own email.
As a bonus, using a client instead of webmail makes E2E encryption easier to do, since the email is being created/read on your own end rather than on someone else's server. Also, if you do get kicked off an email provider you have your email on your own computer.
Rather than registering a bunch of different email accounts, many systems allow extending a single account with a suffix you can then filter the incoming mail. Protonmail supports using <code>account+suffix</code> as an alias for receiving mail, so rather than having to create dozens of accounts you just create and check one, then have your mail client filter [email protected]
etc into appropriate folders.
telegram is open source I think he is saying it because telegram stores all user data in there servers they encrypt it with MTProto protocol instead of using aes they say their encryption protocol is more safe than aes and another thing they don't province you with end to end encryption by Default you need to enable it manually by enabling secret chat
Hi!
Good news!
Uber uses the Play services location APIs, not the OS location APIs.
If you like, please read https://grapheneos.org/usage#sandboxed-play-services very cafefuly. Follow the instructions exactly. Use the split apk installer as per instructions. Here is there repo https://github.com/Aefyr/SAI/releases and the release page will have the apk assets for download the app.
Granting Location access to Play services by going to system's Settings
-> Apps & Notifications
-> See all apps
, proceed locate "Google Play Services", then tap it. Next tap Location and tap the check box to the left of Allow
.
This will be foreground-only access and you'll have a working Uber service.
Have you tried KDENeon? I've found Kubuntu to be very glitchy in certain aspects (it was my first Linux OS) KDENeon is literally the same thing but with bleeding edge KDE. It's maintained by the KDE Foundation.
If Kubuntu works for you than stick with it, It's your OS so you should use something that works for you.
straight forward way for you is to setup flatpak and install it from here
and once done simply install ungoogled chromeium by typing
flatpak install com.github.Eloston.UngoogledChromium -y
They routinely engage in openwashing and outright lie about their software. I'll leave it to you to decide whether that's better than Google, or if there's possibly more they're lying about.
Here's their open source secure connect announcement. The source for secure connect has not been released.
I'd guess data mining and using built in referrals on websites like Amazon
EDIT: their privacy policy explicitly states that they do not sell data ever.
EDIT2:
>We know how important your data is to you, so we will never sell it. We don’t need to. We make our money through commissions from the merchants that we partner with. We’ll only share data with your consent or in ways you’d expect, which we explain in our privacy policy. That means we will share data with service providers who work for us and help Honey operate (like lawyers, IT companies, or customer support). The only other time we’ll share your data is if we are legally required to do so.
It's fine for less technical people, but, if you're able to use a VPN normally, I recommend cutting out the middleman and going straight to Mullvad.
If you'd like to check out some more options -
Mullvad VPN for general life stuff that requires logging in somewhere. TOR for everything else. There is a way to use mullvad to cover the exit node for TOR provided you paid for mullvad anonymously (depends on what you are trying to do). Your internet would be slow though.
I know, its a 12 year old thinking he is an anonymous hacker trying to impress people online. Probably uses Windows and his only friend is Alexa.
The first thing I thought about that day was to use a VPN. The thing is that it would make my connection beyond slow since I have to use the free version of ProtonVPN because I'm not subscribed.
Ill try not to join strangers party chats in the future.
I shouldn't be using PS anyway. Since the PS5 will record user conversations for """"moderation purposes"""". Not surprised if the PS4 is doing that already.
When i see this type of question it's feels stupid.
Why always vs? can be please use ‘or’ word for this compare things.
Btw if we leave trust and geo at table and look for what is it for and when you should use which one.
Want to use vpn who don't have any idea about who you are ? Mullvad no doubt.
Want a free vpn to access something blocked or general use and ready to give up phone number ? ProtonVPN no doubt.
In privacy concept.
Don't trust single provider with more then one data point if you use protonmail simply don't use there vpn. If you use something else like tutanota for email you can use proton vpn free or paid any option.
In my use case mullvad and protonmail is overall nicer then other but proton kind of follow marketing more seriously while mullvad keep user hope in ground.
