Animated Digital Freedom videos to combat Big Tech surveillance on a Nostr-integrated website. Cypherpunk memes, Open source, #Linux, DeGoogled Phones, Tor/VPNs, self-hosted services, Austrian economics, #Monero #Bitcoin, Security, and more!
Public Key
npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 Profile Code
nprofile1qqs2c0m2lct4j0mpsyz38kkf58j5f6rmnn53kf7n0wywck8m42gpf2szhupd7
Author Public Key
npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 Show more details
Published at
2024-06-03 23:05:55 Event JSON
{
"id": "eef111521ba33e4be73e014998dcc3527fd9f38389827a39440749866ef268b3" ,
"pubkey": "ac3f6afe17593f61810513dac9a1e544e87b9ce91b27d37b88ec58fbaa9014aa" ,
"created_at": 1717448755 ,
"kind": 0 ,
"tags": [],
"content": "{\"name\":\"SimplifiedPrivacy.com\",\"about\":\"Animated Digital Freedom videos to combat Big Tech surveillance on a Nostr-integrated website. Cypherpunk memes, Open source, #Linux, DeGoogled Phones, Tor/VPNs, self-hosted services, Austrian economics, #Monero #Bitcoin, Security, and more! \",\"picture\":\"https://cdn.nostr.build/i/917c5e2d5e5d28acf2737a5d074e4df5ddf24976893a47cba2362a99c5a35ff7.jpg\",\"nip05\":\"[email protected] \",\"banner\":\"https://cdn.nostr.build/i/c6dffc673fc1c9d744bc9e25fedf583adc7acc1143cac60279273203e8474c67.jpg\",\"displayName\":\"SimplifiedPrivacy.com\",\"display_name\":\"SimplifiedPrivacy.com\",\"lud06\":\"\",\"lud16\":\"[email protected] \",\"username\":\"SimplifiedPrivacy\",\"website\":\"SimplifiedPrivacy.com\"}" ,
"sig": "bde88c701b25ce7edc79617cdcf8f4b9311f0866d297bc71c17fd1d4a1538ae212bed102f0f86d0f2be5b92dc5c6d5990923d5a4353a9b6483ea851e82dd8886"
}
Last Notes npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com This is true, but many of these services use Big Tech in their stack. So it’s a philosophical, security, and personal choice. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Mail-in-a-box is good for beginners, it’s a script that does the setup and then spits out the DNS information. But the downside is that uses the whole VPS for just email. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com You are correct that Email is not private. However, this is more of a power issue, as many services won’t let you just do a password, and demand this non-private email. Including many custodial bitcoin wallets which are really bank accounts. And you got a link on Proton doing whirlpool? npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com So @npub1tms…208a is asking how spam email reputation works for self-hosting email. First off, it's NOT true that self-hosting doesn’t work, or that there’s no way to avoid spam block lists. And for the email setups we do, we guarantee you're off spam or your money back. There's 2 main aspects to avoiding spam lists, 1. Having the correct domain name (DNS) entries, and using a program that gives you those entries. Mail-in-a-box is good for beginners, it’s a script that does the setup and then spits out the DNS information. But the downside is that uses the whole VPS for just email. Luke Smith has scripts as well. For the setups we do, we put Mailu in a docker container, so it can be moved from VPS to VPS easily, and other services can be using the same VPS. 2. Having a provider that isn't on the block lists. This is a tough game because the KYC providers are more likely to be off the list than the anon crypto ones, but it does exist. Also with most providers, even if you're on the spam list, you can request to get off it. Spamhaus will demand you fill out a form on their site, and you have to use a residential proxy, and not a datacenter VPN. Further, not only does the VPS provider matter, but also the domain name registrar, and their nameservers. Make sure to ask them before you buy it, and then check in the Spamhaus database as soon as you get the IP to complain/dispute. Important point: ALL domains will be on the spam list for 1 month when they are first registered. This is NOT a permanent ban, it’s an unavoidable 1-month thing. So if you’re doing it on your own, first buy the domain, and then the VPS a month later. And if you don’t feel like reading the docs, consider our program, you get email, XMPP, Cryptpad docs, and whatever else you want (Nostr relays, SimpleX relays) on there, and then we hand the whole thing over to you, https://simplifiedprivacy.com/email-cloud-combo/index.html #nevent1q…af7s npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Protonmail has a BTC wallet?! Yup it's Bitcoin-only Layer-1-only tied to your email. So now all I need is your email and I can see all your transactions. They claim it makes a new address, but this is propaganda if the input/outputs are being used together. This is the worst of both email and Bitcoin privacy. You shouldn't be using a web app in a browser for your L1 Bitcoin, it should be in a local wallet like Electrum. Just like their email, you don't know what's going on in the cloud. They write "not your keys, not your coins", but they don't even let you use your own PGP key for email. Further, they called everything else other than Bitcoin a shitcoin. Even if we ignore Monero, they still don't even accept lightning for their vpn/email. Lightning is far better at privacy than L1, and more economical. This shows they are basically a honeypot propaganda outlet, with a World Economic Forum rep on their board, that hands over thousands of emails a year. Now they can add bitcoin transactions to give context to those compromised emails. Once again, I urge you to consider self-hosting your email. Any small VPS is barely more money than proton's paid plans, and we have cheap plans to set it up for you if you're uninterested in reading technical docs, https://simplifiedprivacy.com/email-cloud-combo/index.html Stop living in web apps. You can really be self-sovereign. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Facebook screws over Google and Microsoft Of all CEOs to go open source with AI, it’s Zuck Meta is releasing the largest OPEN SOURCE AI model, that cost billions to develop. Llama 3.1, which he claims can beat ChatGPT and Google’s bullshit, on multiple benchmarks. And now he’s completely just giving it away. And it’s cheaper to setup server-side also. [1] Quote Wired, “Meta CEO Zuckerberg compared Llama to the open source Linux operating system. When Linux took off in the late '90s and early 2000s many big tech companies were invested in closed alternatives and criticized open source software as risky and unreliable. Today however Linux is widely used in cloud computing and serves as the core of the Android mobile OS. “I believe that AI will develop in a similar way,” Zuckerberg writes in his letter. “Today, several tech companies are developing leading closed models. But open source is quickly closing the gap.” [2] Sources: [1] https://www.theverge.com/2024/7/23/24204055/meta-ai-llama-3-1-open-source-assistant-openai-chatgpt [2] https://www.wired.com/story/meta-ai-llama-3/ npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Sir, the bullets missed. We have to win with voting. "What?! Voting? Screw that, I'm dropping out" npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Monero Nostr Client Out It's not made by our team, it's Retrnull doing a fork of Amethyst for Android, he's named Garnet. I can't vouch for this because I didn't make it. I tried it w/ a burner, but I could not fund the burner: "Failed to construct transaction: Invalid destination address" https://github.com/retrnull/garnet Ask him questions or complain: https://bounties.monero.social/posts/94/42-420m-nostr-client-for-monero He has multiple tipping modes for different privacy options (public, anon, ect), and it can search bios for XMR addresses. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Huge Microsoft Outage leads to Global Closed Businesses Banks, Airlines, Businesses Worldwide Shut Down. London Stock Exchange’s news service was down. In the US, many 911 and non-emergency call centers weren’t working properly. Many television channels around the world have been hit by the outage, with Sky News in the UK broadcasting from a phone after its studio equipment failed. The Paris Olympics organizing committee also said it had been hit by the outage, but that it had contingency plans in place. In Europe, Amsterdam Schiphol Airport—one of the continent’s biggest connecting hubs—was shut to all arrivals due to the issues, according to Eurocontrol, Europe’s air-traffic-control agency. KLM Royal Dutch Airlines said it had suspended most of its operations. This story not only shows the horrible dangers of Microsoft’s operating system, but also proprietary software that constantly and unnecessarily monitors systems that otherwise could be offline. CrowdStrike is a corrupt pro-Democrat firm that supposedly does cybersecurity. And it’s their software going down has caused Microsoft operating systems globally to have the blue screen of death. Thousands of airlines globally have delayed flights, and millions of people are being inconvenienced. CrowdStrike’s bloated proprietary software is morally corrupt and forced upon workers. The software monitors all activity on a computer, even when offline actions are performed such as copying a file. Then this data is all sent back to CrowdStrike to be monitored for their supposed security purposes. But what is never discussed is that CrowdStrike now has complete surveillance over all documents in organizations that could have otherwise been kept offline, and is now a centralized point of failure for incidents exactly like this. Further, it’s a massive invasion of privacy for employees, and is often pushed on them for all their devices. CrowdStrike’s invasive software is difficult to remove, and hijacks the system at the OS-level. It’s not something employees can just toggle on and off. While as if employees were just using Linux and end-to-end encrypted communication systems, this would not only save companies money, but has a more reliable track record for reducing security inncidents. CrowdStrike is famous for lying about Wikileaks. Even though they had no special knowledge, these supposed experts mouthed off malicious lies that Wikileaks was a hack, and not leak. Their goal was to create trust in Hillary Clinton, which they failed to do because they provided zero proof. Between Microsoft and CrowdStrike, they have invaded all corporate computers with surveillance of all OFFLINE activity, that has now brought corporations globally to a screeching halt. Now is a great time to switch over to Linux, using our rich educational resources. