• 8 Posts
  • 30 Comments
Joined 1 year ago
cake
Cake day: May 19th, 2025

help-circle
  • While this is certainly true, I’d like to highlight the difference between privacy and anonymity. Kagi is worse because they require payment information (though there is an option which attempts to separate your payment from your searches), but they are better because their privacy policy is better. If you don’t trust the service itself, whether because of its location or any other reason, then you need to be paying in cash or monero, using free services. In both of those cases though, you also need to ensure you don’t deanonymize yourself in other ways. In other words, pay if you don’t want to think about too much, and you more or less trust the company.










  • For the sake of accuracy: Incoming emails from external services are initially not encrypted. It’s only truly zero knowledge for either emails sent by another tuta user, or for emails that have already been received.

    That being said, they don’t record this information unless specifically required by a court order, which to my knowledge has never happened. I understand that they make the decision of whether your account is spam within 48 hours, and after that it is in the clear. I created my account over Tor, didn’t use it much at all for the first few days, and have been using it fine since. That’s only one data point of course.



  • I’m not entirely sure what you’re trying to say here. To clarify, telegram uses a store-forward architecture, meaning that it deletes messages from the server once they have been received by everyone. Until that time, the messages are stored on the server in plaintext, unless you’re using a secret chat. They do this to avoid having to exchange keys between different clients, but what that really means is that it isn’t actually private most of the time.









  • This exists in Canada, and it’s called jmp.chat. They use jabber, rather than simpleX, but they will optionally provide a server, which you could then bridge to your own server without needing port forwarding or anything like that.

    They do take payments in monero, but for some reason you can’t create an account with only monero unless you contact support first…and they don’t do support by email, only phone/sms and jabber. There are public jabber servers, so it should be entirely possible, just inconvenient. They also take payment by mail, which I think includes cash.

    I’m not sure the logistics of using jmp.chat outside of Canada, but I know it is somewhat possible to do in the US. Of course, there’s nothing forcing you to actually be in the same area as the service, but people who live in the same area as you might question the +1 phone number, and might get charged more by their provider.


  • First off, I would be careful around browser-based VPNs, especially free ones. If it’s in the browser it’s often just a proxy (as opposed to wireguard or openvpn), which is potentially bad for normal functionality or privacy. Also, if it’s a free service then it almost certainly collects your data itself, and won’t necessarily be allowed by sites either.

    That being said, there are two ways to layer the two type of tunnels:

    Connecting to the VPN first is relatively common. This means that your ISP can’t see you connecting to Tor. Furthermore, VPNs are designed to tunnel your entire system, while Tor generally is not. Thus, you can have some traffic that is merely VPN protected and some that runs through the Tor network as well. In this situation my ISP knows which VPN provider I use, my VPN provider knows (1) my identity and (2) my network activity outside of Tor, and sites that I visit can only see that I use Tor.

    The other direction is to connect first to Tor, and tunnel the VPN connection through there. This is very much not intended: Tor only tunnels TCP, while most VPN protocols use UDP (only, or more efficiently). The reason is that it’s actually quite difficult to hide your identity from your VPN provider. If the VPN is the innermost tunnel, then that means that it has access to all your network traffic. I’ll assume that all of it is encrypted with TLS (but be careful because a single error is bad). Then, the VPN only knows which domains you visit, how long, how much data, and at what times. This is still quite significant. Then there’s the issue of payment. If you choose a free service, it almost certainly means it’s selling your data. I will say that this is better than most other uses for free VPNs, but it’s still pretty sketchy. If you’re paying, then you need one which accepts payments in monero (or zcash or another private cryptocurrency) or cash by mail.

    Overall, Tor over VPN is relatively normal. I use this configuration regularly. VPN over Tor is highly unusual, and you should consider if you need it. If you need a recommendation for a VPN though, Mullvad supports both monero and cash by mail (sweden), and is generally a good all around VPN (as long as you don’t need port forwarding). One final thing to note: If for some reason you want to use a VPN on both sides, do not use the same VPN, even with separate accounts. Probably, they won’t check, but at that point you might as well just use straight Mullvad VPN.


  • One thing that’s worth keeping in mind: physical retailers may have cameras, but they (in general) rotate their recordings and don’t provide an API for law enforcement. By contrast, any data that an online service gets is probably stored forever, possibly across multiple companies. If you do pick up the online package at a physical store, then you’re losing most of the benefits, so you also need to provide an address.

    That being said, much of China and some of the US have significant outdoor surveillance camera networks. These usually do provide law enforcement with real time, AI search, and may keep recordings for a very long

    For me, as a Canadian, I’d consider physical stores more private, maybe putting on generic clothing and a mask if it’s really important. If your city has its own surveillance system, that might be different for you. Though really, in that case, you should be more concerned about pushing for the cameras to be removed, or failing that looking into moving elsewhere: it is not sufficient to have privacy only online, only from major storefronts.