Depending on your case use any but follow good opsec rule and don't expect anonymity from vpn you should be fine.
I feel your pain. My solution was to have Mullvad on my OPNsense firewall on my home network. That of course is only useful when I'm connected to my LAN.
NetGuard does support Socks5, definitely not the same.
It's also possible to do everything that NetGuard does through OPNsense (or alternative), as well as connect to Mullvad though WireGuard. Once set up, you could just keep an always-on WireGuard connection into your home network. This also let's you use Pi-Hole and access your locally running services from anywhere
Its a part of "Google Play" product line, so i think you will need gmail account for that at least.
You can use apps like shelter or island ( https://play.google.com/store/apps/details?id=com.oasisfeng.island ) to isolate them completely and use a dummy google account to play any game you like.
Or if you don't want to use google account at all then look for alternative games or stop using it that's all there is to it.
A VPN cannot protect you from this kind of intrusion. Mullvad and any other VPN users might as well walk around naked for all the privacy this'll afford them. A VPN is pretty much a tunnel of encryption so if the "authorities" have access in front of or at the end of that tunnel... well, you're boned. Heck I doubt this intrusion will even stop at the Swedish border. Sweden is a member of the 5-14 Eyes surveillance agreement. They'll probably spy on anyone the Americans pay them to. That said if it's hardware having tech knowledge might be able to help you thwart it and perhaps the software backdoors might be able to be closed with enough coding experience or by using open source software. Course if you can code like that you're probably already working in one of the alphabet soup agencies.
>Then create another protonmail account that no one can guess that belongs to you and use it to sign app for the social media you want.
Thank you! I agree so much with this statement. When I was thinking about compartmentalization, I thought "if I use my work email for my work social media... Then, for what I do compartmentalization? Yeah, it is for my "work social media". But, the point of compartmentalization is to avoid big companies like Facebook and Google to collect my data. If I use my work email for Instagram then... Useless".
That's what made me always stop to continue my compartmentalization (and decided to ask in this forum). I like what you suggested to me. I will do that: make a new ProtonMail account that has no real data just to sign up for Instagram and Twitter (should I use the same email for these 2 social media?)
What do you think about SafeSwiss? I always hear people recommend ProtonMail and TutaNota, but no one mentions SafeSwiss. Here is the link:
​
>An important tip: NEVER and I mean NEVER log in to both your accounts at the same time from the same device. I would suggest using different devices for each account, just for privacy reasons.
Yes. Of course. Thank you! I use hardened Firefox (for professional), hardened Brave (for social media except for Facebook and YouTube), hardened Vivaldi Browser (only for YouTube), and Tor Browser (for private/personal) on the laptop. I have a paid ProtonVPN account. I also want to try Firefox Portable since I can use it locally (the data will store only in the place where the Firefox Portable located). What do you think?
1) Multi-Account containers should work fine, you can probably find cookie container tests somewhere on the internet. If you are really worried, you can use Firefox, brave, and Tor for compartmentalization.
2) Try using open-source software like bitwarden. Bitwarden Premium is only $10/year. A lot cheaper than Dashlane. As for the VPN, don't trust them. Try not to put all your eggs in one basket; use Password manager for passwords, and VPN service for VPN. ProtonVPN is one of the only great providers out there. (Free accounts are supported by Paid users, not with your private data.)
3) Microsoft is just like Google. Use ProtonMail, Tutanota, MailFence, or SecMail for your online accounts. If you are to lazy to manage all these email accounts, you can do what I did, and just use an email alias forwarding service that uses different fake aliases for your online accounts that forward them to your private inbox. If one account is involved in a data breach, just delete the account, and the anonymous alias, and you should be fine.
I would STRONGLY recommend using YubiKey (from Yubico). WebAuthn + FIDO Universal Two Factor authentication which is the most secure option for authentication by far right now. Google, and other services have rolled out support, along with Tutanota. ProtonMail/ProtonVPN/ProtonCalendar users should expect this functionality by the end of this year.
