/g/ - Technology

Computers, Software, Technology


[Hide]
Posting Mode: Reply Return
Säge
Subject
Message

Max message length: 5000

Files
E-mail
Password

(used to delete files and postings)

Misc

  • Supported file types: GIF, JPG, PNG, WebM, OGG, and more
  • Max files: 5
  • Max file size: 50.00 MB
  • Read the global rules before you post, as well as the board rules found in the sticky.


02/27/20 IRC/Matrix/and Discord servers are now available, join here.
02/09/20 /ausneets/ has been added!
11/23/19 Donations can now be made via PayPal, thank you for all of your support!
11/21/19 We have successfully migrated to LynxChan 2.3.0, to see all of the changes to 16chan, click here.


[Index] [Catalog] [Archive] [Bottom] [Refresh]

(47.94 KB 728x380 nordvpn.png)
VPN = data collection scam? VPN = data collection scam? 10/09/2019 (Wed) 22:05:01 ID:b7fc19 No. 983
Why would you trust a large VPN like Nord or Express to not just sell your info? Their clients info most likely worth more than granny on facebook. Why wouldnt NSA start a VPN service and price it extremely competatively?
>>983
>can't spell "C O M P E T I T I V E L Y "
GNU/Linux -> VPN -> Tor . At most, my VPN can tell that Anon Realname uses the tor network, that's it. I'm sure the glowniggers can still get me with enough effort if I fedpost repeatedly about Imminent Lawless Action on a specific target, but this is as good as it gets at the moment for your average user. The level 99 russian hacker way would be even better if you go VPN -> Tor -> botnet machine -> website, but I'm not quite that leet.
FUCKING DUMB BRAINLET
>>983
I use a VPN from a smaller company that I trust. Do you research.
>>983
protip: just hack the NSA's wifi and then you're impervious from all datamining
>>986
>implying the NSA does not surveil itself
>>985
Maybe, but probably most VPNs have been bought by NSA and are owned and run by them, and the frontman is just an actor and an agent. They probably have some smaller ones too to honeypot you. Tor/I2P are your best bet.
>>983
WWW aka World Wide Web as in a global net to catch prey. The whole thing was legalized for public usage to create massive division on all fronts.
>>988
Agreed, honeypots!
>>990
Where is this from?
>>991
My /fap/ files
>DON'T TRUST ANYTHING GOYIM
>BE AFRAID, REMAIN TIMID
>NEVER FIGHT BACK
>THERE IS NO HOPE

The shills are out in force on 16 this week. We must be doing something right. History rhymes jew, history rhymes
oy vay goy stop using our own methods!
>>993
kikes are shlooming 16chan. oy gevalt
Pretty dead thread maybe /g/ can revive it
>>983
>Why wouldnt NSA start a VPN service and price it extremely competatively
Because the jew israelis got them covered already, and the israelies don't have to follow any pesky US laws.

Do you homework anons, just because some site says a VPN is romanian or polish owned, it may have been purchased by a london/isreali holding company... And I bought three years worth... fug
>>991
The new StarTrek Discovery show
>>984
>Anon Realname uses
Why who'd you be stupid enough to buy a VPN with your real info? Pay in crypto or you are wasting your time and money. its pointless to have a VPN if the VPN knows your real info.

Also never renew a subscrption. Make a new account ever time and let the old one die.

>GNU/Linux -> VPN -> Tor .
> VPN -> Tor .
This is useless. Why not go directly ISP -> TOR ? The Only logical thing is:
ISP->TOR -> VPN

>>983
>Why would you trust a large VPN
Good call never trust anyone especially any business.
>>999
>Why who'd you be stupid enough to buy a VPN with your real info? Pay in crypto or you are wasting your time and money. its pointless to have a VPN if the VPN knows your real info.
Next time I won't make the same rookie mistake. Didn't know when I bought the VPN that shit would get so real so soon.
>>1000
>same rookie mistake

Also don't renew the same account simply make a new one and let the old one die.

Anything that will not let you pay in crypto is a scam.
>>1001
>Anything that will not let you pay in crypto is a scam.
And if you can tell me how to buy crypto without telling god and country my name, I'm all ears. Everyone requires a fucking driver's license and a picture of my cock.
>>1002
>And if you can tell me how to buy crypto
No problem.
1) Actually mine the coin. Yes simply get a miner and mine crypto (simple PC).
The electricity costs of what you get will be greater then the value of the crypto however this is not the point. You can warm your house in the winter with crypto mining.
https://www.youtube.com/watch?v=Poa-VkX_k20

You look up how to get into mining.

Personally I do it this way.

2) I hear there are "drug dealer" level of street people who will take your physical paper cash and give you crypto on your digital wallet no question or ID asked. This depends on your location and I did not try it. I simply mine it for myself.

However there is something named local crypto or local bitcoin or something like this and the people will depend on your location.

People tell me to always meat in McDonalds for your own safety and do the transaction there and look on your laptop if the money is in you digital wallet. Do research into this on the internet.
>>1002
Another option is to go the legit exchange route and wash your purchase through an anonymous currency like XMR. The exchange will know the wallet that you sent it to initially, but transactions out of that wallet will be anonymous.

BTC --> XMR (recv) --> XMR (hold).

The recv wallet is a buffer wallet that your exchange knows about. The hold wallet is your private wallet, known only to you.
>>999
>Why who'd you be stupid enough to buy a VPN with your real info? Pay in crypto or you are wasting your time and money. its pointless to have a VPN if the VPN knows your real info.
Seconded but I'm a bluefag and ... ok how do you do that?
>>1001
>Also don't renew the same account simply make a new one and let the old one die.
Simple tip but so pro in fact.
My XP builds.

>>1003
>>1004
Getting better.
So you buy or generate some BTC, then go to exchange them for some alternative cryptocurrency, like XMR? So this XMR wallet will leave a trace on the legit exchange website (back when you did the BTC to XMR), but then paying with XMR, no one but you and the encrypted data in the cryptocoin will know where you spent your XMR? That's it?
they do
>>1005
>So you buy or generate some BTC, then go to exchange them for some alternative cryptocurrency, like XMR?
Yes.
>So this XMR wallet will leave a trace on the legit exchange website (back when you did the BTC to XMR), but then paying with XMR, no one but you and the encrypted data in the cryptocoin will know where you spent your XMR? That's it?
From the perspective of the XMR blockchain, all transactions are anonymized, including the transaction from the exchange into your receiving account. The reason the buffer wallet is needed is because your exchange may (will) keep a permanent record of any outgoing transaction, including the address to which it is sent. The transfer from your recieving account into your private holding account (or to any other account) is anonymous.
I mean not all VPNs are created equally and there are a lot of them out there so I doubt all are bad
>>1004
>Another option is to go the legit exchange route and wash your purchase through an anonymous currency like XMR.