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com How you can be deanonymized through Tor Tor is an excellent tool for privacy, and we do not recommend you avoid it. However, there are many limitations to be aware of and ways of using it that can compromise your anonymity on Tor. This post will discuss just a few of the ways, but there may be others that the public is unaware of. For example in 2017, the FBI dropped a case against a school worker accused of downloading child pornography because the FBI would have rather let him go than reveal the source code for how they deanonymitized him through Tor. [1] The techniques we will cover include: 1) JavaScript based attacks 2) Cookies 3) Compromised Exit Nodes 4) Compromised Middle Relays 5) Compromised Entrance Guards 6) Opening Files Outside Tor 7) Ultrasonic Sounds JavaScript Attacks JavaScript can be used to identify a user through Tor in a number of different ways. This is why Tor Browser comes pre-bundled with the “NoScript” plugin. This plugin can either reduce or disable JavaScript’s ability. When the plugin is set on the “Safest” setting, JavaScript is completely disabled. This level of security is required to completely stay anonymous and secure on Tor. The first way that JavaScript can identify a user is if a malicious website were to inject code into Mozilla Firefox (the foundation upon which the Tor Browser bundle is built). An example of this exploit was demonstrated as recently as 2022 by Manfred Paul at a Pwn2Own hacking contest of getting a user’s real IP address through Tor. [4a] [4b] But this is not a one time bug or incident, as Mozilla Firefox has a history of being vulnerable to these types of malicious JavaScript injections. Malicious script hacks caused Tor to have to patch to correct them in 2019 [5], 2016 [6], and 2013 [8]. Back in 2016, cybersecurity researcher Jose Carlos Norte revealed ways that JavaScript could be used to identify Tor users through its hardware’s limitations. These advanced techniques fingerprinted the user’s mouse movements, which are tied to hardware restrictions and potentially unique operating system settings. Norte additionally warned how running CPU intensive code could potentially identify the user’s PC based on how long it takes to execute. [7] The point of all of this is that all of these vulnerabilities did not work when NoScript was set to the safest mode of disabling JavaScript. Browser Alone doesn’t stop cookies Another security issue with Tor is pre-existing cookies, which could compromise your anonymity. For example, let’s say you previously signed on to your Amazon account from the same computer you are now using Tor Browser in (but using a different browser). If you now visit an Amazon page using Tor Browser (or maybe even receive a forwarded Amazon URL), you could potentially be connected to the Amazon cookie already on your computer and be deanonymized instantly. This would immediately connect the Tor traffic with you. Remember though that Tor Browser is only one of a few options for using Tor. The way around this cookie issue is to use Tor in a virtual machine with the Whonix operating system or the USB operating system version of Tor called Tails. Compromised Tor Exit Nodes Your traffic enters Tor encrypted and stays encrypted through its journey throughout the mixnet until it gets to the final stop, which is the exit node. Here the exit node communicates with the “regular” clearnet without Tor’s onion encryption to access a website on your behalf. Outside of Tor on the “regular” clearweb internet, most websites use httpS encryption. This is shown with a padlock in the top by the URL. If the website is http, without the “s,” then it’s unencrypted plain text data. Anything you do using an unencrypted http website with a Tor exit node can be snooped on and seen. However, this risk is relatively low because of the high percentage of websites that use httpS. The biggest risk is that the httpS encryption can be removed using SSL stripping. This is when the Tor Exit node acts as a man in the middle, faking the server with which you’re trying to authenticate and downgrading the connection to httpS. For example in 2020, a malicious actor took control of over 23% of all Tor exit nodes and started doing SSL stripping to steal Bitcoin being sent on mixing websites. [9] [10] To prevent against these types of attacks, upgrade the Tor security level to safest, which requires the use of HTTPS encryption with “HTTPS-Only”. Also pay attention to the top icon by the URL bar, to make sure there’s always a padlock showing it’s using this encryption. You can click on the icon to see your Tor connection route and the certificate authority. Certificate authorities are the entities that validate the authenticity of the HTTPS encryption to this IP address. On a side note, these certificate authorities can act as a censor by removing an entry’s IP address, and this is one of the flaws that many cryptocurrency blockchains are actively working to solve. Another way to prevent malicious Tor exit nodes from stealing your data or cryptocurrency is to avoid using exit nodes by using primarily Onion services. If you only login to Onion websites, then you never exit Tor. This doesn’t mean completely avoiding clearweb sites, but try to only browse them and not login. It’s the login/password credentials that malicious exit nodes steal with SSL stripping. Malicious Middle Relays The next type of risk is malicious middle relays — the hop between an entrance guard and an exit node. For example, the malicious group KAX17 had been identified as having run up to 35% of the middle relays and 10% of the overall Tor network before the official Tor project removed 900 of its servers. [15] [16] While malicious exit nodes often want to steal Bitcoin or data, the goal of malicious middle relays is to deanonymatize users by seeing the path of their traffic. This is especially true on Onion hidden services because it doesn’t even use exit nodes. There are a few things you can do to reduce this risk. We will go over them in the entrance guard section, because they are the same methods. Malicious Entrance Guards Entrance guards can see what IP address is connecting to the Tor network, but can’t see the traffic itself as it’s onion layer encrypted. However, they can gather some information, such as the time, size, and frequency of the data packets. Researchers from Massachusetts Institute of Technology and Qatar Computing Research Institute wrote in a 2015 paper that if one of their malicious machine learning algorithm servers gets randomly picked to be a user’s entrance guard, then it may be able to figure out what website that user is accessing. The MIT researchers are able to do this by analyzing the patterns of packets from a pre-determined list of websites and seeing if they match the traffic their malicious entrance guard snoops. [17] [18] According to MIT News, the MIT machine learning algorithm has above an 80% chance to be able to identify what hidden services a given Tor participant is hosting, but there are two conditions. First the host has to be directly connected to its malicious entrance guard and second the hosted site was on MIT’s predetermined list. [18] And finding who is the host of controversial materials is often of more interest to oppressive regimes than just who are the website’s visitors. How can you avoid this? There are a few ways you can reduce your risks with malicious entrance guards and middle relays. First, use your own hosted ob4s bridge as an entrance guard to avoid ever having both a malicious relay and guard. Our company can help you set this up on a cloud server (VPS) or you can do it on your own. And second, you can enter Tor with a VPN first. Opening Files Outside of Tor If files are opened outside of Tor Browser, they could have code that executes and reveals back to an adversary your real IP address. To avoid this, one can use a dedicated virtual machine like Whonix, which forces all traffic in the VM through Tor. Another option is the Tails operating system on a USB stick, which automatically erases everything after you’re done. However, if you want to use a PDF outside of Tor, then you’ll need to convert it to plain text. One great Linux tool to do this inside Whonix’s command line is PDFtoText. You can install it with this command: sudo apt install poppler-utils Then use it with this: pdftotext -layout input.pdf output.txt The -layout flag keeps the original layout. input.pdf is the original file, and output.txt is what you want the output to be named. Ultrasonic Cross Device Tracking As University of California Santa Barbara cybersecurity researchers presented at a BlackHat European conference, malicious websites can identify users through Tor using sounds invisible to the human ear. [20] The way this works is that many popular phone apps use Silverpush’s ad system, which can receive high frequency audio without the phone’s owner being aware of it. Audio of this type could be broadcast maliciously from a Tor website. Silverpush enables the sale of your location data These doctoral researchers warned of the dangers Silverpush presents by being connected to wide-spread platforms such as Google Ads. To demonstrate this, the researchers played video of their lab experiment, which de-anonymatized a laptop through Tor Browser, as a result of an Android’s mic next to the laptop’s speakers, while being signed in to a Google account. [34] While the researchers presented a Chrome browser app that can stop this, we do not recommend it for Tor use because of fingerprinting (and Tor Browser is Firefox based). The best solution is to turn off the speakers and any phones around you when visiting controversial or private websites. Also consider a degoogled phone with a custom operating system, such as Graphene or Calyx, which would allow you to modify when apps have microphone privileges. Conclusion In this article, we covered a variety of different ways your identity can be revealed through Tor. To summarize