

The US has a long history of secret court systems


The US has a long history of secret court systems


A mix of blackmail and extortion
Just kidding, in reality there is no ethical way to control what your neibours do. What you can do is inform them about the recent controversies regarding Ring cameras.


I did that years ago
Don’t subscribe to anything Lemmyml if you want to keep your sanity


Librewolf doesn’t have a mobile version
As for Waterfox, they would need to meet the F-droid requirements and then publish to F-droid. That is really difficult in practice as the mobile version of Firefox contains a decent amount of proprietary code.
I would recommend Fennec personally: https://f-droid.org/packages/org.mozilla.fennec_fdroid
Be default it doesn’t have much in the way of hardening so you might want to go into about:config and enable resist fingerprinting at least


Http doesn’t have that much overhead (especially when you want to send things in the MB range)
What kinds of applications are you talking about? Are you thinking TCP/IP connectivity or something slower?
You can build a network mesh out of wireless point to point and 802.11s mesh networks. It is all TCP/IP networking so you can run any application you want over it.
https://en.wikipedia.org/wiki/Babel_(protocol)
https://www.open-mesh.org/projects/batman-adv/wiki/Wiki
Edit:
I forgot about HaLow. It is lower bandwidth but it has a much longer range. https://en.wikipedia.org/wiki/IEEE_802.11ah


What exactly are you looking for?


To join you need to either have an established mesh network already (assuming you don’t want to start a ISP)
I think you are overestimating the threat model. Nothing is ever fool proof but Tor does make it extremely difficult to actually identify someone. You are talking about a hypothetical attack vs something that is actually feasible to pull off. Tor is design so that there can be many compromised nodes without to much danger. Tor’s popularity as makes it hard to track individuals since there is a lot of traffic.
Source?
The Tor foundation is constantly working to fight all sorts of attacks. Don’t buy into misinformation as there are many organizations who stand to benefit from people not using Tor.
Even if Tor was vulnerable like you say, I’m not sure what else you would use. Not using Tor is worse than using Tor. It is in the interest of the nation states for you to not use it which is while you see them promoting the idea that Tor is insecure.
You really should consider the fact that there are parties who have a vested interest in making people doubt Tor. Tor is the best option we have by far and is currently far superior than i2p. It is designed to keep anonymity even with compromised nodes. Doing a deanonymizing attack is extremely hard and costly and only has a small chance of actually succeeding and that’s before the new crypto algorithm roles out which makes this kind if attack pretty much impossible. Nothing is perfect but Tor does a pretty good job. It also has some of the most robust censorship resistance tools available and works in Russia and Iran. They solved the denial of service issue with a proof of work system a while back so performance wise Tor is now much better.
Meanwhile I2p still has issues with its design which the developers acknowledge on the website. This isn’t meant to be hate against i2p but simply an analysis of the real world facts. I2p shouldn’t be used anywhere where anonymity is critical as it is vulnerable to attack due to some outstanding issues with its design. Even outside out deanonymity, i2p still has issues with denial of service attacks and it doesn’t have a simple solution for name resolution which is rather dangerous. I like it and concept and run my own node but I wouldn’t rely on it for survival. Building a p2p network is really really hard which is why Tor uses a more centralized approach.
I2p has some flaws that make it potentially dangerous to use in a country targeting civil liberties.
Tor is a much better choice since it has better anti censorship and anti detection built in.
The good news is that the youth will find all sorts of ways to bypass it
Performance wise it isn’t going to be great. I’m not sure about censorship resistance.
I like how this is the same country that brought us 1984


I believe it is for beam forming (the tower needs to know where to send the signal)
Clippy wouldn’t do this
We need more push back. Ublock origin is not going to fix all of the anti consumer stuff companies are doing


There is no such thing as a “no log VPN”
When traffic leaves your device it is free game. You have no control over the VPN companies stuff plus the VPN company also has to have a connection to the internet. Your traffic will always be passing over many different companies infrastructure to get to where its going.
https://en.wikipedia.org/wiki/United_States_Foreign_Intelligence_Surveillance_Court
https://en.wikipedia.org/wiki/Lavabit
The thing that pisses me off the most about these courts is that they completely violate the idea of a fair trial where you are innocent until proven guilty. The Judges in these courts seem to be openly biased toward government entities and the trials they oversee are mostly for show. They deliberately set up the defendant to loose by doing crazy things like denying a defendant access to legal council.