For FreeOTP, just download YubiKey Authenticator for your device, insert your YubiKey into your computer or Device, and your TOTP's are saved on there. Just make sure to have a backup YubiKey there too in case something happens to the main key. You won't have to worry about losing a device, as having a main key, and a backup key ensures you never lose your authentication device. Just like the Apps on your phone, you can set a password to your YubiKeys locking unauthorized users from accessing your authentication tokens.
Here is one that does not store your data online: Password Safe. I got the pro version which even allows you to delete all the passwords if you mess your master password 10 times.
Because there are so many other apps named the same way, here is the official link: https://play.google.com/store/apps/details?id=com.reneph.passwordsafe&hl=en_US
It seems to me all he was saying was dont trust anyone and do your own research. I agree, PTIO seems pretty biased. If you look at any vpn long enough im sure you can find something wrong with them.
When I tried Mullvad I was unable to access Netflix, BBC, etc. There isn't (wasnt?) an app for mobile, no live chat support. Also Mullvad is located in a 14 eyes country and to my knowledge has never been audited. Not trusting a vpn because they advertise a lot seems pretty silly.
Firefox and tor which is firefox based are literally the only browsers on their page. No one wants to spend a bunch of time digging around deep in the settings to make their browser priavte. Most users aren't that technical.
Limited Linux support? Mullvad has a full GUI client for Linux multiple guides about how to use Mullvad with Linux. Mullvad even has a guide on QubesOS with Mullvad. Mullvad's Linux support is outstanding. Mullvad also Supports OpenVPN AND WireGuard
Unlike other competitors which only have command-line clients and OpenVPN support for Linux.
I never said NordVPN is the best provider out there and I never will because Nord is not IMO. As I explained earlier I bought NordVPN because THO is affiliated with them. I was in a rush because I did not know my subscription for PIA was going to expire. Anyway after buying a NordVPN plan for 3 years I started doing some research with my new VPN (I always have one on because I do not trust my ISP) . So during my research I found out that NordVPN is really focusing on marketing I find that troubling. After that I started reading reviews on trustpilot and I've never seen so many negative reviews about a VPN. After reading some of them I decided to issue a refund. And I understand content creators affiliate with NordVPN because their affiliate program is really generous.
I was just about to reply to your deleted comment, so I'll put the answer here instead:
Their service is free, but after the first week it becomes very limited. They can sustain this by earnings from paying users and not by selling your data.
It's true that ProtonVPN and ProtonMail is owned by two different companies: "For security and legal liability reasons, ProtonVPN is operated under ProtonVPN AG instead of Proton Technologies AG, which operates ProtonMail. However, ProtonVPN and ProtonMail (Proton collectively) share the same management team, offices, and technical resources." - There is no reason to worry about this as it is purely from a legal standpoint.
I cannot speak about or compare ExpressVPN as I haven't read much about it or used it.
I see, I'm using paid ProtonVPN so I can connect everywhere. there's not much you can do. If you don't have enough money to pay it. You can buy a phone that supports Ubuntu for phones , and install it. Then use Orbot to connect to Tor network so your ISP can't see what you are doing. I don't know what else you can do.
Ooh I thought that you had a PC. Yeah, privacy on mobile is hard. If you don't want to your ISP spy you, use ProtonVPN, connect to a place outside the 5-9-14 eyes (like Switzerland) and use your 2 Protonmail accounts. I don't know how much you can do because privacy on mobile is not easy.
> 3) This is not a "special deal" but rather standard pricing. That makes it a lie when THO says: "use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!"
Also for /u/newslooter who mentioned the pricing.
I cannot confirm the pricing prior to today, as I have not looked at it at all. However, today (and presumably, yesterday when you posted this comment), it appears that NordVPN is running a deal that expires in (at the time of posting this comment) 9 and a half hours. That deal is also 75% off. So the pricing available today is not "standard pricing" as you say, from all appearances. Also, presumably, any referral coupon code would last longer than this current deal. Lastly, what does pricing matter to the main argument of corporate shilling? Surely a shill is a shill, no matter how deep a discount is provided via their shilling? It seems silly to try to use the discount amount as an argument for shilling.