You do realize that transaction is reported to the IRS and they are going to want you to prove you didn't make a profit by showing what you sold your crypto at. So, let's say that another way "men from the government are going to come with guns and you are going to have to tell them where that crypto went." So that's not really an option. Because the IRS wants their cut and they aren't going to take "dunno where that crypto went" as an answer.
>>1009
>You do realize that transaction is reported to the IRS and they are going to want you to prove you didn't make a profit by showing what you sold your crypto at.
True, and if you were moving around thousands of dollars worth the IRS might take an interest, sure. But let's not lose perspective here: we're talking about the cost of a VPN subscription.
>>1010
>True, and if you were moving around thousands of dollars worth the IRS might take an interest, sure. But let's not lose perspective here: we're talking about the cost of a VPN subscription.
With the volatility of bitcoin and other cryptos, I wouldn't be surprised in the silghtest if they thought a $100 crypto purchase could net $500 profit. Plus, it might not make economic sense to go after a few small time traders / purchasers, but it certainly would if they wanted to make an example so everyone else would follow the rules...
>>1007
ty!
Trying to decrypt the elements of your post:
>From the perspective of the XMR blockchain, all transactions are anonymized
IIRC, Bitcoin retained more information, but the only way to get to it required the cracking of the entire blockchain, which is virtually impossible for the moment.
I suppose XMR adds a lot of salt and has a terrific shalala.
>receiving account
The account you have on the legal/legit website?
This leaves a trace of all your transactions and your government can use legal pressure to obtain information about your account.
>buffer wallet
Is associated to the receiving account on the legit site?
>private holding account
Is another "secret" account with a XMR wallet?
>The transfer ... is anonymous.
I wonder how this can be. The receiving account keeps track of exchange between two cryptocurrencies, but a transfer of XMR coins from this account to an external account will be unseen? Strange.

>>1009
Ah, good catch. Since it's legit, it must be (((transparent))). Forgot about the IRS (or any similar organization in your home country).
Let's be honest, the moment you use cryptocurrencies, you're a suspect unless you are part of the government.
Tarrant using crypto has certainly not helped anything at all there. Cryptocash is all about childpron, fourth reich megakillers and hard drugs.
Okay, so how do you find a non-legit exchange place?
Don't give names if you think they should be protected, just a clue as to how to get there and I'll dig deeper with my 3rdeye.
(56.08 KB 600x673 8f0.jpg)
>>983
>Virtual machine
>not using a VPS
>>983
It's being shilled by so many jewtubers it isn't funny. And coincidentally all of those same jewtubers end up in people's recommened feed. Mine included. It's absolutely a data collection scheme. Some of them have WAY too good of deals to be true too. Like 3 months for $2.00 per month with a full refund if you don't like it at the end of the 3 month period. Only problem is (((they))) can pretty much get everything on you within a 3 month timespan. The shit people say in and around their phones/computers/social media is like an open book. I always look at products/services this way: if it's being shilled in the strangest of places by dozens upon dozens of people or through dozens upon dozens of outlets, it's likely either a shit product/service or Jew-influenced to hell and back. That and if the deal/price is too good to be true, it probably is.
>>1014
I'm sure the price goes up after that. Anyway, most of these services (like gyms) are sold with the understanding that most people aren't going to use it much. So yeah, you get more than your $3 worth, but so many others hardly use it at all. Just like a gym. You couldn't stand in a gym if all the members actually showed up. If everyone used it, you would be paying a lot more because the gym would need to be massive. Along the same lines, if they charged more, people who didn't use it much would cancel the service.

So price isn't proof that they are a honeypot.

t. mbaAnon
Wondering about chaining two VPNs before finalizing the chain with some tor on top.

Is it doable to sort of route a VPN through another one for your average anon, or is this shit too arcane?
>>1016
You could if you know how setup your VPN sever on OpenVPN, which is easy to do if you are tech literate. Commerical VPNs are shit
>>1016
Look into whonix. It's the easiest way to get a secure connection and also block the connection when the vpn fails. It comes with tor out of the box, and I'm currently looking into chaining multiple VMs to get tor -> vpn.

>>1017
The nice thing about a commecial vpn is that you can mix up your endpoints. Someone attempting to figure out what you are doing would need worldwide reach. If you have your own VPN, it's pretty trivial to get something set up on the other end, especially if your homemade vpn is in the same country.
>>1017
Not that literate at all but I can think I could dedicate a week to it eventually (actually stretched over a full month most likely).
If the basis is, first, to run some form of Linux (tails?) on a dummy computer and set it up from there with command lines, assuming I have a help file and dictionary at hand's reach, then maaayyybe something can be done.

Commercial VPNs put one client on the computer and manage the online outputs.
I have not been really convinced of the "free" VPN proxies either. Many don't even seem to work at all.
(17.93 KB 736x263 nord.png)
(11.64 KB 236x124 EHUJeJ1VUAIwXj4.png)
>>1015
Your data has been compromised if you use Nord, their private keys has been expired a year ago and have admited the issue a week a ago.This means anyone could set up a sever on Nord and have your data stolen
>>1020
That's just for their web site (I hope), but how could they not notice that or not care? VPN business must not be as profitable as I'd have thought.

>>1019
Whonix runs in two virtualbox virtual machine sessions. It's basically running from two dummy boxes without needing extra hardware. I run it on my 8gb RAM laptop that's almost 10 years old and it runs great. SSD definitely helps though, I'd hope no one is still running spinning platters these days, SSD are so cheap now.
Did you guys forget that NordVPN got hacked and infos leaked + users monitored.
>>1021
No they confirmed that servers have been also hacked.
>>1021
Not just the website itself but it's severs in the VPN they breached users by redirecting the end encryption to an unauthorized server exposing your IP.
>>1024
Hackers also were able to monitor traffic entering NordVPN VPN relays and exits. So it was pretty bad attack. They fully compromized / rooted the VPN server.

On top of that, they didn't tell about the compromise, before users noticed the issue. And it came to the light. - That's pretty fucked approach to security.
>>1020
Thankfully I don't use nord. Not that my JewVpn is any better.

>>1023
Ouch, that's bad. WTF NordVPN, you run a server, all it does is run some openvpn instances and an authentication scheme. How can you fuck this up? It's probably all in VMs too.

>>1025
Shit, even worse, they knew and did nothing? So what are current recommendations on VPNs? This sucks. My 3 years prepaid is up soon, I'm going to have to find a new one.
>>1021
> I'd hope no one is still running spinning platters these days
*whistles*
mine died weeks ago, barely managed to do a big backup. I had clusters repaired and I thought it was fine then bam, whole thing went black and no booting. Disk made silly noises, click clicks and I couldn't push a fresh MBR into this piece of **** of hardware.

Anyway, I'll look into whonix and see how to set up virtualbox VMs. I'm curious as to how such a set up can help hide your ID though.
I get the principle behind the VPN; basically you go to a shop and someone lends you a mask.
Tor is more like you jump different ponds before reaching your destination.
But whonix? How do I confuse sniffers?

On another hand, this kind of complicated set up will be useful on 8kun as long as they don't block VPNs/Tor.
4 chan is totally dead, you can only pop civnat memes at best over there. It's reddit with more pictures.

>>1026
> they knew and did nothing?
I think we can say that they're totally comprised. Nobody should use NordVPN ever again.
>>1027
>I get the principle behind the VPN; basically you go to a shop and someone lends you a mask. Tor is more like you jump different ponds before reaching your destination.

Whonix uses tor, and it's set up so that you have NO leaks. No DNS leaks, no leaks at all. Everything goes through tor, and it tor drops, you have zero connection.

>I had clusters repaired and I thought it was fine then bam

Cluster loss is often the only warning IF you get a warning. Sometimes you can freeze a HDD and run it with an ice pack and it will go long enough to get your data off. Put it in a plastic bag so condensation doesn't screw you.

I'm kind of afraid of the SSD, I haven't had one fail yet, but I'm sure it will happen at some point. Time to make a backup....
>>1028
>Whonix uses tor, and it's set up so that you have NO leaks. No DNS leaks, no leaks at all. Everything goes through tor, and it tor drops, you have zero connection.
Right, I see. But then I suppose the virtual machine set up is more of an advantage to avoid certain viruses and unwanted media like cp.
I've booked a few docs about whonix which I'll read later on.
>>1005
> ok how do you do that?
Mine the coin.

