SimplifiedPrivacy.com's avatar
SimplifiedPrivacy.com
npub14slk...t5d6
Give me Liberty, or Give me Death. HydraVeil is our Revolutionary New Linux app that allows you to create different isolated profiles, to resist AI Browser Fingerprinting from Cloudflare & Big Tech. Another feature of HydraVeil is routing your traffic though your choice of WireGuard or a Tor->Socks5 proxy (to evade Tor blocks), and to fool CDN packet speed tracing with different IPs for each profile. Additionally, we provide VPN service for Android, iPhone, Windows, Mac, and Routers. Tune in to our Podcast to combat Big Tech surveillance. Help me, help you. Hashtags: #Cypherpunk, Open source, #Linux, DeGoogled Phones, self-hosted services, #Monero, #Security, and more!
A real genius is able to explain complex concepts in the most basic terms. So don't ever be intimidated when you're trying to learn. If the guy can't make it sound simple, then he really is retarded.
FBI extracted deleted Signal messages, even after the app was uninstalled. When Signal messages arrive, iOS stores push notification previews locally on the device. In this case, those previews stayed behind even after Signal was uninstalled. - Only incoming messages were captured this way - Disappearing messages that had already vanished inside Signal were still recoverable from the notification cache -This is iOS behavior, not a Signal vulnerability. And likely impacts other ALL apps on iOS. The quick fix, to turn it off: Signal → Settings → Notifications → Show → set to "No Name or Content" You'll still get a notification ping, but iOS just won't cache anything useful. The real fix: Switch to GrapheneOS The original 404media source is paywalled, https://cybernews.com/security/fbi-extracts-signal-messages-from-suspect/
Top 6 Android Privacy Tips 6) Don't use or give out your SIM card's real phone number. Instead, use VoIP (internet -to-> regular phone) with a VPN. This appears in calls or texts to be a regular number, but hides your location from the cell tower. Only use your real underlying SIM card for getting data. 5) Don't literally buy the phone in your real name. The IMEI hardware identifier then is following you around, and defeats the purpose of VoIP. We offer Pixel phones prices below Google's official store for Monero or Bitcoin. It can then eSIM with digital crypto plans, or cash for a physical SIM. 4) Use a burner Crypto Service for account sign-ups. We now have a new SMS exchange where you can get non-VoIP P2P confirms, that appear to the service as a random number. This avoids you paying a monthly fee (it's a single time), bypasses restrictions, and seperates each account from you, your SIM, or the VoIP you talk to your family/friends on. And best of all, there's options to restore it later on in an emergency. See SimplifiedPrivacy.net 3) See if your bank offers YubiKey. Bank of America allows you to declare you're "going abroad" and switch from SMS confirm, to YubiKey. But they never check if you actually leave. This means you can avoid maintaining a real SMS line to bypass their VoIP tests. If you buy an SMS Zelle confirm from the exchange, then the seller can't access your bank account without both the password and the yubikey sign. That's wayy more secure than even an SMS line you own. 2) Abuse Shared Cell Tower IPs When you connect to a cell tower, you're sharing the same IP address as every other user of that tower. This means even if your VPN is really logging, or compromised by memory dumps at the datacenter, there is still an anonymity pool. As our previous content has repeated, Mullvad is Sweden, has really no ability to stop M247's US servers from a memory dump. Their "in memory" routine is really propaganda, if being in memory is the problem itself. But when you use a VPN on your home ethernet, the VPN provider can identify you and you alone. If you re-use that same VPN subscription when you're at home (only your household on that IP), and when you're on the tower (sharing it with your entire city), you undo the magic of celltower's shared IPs. That's why I'm so excited about the 1.5 euro quick burner plans from our VPN with accomplished Nostr-verified operators. The web panel could not make it faster or easier to use Monero or Bitcoin, and get an isolated sub for mobile. And you could even use one operator for your home like a router, and another for android. You only need one location for a router! See web.hydraveil.net 1) Switch to a Degoogled OS You really can't get meaningful privacy if your entire operating system is compromised. By default both iPhone and stock Android do Wifi triangulation and Apple/Google share the notifications with the US government. I hate to give you the bad news, but it kinda defeats the purpose of freedom tech, if the government and Big Tech are the ones who really own your Bitcoin and Nostr keys. You heard the saying "All your base belong to us"? He was talking about stock Google. Master Yoda said in the Last Jedi, "Pass along what you have learned". I word it, "When you explain a concept, you actually learn it. Repost this so you can easily find it and act on it."
LinkedIn makes more money selling your data, than the job posting fees. Even if your full real name is on LinkedIn, you want to avoid giving them your SIM card's real underlying phone number. Because then you're handing over to all these aggregated cross-service data brokers, what other services (that aren't in your real name) you sign up for, and what you do on those. And you're handing over to the government, the full metadata of where you are 24/7, who you're standing near, and who you talk to and what you say on that number. But LinkedIn will reject VoIP numbers, and most "crypto confirm" services will be detected. Because they buy a block of numbers, and are often labeled "landline" on APIs. That's why I'm so excited about the new P2P SMS Exchange we made (Simplified Privacy). Not only does it filter out sellers using VoIP with multiple API checks, but the numbers appear to services (such as LinkedIn) as a random number. There is no relationship between one seller's number and another. Try it out for Monero or Bitcoin Lightning,
Main website got a beautiful remake. It now more clearly differentiates between our original projects and promoting/reviewing third party tools as part of a comprehensive educational center. It also looks less like some guy's blog, and more like it is, a team effort creating the bleeding edge of freedom tech. Let me know what you think.  bitching and complaining is welcome.