I've tried a number of VPN providers and Mullvad has, so far been the overall best. Network speeds are excellent, the apps work well (Mac OS and iOS) and configuration was pretty easy. I have only one complaint and that is I cannot figure out how to get the OpenVPN client to connect to the VPN when I'm at work. I don't know if the university I work at has some kind of block on it but the OpenVPN client just will not connect on the university wifi.
Oops i deleted my comment on accident.
Mobile - IceCat/Tor browser
Tablet - Icecat/Tor
PC - Ungoogled chromium/ Pale Moon/ Tor
Nothing beats TOR, but the others are casual and have been proven to make no unsolicited request at all.
Also dont use nord vpn on mobile or tablet. Its embedded with hella trackers as firefox is as well. Use exodus to scan apks for trackers. Nordvpn has all kinds of google hardcoded in it.
If you want easy tracker scans download yalp and in settings check "show exodus privacy results" and it will tell you how many trackers it has and exactly what they do. Another perk is you can use their built in account so no logins.
ProtonVPN is tracker free and you can use their premium service free for seven days if you make a protonmail account. Their apk from Yalp is tracker free, the one om their website they offer has crashyltics in it so dont get that one. Get it from yalp. Its literally the only good tracker free one. Shoutout to proton.
Riseup is another tracker free one from fdroid. Shitty as hell compared to protons premium service but hey its a vpn.
Wait i just realized your on apple lmao. Those are still top notch PC suggestions. But if nord has trackers here on android i assume they do as well for ios so that still remains.
Also if you must use firefox, Nightly for us atleast is the only one without trackers embedded in it.
Focus has only one and regular FF has two.
Last time (maybe week ago) when I've made my research on best VPN it came out that TorGuard is the best among. But as I am aware here we talk why we have some trackers on NordVPN.
In the steps of the research I am referring to, it came out to me that despite their 30 day money back guaranteed, they don't have PayPal as a payment method where the clients have very strong policies against those companies. PayPal can squeeze milk from a chicken when it comes to clients right. NordVPN removed PayPal as a payment method most likely for that reason.
In these 30 days test period you get the best of speeds and server time, but when the period is out of the way the connection begins to get little by little a bit slow and slow... and... you get the point here. And if you are on the 3 year contract wagon you are pretty much screwed.
Typically as a recommendation when you buy VPN don't get too long periods of contracts, as in this case your right to change your mind in short timeframe remains in play. Here again the VPN service with shortest cheap contract is TorGuard. The cheap prices comes from unpacking all the services in to additional purchases.
For $9.99 a month you get premium package but for $8 more you can get Add-ons like DDoS protected IP or Time Warner IP etc. Check their website if you are interested.
As for the best option we cant talk any further than TorProject. It's the best. And free.
It says that android 4.4 kitkat is the minimum requirement for proton vpn, but try it anyways.
Download this using a desktop:
Copy it into the phone storage.
Install it on your device by using a file manager.
Let me know if there's any problem.
It's depend on your define as “safest”.
Options.
Privacytoolsio have a collection of dns that meet some to all of there criteria please check it out here on privacy tools io.
Now i if you ready to give up some time and effort with self hosting your dns resolver pihole still rocks with features like block domain, dns over tls, dns over https and a lot more check it out here .
Suggestions :// I use dns adguard in temporary stage (android 9+ support doh) and my home network have pihole setup.
If something is missing according to requirement let me know i will improve my answer.
Well, if the IMEI is used in the authorization process for a network, which it generally is at least registered to the network, then yes, a constant IMEI would be required. However, there are cases where the IMEI is merely logged and not required as a pair to the activated SIM card, so it's possible that you could spoof it. That being said, it's really just a losing battle. MAC, IMEI, IP; all of it is parsed and logged in order to build relative profiles until given more specific or concrete data to profile you with.
You can spoof your IMEI and other data points all you want, but unless you have an anonymous carrier on par in methodology with Mullvad and have randomization and connection processes automated, it won't make much of a difference for the majority of people out there; they've already been profiled to enough of a degree.
