Clark

joined 1 month ago
[–] Clark@lemmy.ml 3 points 4 days ago* (last edited 4 days ago)

He sees through flesh and rock. He is straining on human kind.

[–] Clark@lemmy.ml -5 points 1 week ago* (last edited 1 week ago) (1 children)

With all that money against leftists, leftists couldn't race head to head with the right wing in the USA. So I don't think they are against you either.

18
submitted 1 week ago* (last edited 1 week ago) by Clark@lemmy.ml to c/privacy@lemmy.world
 

Hello, you see the 2 cameras at the top seeing all the way to the house and balconies of neighbours. His door is seen at the bottom right. Shouldn't the cameras only see the entrance? What can I do about it? He even sends pictures to neighbours showing people approaching his house and asking the reason because these cameras are sensitive to motion with night vision. Can you help me please? One option is to use ir or blue lasers to destroy the camera. The other is to go to municipality but he can evade it saying "I use them for my house personally". Obviously it is a lie as the cameras see everywhere except his house.

[–] Clark@lemmy.ml 1 points 2 weeks ago

Nym pays users to be a relay as far as I know. There are 5 relays or 2 relays with your preference (depends on the speed and security you want). Maybe they own some servers that I don't know but their encryption techniques are quite advanced. There are articles on their websites that they cannot log anything.

[–] Clark@lemmy.ml 2 points 3 weeks ago

Sorry, you are right. But what I meant was it is very hard to deanonymize and monitor users of NymVPN. Tor network can be however monitored by NSA although chances are small that you will be deanonymized. And unlike Tor, NymVPN can offer 5 relays, which makes the chances that nodes can collaborate to deanonymize you to almost zero. Correct me if I'm wrong.

[–] Clark@lemmy.ml 1 points 3 weeks ago* (last edited 2 weeks ago) (2 children)

Why don't you use a decentralized VPN like NymVPN? It's impossible for the company or anyone to take logs because your traffic is routed over several nodes. It's like Tor but also adds noise to data and harder to deanonymize

[–] Clark@lemmy.ml 1 points 1 month ago (1 children)

Can you please elaborate on dependencies part? How to analyze them and how to know which package does exactly what in a quick way? Does one need any coding knowledge? Thank you

[–] Clark@lemmy.ml 1 points 1 month ago

I have LineageOS installed on my phone. Without the app InviZible Pro from F-Droid, my phone connects to Google servers for connectivity checks, system webview and time adjustments. The disadvantage in terms of privacy of /e/OS would be the default presence of micro g, which is proprietary. In LineageOS it's not present by default.

[–] Clark@lemmy.ml 5 points 1 month ago* (last edited 2 weeks ago)

Sonalder explained it very well. I just want to emphasize that it's much more private than any other vpn because its impossible for Nym to keep logs.

I also want to add to his comment that it's like Tor network but adds noise to data and harder to deanonymize. As there aren't as many and as fast nodes as in Tor, it's slower. Here is the owners conversation with the Youtuber The Hated One: https://www.youtube.com/watch?v=dVtw-4Eox2E

68
submitted 1 month ago* (last edited 1 month ago) by Clark@lemmy.ml to c/privacy@lemmy.ml
 

Hello all,

According to the Wireshark record my computer connects to various services often, including Amazon, Hetzner, 1337 Services GmbH, Evanzo GmbH and ThomasFamilyInvestments. The most often were the connections to mail.my-mail.rocks which is a part of Netcup GmbH. I have a somewhat minimal distro and the attached recordings were made when no app was open including no browser. I can send the other screenshots showing other connections too. I'm suspecting of malware since some time ago but can you help me clarify these connections please?

view more: next ›