Deleted by creator
permalink
report
reply

Your only option is to have it based in a country that doesn’t cooperate with the US and ensure MITM isn’t possible.

permalink
report
parent
reply
6 points

Got any examples or places I can go to read more?

permalink
report
parent
reply
6 points

There is a wide scope of “cooperation with US”, from extradition treaties (so the US could demand the operator be legally extradited & jailed as opposed to kidnapped) to mutual legal assistance treaties (police collaboration), to “cybersecurity agreements”. And the US military/economic strength (such as their control of SWIFT or the widespread military and “intelligence” apparatus) means very few countries won’t cooperate. The US does not follow international law unless it wants to. US most often collaborates with EU & Anglosphere countries (UK “commonwealth” countries).

Comparison of NSA spying collaboration (known) https://restoreprivacy.com/5-eyes-9-eyes-14-eyes/ NSA are also interested in undersea cable wiretapping: https://www.vice.com/en/article/wnnmv9/undersea-cable-surveillance-is-easy-its-just-a-matter-of-money https://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/

MLAT data: https://web.archive.org/web/20180325141949/https://www.mlat.info/

Extradition: https://qz.com/97428/map-how-to-stay-out-of-reach-of-us-extradition-treaties/ Note that they could probably use a third country that has treaties with both the US and the country where the operator is located.

The NSA also works to gather information before it is encrypted, or to weaken random number generators and encryption schemes. https://www.schneier.com/blog/archives/2013/09/good_summary_of.html https://www.zdnet.com/article/has-the-nsa-broken-ssl-tls-aes/ https://www.schneier.com/blog/archives/2012/03/can_the_nsa_bre.html Intel ME is a good example, also keyloggers, hardware surveillance devices. https://news.softpedia.com/news/intel-x86-cpus-come-with-a-secret-backdoor-that-nobody-can-touch-or-disable-505347.shtml Intel ME can be set to disable (ironically thanks to NSA), but since it’s proprietary, you can’t be certain. AMD and other chip makers likely have similar subsystems. https://privacysos.org/blog/did-this-tor-developer-become-the-first-known-victim-of-the-nsas-laptop-interception-program/

Oh and NSA is allowed to share with FBI. https://www.rt.com/usa/373644-new-rules-access-nsa-data/

permalink
report
parent
reply

Hmm depends on which part you want to read more about.

Basically you want to avoid 14 eyes+ countries, basically any country that you think would be friendly to US requests for data. China might be the best option.

I personally just don’t out anything I wouldn’t want anyone to read in email.

For MITM that means you need e2e encryption. This way, your email sending service can’t read the contents of your emails even though you’re sending them to them to pass on to the recipients’ servers.

permalink
report
parent
reply
33 points

Been wondering lately if the folks who tell us shit like “we don’t log your IP” are instead keeping a hash of the IP, which a dedicated actor (like a state intelligence apparatus, or law enforcement) could probably combine with other sources to out you.

permalink
report
reply

The IPv4 address space is small enough where hashing is effectively useless. Though a bigger concern IMO is DDOS mitigation services like Cloudfare. It doesn’t matter if websites log or not if half of the internet is using the same reverse-proxy service.

permalink
report
parent
reply
26 points

DDOS mitigation services like Cloudfare

Hexbear using Cloudflare

:side-eye-1: :side-eye-2:

permalink
report
parent
reply

Lol if it makes you feel any better it’s basically impossible to be anonymous on the internet anymore, so we’re fucked anyway

permalink
report
parent
reply
7 points
*

Been wondering lately if the folks who tell us shit like “we don’t log your IP” are instead keeping a hash of the IP, which a dedicated actor (like a state intelligence apparatus, or law enforcement) could probably combine with other sources to out you.

Good thing this site is open source so we don’t have to wonder.

permalink
report
parent
reply
6 points

Not everyone can read code, comrade.

permalink
report
parent
reply
7 points
*

Well yeah, of course. Otherwise there’d be more of us here who could build cool shit. My point is that it’s all there for anyone to vet who has put in the time to learn how.

@LeninWeave linked to a good example of when we’ve noticed stuff and brought it to the devs / admins: https://hexbear.net/post/127316

If you’ve got any proof hexbear is hashing all the IPs of everyone and storing them, then please make a post about it because I think we’d all want to know.

permalink
report
parent
reply
6 points
*
Removed by mod
permalink
report
parent
reply
7 points

You should wonder less and think more.

Simply epic, sir

permalink
report
parent
reply
21 points
*
Deleted by creator
permalink
report
reply
Deleted by creator
permalink
report
parent
reply
8 points
*

Yeah, what’s weird is that they were advertising that they wouldn’t do something that they then went and did.

permalink
report
parent
reply
Deleted by creator
permalink
report
parent
reply
4 points

100% agree.

Rick Falkvinge, Pirate Party cofounder, had a good article making this point. https://falkvinge.net/2017/12/09/privacy-promises-company-worth-nothing-companies-cant-promise-anything/

permalink
report
parent
reply
Deleted by creator
permalink
report
parent
reply
6 points

Why don’t we just use Chinese or Russian services?

permalink
report
parent
reply

Is there an alternative that is better?

doing everything in plain sight, and possibly getting some type of software that makes random internet activity to make even more cluttered data to sift through

it’s just common sense, using a VPN basically screams “hey I’m not a normie and I have something to hide”. Now you’ve cut down their work by 95%, because only 5% of people use VPNs at all

permalink
report
parent
reply
19 points

Trusting a company to be truly secure is, unfortunately, a terrible idea. They exist in a world where they can be compelled to cooperate or be shut down. They’ll make the choice that continues to make some money.

Also any claim of no logging may as well be marketing nonsense. There’s no way to verify it, logs have to be kept to some extent atleast for a little while to allow functionality, and adversaries may compel or compromise and thus create logs.

permalink
report
reply
15 points

:france-cool:

permalink
report
reply

news

!news@hexbear.net

Create post

Welcome to c/news! Please read the Hexbear Code of Conduct and remember… we’re all comrades here.

Rules:

-- PLEASE KEEP POST TITLES INFORMATIVE --

-- Overly editorialized titles, particularly if they link to opinion pieces, may get your post removed. --

-- All posts must include a link to their source. Screenshots are fine IF you include the link in the post body. --

-- If you are citing a twitter post as news please include not just the twitter.com in your links but also nitter.net (or another Nitter instance). There is also a Firefox extension that can redirect Twitter links to a Nitter instance: https://addons.mozilla.org/en-US/firefox/addon/libredirect/ or archive them as you would any other reactionary source using e.g. https://archive.today . Twitter screenshots still need to be sourced or they will be removed --

-- Mass tagging comm moderators across multiple posts like a broken markov chain bot will result in a comm ban--

-- Repeated consecutive posting of reactionary sources, fake news, misleading / outdated news, false alarms over ghoul deaths, and/or shitposts will result in a comm ban.--

-- Neglecting to use content warnings or NSFW when dealing with disturbing content will be removed until in compliance. Users who are consecutively reported due to failing to use content warnings or NSFW tags when commenting on or posting disturbing content will result in the user being banned. --

-- Using April 1st as an excuse to post fake headlines, like the resurrection of Kissinger while he is still fortunately dead, will result in the poster being thrown in the gamer gulag and be sentenced to play and beat trashy mobile games like 'Raid: Shadow Legends' in order to be rehabilitated back into general society. --

Community stats

  • 198

    Monthly active users

  • 20K

    Posts

  • 428K

    Comments