The defaults on Graphane are already vastly better. But I also recommend install IVPN, and sandboxed google play. Then all of your other apps.
Review the permissions you give each app. I cut network access and location from anything that doesnt absolutely need it.
If you have sensitive material, create a separate account profile for added protection.
Then back up your install.
That's about it
What a load of bollocks.
Techlore may have different opinions to you, but that doesn't make him a hypocrite. You have exposed fuck all.
In regards to Privacy Guides: read the real story. The founder has not had any money stolen, and his site is littered with ads, affiliate links and poor recommendations.
Regarding NordVPN, u/Toaster8262 sums it up neatly:
> Lmao this video is obviuosly fake, especially video clips and messages/posts with henry shilling Nordvpn and saying it makes you anonymous (This is his actual review of nordvpn). There are no links/sources in description.
For what it's worth, NordVPN is shite anyway.
You site Braxman as a credible source, when all he does is shill his insecure phones and services.
Spend your time more productively.
Or
You can also check there site.
I agree with you that corporate influence is an issue at all levels including medical journals, journalism etc. I’m not remotely suggesting they aren’t an issue nor discouraging you from tackling that problem.
But again, sponsorship is NOT a problem unless we can explain why a specific sponsorship creates a conflict of interest.
To use my previous example, would a makeup YouTuber doing an ad for Ridge wallet create a conflict of interest? No. It’s just an ad, like any other ad or commercial. Journalistic integrity/corporate influence isn’t impacted here.
If that same YouTuber did an ad for Maybelline, now we have a conflict of interest because they may no longer be honest about the products they review. They now have incentive to promote Maybelline and negatively review other companies. Now we have an issue of corporate influence.
I hope that makes more sense, apologies if I was unclear.
Regarding the “no-knowledge” ad model you proposed, I think there are pros and cons to both.
You know yourself that you can’t control the ads that are on monetized YouTube videos. That’s good because you can’t run into a conflict of interest like the above example, but it’s bad because you can’t stop NordVPN from running an ad filled with marketing nonsense about how their VPN will keep you safe from hackers and make you completely anonymous.
I think we agree that the ideal situation is to be supported entirely on your own products and services (merch, memberships, courses, etc.) and have no ads whatsoever.
But if for some reason ads were necessary, then a good “second best” in my opinion would be having full knowledge of sponsorships but only taking ones that don’t create the conflict of interest we mentioned earlier. It’s not ideal, but I think that’s as close as we can get in what’s already a non-ideal system.
I like it more to stream but it depends on where you live. In most countries movie streaming is a grey zone, but If you want to be more safe I would recommend ProtonVPN as said in the pre-post.
But be sure to have an good adblocker (Ublock Origin, with filter lists is the best option in my experience.)
I don't know if its allowed to post the links here, but (good for Anime, English only (Dub ans Sub)), ( English only, in my opinion best site for movies). If you want more sites just browse the mega threat and give every site an chance.
Have fun sailing the high seas.
I don't think you are going to get a response from the u/The_HatedOne. He has been MIA for a bit. The last anyone has heard from him was me in a private message and that was on the 12th. I'm going to make a community announcement about it on the 3 week mark.
But untill then he at least has a bitchute page https://www.bitchute.com/TheHatedOne/. I also have redundant copys of the videos stored on my end.
That said when he gets back I will do my best to get him to put stuff on peer tube.
You have many firefox and chromium based browser to pick from.
https://alternativeto.net/software/firefox/?license=opensource&p=3&platform=linux
I would recommend Librewolf for the best privacy and security.
https://www.privacytools.io/browsers/#addons you can follow this guide to harden it. also, if you really need google voice, you could either not use google containers or you could use brave for those.
For everyday use, any Linux OS would be fine. I personally use Kubuntu. A full install is ideal in my opinion, but just try out whatever OS you want on a virtual machine or USB to see if you like it.