Buy yourself some killer PC that is good for mining and let it run overnight (or use your own killer PC if you have it).

>XMR
Yes mixing also increases the difficulty of tracing this however lots of exchanges are also simply scams who will run with the crypto money so look out.

Best way is to transfer small fragments of your money there and immediately withdraw it to the actual crypto wallet not some Honest-Hank-Crypto-echcange.com website thing.
(116.47 KB 1000x1000 external-content.duckduckgo.com.jpg)
>>1021
SSLs are basically bullshit because the (((certificate authorities))) will store all the keys and give them to the gov if they are not directly sending them to the gov.

You are simply adding another layer of spyware to your connection.

The only thing SSL will do is hide what cat website you are browsing from your local coffee shop owner.

This is all, anyone having the resources to intercept your direct clear text connections and do a MitM attack has the resources of a government (you think your local hooligan can simply plug into restricted internet cables without the cable terminating or the gov showing up within minutes?) and I can bet everything that the government simply gets all the keys from the (((certificate authorities))).

SSL does not protect from anything since there are cheap and crap (((certificate authorities))) who will give the certificate to absolutely everyone or "accidentally" have a certificate leak.

SSL is there to take over control of the internet and have a way of making websites unaccessible because they have no SSL and are "insecure".

Now you know.
this is what i have been thinking
(13.66 KB 424x210 logo_424x210.png)
>>1021
> SSD definitely helps though, I'd hope no one is still running spinning platters these days, SSD are so cheap now.

Shilling literally useless garbage this hard.
There is no reason for anyone to own an SSD.

> SSD definitely helps though
Say how and accompany your research data with making 2 tests of the same thing on a HDD and SSD.

Aha I see you did not do any tests.
only repeat the youtube propaganda about SSDs.

Virtual machine do not require disc access. What they need is space for all the data they hold (you need to store all the data of the virtual OS) and HDDs are the best option here.

>SSD are so cheap now.
Spoken like a true marketer/advertisement.
There is a difference between "are so cheap now" and "price efficient to HDDs for the same space".

Simply check the prices of a HDD lets say a cool 4TB HDD

https://www.newegg.com/p/N82E16822235011?Description=4TB&cm_re=4TB-_-22-235-011-_-Product

>$88

VS a 4TB SSD:

https://www.newegg.com/samsung-860-evo-series-4tb/p/2NS-002X-00023

>$549

Pay more money for the same capacity!

SSDs are useless for literally everyone.
>>1033
there is obvious solution/compromise

Buy mass storage disk drives for large files like media files

and medium sized SSD's for programs that stand to benefit from higher read speeds like video games
>>1026
AirVPN has a very good reputation
>>1035
I was always suspicious of NordVPN with their huge budget for advertising, never trusted the larger ones
>>1031
>SSL does not protect from anything since there are cheap and crap (((certificate authorities))) who will give the certificate to absolutely everyone or "accidentally" have a certificate leak.

But the CAs don't have the web site's private key, so what do they have that can leak, aside from their own signing key. Yes, state actors could use the signing key for MITM attacks, but that's much harder to achieve if you change up your VPN often.

>>1033
Yes, spinning platters are cheap and they have their use, maybe on a storage server, or a secondary drive, but you would see massive performance increases if you ran your OS on a small SSD. You can get a 256G SSD from samsung under $100 and it makes a HUGE speed difference.

Anon >>1034 said it well.

Also, there's a price / capacity curve, no one needs a 4TB SSD unless you are running some very specialized applications.

>>1035
Interesting, haven't heard of them before, thanks for the tip I'm hoping someone starts up a service using WireGuard, it looks very promising.
I realize many questions sound quite newfaggy, right? Like, total novice. But we're going to need to help more and more people get on the boat, considering the evolution of the spying system and what we're facing. We must not only adapt, but plan ahead too.

Actually it's funny. A certain level and type of knowledge is, these days, not available to occultists, but tech savvy people (not to say nerds).

So again thanks all for the info, we need to keep sharing the tools of our freedom.
>>1031
>I can bet everything that the government simply gets all the keys from the (((certificate authorities))).
Honestly, I'd actually be surprised that it does not. The keyholders must be part of the gang, it would fit with everything else.
>>1031
>SSL is there to take over control of the internet and have a way of making websites unaccessible because they have no SSL and are "insecure".
Yes, a central authority (totally friendly of course) that gets to decide what is fine (safe) or not.
So, is an alternative even needed or can we do away with those certificates altogether?
>>1033
>SSDs, boo
The silence, maybe, is at least the beginning of a good argument?
>HDD vs SSD
What about transfer speeds? Come on it cannot be totally bunk either.
>Virtual machine do not require disc access. What they need is space for all the data they hold (you need to store all the data of the virtual OS) and HDDs are the best option here.
So good old fashioned tower?
>>1037
>Also, there's a price / capacity curve, no one needs a 4TB SSD unless you are running some very specialized applications.
Class: Otaku Thief
>>12312
>Proton
Would that also compromise the security regarding emails?
>>993
>Oy vey, don't be cautious goy! There is nothing to worry about
See, I can make strawmen too.
>>1037
>256G
Pathetic.

>no one needs a 4TB
Objectively wrong.

1TB was the absolute minimum until 2018 now you must move on. What the fuck are you using your computer for?

4TB is the minimum now.
>it makes a HUGE speed difference
Nice placebo advertisement, are you parroting the advertisement BS or are you a real shill?

I told you to post any tests you did yourself. You did not do this.

What will this 0.001% increase in system loading on start up give me?

Keep in mind I did run 8 (eight) VMs at the same time on my HDD and there was no problem at all.

>>1034
Why do I need to use this SSD component at all? Waist of money.

>and medium sized SSD's for programs that stand
Name any, because that's not how programs work or ever did.
>like video games
And you just disproved yourself (I did not expect to debate gaming on /g/ however lets get into this subject).
Name what games benefit from this and your setup (how much do your games take up and where they are HDD or SSD). Installed steam library will take 900GiB especially with more of these 30GiB updates getting on games.

How do you use your SSD?????
You keep 1 game and delete and download the other one if you want to play it?
Actually name your setup.

<muh retro games
Will see no improvement from SSD speeds.

SSDs are literally for no one. There is no application that needs SSDs from advanced databases to gaming(modern or retro) to VMs its only for idiots who want to throw away their money.

>So good old fashioned tower?
Yes I do my computing on a PC/desktop.

>What about transfer speeds?
Yes SSDs are faster however I struggle to find any use case for them.

Gaming?
Retro games are fast on HDDs and new games take shit loads of space. So the choice is paying 500% more to have 4 second shorter load screens in modern games only.

Gigantic corporate databases?
Was never a problem on HDDs simply because the database works in ram and snapshots itself to the HDD and RAM is 900 faster then the fastest SSD.

Writing files?
No problem on HDDs.Or ever was, even for 4K videos.

VMs?
Wrong I did run 8 VMs at the same time and them getting to use up the RAM was the biggest problem and they needed their HDD space you try to create some VMs and see how much they take and multiply this by 8 or even 20 if you have lots of VMs.

The only use case is when you need to use a SSD would be if you constantly need to transfer TiB of data in 1 day. We are talking 16 TiB of data under 24h.

Only SSD in the 16 TiB range don't exist.
Or are so expensive you will reconsider ever using an SSD.

The other benefits of SSDs are marginal like no noise (HDDs are not that loud) and no fear of damaging the SSD if you drop it or move it while its online.

Look if SSDs did not cost an arm and a leg to buy and where in the actual capacity range of HDDs I would be using SSDs. However they are literally for nothing and no one.