your best defenses are: 1) Disable JavaScript with Tor’s Safest Setting 2) Use a custom private entrance bridge (ob4s) for an entrance guard that you control. Our company can help you set this up, or do it on your own. 3) Use Whonix or Tails when you need JavaScript or for doing anything outside a browser, such as opening unknown software or files 4) Before connecting to Tor, first use a high quality VPN with OpenVPN (Wireguard won't be faster for Tor) 5) Avoid resizing Tor Browser because of fingerprinting Consider sharing what you learned. And of course, here's the sources: https://simplifiedprivacy.com/how-you-can-be-deanonymized-through-tor/index.html npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com this is bravenewpipe? its different than the other one npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Thanks for admitting it. Most times people string us along for awhile as a form of DDoS npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Ok, but the 2nd question is not only was there intent to kill or not, but was it a lone individual or the Deep State? The people who think JFK was the CIA are not just “security minded”, but the logical evidence points to it npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com are you pranking? of course not. you want long random passwords with complex characters like %$#^ npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com This list of breaches shows the importance of giving out minimal information. Some tips: a) Use a different random password for different accounts b) Use an email alias service like AnonAddy or burners As once a data breach happens and data is sold on the darkweb, the buyer will automate testing the password with that email, on OTHER services. #nevent1q…mf6n npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Let’s be honest, that same outer ear shot would have killed Joe Biden In fact, even just loud noise and the weight of secret service guys going on top of him might have npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Donald Trump was Shot Poll: Who do you think did it? a) Random angry democrat b) Deep State c) Deep State but not to kill, just to scare d) Lee Harvey Oswald's ghost e) Trump faked it for sympathy npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com VPS is a virtual private server, or a tiny cloud, 1 or 2 CPUs and RAM. Then you can host services like your website, your email, your files on the cloud, your private messengers such as Matrix or XMPP. So then you are in control npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Why BitcoinTalk forums suck: --Cloudflare sees your password. People invest so much time here to own nothing. --Tor & VPN restrictions (that require payments) for a borderline illegal grey market --Google Captcha for Tax Evasion & Bitcoin Mixing --Payments for Ads in Signatures, based on the quantity of posts, leads to low quality spam --There's no sense of community like Nostr has, just calling each other scams. And the criteria for not being a scam is having spent a lot of time using this Cloudflare password to spam. --People don't even trust the escrow moderators. --Applicants to job ads often have no presence or website besides BitcoinTalk. Oh you're a web dev with no website? Anyone who is self-employed should be self-hosting a VPS. If your only presence on the internet is Cloudflare seeing your password, Gmail, and Telegram... then you're basically homeless. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com User: I'd like to install software from apt Linux: I need to see your sudo credentials, do you have authorized access to install stuff from the most heavily monitored package manager? ~ User: I'd like to install software from Python pip. Linux: Come on down! No sudo required! BLIND TRUST IN DEV SOFTWARE! Just flag it with "--break-system-packages" and you can DESTROY YOUR SYSTEM! npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Leaked: Google Pixel 9 info It's unclear if this is a real leak, or Google purposefully marketing their stuff (likely the 2nd). From the leak, a random Russian websites got images and dimensions: [1] Pixel 9: 6.24" Pixel 9 Pro: 6.34" Pixel 9 XL: 6.73" The Verge is reporting the Pixel 9 will have AI scan screenshots similar to Microsoft's Recall. Wiping this with a custom ROM may end this OS-level feature, although it's unclear yet if it will be integrated with the hardware. [2] As a reminder, Google's newer models (8+) already include the "Find My Device". This and price are why I recommend the 6a. AndroidAuthority is reporting on the leak as well, saying there will be a price increase. Vanilla models going up 100 euros in France. [3] Sources: [1] https://rozetked.me/news/33304-eksklyuziv-fotografii-vseh-modeley-google-pixel-9-ot-rozetked [2] https://www.theverge.com/24196571/google-pixel-9-pro-xl-9a-fold-rumors-leaks-camera [3] https://www.androidauthority.com/pixel-9-series-france-prices-3459857/ npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com yeah they said on github today the fix is in the works npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com cool, tell that to Samarai prosecutors. he didn't have custody npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com BraveNewPipe just pushed an update! I tested it and it works. You can get it right now via Obtainium! Beginner Q&A: Q: What are you talking about? A: Youtube broke a lot of privacy frontend apps with an update. This is the fix Q: What is Obtainium? A: An android app you can get via F-Droid that lets you install any other app via the developer’s Github, so you avoid having to wait for slow groups like F-Droid Q: How do I do it? A: First get Obtainium via F-Droid, then copy-paste the Github link: https://github.com/bravenewpipe/NewPipe npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Two points: 1) Linux Mint's new version (22) will have Matrix/Element pre-installed. 2) NewPipe, an android app that's a front-end for Youtube, broke from Google's updates. Now the devs just announced they are working on a fix to the issue. Sources: [1] https://www.linuxmint.com/rel_wilma_whatsnew.php [2] https://github.com/TeamNewPipe/NewPipe/issues/11255#issuecomment-2221421523 npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com The official Eth foundation, as well as prominent influencers in the space did promise it, and the Shanghai Upgrade was supposed to be when those benefits could start being implimented. Now did they bail on that promise? Quite possible. The issue with rollups is who is a money transmitter from a legal risk npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com I was debating Telegram vs Matrix groups with an Ethereum developer, And he said "We use Telegram because Matrix hasn't lived up to democratizing things as promised" You're mixing up democracy and decentralization. To quote @npub1haq…cvpg, "Democracy is literally a 51% attack on decentralization" Ethereum switching to democracy (proof of stake) has not really brought about the speed or cost fixes promised. But it has introduced the new issue of the KYC exchanges having majority staking power, so they could be forced by the government to censor or steal. One day man, you'll wake up and see that democracy is bullshit, as your fundamental human rights shouldn't be subject to the mob's decisions. But unfortunately that day may only come because the vote will be against you. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com There is no logical connection between Nostr and Custodial Bitcoin Lightning, it's totally unrelated. If anything, they are opposite concepts. One is you own your private key to speak, and the other you don't even own your money. Further, there's nothing "ironic" about a privacy website promoting a privacy coin, that’s what everyone would expect. And trying to scold me for KYC coins is a complete divergence from reality and my writings. Your insult banter is epic fail. I question if you even speak english. I'm not even reading your reply npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com says the Bitcoin maxi who is hazing / fighting with other coins. I gotta bookmark this meme and show it to you next time =) npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com If Elon Musk really gave the slightest shit about "climate change" then: Why didn't he make Teslas just do electric, so everyone could afford to get one? Why make all these fancy self-driving features, fancy auto-body, ect. that raise the price and reduce adoption? These elites do not believe their own hype, and Tesla is the biggest privacy invader out there. Next Twitter will become the same surveillance nightmare. How is verifying people’s identities on X, really good for free speech? npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com New Hack Shows that: Governments that force KYC make their citizens more vulnerable to crime. Twillio is a VoIP/SMS provider for businesses doing 2FA and other corrupt and ridiculous security. Now Twillio's Authy app has been hacked, This hack exposed millions of phone numbers to now be sold on the darkweb and abused, https://thehackernews.com/2024/07/twilios-authy-app-breach-exposes.html Once again, I am repeating the messages of: --Do not give your real number out to verify anything --Use burner crypto services for corrupt dumb websites that demand government SMS --Do not trust large companies --Don't do 2FA with mobile --Use KeePassXC with TOTP for 2FA KYC is a scam to make you feel secure with a trusted large provider. In reality, you expose yourself to scams, hacks, and abuse when these corrupt entities leak your data. Evil Governments are willing to let you be abused in their lust for power, under the disguise of saftey. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com If the sender is wrapped in encryption, then it's protected. And yeah Tor would help. If it's a Tor Onion relay, even better. Not sure if 0xchat supports that. What you're describing with Tor + Nostr + sealed sender is basically how Session works npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Google Censors Freedom This post presents evidence that Google promotes an agenda of centralized control through systematic censorship on its search, email, video, app store, and ad platforms of ideas promoting decentralized personal responsibility and anything critical of government power. Political Bias Google directly promoted the US military’s bombing operations in Syria in a positive light on the front page of its search engine before the user even types in a search query, while Google simultaneously scores lucrative cloud contract deals with the same military. [1] Google isn’t just lobbying for deals, they’ve literally become the corporate extension of the government. Over 53 employees have been part of a revolving door between Google and Obama’s white house staff, which is more than any other company in the United States. With Google employees joining white house staff, or transitioning the other way after Obama’s term. Are we honestly supposed to believe Google search is unbiased? In analysis from data firm Gotcha SEO, in a study of 50 controversial terms, only 5% of the results favored conservative websites. [5] With 63.8% Neutral, 31.8% Left, and only 5% Right websites, we are expected to believe that conservatives are just “bad as SEO”. 77% of conservative emails are labeled spam But yet this censorship and bias is prevalent even in Gmail. Research published by North Carolina State University found clear bias in how Gmail decides what is spam. Their study created 102 fake email accounts and subscribed to 2 Presidential, 78 Senate, and 156 House candidates email lists. These researchers found that under 10.12% of left-leaning politicians’ emails were marked as spam, while as 77.2% of right-leaning ones were “spam” that never made it to the primary inbox. [8] Despite Google having such clear support for Democrats, they are exceptionally skilled at tax avoidance. The Irish Times reported on Google avoiding paying tax on $75 billion in profits through complex offshore money transfers that avoid both US and EU tax, and thus Google’s effective tax rate on these profits is 0%. [4a] Reuters reports on an earlier similar abusive transfer of $23 billion sent to the tax haven Bermuda. [4b]. Even left-leaning researchers find clear evidence of Google’s email bias. The Markup did a study with extensive statistical analysis of 5,417 emails from 172 different political groups during election season. They found clear bias in the treatment of which campaigns’ emails got labeled spam or promotions. For example Tulsi Gabbard got a mere 2.22% of her emails in the primary inbox, while other candidates saw 12, 46, or 63%. Elizabeth Warren who is highly critical of Google’s monopolistic power, coincidentally did not get a single email in the primary inbox. [9] The Verge reports on presidential candidate Tulsi Gabbard, who also promotes breaking up Google, faced similar censorship when her Google Ads account suddenly was suspended right as traffic to her website spiked immediately following a televised debate. This ended up depriving her campaign of millions of dollars in revenue from the organic traffic she was receiving. [14] Tailored Propaganda Google does not just censor equally for every user, but tailors their propaganda to the individual’s search and email history. Google through their Jigsaw division has partnered with Moonshot CVE to offer paid search engine manipulation services for the US government. If the Department of Defense is the client, then at a minimum using Google search to research anything related to foreign policy would be a direct conflict of interest. Moonshot CVE claims that this search engine manipulation is just to stop extremists which promote violence. [12] However, from documents leaked to Wikileaks, we’ve learned that it’s secretly the US government that incites and strokes violent uprisings. For example the Syrian civil war, in which millions of people died, was sparked in part from the US government purposefully igniting tensions between Sunni and Shite Muslim ethnic groups to create instability that would overthrow the president of Syria Bashir Assad. According to leaked Wikileaks cables, William Roebuck, the US diplomat in Damascus, suggested the US should “stroke these tensions and play on these fears” when writing back to Washington right before the war broke out in 2006. [2] But yet Google’s front page promotes an entirely different narrative on Syria as they put John Kerry’s statements below the search bar. And paints anyone who dares to question their narrative is labeled as a “conspiracy theorist”. Not only does Google have an interest in manipulating the search results, but their partner Moonshot CVE openly admits to storing in a database the IP address and location of those searching for controversial information. These databases are then used to target redirection techniques to websites that the government has deemed to be “less extreme”. [12] The idea of customized government propaganda administered through personalized monitoring should provide strong motivation for the use of a trusted VPN or Tor. NSA Whistleblower Edward Snowden called Google search completely unuseable because of it’s anti-privacy stance. While Google’s CEO Sundar Pichai said that the company will develop machine learning and A.I. to combat “misinformation” shared by “low-information voters” and conspiracy theories. The issue is who gets to decide what is true and what defines a “conspiracy”? This pretext could be used to censor true information that Google’s paying customers (governments and large corporations) don’t want heard. One example of this is the Federal Reserve creates money, which causes inflation and your salary to be worth less. But this banking system doesn’t affect everyone equally, because the banks and their wealthy clients get access to the freshly minted money first at lower interest rates, while the poor can not effectively hedge against inflation with assets that rise from printed money like stocks or real estate. This is the type of criticism which was laid out in James Corbett’s ‘Century of Enslavement: The History of the Federal Reserve’, which got millions of views and rose to the top of Youtube’s search as the 1 video for the keywords “Federal Reserve”. At least it was on top of Youtube’s search, until MSNBC’s Chris Hayes tweeted out that this video was promoting “conspiracy theories” and the video was downgraded immediately from being the number one video for the search terms to not even showing up. [3] However, Chris Hayes did not provide a single argument as to why the video was wrong or inaccurate. How much your content strays from Google’s view will determine how your emails are received. A different libertarian leaning news site found its email list delivery rate to be half for Gmail what it achieves sending to non-Gmail accounts. [10] Cryptocurrency Banned While Cryptocurrency offers a way to escape from the tyranny of central bank inflation, Google fundamentally disagrees. Forbes reports on Google overwhelming banning crypto apps and Youtube channels well beyond what it does for other industries. [15] For example Google delisted apps for the popular cryptocurrency wallet Metamask from both the Google Play store and the Chrome web store. [16] Mobile App Daily comments on Google banning almost all crypto mining apps without any type of warning. [17] And industry leaders CoinTelegraph and CoinDesk both had their news apps removed from the Play Store. [18] Many Crypto Youtube channels were suspended or banned even those that just promote basic Bitcoin education. Some of these had millions of views or subscribers and were done without warning. While some of these channels have been restored, it still damaged their fanbases to have outages. [19] Locked Out of Accounts Suspension can get you locked out of all accounts that use a Gmail. Jordan Peterson is a popular conservative Youtuber that some consider controversial including Google, who suspended his account without warning. While having his Youtube channel removed hurt his business, the real crippling part was his prior reliance on using the Gmail associated with that account. Peterson explains in an interview with the Daily Caller: “I’ve had that account for the last, say, 15 years. All of my correspondence is in that account. It’s hundreds of thousands of emails from people all over the world.” [6] Not only did Peterson have a difficult time reaching out to his personal and business relationships, but all of his accounts like banking, medical, and other websites were linked to that email. This is the danger of using Gmail or other centralized email providers because then if they censor you, then you’re locked out of everything. Cybersecurity Video influencer the “Mental Outlaw” points out that some listeners may think they are immune from censorship similar to what Jordan Peterson experienced because they aren’t public personas with a Youtube channel, but Google often suspends accounts for even posting comments and replies to videos that they deem inappropriate. Therefore Mental Outlaw warns it’s quite possible that you could get your email suspended over some comment or reply you consider to be relatively mundane and thus be locked out of all your accounts that used that email to verify. [13] Conclusion A reliance on Google products (including even Gmail) will curb your ability to access ideas, learn, and ultimately brainwash you to obey centralized authority which does not have your interests at heart. This trained obedience could lead to a direct decline in your finances, health, and ability to connect with others. Sources: https://simplifiedprivacy.com/google-censors-freedom/index.html npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com I am saying that the post has the same content as the website: VoIP lets you do SMS with Tor/VPN, so it COULD separate physical location from the SMS. Are you disputing this? Perhaps I should have used the word “could” npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Privacy Ranked: I’m going to rank these least private to most, and explain why on each step. Discord Why: Discord is as bad as it gets. It's not only completely unencrypted, but they maliciously sell your data and have such huge restrictions on VPN IPs and SMS VoIP verification. SMS Why: It’s going naked over the phone lines, but isn't heavily sold in such a rotten way as Discord. VoIP Why: VoIP is just as horrible as SMS, but separates your real physical location