As far as a browser goes, I would suggest a privacy hardened Firefox. Follow this guide:
https://www.privacytools.io/browsers/
Scroll to the bottom to learn how to change your about:config settings. Have fun!
I recommend running your own DNS resolver using Unbound on a Raspberry Pi, which you can use on your phone via a VPN to your home network with the resolver.
Your next best option would be to use one of these providers:
The issue with using multiple profiles is that, unless you already have hardened your settings, fingerprinting will be able to detect you regardless of what profile you're using. Two default profiles are practically identical to eachother. But two hardened profiles are nothing alike, not to the websites you are connecting to anyway, as they will only be able to see default information if you've set it up that way. The only settings that won't change are your system-level settings, which is an advanced level of fingerprinting, which is where Qubes comes in handy.
My advice is, forget about profiles and containers. Learn to use uBlock Origin in advanced mode, tweak your browser config based on this link, set tracking protection to Strict, and attempt to use Never Remember History. You won't need to use containers if every session is unique. It's one thing to separate profiles, but it's better for them to not meet in the first place.
That's actually great that they do so.
This way they encourage more people to stop using Gmail spyware services, and use an email provider that is respecting their privacy https://www.privacytools.io/providers/email/
There are four things ISPs can potentially see: non-encrypted http content, DNS queries, the IP you connect to, and SNI (server name/domain of the website). Because most websites use https (encryption) anyway, your isp shouldn't be able to see the actual content. This can be further improved with the browser extension 'https everywhere'. Secondly, Firefox has a feature to use encrypted DNS. Go to settings, scroll down to the bottom, network settings, scroll down to the bottom, enable DNS over https. I recommend using one of these: https://www.privacytools.io/providers/dns/ Thirdly using a VPN will hide which IP you connect to from your ISP (or anyone managing your internet). But the VPN still has the key to all you data, in which case you can use tor. If you enable bridges in tor your ISP won't even know your using tor. Lastly Firefox has a feature to use encrypted SNI. Go to about:config, network.security.esni.enabled.
Scenario: You are using ProtonMail. Your friend is using Gmail.
First, when you are sending email to a Gmail user you are accepting Google's TOS even if you are not a Gmail user.
However, as long as you're sending encrypted emails and use ProtonMail as a tunnel (even if your friend is Non-ProtonMail Recipient) only you two can read the emails. By default, all messages sent from ProtonMail do not expire. If you set an expiration time (which you should), once expired, the encrypted message and attachments will be deleted.
When sending PGP encrypted messages, all that Gmail can read is your subject line.
THO has some great videos his online privacy tutorials for 2018-2020 are great to watch but for all purposes and to answer what you got. For extra reading and if you got time to burn look into privacytools.io
1/ Privacy hardened Firefox is a way to go tool, If you know how to add extensions then you need to add Ublock orgin, https everywhere, decentryles and cookie autodelete. These are also explained in THO videos. Firefox and learnign to compartmentalize with different profiles is the way to go. but first.. get firefox.
2/ I woudl recommend KeepassXC .
3/ I would discourage you from using outlook / live accounts.. I would use more open source material such as Protonmail.com or tutanota
Watch and rewatch all of THO videos on Privacy tutotiral for each year and get an understanding.. and again... go to privacytools.io for further info and reading.. Get educated and you will make a great informed decision for yourself. :) best of luck!
ProtonMail is a good option for a long-term email that you wish to keep. If you are signing up for something you care about, use a long term email to better secure that account. One option for a burner email service is Guerilla Mail. This is better for websites you don't care about that ask for your email to use temporarily, or for any other reason you need an email address only for an hour or less, because it prevents spam in your main email.
Unfortunately I don't use Calendars except a physical one in my house.
Protonmail is developing a calendar and it's in beta now so maybe that'd be worth checking out.
I've never tried it, but get a Protonmail account and try this email expiration.
There's good evidence: https://www.slideshare.net/codeblue_jp/igor-skochinsky-enpub
But also that is a backwards way of thinking. Users should be empowered to prove that their hardware is not backdoored. Your comment is like saying "It's not been proved that there are no fairies in your garden".