Every idiot who shills them needs to do tests and contrast the supposed benefits of SSDs VS HDDs.

At this point they are like burning your money for nothing.

I also recommend anyone who feels some magical benefits from SSDs to actually monitor what is going on if your PC is ruing out of RAM and using page file (or the swap partition in linux) its bad and you need to:
A) Buy more ram
B) Think how not to reach this limit of RAM.

Because a swap file on a SSD will make your computing less shit however SSDs are slow garbage in contrast to RAM.

This was the traditional division RAM for the fast stuff and HDD for your storage.

SSDs are a middle point and accomplish neither speed neither capacity.

And getting a page file is crisis mode and you should buy more RAM not a SSD to improve this situation.

Also think about formatting your HDD instead of transferring a bloated and rotten windows registry to a SSD. The win registry rots and you need to format your PC and make a fresh install to prevent this, you are only prolonging the ultimate win rot if you transfer it to a SSD.

And always look out for the technically right SSD advertisements like:
>SSDs increased in capacity now
Technically true, practically useless and misleading
made up numbers for demonstration
2010: 1TB SSD = $500
1TB HDD = $100
5TB HDD = $500
2015: 2TB SSD = $500
2TB HDD = $100
10TB HDD = $500
Now I think you understand what is going on here. The HDDs are also increasing in capacity.

Simply look at the prices people!
>>1043
>I told you to post any tests you did yourself. You did not do this.
LOL. My computer boots up in under 10 seconds compared to almost a minute before. Granted, I use a laptop, and laptop HDD are slower, but the speed is unmistakable. Apps open instantly, I used to see a splash screen opening word for at least 10 seconds (yes, Microshit, get over it, I run gentoo when I can).

>1TB was the absolute minimum until 2018 now you must move on. What the fuck are you using your computer for
Browsing and android development. Doing a full lineage build takes about 4 hours on SSD. On spinning platters, I'm looking at overnight. What are you using your computer for? I mean, I understand if you have big storage needs, getting some traditional HDD, but not for your main OS. I run Win10, Gentoo and my android build environment (including that storage pig ccache) and have room left over. I don't store movies (separate server) and I don't play games.

You can get a 256G HDD and run your OS off that and get 95% of the benefit of SSD for around $60. Everything else goes on the spinning platter.

Heck, you want fast? My server runs the OS on two mirrored SSD running raid 0. Faaaast!

I have to say, I have never seen anyone mount such a defense of spinning platters before.
(202.23 KB 1063x709 54647.jpg)
>>1044
> I have never seen anyone mount such a defense of spinning platters before.
This is because all the mainstream tech channels shill SSDs like they shill other shit.

> Doing a full lineage build takes about 4 hours on SSD
What? Of android? The fuck? What are you talking about? Would that not involve compilation? Because you are compiling the source code? And compiling is dependent on the processor? Once more I have no idea what you are talking about. So explain this.

> I don't play games
VS
>>1034
>from higher read speeds like video games
And me:
>I did not expect to debate gaming on /g/ however lets get into this subject
So the subject of video games is closed? Because I responded to what was posted and there is no scenario in video gaming that requires an SSD.

So are we finished with the subject of gaming? And can conclude its burning money to get SSDs for gaming?

Once more I only respond to what others post in defense of SSDs.

>Granted, I use a laptop, and laptop HDD
I use a desktop HDD. Oh and I also have a laptop with a HDD (old model).

>My computer boots up in under 10 seconds compared to almost a minute before
Yes my win7 machine for win specific applications starts up in something like 20 or 30 seconds. I need to clock it however this is how long it is. Only its not that bad. Especially that I don't turn my equipment off often meaning my PC has simply its screen turned off and is working (more on this later) the laptop? No clue I simply close it and it wakes up from sleep mode in under 1 second.

>Apps open instantly
Can be some retarded MS win registry fagotry. On windows GIMP loads in 50 seconds on Linux it opens instantly (2 seconds) (I'm mostly on linux) libre office opens in 3 seconds on windows and linux. I don't mind waiting 2 seconds for the splash screen. I'm not saying its not a benefit for SSDs I'm only pointing out HDDs are not agony and you can live with it. And I'm not willing to pay 500% more to have the less then 2 seconds opening of apps.

Especially that once the app is in ram there are no splash screens the only thing I need to remember is to not close GIMP totally in windows and it stays in RAM and there are no more splash screens.

>if you have big storage needs,
Yes I do.

This thread moved to VMs(whonix) so I recommend you look into how a VM can take up 30GiB at the minimum. for the crazy things I did with VMs there is me starting a farm of click bots VMs so 30 * 10 = 300 GiB and 30 * 8 = 240GiB and +30 GiB for the real OS is 270GiB and its good night SSD and hello "OS screams at me" if you are on 256GiB.

This is where I got my experience with knowing that 8 VMs at the same time will not have any problems on a HDD granted it was under a linux OS so maybe MS is more retarded with windows.

I also do a rare and stupid thing where I use multiple VMs like "eggs" there are retarded win programs who eat the entire OS so I have a master VM copy of a full XP installation ready to go, clone the VM point it to download pictures (it runs a win program to download from sites) after it finishes I extract the downloaded files from the VM and delete the VM (like you discard the shell of an egg after you get its contents).
This is a extreme niche case however I like doing it once in a blue moon.

Any other playing around with VMs will get you into 30GiB for every VM.

>if you have big storage needs,
Getting out of VMs and into what I need the storage for all the data.

This is exacerbated with me (this is /pol/ and not /g/ my mistake earlier) server that downloads.

You see lets say there is a interesting YT channel I simply add it to my download protocol and have my server fetch data and write it to my HDD. This way I have a full archive of the channel and even if a video gets deleted or the channel killed by YT I have all of its contents. This should be more relevant to /pol/ .

Not to speak of downloading other stuff that is /pol/ related.

>if you have big storage needs,
The other thing is that if I consume media I like to have it on my HDD and not stream. Instant saving of frames while watching or extracting a fragment to use is something I like to do.

I also have saved the "practically every book ever written" torrent so I have shit loads of data.

There are also dubious compilations (that I bet repeat) of helpful books and manuals that I torrented.

TBC
>>1045
And the last part
>>1044
>I understand if you have big storage needs
>but not for your main OS
This gets me into another subject because I have all these HDDs and buy more of them I have old HDDs sitting around. So I can then use them for a OS HDD so the OS HDD is free.

I also go full crazy with HDDs with separate OSs on them for specific tasks like my OS with my crypto wallets. I have old HDDs sitting around and they can be utilized for this now.

Personally I find people who only brows the internet without saving any data to be void and not have any competence or interests. Everything on the internet can vanish fast something /pol/ should know. And there are far more important things to save then cat videos.

For example the YT channels who explain in detail how to open any lock.

I dream that I can simply get a 900TB HDD for under $100 today.
NordVPN is linked to data mining companies, Tesonet. Both NordVPN and Tesonet are Lithuanian companies. Lithuania has 3 million citizens. I'm not stating that it's clear but there is very high likelyhood that it is selling data.
This is more information on NordVPN:
https://news.ycombinator.com/item?id=18609655
>>1045
>What? Of android? The fuck? What are you talking about? Would that not involve compilation?
Yes. It's a HUGE fucking codebase, and it hits the disk like mad. If you use CCACHE, it hits the disk even worse. It can easily take 50G for build space.

>So the subject of video games is closed?
With me, yes. I prefer not to debate shit that I know nothing about. So I cede the video game ground to you, as I have to fucking clue. Kind of the opposite of how you have no fucking clue about compiling a lineageos android build, yet, you still tell me it's CPU bound.