from the cell tower Telegram Why: Unlike VoIP, it does have end-to-end encryption, but only on mobile. And with weak encryption that they made up, that hasn’t been properly reviewed [Source: Madaidans of Whonix] Signal Why: Telegram has no metadata protection, while as Signal has sealed sender. Signal’s encryption is stronger and more thoroughly peer reviewed. Also Signal has a good legal track record and isn’t strict on crypto VoIP burners like Telegram. Having phone numbers isn't that big a deal if I paid $1 of crypto for a random VoIP burner in Cambodia without restrictions on Tor. Btw, my Signal # is Cambodian: +855 68 504 905 Matrix Why: Tucker Carlson’s Signal was hacked. Also, academic papers have shown Signal’s sealed sender has flaws. If you self-host Matrix, that's much more control than trusting Amazon's AWS, which is a CIA contractor. Many open source projects use Matrix rooms. Session Why: Most Matrix users use Matrix.org which is Cloudflare with Gmail verifying the emails. Setting up a Matrix server is more expensive and complex than just opening Session and hitting "create account". Session’s onion routing, non-location based DNS, and decentralization is stronger than Matrix's Cloudflare-dominated network. SimpleX Why: Session lacks (by default) rotating keys and multiple identities. You can manually rotate keys using your blockchain name, and manually get multiple accounts at once via enabling it on Linux, but most won’t want to do this just to avoid government domain names (which most SimpleX users use). Session is better for censorship of servers, SimpleX is better for end users being invisible. Self-hosted Tor XMPP Why: SimpleX is hiding from servers, but if you control the server, that’s stronger. Even a self-hosted SimpleX server only picks half the conversation. Also, XMPP has a longer proven track record, which is more eyes on the code. Now if you DON'T self-host XMPP, it's way up on the list next to Matrix. Self-hosted Tor XMPP w/ OTR Why: OTR nukes the conversation when it’s done. It literally destroys the encryption keys. Game over bro. Conclusion: Anything is better than Discord. Now, let's play a game, pick a communication method I did not mention, and you tell me where you think it should rank on the list. Then, we'll discuss. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Why is it so important for conservatives to get off Big Tech? (Linux, degoogled phone, decentralized social, ect) 1) Your enemy controls your means of finding news and publishing your content 2) Your enemy oversees everything you’re doing and can later jail you. Even if you think you're doing nothing wrong, some complex cryptocurrency transaction tax can be used years later to silence you. Look at Roger Ver who was jailed a decade later for Bitcoin taxes, even after renouncing US citizenship. 3) You have lack the technical infrastructure to resist during a crisis. The next "covid" situation will endanger you and your family because you can't get a fake vaccine passport without being watched. 4) You're a target to the woke radical left to get you fired because your political speech is tied to you. Look at NixOS, he just got ousted by Transgenders just for saying "let's all be equal" 5) You're overpaying for new electronics. Microsoft and Apple products have planned obsolescence, which is to purposefully force users to buy new products, by having them break down quickly. While as Linux often allows older PCs to work longer. 6) You don't believe your own political beliefs. If you really thought there was a deep state out to silence, kill, and control us all, then you wouldn't be blabbing about it on Twitter tied to your real name's family bank account with your life savings. In summary, if you continue with Big Tech: 1) You're silenced 2) You're propagandized 3) You're fired 4) You're poor 5) You're a hypocrite, you don't believe your own positions. Some people think Linux, DeGoogled Phones, or having your own VPS is complex or beyond them. But I am here to tell you that it's not that different than what you’re already used to. And the only real obstacle is in your mind. Learn what you can from our site, and reach out for help if you need it. Help me, help you. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Linux distro NixOS kicked the founder out They forced him to sign a letter giving NixOS "back to the community" because he supported treating everyone as equal. The activists were furious he did not support Transgender rights, which means discriminating against non-trans for funding and power. Source is Lunduke (which is behind Cloudflare btw, but I gotta link the original): https://lunduke.locals.com/post/5819317/nixos-commits-a-purge-of-nazi-contributors-forces-abdication-of-founder npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com What? SEC can't regulate crypto anymore? Yeah bro, the Supreme Court overruled a previous decision on the Chevron doctrine. What this means in plain english, is: BEFORE when the law was vague or unclear, the individual agencies would set policy based on their expertise. So when Congress had not made the law clear, the courts would look to the agencies for guidance. This was called the "Chevron doctrine" off an earlier case in 1984 (Chevron v. NRDC). But NOW, the Supreme Court overruled that and agencies must seek the court's guidance when the law is not clear. In other words, the SEC doing whatever they want with crypto is coming to end, as they no longer have power and authority unless the court grants it. We could also word this as, the government is so hungry for power, that the only way to stop the madness coming from these unelected agencies, is for the Supreme Court to seize it's own power back. To summarize the words of a professional educated expert and legal scholar, that I consulted on matters of the highest level of dignity, we could word this: "Gensler, you lost you dumb assclown" npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com maybe as an option on groups. but for mobile devices with 3 hops networking? takes the instant out of instant messages npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com All Session messenger rooms are getting DDoS'ed with a flood of spam. Our room is now in lockdown, no new posts. Be advised simpleX could be a target next. These anonymous messengers with zero credentials to make new burners can be easily flooded with bots. Matrix and XMPP are tied to government domains, so it's easier to control where bots are coming from or verification on the big servers. Here’s the key point: The more control group owners have against DDoS of group chats, the less metadata protection the 1-on-1 chat users have. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com This US Supreme Court Ruling is a big deal It means the government CAN pressure social media companies to censor anything You can use technology like Nostr to resist it, BUT, Technology can’t help you stop the state’s violence. Therefore, Without the privacy to post anonymously, there is no free speech. Fast key facts to know about the case: 1) It isn’t over, it just got sent to the lower courts 2) Supreme Court dismissed it that “plaintiffs lacked standing” 3) This doesn’t mean it’s done, it means they have to prove (again) that they were harmed in lower courts 4) Dissenting judges cited significant evidence in favor of the defendants We lost the battle. But the war can be won. Full official text: https://www.supremecourt.gov/opinions/23pdf/23-411_3dq3.pdf npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com join our XMPP group =) npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Hmm, you do have good insights. Some of these statements I agree with, others are pushing it. The first paragraph on trump I accept your arguments. I'm just not pushing that as "the sole truth", as the arguments against it are logical as well. Trump certainly picked deep state people in his cabinet/staff. As far as the deliberate decline of the US empire, I disagree with. In fact, I think most war/coups in the Middle East, South America, and even other places has been over the forced sale of oil in US dollars. And actually Wikileaks has been some of the sources we've backed these claims up with. (such as Libya) But even without Wikileaks, Iraq's timing and Venezuela coups are great examples of "sell oil in USD or die" I agree with you that they want one world government, but I think the path towards that is dominance of the petrodollar empire & IMF/World Bank. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com I can not speak for the SimpleX dev on this, but @npub1m5s…gjl3 may potentially have a comment on grin with chat npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Comments posted by Vidar in the group chat, quote: I agree it makes Zero sense to you or me. Though I can guess some potential motivating factors: Assange public supporters aren't going down in numbers. I would guestimate there are more supporters now than 10 years ago, and there would have been more demonstrations. Growing public outrage. The Deep State trying to make it look good for Biden before election. *See links The USA prosecutors could see that their case was weakening as time continued, and they offered Assange a simple guilty plea Today, rather than lose the case completely after another 5 years. his sources: https://edition.cnn.com/2024/06/24/politics/julian-assange-plea-deal-biden-administration/index.html https://www.bbc.com/news/world-us-canada-68784298 npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com I believe codeberg was mentioned, but he can confirm this npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Was a reference to the backgrounds on desktop and mobile being improved with the layout of the avatars/text npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com hey @npub1g7l…8yd9 it was a group Q&A in our simpleX chat. I think me and you spoke in there earlier about IPFS not scaling. And you were correct it does not. I do still think there are some limited use cases and benefits to it, but IPFS will not be the mass adoption future at least in it's current form, I agree npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Signal has a flatpak. In fact, you can use the official distro repo AND flatpak for two