A bunch of minor GUI bug fixes isn't that sexy an update. But it has to get done. So if you were one of the users complaining, I'm delivering on the promise, HydraVeil 2.2.6 Sha256sum, 084e265a31c4c7ecd9737e1459f29f36e3375ba9076b6bac475601886da904a2
The new Iceland server is super fast and low "fraud score" IP address. Now Simplified Privacy is only directly running 3 of the 8 locations. That gives you plenty of options for one operator systemwide, and another for the browser fingerprint. Wayy faster than Tor, no javascript restrictions, cookies saved, and no IP address blocked. Try it out for 1.5 euros in monero/lightning. View quoted note →
!! The SMS Exchange is now officially open for buyers !!! We got sellers from the USA, Colombia, Ukraine, & more. You can get a non-VoIP SMS confirmation to register any account privately, for Monero or Bitcoin Lightning. It could be social media like Youtube/Twitter, messengers like Signal/Telegram/WhatsApp, business accounts like Yelp, or even financial accounts like Zelle/Paypal. How it works is: you get matched with a seller by your choice of service/country, and it serves you the number, and if you want a burner email. If it doesn't work, then the buyer gets 3 disputes, which triggers a match to a new seller and number. If it does work, you have the option to "restore", which means paying again but skipping the matching process, and getting that same seller/phone number again. So if you lie, and falsely dispute, you lose the right to restore later in an emergency. This is on the dot net domain: Or Tor Onion: http://privacyoyec4fmxxxuvysrg6ljna6blgotauud3rkvrtiavfbvyuagad.onion/
Want to earn Bitcoin or Monero without KYC? A big problem with digital privacy, is that some services require SMS registration, and many times block VoIP numbers.. Even worse, there are Crypto “SMS-confirm” services that buy blocks of phone numbers, but once Big Tech's security vendors find out what the block is, the entire block may get banned or labeled VoIP. Leaving many privacy-conscious users feeling frustrated and isolated from parts of the internet. But not everybody wants to be anonymous. Some people don't care that much. What if there was a way that those who don't care that much, could sell their phone number to those who do? That's why I'm excited to present to you a huge new project from Simplified Privacy, the SMS Exchange. You can register as an SMS seller, and get notifications via your pick of SMS, Telegram, XMPP, or Session. You reply to an automated system with the SMS registration code, and boom, you earn your favorite cryptocurrency in a few seconds. Not only can these surveillance firms not stop a guerrilla P2P market like this, but it's a huge step forward for the circular parallel economy, to never be dumping Bitcoin or Monero on an Exchange, in order to pay for blocks of phone numbers. Instead, this is an opportunity for some savvy cats to on-ramp without KYC. And even pay for their phone bills with an easy side hustle. I encourage you to check out this extremely short article with some of the details, and consider reposting this so we can help the Nostr economy succeed.
Google's official store is doing $200 off on the Pixel 10, until the end of the month. So their price of 799 is knocked down to $599. [1] Simplified Privacy can go down to $540 on a Pixel 10, 128G storage. That's brand-new, with GrapheneOS, a case, and charger included. And on top of that, we can even throw in 3-months of VPN service, for free. In fact, our prices are so affordable, that some fear sending cryptocurrency from a scam. And that's why we just renewed our security deposit with XMRBazaar. This provides scam protection to you, while shielding you/us from data inquires. Bazaar Listing: Google Official: [1] https://store.google.com/us/product/pixel_10?hl=en-US
Dear Iceland VPN users, We are doing a peaceful server transition, (defined as no interruption in service). The new one and old one will both online for the next days 9, after which the old one will stop working. This new provider is faster & should better meet your needs. If you're using HydraVeil it will automatically renegotiate if you delete your wg.conf. For android or routers, please use the web panel at web.hydraveil.net
We are adding more nodes, and looking for operators. If you're interested in promoting Nostr, Linux, Bitcoin, Monero, open-source, Security, Parallel economies, and of course Privacy, even when they want to prevent you from being private, reach out. View quoted note →
New Update! Many misunderstand screen size fingerprinting. They assume that when a website fingerprints their browser, that it merely gets the display 'category', such as '1200x800'. But in reality, it gets your unique size down to the pixel, such as 1202x799. Each window will fill the display slightly differently, which absolutely can (and is) tracked across services. In 2024 with version 1.64, Brave completely deprecated screen size fingerprinting, because it so frequently broke websites. Which is exactly what I'm screaming about, that modern web browsers force you to pick between privacy and functionality. image Tor Browser attempts to hide unique screen sizes by blocking and restricting Javascript, which causes services such as Google, Reddit, and Cloudflare to haze you. That's why I'm excited about HydraVeil's feature to instantly create a new display, that realistically looks to websites like the browser window is your computer's full screen dimensions. Here we can see deviceinfo-me compare Tor Browser to HydraVeil's profiles, and it does not percieve it to be spoofed. image But many HydraVeil users have complained that they don't want to deal with smaller windows. And that's why I'm excited about our new update today. We are proud to present a new 'dynamic mode' for quick profile creation, which when enabled, presents many screen size options that are only slightly smaller than your host, in 50 dimension increments. This allows the user to effortlessly and conveniently get profiles that comfortably fill up their host’s display window, but each one is slightly different to fingerprinters. image Learn more from our release notes: HydraVeil v2.2.5 SHA256 SUM: eed46e20d1e8c8519030169fb931054e6b44abb09e499e2ad8107946718d5c5e
Huge thanks to Zenaku. -Designed the Simplified Privacy website -Designed the HydraVeil site -Designed the Podcast page -Designed the HydraVeil GUI & Logos -Lead Dev behind ArWeb After the last 2 years, I trust him with my life. So you should be fine to route traffic. View quoted note →