>I'm not saying its not a benefit for SSDs I'm only pointing out HDDs are not agony and you can live with it.
Well, when you are used to SSD speeds, going back IS agony, Wife wanted a new laptop, it was too slow. I said, nope, I'll upgrade you to SSD. She was skeptical, I did it, she said it was like having a new computer it was so fast. I didn't do any registry anything, just imaged her hdd to ssd and installed it. Saved me the cost of a new laptop ($1500 or so) and only spent maybe $100-$150 on an SSD. Now she's happy as a clam on her old computer.

>This thread moved to VMs(whonix) so I recommend you look into how a VM can take up 30GiB at the minimum.
I just checked, my whonix server is about 4g, my whonix workstation is 5.5G. My gentoo VM is huge though, but I have a second SSD for that one. That one I run rawdisk so I can boot into it native also. It's a pretty sweet setup, I highly recommend it.

>This is a extreme niche case however I like doing it once in a blue moon.
I need to figure out a system to do disposable VMs. Definitely have some use cases for that.

>I also have saved the "practically every book ever written" torrent so I have shit loads of data.
Ok, definitely spinning platters for that. No question.
(26.31 KB 474x474 1.jpg)
(103.25 KB 1280x720 2.jpg)
(18.61 KB 474x260 3.jpg)
>>1049
> Wife
What is placebo effect with woman.
> I didn't do any registry anything
huh?
> just imaged her hdd to ssd
So you did copy a faulty registry on a SSD. What you where supposed to try is to reinstall windows.

>Yes. It's a HUGE fucking codebase
OK did you try to simply make a RAM disc? You can simply assign ram to be mounted like a disc and use this. Because ram truly makes SSDs look like tape drives.

> It can easily take 50G for build space.
Now that is a kick in the face. I need to know exact numbers. Depending on your PC (not laptop) this can be arranged in RAM discs.

>I need to figure out a system to do disposable VMs. Definitely have some use cases for that.
My recommendation (and I hope you are on HDD for this or get ready for a world of pain ) 1TB HDD.

1)install whatever linux mint or windows.
2) install Virtual box in the OS
3) in Virtual box install a OS (I recommend simply using a linux ISO)
4) Configure this OS to your liking and don't connect to the internet or web brows or know how to clean it after.
Name this VM "base master" or something like this.
5) With base master turned off click in Virtual box on the base master VM and select clone VM.
6) make it a full clone
7) Wait for the data to be copied
8) name the copy/clone "splinter torrenting" or something like this for torrenting of course
9) Start the splinter torrenting VM and brows in it the internet or get torrents etc.
10) after finishing tunr off the VM.
11) extract fiels out of the splinter torrenting VM if you need to
12) Select delete splinter torrenting VM.

And this is how easy it is.
You can even have multiple clones of the base master.

Hope this helped.
>I just checked, my whonix server is about 4g, my whonix workstation is 5.5G.
Maybe I was speaking for me installing full OS like windows or linux mint in the VMs.

I also like to point out the convenience of me using VMs for torrenting tasks.
Lets say you are on /t/ and there is 1 thread about productivity software while there are also others of interest.

Clone a VM for every one of these threads and point the in VM browser to the thread and start opening the magnets in the torrent client in the VM.

So video thread is in its own VM and productivity software is in its own VM.
When you want to revisit the thread simply open the VM who saves the RAM content (more storage needs for this) on the HDD so you are instantly in the thread.

Also this helps manage topics for example lets say you want some posted videos now more then the software that is downloading simply pause the software VM and the video VM will be the only one downloading.

I don't think there are faster and more convenient solutions then this.

Also VMs let you do impossible things like having 2 different instances of TOR opened at the same time (1 TOR in 1 VM).

Hope this helps. Get Virtual Box my man.
Okay ladies, what about a thing called Qubeos? Rings a bell?
Says it combines both an OS and a VM. Does Tor too I think. Not coffee though.
>>1051
Qubes is based on whonix. Unless you really know what you are doing, start with whonix. You can run whonix on windows in virtualbox. Qubes is basically a linux distro where you run your separate apps each in a VM.

If you are just starting out, run tails OS off a USB3 thumb drive. When you get the hang of that, graduate to whonix. If you find that you can do all of your internet stuff within a linux VM, you could be ready for Qubes. I imagine you are going to need a pretty modern machine to run Qubes, and a lot of ram. I doubt I could run it acceptably on my old laptop with 8g ram.

Nice thing about whonix is that I can run all my other stuff, and then go into the VM for chanposting. No rebooting into tails, etc. And you don't have to worry about if TOR disconnects, it's automatically handled.
>>1050
>Now that is a kick in the face. I need to know exact numbers. Depending on your PC (not laptop) this can be arranged in RAM discs.
Yeah, I'm rocking a laptop with 8G ram. It's maxed out too, can't add more. But 50G is a pretty good estimate, and CCACHE can easily cost another 10-20G.

ccache really speeds up build time too, usually, you aren't changing a whole lot between builds, but the downside is massive disk space.
https://ccache.dev/

>Configure this OS to your liking and don't connect to the internet or web brows or know how to clean it after.
I know it's not ideal, I usually download a premade image. They tend to be decently small.

>Hope this helps. Get Virtual Box my man.
Heh, I have been running vbox for maybe ten years now, possibly longer. It's a quality app, I'm amazed Oracle hasn't totally fucked it up.
>>1053
>Yeah, I'm rocking a laptop with 8G ram
There is a reason I consider laptops to not be serious(in 2019) and only real PC desktops are important.
You can get a 64 GiB PC to try RAM discs.
>50G
>and .... cost another 10-20G

You can try the 60 GiB RAM disc and 4 GiB for OS. Or try to get into 128 GiBs of RAM (cheap server hardware or wait for PCs to get to this level in 2020), you sohuld seriously check out RAM discs oh and try some experiment where you have your RAM disc work PC turned on 24/7 and seldomly if ever shut it down with the codebase and CCACHE in the PCs RAM disc.

I mean bet this PC and try it out and then tell me if you ever want to get away from this to SSDs.

You you seriously need to have your compilation computer be mobile with you and compile on the train?
Why not just SSH to your server(set up PC as server)?

>Heh, I have been running vbox for maybe ten years now
Did my post help you? Have a nice day.

>>1052
>Qubes
Always looked like paranoid overkill to me. Why do I need every app to be its own VM? Some apps require one another to function, and we are going back to the same problem. Better to have VMs for specific tasks with all the apps in it. Don't install literally everything in the VM only the stuff you most likely need.
1 VM for browsing another for something else.
>>1054
>You you seriously need to have your compilation computer be mobile with you and compile on the train?
Yeah, I take my laptop to work and it's my work computer. Wish I could work in the car, no train for me. Probably kill myself if I lived in a big enough city to have a train. At least in the US.

I haven't really had a reason to buy a separate machine. The old laptop gets it done, and I have docking stations at work and at home.