identities flatpak install flathub org.signal.Signal it will add to your start menu, but also could do: flatpak run org.signal.Signal npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Because bitcoin has no binding contract functionality to enforce or do anything npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Huge thanks to SimpleX's developer for coming through for the event! Here's what he shared with us about the future of @npub1exv…d828: -Moving off Github this year -Flatpak support is coming very soon, like 1 week -iPad Support this year -Group chat on-board with 2-3 other users will eliminate the need for the admin to be online -Will be getting rid of the "connecting" on initial sync and increase speed of on-boarding With the new feature to hide IPs, the user is first sending it to a server they trust, which passes it to the other server. How do users know who to trust? The app will soon be able to differentiate infrastructure operators in these ways: -several preset providers in the app next year -operators can self-identify with certs, it's optional - this year -using servers of people you are friends with or know - very soon -A user asked about a directory - but it is not coming due to privacy and trust concerns it would create To make the network financially sustainable and provide the commercial incentive to the operators they are designing the concept of "infrastructure vouchers" that are planned for 2026. These vouchers will: -Will be on a private blockchain maintained by the approved operators together with the app developer(s) -Work like gift cards, except: -Vouchers won't be transferable from 1 user to another -No refunds -No wallet -Stays in-app -Can't be used as external money to avoid compliance requirements -One can buy vouchers with Monero (or other cryptocurrencies), as long as XMR remains legal -Government fiat can be used -Voucher sellers may be different than server operators (collectors) -It won't be just the SimpleX team selling vouchers, some decentralization Here's more details on his commercial model: https://github.com/simplex-chat/simplex-chat/blob/stable/docs/rfcs/2024-04-26-commercial-model.md And if you haven't already seen the new version with slick UI, head over to https://simplex.chat npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com OTR XMPP npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com I did not say he deserves it? My arguement from before was less so that the hater would be killed, but more so that he was literally working for the US military while he was actively "exposing" their psy-op. Can we agree this is a little off? npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Assange is alive because the whole world is watching and the blowback that illegally killing him would create. Also the CIA wanted to kill him according to some of his leaks, after he did the one showing their hacking of routers and killing via remote car shut offs. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com The big news is he said flatpak is coming soon, like 1 week. Regarding the battery said: “We do something that reduces battery usage in almost every release - 5.8 had a notable improvement, and 6.0 will have it too. Battery usage is not one big thing to work on, it's many small things each contributing a little bit. User-visible server stats will also ship in 6.0 - it'll help a lot identifying battery drains.” npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Q&A with Lead dev of SimpleX starting right now: https://simplex.chat/contact#/?v=2-4&smp=smp%3A%2F%2FN_McQS3F9TGoh4ER0QstUf55kGnNSd-wXfNPZ7HukcM%3D%40smp19.simplex.im%2F-0fWTzXMJNobsaiaodOGLOfm0m9pq05I%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAdfeJrGjuY_qKripG4E7xle6nTDWOWuBPtWmapW6pyEc%253D%26srv%3Di53bbtoqhlc365k6kxzwdp5w3cdt433s7bwh3y32rcbml2vztiyyz5id.onion&data=%7B%22type%22%3A%22group%22%2C%22groupLinkId%22%3A%22yhJzAfpfVkMynOUVxs412g%3D%3D%22%7D npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Yes and we are selling them at discount rates. far below Google's retail. please DM me or check previous posts npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Did you know on Signal, your deleted messages aren’t deleted? Don’t believe me? Cut Signal’s network permission on Android. And go a long time with using it on desktop with disappearing messages on. Then re-sync Android with network permission, and boy you’ll be shocked to see those messages flash back before your eyes! They’re still on Amazon’s centralized servers even though they took it off your device. This is even sadder when you think about how in centralized systems, it’s easier to force messages out. But with decentralized systems, there’s issues. SimpleX has unique plans to force messages to disappear on the other person’s device, but how’s he gonna implement it? These are the types of questions to ask and hear at tomorrow’s event. (if you live in Asia, it’s tonight) #nevent1q…06zz npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com The thing about these presidential debates is they never discuss the real issues. Nobody says "hey maybe the issue with economics is the money itself is debt" Nobody says "why fight the Taliban in Afghanistan for years, if it was Al-Qaeda that fled to Pakistan?" They just keep taking jabs at each other. And the sad thing is, most people will never realize these other ideas exist. But there is good news, you can reject the system and join the parallel economy. the parallel social media. parallel tech. Yes startups are rough. Yes it has a learning curve. But as Tom Edison once said "I have not failed. I've discovered ten thousand ways that don't work." npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com sorry post was redacted npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com I am sorry, my post is redacted. The original sources were mistaken. The pages went down due to high traffic on the servers following the release. I just confirmed and I can view the DNC emails from podesta with Bernie sanders on Wikileaks.org Other made the same mistake: https://www.dailydot.com/debug/wikileaks-delete-dnc-emails-debunk-assange-plea-deal/ npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com I am sorry, my post is redacted. The original sources were mistaken. The pages went down due to high traffic on the servers following the release. I just confirmed and I can view the DNC emails from podesta with Bernie sanders on Wikileaks.org Other made the same mistake: https://www.dailydot.com/debug/wikileaks-delete-dnc-emails-debunk-assange-plea-deal/ npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com The truth behind the Julian Assange plea deal: Wikileaks agreed to delete 20,000 DNC emails from their website, to get Assange free. Turns out it has nothing to do with supposed “national security”, but is really about hiding the crimes of Hillary Clinton and the Democratic Party insiders. And all the non-partisan stuff on the US government in general (or Bush administration) remained. Sources list & updates: https://rebelnet.me/news/15664a7a9d498a72ab3d npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com SimpleX Dev Q&A Event Simplified Privacy’s group chat on SimpleX will have the lead developer Evgeny Poberezkin drop by to answer your questions. Ask him upcoming features, technical questions, or the direction of the project. Saturday June 29, 1 hour starting at: 2pm UTC New York 10am Hong Kong 10pm It’ll be an open chat for you to pick his brain. Join in advance, don’t wait for right before the event because the moderator has to be online for it to connect you, so we give options. Here’s East EU & Asia timezone: https://simplex.chat/contact#/?v=2-4&smp=smp%3A%2F%2FN_McQS3F9TGoh4ER0QstUf55kGnNSd-wXfNPZ7HukcM%3D%40smp19.simplex.im%2F-0fWTzXMJNobsaiaodOGLOfm0m9pq05I%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAdfeJrGjuY_qKripG4E7xle6nTDWOWuBPtWmapW6pyEc%253D%26srv%3Di53bbtoqhlc365k6kxzwdp5w3cdt433s7bwh3y32rcbml2vztiyyz5id.onion&data=%7B%22type%22%3A%22group%22%2C%22groupLinkId%22%3A%22yhJzAfpfVkMynOUVxs412g%3D%3D%22%7D West EU & Americas: https://simplex.chat/contact#/?v=2-5&smp=smp%3A%2F%2FSkIkI6EPd2D63F4xFKfHk7I1UGZVNn6k1QWZ5rcyr6w%3D%40smp9.simplex.im%2FxPXefPbN7ZAkPyMKzJmQrFD_fv55R6w_%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEALLyynGdXLoWke3pIt1CrR00p62eT0ewpKEaWn542gWA%253D%26srv%3Djssqzccmrcws6bhmn77vgmhfjmhwlyr3u7puw4erkyoosywgl67slqqd.onion&data=%7B%22type%22%3A%22group%22%2C%22groupLinkId%22%3A%22n99NTwZLjeKwyI4lwMHB_g%3D%3D%22%7D If you can’t make it and want to ask something, reply to the post here on RebelNet, and we’ll post the reply copied to you. https://rebelnet.me/news/0xbf8079a69a15fd74ae npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Repost this for Assange: The criticism of Julian Assange being funded by the US government is bullshit. This claim comes from Daniel Estulin's book, (which combined with his other works sold 8 MILLION copies), and his primary source is Peiter Zaitko, who works for Google, Twitter, and the US military. If Assange really was big a psy-op, then wouldn't exposing that be a huge risk to one's life? Wouldn't they KILL whoever was telling the truth? So now you're gonna tell me, that Zaitko working for the US military and Google as a free man, while he's exposing the very same military's largest undercover propaganda of all time is perfectly fine… All as Assange who supposedly "worked for the military" rotted in jail. And all of this is in Daniel Estulin's for-profit book on Amazon, promoted on his website using USA-compliant Cloudflare, Bill Gates Microsoft emails, and malware Google analytics. Only for a US dollar banking system paid book, shilled on Youtube, via the CIA contractor Amazon, can you tell me that Assange's non-profit Bitcoin donation website was government lies. And you have zero presence on Nostr, IPFS, Arweave, Tor, Iceland servers, or anywhere that an oppressed truth teller would. In fact, Estulin doesn't even have a doge coin donation address. As you shill your other book on the banking system being corrupt, you're still less rebellious than autistic little girls buying doge coin with their tooth fairy bills. You think you're beating the CIA? Bitch please, I could kill you with a plastic hello kitty squeaky toy. Repost this