One day I will, but not today. Maybe I'll pick up some semi-old rackmount servers.
>>1042
Shalom, my brother. I agree. Trust nothing. We are watching. The goys must behave like the cattle they are or face our wrath
>>1052
>Qubes is based on whonix.
Qubes OS is its own beast, and can run with or without Whonix. Qubes-Whonix is a component of Qubes.
>I imagine you are going to need a pretty modern machine to run Qubes, and a lot of ram. I doubt I could run it acceptably on my old laptop with 8g ram.
8G would be pushing it, I'd imagine. It will run comfortably with 16G. To get the most out of it you'll also need hardware with modern virtualization extensions, including an IOMMU (in fact, I think since Qubes 4.0 this is a requirement). Most of the higher-end CPUs released within the last 10 years have this feature, but you will have to shop carefully for the motherboard, because some boards claim compatibility but have a broken implementation. I recommend finding a board you know someone else is using successfully and use that.
>Nice thing about whonix is that I can run all my other stuff, and then go into the VM for chanposting. No rebooting into tails, etc. And you don't have to worry about if TOR disconnects, it's automatically handled.
This. The ability of Whonix to contain information leaks is also a big plus for peace of mind.
>>1054
>Why do I need every app to be its own VM?
That's not how it works. Hardware and applications are segregated into domains; your network hardware, drivers, and management software all run in a NetVM, for example, creating a container for the network drivers, and isolating applications that use the network from potential driver exploits. Similarly, your USB hardware and drivers exist in a USB domain, separating the USB stack from the applications that use it. In the actual application domains, you can run one application or many as you please.
>>1043
Wall of words puffing old technology.
No consideration of speed differences for Disc Intensive operations, i.e. cache.
Source: trust me dude
>the lady doth protest too much, methinks
>>1057
>That's not how it works
OK.
And this is different from me having a:
1) internet VM
2) ??? archive VM ????
I don't seriously get why run anything more then a generic internet VM.

>USB
Do you seriously need to separate the USB from the rest? Like for real? And you transfer data out of this how exactly?

Serious question what is the difference between a VM and a domain?

I run my computing simple. Old PC with tails and a USB stick to transfer to my other machines. Who is physically disconnected from the internet.

After I exit tails it simply forgets all that happened.
How exactly will this domain thing save anyone? If there is an bug in the domain system can a attacker not get the same access? To paranoid for nothing if you ask me.
>>1058
>Wall of words puffing old technology.

Coming from the SSD shill, I don't want to run a computer like its 2002 with 500GB of space OK.

Just admit to yourself that you did buy into the SSD hype.

>Disc Intensive operations, i.e. cache.
Try a RAM disc and say this to me. Go on try a RAM disc. Lets see if you ever go back to a SSD after that.

Hey look all the popular celebs are telling you about it (like they told you about SSDs):
https://youtu.be/6pp_krChw_A

Ignore the muh games bitching. Most games have hard limits and will not increase their load speeds after some point.
Also ignore SSD shilling retards you are supposed to buy lots of RAM to run this. Shilling SSDs even when they lose in speed.

Solution for no one no space and no speed that's an SSD.
>>1060
Hey, I'm the SSD shill, that's just a random supporter. But yeah, I don't have a huge desktop, portability matters for me.
Why don't you fags just proton?
>>1062
Because I got tricked and bought 3 years of a Jew VPN. Thought I did my research, but I think there's a network of VPN shills that hide the fact that cybergh0st was bought by a london/israeli holding company.
>>1035
I noticed that AirVPN was based in Italy. From what I've read, Italy is working together with other European countries, Israel, Canada and the U.S., ect. to collect and analyze mass surveillance data. I have my doubts that this would be a trustworthy VPN service.
>>1064
Good catch. The search for a good vpn provider goes on.
>>1065
I've tried several of these VPN providers that are supposidely not in the N-eyes jurisdictions, but based on my limited interaction with them my ghost tells me that they are all either honeypots and/or all run by low-agency niggers looking for an easy cash grab.

Conclusion? Trust no one. The only way you can be absolutely sure that you are 100% safe from spying/logging is to set up your own network of VPNs one multiple VPCs using anonymous payment methods. Set up you own DNS relay, IDS, and IPtables and use multi-hop setup with Tor to protect your home IP. I'm about to start working on this today in fact.
>>1066
s/one\ multiple/on\ multiple/
(189.90 KB 2419x1834 tor-vpn-vps.png)
>>1067
Here's a high-level overview of how I'm going to set up my system. In summary, my Openswan VPN will hide my all of my traffic from my ISP. I will also set up a Tor bridge on the same node which acts as a private entry guard. Therefore, I can avoid profiling and timing attacks where an attacker gains control of an entry guard. It will also act as a directory guard for building random circuits on the Tor network.

For normie, non-Tor web traffic my VPS provider can indeed see my DNS lookups and any unencrypted traffic, but that's no different than any other datacenter. The benefit is that destination sites won't be able to log my home IP nor know that I'm using a VPN. This avoids the annoying flagging that ensues when using the popular subscription based VPN services because they see you coming from an abused IP.
>>1068
> This avoids the annoying flagging that ensues when using the popular subscription based VPN services because they see you coming from an abused IP.
It's much worse with TOR. Tor is blacklisted many, many more places than my VPN.

Have you looked into wireguard?
>>1069
>Tor is blacklisted many, many more places than my VPN
True, that's why having both options is good. The VPN for sites that you must use like banking, etc... all others sites that don't work over Tor you can just blacklist if possible.

For Torrents it's best to keep that traffic completely separate. I'll be getting a dedicated seedbox in Europe for that so my US based VPS IP stays clean.

However If I want to have a European based IP for whatever reason it's very easy to set up a new VPS over there and even do P2P tunneling and internal routing between VPS's.

>wireguard
You're right. Thanks for reminding me! I remember looking at Wireguard in early 2018 but it still seemed pretty beta at the time. Wireguard does look superior; smaller code-base, faster, author is a Kernel vulnerability researcher. I'll definitely drop that in place of Openswan.
>>988
I understand your concerns but I think that's a big schizo. I think NordVPN and the bigger ones are likely honeypots, but IMO there are still good VPN's out there who are run by smart people that care about privacy.
>>1071
>big schizo
Hey, shizophrenia is a bad-ass mental condition. Terry Davis had this, and his healthy suspicion of cianiggers was ultimately proven to be valid.

> there are still good VPN's out there
What VPN providers are you referring to? I've tried several and they are all severely incompetent.
Moreover, how can you prove that these oh so smart niggers actually care about my privacy enough to tell the glowies to fuck off when they're hit with a subpoena? Because they have some stated lofty principles typed up on an html page (usually loaded with trackers)? Because my $5/month is so important to them?