to help clear Assange’s name. Maybe add your own shit talk! npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Hot special: GrapheneOS Pixel Tablets CHEAPER THAN through Google. Google sells these for $399 Our promo is $335. Normally DeGoogled privacy providers charge more than the official stock retailers, but we got a promo special going on right now that's CHEAPER Plus it comes with a code for a free month of JMP Chat. I only got 3 left in stock under this pricing, so you have to act quick. -Brand New -Still in original packaging -Pay in Bitcoin or Monero -You can choose to get it still sealed in original packaging, or have us open it and flash GrapheneOS -Keep your name off hardware identifiers -Keep your name off the cloud, buy it through encrypted chat -Get a PGP signed receipt. -1 Year Warranty from Google (to get a new one) -1 Week Shipping Hardware Warranty from me (to get crypto back) -Includes a code for a free month of JMP Chat -Support the circular Nostr economy -I'm grinding to raise money for original open source projects Perfect for: --Chilling on the couch or bed but get a larger screen --Watch movies --Navigating websites on phones sucks, but who wants to carry around a laptop? --Get work done on the go --Advanced security of GrapheneOS --Tablets are the perfect blend of the convenience of mobile, with the ease of access from laptops Hazel color 8 GB LPDDR5 RAM 128 GB UFS 3.1 storage 17.39 oz (493 g) 10.2 width x 6.7 height x 0.3 depth (in) 10.95-inch display LCD 2560x1600 resolution Session ID: Support Signal: +855 68 504 905 Matrix: [email protected] XMPP: [email protected] email: support [at] libertyoceanhorizons [dot] c o m SimpleX: https://simplex.chat/contact#/?v=1-4&smp=smp%3A%2F%2FZKe4uxF4Z_aLJJOEsC-Y6hSkXgQS5-oc442JQGkyP8M%3D%40smp17.simplex.im%2FjlgwnohJoxn1yz9bhJ_3m6JhanIbgOME%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEArsSD2oa0yAYYTXuSKj_3uw5uQo0LU77i3jeoXtK6kjU%253D%26srv%3Dogtwfxyi3h2h5weftjjpjmxclhb5ugufa5rcyrmg7j4xlch7qsr5nuqd.onion npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com “Why privacy? What do you have to hide?” The question is not why am I hiding, it’s why are you for free submitting to their absolute surveillance over every word you say in chat and every thought you have through algorithmic AI monitored feeds that do custom propaganda? Julian Assange paid a heavy price just to show us the tip of the iceberg. And you want to send every thought going through your skull to them?! Replace the word privacy with power. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com What do I want? Self-sovereignty over my life & Political Freedom How do I express that? Not by voting, but through depriving Governments of power with Technology What defines tech freedom? Encryption as Identity Open Source Permissionless Decentralized How do I live? End-to-end encrypted messengers Encryption based social media Encryption based contracts Linux DeGoogled Android Self-hosting my email Self-hosting my website Reject government money Reject government domains How do I reject government domains? Nostr Tor Onions Session Bot (DM Simple. 200+ followers) SimpleX Bot in future (I got some ideas w rotating burners) Arweave (I'm Privacy.ar) Eth push channels IPFS (I'm SimplifiedPrivacy.sol) Yes IPFS sucks, I'm working around the issues How do I reject government money? Point customers to easy crypto on-ramps, https://simplifiedprivacy.com/crypto/index.html What law do I follow? PGP sign contracts, w/ deposits or multi-sig. Core message: The enemy is not the government, it's pessimism. For all the tools you need are there, you just have to find the motivation to use them. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com UK's Nigel Farage had his Google ads account suspended. After many criticized censorship of an active election, Google gave it back. He's praising this as a win. But to me, it's a loss. You're pouring more money into the lefties, to try to stop the influence of pro-authority lefties. I know he's trying to reach as many people as he can, but you're telling me that's the only way to spend ad money? You know, he could pay the relevant websites directly, and cut Google out. Google's just a middle man. It's more work to arrange this, but under the moral high ground of censorship, he would get replies… and votes. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com fair enough, can you post any public documentation on setting it up? like on prosody site. I didn't see it there when we did our MUC npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Nice, that's not the default though. I'd be interested to see your setup. Can you post a group link? npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Despite it being easier to self-host XMPP and less expensive on resources, Matrix is more popular. Why? The real reason Matrix is popular is because corporate and FOSS developers like the encrypted group chats for their internal use. (XMPP is NOT encrypted group chats). So then devs host a Matrix room to answer end-user questions, and having all these rooms encourages overall adoption. The part that's not usually mentioned, is that only the devs usually use self-hosted Matrix servers, and the vast majority of the public uses Matrix.org which is on Cloudflare with Gmail verification. In theory Matrix is decentralized, but in the real world, everyone gets Cloudflare metadata surveillance, and uses the same Element client. Here's my core message: Try to be Self-Sovereign with what you're doing. If you're hosting a website, 1 core VPS for email, whatever. Then host your own XMPP/Matrix. XMPP uses so little resources, it's near free. If a VPS is really not for you, even if you pay someone like me $100 to set it up: https://simplifiedprivacy.com/email-cloud-combo/index.html Then public SimpleX/Session servers are right for you. That's fine. This isn't about me trying to force you to use my favorite protocol. It's about you not using Cloudflare (and Protonmail seeing your metadata) and thinking you're "doing privacy". npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com i see. ok thanks for sharing npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com I can't tell if you're being sarcastic lol. Yes we have a service: https://simplifiedprivacy.com/email-cloud-combo/index.html npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com If you host your own SimpleX and your friends use it on a Tor Onion, This is essentially "turning it into XMPP". So yeah that's fine if you're using simplex anyway with other accounts npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com The main difference between SimpleX/Session and XMPP/Matrix is that: SimpleX/Session hide metadata even through you're using other people's servers. While as XMPP/Matrix don't hide the metadata at all, but expect & empower the end user to run their own server. So something like self-hosted XMPP, with a Tor Onion, is a higher level of privacy than trusting random SimpleX/Session servers, but also a higher barrier to entry, as most are not willing to read docs and pay for a VPS. Side note: You can configure an XMPP client like Gajim to force Tor, even if it's not system-wide. SimpleX does have a self-host, but if you just use your own server, then it labels/identities these accounts as you. So you'd have to have a popular server, and even then the other person in your conversations picks the other server. Ok, let's pause here and resume tomorrow. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com So by your braindead logic, is cryptocurrency property? Can Marxists steal Bitcoin? npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com If I zap you bitcoins, that's a business npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com monopolist? abusive? what? there's tons of other sites npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Pornhub plans to block access to its website in Indiana, Idaho, Kansas, Kentucky, and Nebraska in response to age verification laws designed to prevent children from accessing adult websites. The website has now cut off access in more than half a dozen states in protest of similar age verification laws. While users in these states can just use a VPN, the real scary part is the precedent these age verification laws present to end online anonymity. As the number of things requiring KYC ID spreads, it has chilling effects on free speech. And ironically, it is US politicians who are abusing minors with the pornographic pizzagate. The only hope is that enough people get so pissed off they can’t masturbate without setting the VPN to such a far off location that it slows the videos, that eventually Americans can wake up to free speech. It’s sad, but I think “slow porn” stands a better chance of converting people than Nostr. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com There is no difference between personal and business property because the line is grey and blurred. To even talk about something on Nostr is to advertise it… which is a business. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Poll: Can I seize this socialist's Nostr key? @npub10ws…3hd3 wishes to force me to obey Karl Marx and rails against the evils of capitalism. But yet he has private ownership of his Nostr key? I seek to draw attention to his hypocrisy. Today, I put forth 'Amendment 453 Nsec Liberation' Under this proposed legislation, we as a community, take control of any Nostr nsec keys under the control of corrupt Marxism. To bring peace and justice to Nostr. All Those in Favor 453, Like this post. Repost for double. All those against it, Like the Marxist's post I'm replying to. Seize the Npub: npub10wsue32ln2w2a9gsy52ylk359n8ams4zj7932j4knvxlk2p84vmq5y3hd3 #nevent1q…kmw4 npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com No, capitalism is part of a republic of self-ownership of the fruits of an individual’s labor and time, While it’s socialism that is whatever the majority wants, even if it’s corrupt. By your logic, Why should you be entitled to own your private Nostr key? I propose a bill to seize and control your Nostr key. If you fail to hand it over to a vote, then you do not believe in socialism. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com I believe you have a fundamental misunderstanding of capitalism. Google gets government money for military cloud, propaganda, educational computing, and more. The government extracts money involuntarily. That’s not capitalism. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Google is known for spying on us, but yet researching THEIR executives, leads us to: Prabhakar Raghavan was put in charge of Google search and was effectively running the entire company. But this the same guy who ran Yahoo search from 2005 to 2012, during which the company collapsed, because Yahoo search results sucked. So of all people to improve Google’s quality?! Google search used to be the icon for American innovation worldwide, but now has turned into mostly AI spam and clickbait garbage. Raghavan’s decisions included: --Make Ads look like organic search and blend in (starting in 2019) --Prioritize ranking of Google ads customers in organic search --Prioritize SEO optimization over quality Google’s CEO Sundar Pichai criticizes republicans as “low information voters”, but yet he previously worked at McKinsey which: --encouraged banks to load up on debt and flawed mortgage-backed securities in 2008 --Cut costs to outsource labor, getting everyday people fired So the CEO wants us to accept his left-wing socialist dribble, when his company went out of its way to gut middle class jobs?! Source: Edward Zitron, https://www.wheresyoured.at/the-men-who-killed-google/ npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Yes and no. Signal lets you use literally any VoIP While as Telegram is very strict on VoIP. and even banning Tor, and even checking if the IP country matches the phone area code npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com well anyone can create an account on proton and see npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Remember I wrote an article a few months ago on "why privacy", and I said the reason changed based on who you are. With few examples such as conservative, black, muslim, gay, ect. Well one of our readers took my examples, and expanded upon them, with an epic amount of groups and over 40 references, https://rebelnet.me/news/15d79277604c484a017e Although I fight with him on many political issues, shout-out to @npub1tj9…mxq9 npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Yes, all web apps have the problem, and so it's not end-to-end. No, It does NOT avoid middle attacks, since they can serve you phising info. Also there's some analysis of proton of your password at account creation to make sure you're not a bot. So if you have 90 random characters, its more likely to reject you as a spam bot, and not let you make an account. But if you have basic WORDS that aren't random like "carrot" it will. This means they are seeing the password, connected to the backend spam filter. That's not private at all. And the source on this is me. We may release an official paper on it, but for now I'm just making the statement. It's your subjective opinion if the trade off is good, but it's far less secure than self-hosting. And a self-host VPS costs the same as a Proton Pro subscription. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Sorry if it was unclear the sources were in the comments. Phones have a baseband modem which is insecure, and easily hacked. This has just one reference, but basic search will show a lot. We also might write an article on it in the future. #nevent1q…9ec7 npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Thanks for heads up on this. you're talking about articles or videos too? npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Why is Telegram horrible --No MetaData Protection (Who and When) --Only Mobile is Encrypted (Phones have insecure hardware) [1] --Invented their own encryption algorithm Unaudited with a history of security vulnerabilities [2] --Most VoIP Numbers are Blocked --Tor Often Blocked --History of handing over to police [3] --Centralized --Forced Google/Apple Stores (Telegram requires Google Push which is closed source, So the binaries can't be compared to the code, and therefore, Telegram's claim of "open source" is a lie) Your friend will try to pressure you, claiming you're a fringe minority. But if you repost this, we can be the majority. (Sources linked in comments) npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com If you're looking for a fancy academic whitepaper, here is one example: An Analysis of the ProtonMail Cryptographic Architecture Nadim Kobeissi September 6, 2021 https://eprint.iacr.org/2018/1121.pdf and the part me & you are talking about is: Pg 7 of 14. Section 4.1.1 If you're looking for me to say it to you in raw shit, here it is: When you use Nostr you have the private key on your device, browser extension or client. When you use Protonmail, their web app is unlocking/signing/or generating for you the private key stored via encryption on their server. So there are many ways they can screw with you. Including SOME: a) serving you bogus code to phish the password b) telling you the other proton guy's public PGP key is something else c) brute forcing you, they have unlimited attempts with no time lock. And your password is weaker than a PGP Key. d) messing with you during registration to begin with npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com He’s not CIA. He’s not dumb either. He just doesn’t give a shit. Only if it financially affects his reputation will he care. Which is possible, so I’m optimistic. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com First of all, Protonmail is creating their private key on their end and then giving it to you. And the purpose of this encryption is to protect you from them. So that’s a conflict of interest. And what does end-to-end encryption even mean if it’s not on your device? You can audit the code served in the browser yeah (which can change at every page refresh), but you have no real way to audit their cloud backend or database to know if they even use this key in the ways they claim. Proton’s mobile app is far better than a web browser, but if they are so secure, then what are they handing over to the 3000 government data inquiries a year that’s growing? npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Why can't one legit choice be on the menu? Just as an option? It's not about it being a state secret, it's that he's not using freedom tech... like nostr. So if the freedom tech influencers won't use freedom tech, then how we gonna grow? I'll tell you how, we stop letting those individuals be the freedom influencers npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Watchman Privacy interviewed SimpleX, But yet If you hit the contact on his website, only Telegram and Protonmail are listed. And Google analytics, Google fonts, Google forms, Gmail, and Cloudflare are used. First of all, Telegram leaks metadata (who/when is talking), and that's why people use SimpleX. You'd know this if you listened to your own interview. Second, even if we ignore that Proton's board of directors has a World Economic Forum member, which is the organization pushing for forced digital IDs. Protonmail is not really end-to-end, if they force you to have your private key in their web app, that's cloud-to-cloud. As I've went over previously, they even ban PGP signatures from external apps. Even Mikkel Thorup, the guy who SELLS Watchman Privacy event tickets, said on his podcast "Protonmail isn't as private as people think". So surely they self-host right? No, Gabe Custodiet’s "Privacy Summit" with Expat Money used Google forms and Gmail to collect the info of those seeking to flee the US for privacy. Thorup’s ExpatMoney.com and io are both on Cloudflare with Google emails, and these coordinated all Watchman events of political asylum seekers and 2nd citizenship applications. Do you really want Cloudflare and Google knowing you're fleeing the US for financial privacy? Now, I know Thorup would respond to this by saying "well your data goes to the countries you apply to citizenship for, so it's not private anyway". But this is misleading, because many countries may only need a fixed investment or time spent in the country. While as applicants to these exclusive Privacy Summits, often feel pressure to exaggerate their assets, to get accepted as clients. Then on Watchman's site, he sells “Bitcoin privacy” through Gumroad, which is on Cloudflare, Google analytics, and Facebook analytics. But the worst part is Gumroad blocks new account sign-ups unless you enable Google. Watchman can’t even figure out how to not have Google fonts API on his WordPress. And then he only sells his book for Amazon CIA contractor fiat, only uses spyware Twitter/Youtube and no alternatives, and lists the following: "CONSULTING: Few humans have the experience and knowledge I do with private and freedom living." Few humans have your knowledge? Give me a break bro, maybe in scamming people. Here at Simplified Privacy, our message is the opposite, I am not claiming to be anything special. I'm just a regular dude without even an undergrad computer science degree. All I got is a dream to spread freedom. And if I can learn this open source technology later in life, so can you. So if you want to see Watchman come on Nostr or SimpleX, make some noise. Smash that repost. Because the only way he's going to adopt freedom tech is when its undeniable that he's being left behind. npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Kagi.com is literally hosted on Google Cloud, so no. Tip for the future, you can do a Whois or DNS lookup and figure it out. #nevent1q…sq25 npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com The question is not should one wear a mask or not. The question is who gets to decide. In your example, I say it’s the patient who decides. You say the government. The purpose of a constitution is to outline what decisions governments can make, and failing to abide by this is a dangerous slippery slope because it’s essentially unlimited power. “No rocket science” npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 SimplifiedPrivacy.com Critical security vulnerability for Pixel androids: Google announced there's an actively exploited zero-day in the wild. They supposedly have the patch https://www.bleepingcomputer.com/news/security/google-warns-of-actively-exploited-pixel-firmware-zero-day/