You must trust your Ghost. Mine is telling me to build my own infrastructure as diagrammed above. I will know exactly what I'm logging and probably have a separate logging server for IDS and FW rejection messages. I'll also implement a dead-man script that nukes the box in the event something is compromised. With everything automated via deploy scripts I can easily redeploy at will.
>>983 Sure use tor browser while warjamming if you really care care, but if you want some privacy all the time that probably works most of the time just as basic everyday information hygiene then do this: https://pastebin.com/2fw8SS9V
(172.62 KB 900x979 img_7407-spy-vs-spy.jpg)
>>999 ISP->VPN means the VPN knows your IP. You trust them not to log. They may violate that trust. This is easy and pretty fast and good for just denying google / social media the ability to track you ( hides your real ip IF you use totally different web browser profile ). In the near future your history may be used against you and things you've done may become retroactively illegal. This is good for not creating a paper trail. ( I probably have already left enough of one to burn me though ) This is totally useless against state actors because you have no way of knowing that the VPN isn't owned by some state (and which one?) Going ISP -> Tor is pretty ok. Use tor browser and if you paranoid for certain things only while warjamming. This keeps out the trackers, and maybe even state actors making recordings if you personally aren't a big deal. I wouldn't trust it long term. Lots of low value targets protected by tor will be nigh impossible to stop though. It's good to use tor unless you have a specific reason not to. It's good to evaluate what you do to be able to use tor more. The only reason to go ISP -> Tor -> VPN would be if some site you needed banned tor exit nodes but not vpns. ( not many sites like that ). Better to donate the money for the VPN to some obscure tor exit node operator ( the more obscure the better because they probably aren't owned by some three letter agency ) ( maybe not that many are but directly giving money outside 'proper channels' is one more headache. Make headaches. As for bitcoin, you can do small time stuff anonymously by running your own bitcoin node that only connects via tor. You cannot be shut down. If you buy bitcoin at bitcoin atms, you cannot be tracked. But often you can buy gift cards at stores with cash which is as anonymous. Also stores/atms take your picture so don't be depending on that to commit the crime of the century. Lots of low value targets. Be more trouble than you're worth. Use/practice anonymity even when you have no reason to. You become the hay for needles to hide in. Also when things don't work, you come to see who is watching you - or else it would work.
>>1072 AirVPN has an extremely good reputation. They are run by legit anons.
>>1074 >If you buy bitcoin at bitcoin atms, you cannot be tracked. Bitcoin atms at the very least require SMS/mobile number. Some will scan your ID. I really want to buy bitcoin anonymously, but it's really fucking hard.
>>1076 Not the last time I scanned a printed qr code of my bitcoin address and bought bitcoin from a bitcoin atm which ended up in my bitcoin wallet on my own node that connects only via tor. I donated the bitcoin ( 20 bucks ) as a test
>>1077 Also buy a tracfone from wal-mart with cash and don't put the battery in until you need it. I have a twiiter account obtained that way. Google makes you get a text confirmation each time you sign in again so it's not worth it. I suppose it would be worth obtaining a phone number over tor for the convenience. Maybe hook a solar panel to the phone ( would have to be android not a flipphone ) in a waterproof box in the woods. Then there are apps that let you get/send texts from your computer. I bought a fiip phone. I have the solar panel and the box. just gotta upgrade to android some weekend when I am bored
>>1078 You need to be warjamming at a coffee shop when signing up for stuff that needs your phone number using a raspberry pi bought at target with cash that has never been / never will be used for anything else. That's why google re-asking for sms confirmation is a bit of a pain, but this is easily circumvented with the solar android in a box in the woods mehtod.
>>1077 Who is the provider? All the ones here require id except pelicoin, which still requires SMS. I'd be really surprised if the ATM also didn't take a picture of me, because why wouldn't they? >>1078 >Also buy a tracfone from wal-mart with cash and don't put the battery in until you need it. Yeah, I have one ready to go, I just have to decide when is best to use it. I'm not turning it on anywhere near my home. >>1079 >You need to be warjamming at a coffee shop when signing up for stuff that needs your phone number using a raspberry pi bought at target with cash that has never been / never will be used for anything else. Yeah, I bought a trackphone for $40 or so, would have been $20 off had I enabled it in front of them, but that's not happening. >That's why google re-asking for sms confirmation is a bit of a pain, but What does google confirm? I'm going to make a new google burner account for my burner phone. Fuck their email, i'll use proton or something else.
>>1078 cat bitcoind.conf [email protected]:~/.bitcoin$ cat bitcoin.conf # Bitcoind configuration # # Bitcoinfags are rich fucks. I intend to leach. I intend to be as minimal as # possible to possibly run other coins. # prune after 2 gigs. # # 1 gig of space ( min is 550, 0 disables, prevents node from going down # during re prune=1000 # 144 MiB / day is minimum reccommended. maxuploadtarget=144 # that ought to be enough maxconnections=20 # don't request/relay transactions unless they are part of a block (keep bandwidth to minimum to stay synchronized with the network 150 Mib/day ) Your node won't see incoming transactions until they've recieved confirmation. ( possibly disable this ) # to recieve funds realtime. Also disables listening. blocksonly=1 # add this to only connect via tor proxy=127.0.0.1:9050 # could reduce traffic to set to zero. Consider this. listen=1 bind=127.0.0.1 # only connect to hidden services onlynet=onion # optional Add onion nodes. #addnode=blahblah.onion # I have lots of addnode= statements. A quick google will get you someone's conf with actual ones you can paste in here. I left it out for brevity and because you can google it. Having these here probably keeps your connection more robust.
> Who is the provider Well if that's now hard to find a few months later, I don't want to give anyone any help in shutting it down ( not you personally necessarily but this is a public forum ) > I would also buy a solar panel phone charger from harbor freight and a semi-clear box for screws from there.. Rip out the dividers for the screws, hook up the android burner in the woods to the solar panel. Place phone and panel in screws-box - hot glue shut to seal, then duct tape to a tree that gets southern exposure. There are lots of sms to phone apps. Practice sterile technique getting this signed up / so you can access from home/tor ( anything you do from home isn't hotzone level 5 suit secure - think of it as wearing rubber gloves and a mask even if you do a good job - not for handling ebola) Both twitter and google text a phone when you sign up. Google does this each time you sign in from a different computer ( which is always over tor )
>>1073 Edit: https://pastebin.com/y45G5EV4 This is the same one but with ipv6 nontcp on local interface disallowed. I have ipv6 disabled in kernel on my arch box using cat /etc/sysctl.d/40-ipv6.conf $ cat /etc/sysctl.d/40-ipv6.conf # ## DISABLE IPv6 # # you can also replace eno1 nic with all for all net.ipv6.conf.all.disable_ipv6=1 # Enable IPv6 Privacy Extensions # you can also replace eno1 nic with all for all # I have disabled privacy extensions for now. I use a random mac address so # This doesn't actually leak useful info. #net.ipv6.conf.all.use_tempaddr = 2 #net.ipv6.conf.default.use_tempaddr = 2
>>1082 >Google does this each time you sign in from a different computer If you are using a burner phone, why do you need to sign in to google over tor?
>>1082 >I don't want to give anyone any help in shutting it down Yeah, that's fair. I somewhat live in a shitty low-tech city, there isn't much competition here, so the bitcoin sellers can do whatever they want.
>>1064 No logs is what matters, and to be honest, no country is safe my friend. I know the hacktivists that run AirVPN they are extremely anti-government and pro-privacy. You don't have to take my word for it but they will tell the authorities to fuck themselves.
>>1084 If you're using the burner phone's internet somewhere other than your home, having only put the battery in when you need it, and while not having any other phone then you don't need to sign in to google over tor. But if you want to sit at home and use google stuff then you can't use the burner phone in your home without creating a log of your whereabouts at the time. What you do can be traced to you if you do it at home on a burner phone. So to enable sitting at home comfortably while not being knowable via logs you'd want the burner phone. Twitter is an example. If I want to say something it's a spur of the moment thing. I am not going to break out the burner phone and go on a mission to post some opinion on twitter/google. I want to be able to do that just whenever I think of it. That's the only way 'it' would even happen at all. It's to not be chilled. It's to be able to do anything a normie could comfortably from home while still anonymous.
>>1087 >having only put the battery in when you need it Well, I hope the phone being off is sufficient, most phones don't have a removable battery anymore. AFAIK, there isn't any provision for phoning home in the android code base (I have worked on it), something like that would have to be entirely implemented in hardware, I would be very surprised if something like that were in there. >But if you want to sit at home and use google stuff then you can't use the burner phone in your home without creating a log of your whereabouts at the time. What you do can be traced to you if you do it at home on a burner phone. You can't use your burner phone at home at all, because the mobile phone company keeps logs on where you are. Google would use the GPS or wifi info, mobile phone company would use the information from the tower your phone connects to and has a pretty good idea where you are at from triangulation. If you want to live dangerously, you can use airplane mode, but I wouldn't trust myself not to fat finger it and turn airplane mode off.
>>1068 >>1069 >>1075 I just wanted to report back in that I finished my setup as described in my previous post with a few modifications: 1. I am using Wireguard based on anon's recommendation, and I highly recommend it! It's a breeze to set up on OpenBSD. and I'm running my server in a good VPS I picked from the link I will share below. It's only $5/month and I have full control over ISO mounting, upgrades, reboots, etc. My Wireguard client runs on a local firewalled Beaglebone Black which routes all my home/office traffic through it. In addition, have a DD-WRT router has a 5 port Ethernet switch which I use that as a second firewall/router. 2. I'm using Unbound as a caching-resolving DNS server on the VPS which is only listening on the private VPN tun interface for use by all of my internal nodes. This prevents any DNS leaking. 3. I set up a Tor Bridge that also only accepts connections from the VPN interface and subsequently relays my Tor clients through the established Tor circuit. Here are some resources that I used to get it all working: Wireguard on OpenBSD: >https://blog.jasper.la/wireguard-on-openbsd.html >https://www.findelabs.com/post/wireguard-on-openbsd/ PF >https://github.com/findelabs/openbsd-ansible-deploy/blob/master/roles/wireguard-pf/templates/pf.conf >https://daemon-notes.com/articles/network/pf Unbound: >https://www.ckn.io/blog/2017/11/14/wireguard-vpn-typical-setup/ ^ Follow step 7 and configure Unbound in OpenBSD as described >https://www.tumfatig.net/20190405/blocking-ads-using-unbound8-on-openbsd/ Tor Bridge: > https://community.torproject.org/relay/setup/bridge/openbsd/ Set your "ORport" and "ServerTransportListenAddr" to your tun0 IP Snort: >https://functionallyparanoid.com/2019/03/18/installing-snort-on-openbsd-6-4/ >https://jumpnowtek.com/security/Running-a-Snort-IDS-on-OpenBSD.html List of Tor friendly/unfirendly VPSs: >https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs Hope this helps someone. Remember lads, with any VPN-as-a-service provider you are putting 100% of your trust in them with all of your DNS queries and internet traffic. You have never met these people and really have no clue who they are. Be smart, buy a VPS with crypto or a PP credit card and run your own shit privately! It's not that hard, it's fun to set up, and it gives you ultimate control and privacy. Check your DNS leaks via: http://dnsleak.com/
>>1083 Why disable IPv6?
>>1076 >I really want to buy bitcoin anonymously, but it's really fucking hard. I wouldn't use a bitcoin ATM tbh. They all seem to want ID over a certain amount. Plus with SMS verification and the fact that they're all located in places that guarantee you'll be recorded and photographed I say screw that. Not to mention the ass rape fees they charge. Try Paxful and/or local bitcoin meetup where you can do an in-person cash purchase away from Skynet. True, there's always a camera somewhere watching but at least it's not a timestamped association with a bitcoin transaction. Just my $.02 and it's how I plan on going about it.
>>1091 Agree 100% >Paxful >Local bitcoins Local Bitcoins stopped offering local transactions. Paxful also required id IIRC. eBay and Craigslist seem to be the places to go. Or pop into your local head shop and enquire. Still going to use a burner phone though.
>>1092 Where are you finding btc on eBay, all I saw was miners and hw wallets for sale. Plus 99% of eBay sellers require Paypal. CL seems sketchy but nevertheless a search in the closest major city turned up nothing for me. Not all Paxful sellers required ID when I checked earlier, wallofcoins looks promising, and there's also a bunch of local meet ups on meetup.com
>>1090 To lower your attack surface. It adds no value whatsoever.
>>1094 >no value whatsoever. Well winfags will notice MS makes a lot of use of it, has value to ((gates))
(11.11 KB 279x225 BigBennyB0y.png)
>>fags in thread >I use VPN to Tor https://matt.traudt.xyz/posts/vpn-tor-not-mRikAa4h.html Keep in mind that End-to-End traffic correlation is still the weak point in low latency onion circuit. Are you to trust a few dozen commercial VPN servers over a couple thousand specifically maintained unindexed Tor Bridge Relays? I think not, as that would make traffic analysis more likely and more statistically powerful. Give the link a read. The only true way to attain some form of 'true' anonymity in this age is chained High Latency connections (i.e. snailmail pace), using chained remailers with randomized time delays. Or use that remailer function with I2Bote on I2P with the same effect but has the added benefit of more users providing cover traffic to the network. >bitcoin exchanges http://localmonerogt7be.onion/faq (LocalMonero, this escrow has an i2p address and clearnet site too) I would use XMR for local reputation-based exchanges when you have the chance. I don't recommend holding onto any volatile crypto for a longtime though, unless you want speculate on a cryptocoin. I'd convert soon into cash then whatever else. >>1030 >lots of exchanges are also simply scams >>1002 >how to buy crypto without telling god and country my name https://en.wikipedia.org/wiki/Decentralized_exchange DEX is a good way to distribute trust if you are skeptical of central exchanges handling your trades and private info. A good thing to know it exists. Some exchanges are more designed with your data privacy in mind, some saving only necessary transaction data locally on your machine. https://bisq.network/faq/ Is one (DEX) D.ecentralized EX.change that uses P2P over Tor for its nodes. Take it with some salt but THIS got me hard: "Bisq does not hold any bitcoins. All are held in multisignature addresses rather than a Bisq-controlled wallet. National currency is transferred directly from one trader to the other. Bisq uses a peer-to-peer network over Tor. This means there are no servers to be hacked or DDoS'd. Bisq does not know traders. No data is stored on who trades with whom. Bisq does not require registration. This means privacy is maintained, there are no “approval” wait times, and identity theft is impossible. Bisq is not a company. It is an open-source project organized as a Decentralized Autonomous Organization (DAO)." Aside from legitimate activities, money laundering shouldn't just be for the rich. All citizens should have the same opportunities to break the law or we get corrupt stagnation. You should however realize that it is up to you to find the best means to convert your funds into what you "NEED" and not live beyond your means. Be wise.
there is literally no reason to use a commercial vpn when there is so many other options
>>1097 >no reason With most free vpn, you are the product that's for sale. Not to say paid services don't ever sell data, I assume they do later in their life cycle
>>1098 Why not host a VPS at that point?
useful bread needza BOOMP
page 9 Bump
F. 'ZX'-,, VGZ
>>1014 >I always look at products/services this way: if it's being shilled in the strangest of places by dozens upon dozens of people or through dozens upon dozens of outlets, it's likely either a shit product/service or Jew-influenced to hell and back. That and if the deal/price is too good to be true, it probably is. so much this
(24.25 KB 255x218 Kikebusters.jpeg)
(70.42 KB 360x361 Say No To Kike Bait.png)
>no one mentions that Nord is obvious as fuck purely because it was allowed to be openly shilled on jewgle I may not be a tech wizard, but it's obvious to me that nothing on jewgle is going to be good for you.
>>983 Never get a VPN using your real info. Sure, the VPN service might says it doesn't keep logs. But what they don't tell you is that they don't keep logs on YOUR machine, but I am sure they are logging your activities on their servers. Pro-tip: If you have to give out your real info, you aren't maintain anonymous.
>>1104 Nord sucks. I used once then cancelled my suscription because it kept pointing to US nodes when I specifically told it not to.
>>1073 Tor used to be cool, but then it got glowniggered. Be careful when using Tor as their nodes are monitored by glowies
I use SoftEther and Ultrasurf. I basically stack the 2 VPNs. I know this is probably a retarded method. Any suggestions?
yes, which is why you should use McDonald's wifi or tor

Delete
Report


no cookies?