SplinterNet
Android app designed to create an unblockable Twitter like network that uses no cellular or Internet communications. All messages are transmitted over Bluetooth between users, creating a true peer-to-peer messaging system. All messages are anonymous to prevent retaliation by government authorities.
SplinterNet is a true peer-to-peer network in that it requires physical proximity to other people to transmit messages. In the current version this happens over a close range Bluetooth connection. To illustrate how SplinterNet works, here is an example scenario:
You take a picture of a protest happening near your home.
Fearing a spread of the protest the government shuts down cellular and Internet access to most citizens.
You write a short message about the protest in SplinterNet and attach the picture.
When you next meet with your friends, you sync SplinterNet with them. They now have your photo and will spread it to their friends.
You also now have all their messages, which includes photos taken of protests happening in other parts of the country.
Any person who can reach a working Internet connection can post all of these photos to any sharing service or send directly to journalists to publicize.
If you fear capture, you can press a single button and all the messages in your copy of SplinterNet are deleted.
Features
Create a post with text and an optional single image.
Mark posts as important to increase their spread within the network. These posts will be sent first during syncing and will be highlighted for the people you sync with.
Delete posts to stop their spread. The contents of the network reflect what users of the network think is important and appropriate. You don't have to spread anything you don't want to.
Project Status
This is an experimental project still in development. All of the features listed here should work, they just haven't been tested in large networks. Please let us know how it works!
https://raw.githubusercontent.com/megamattron/SplinterNet/master/other/splinterNet-infosheet.png
https://github.com/megamattron/SplinterNet
📡 @nogoolag 📡 @libreware
#SplinterNet #im #messaging #p2p #bt #bluetooth
Android app designed to create an unblockable Twitter like network that uses no cellular or Internet communications. All messages are transmitted over Bluetooth between users, creating a true peer-to-peer messaging system. All messages are anonymous to prevent retaliation by government authorities.
SplinterNet is a true peer-to-peer network in that it requires physical proximity to other people to transmit messages. In the current version this happens over a close range Bluetooth connection. To illustrate how SplinterNet works, here is an example scenario:
You take a picture of a protest happening near your home.
Fearing a spread of the protest the government shuts down cellular and Internet access to most citizens.
You write a short message about the protest in SplinterNet and attach the picture.
When you next meet with your friends, you sync SplinterNet with them. They now have your photo and will spread it to their friends.
You also now have all their messages, which includes photos taken of protests happening in other parts of the country.
Any person who can reach a working Internet connection can post all of these photos to any sharing service or send directly to journalists to publicize.
If you fear capture, you can press a single button and all the messages in your copy of SplinterNet are deleted.
Features
Create a post with text and an optional single image.
Mark posts as important to increase their spread within the network. These posts will be sent first during syncing and will be highlighted for the people you sync with.
Delete posts to stop their spread. The contents of the network reflect what users of the network think is important and appropriate. You don't have to spread anything you don't want to.
Project Status
This is an experimental project still in development. All of the features listed here should work, they just haven't been tested in large networks. Please let us know how it works!
https://raw.githubusercontent.com/megamattron/SplinterNet/master/other/splinterNet-infosheet.png
https://github.com/megamattron/SplinterNet
📡 @nogoolag 📡 @libreware
#SplinterNet #im #messaging #p2p #bt #bluetooth
Forwarded from Barinsta - That App on Android (Austin Huang)
They did a cease & desist on us. We're done. Thank you for your continued support. See the letter.
GitHub
Cease and Desist of Facebook and Instagram - Barinsta · Issue #2 · austinhuang0131/austinhuang0131
Sent by Gallego, Gabriella (Perkins Coie) (GGallego@perkinscoie.com). Created by fire. Dear Mr. Huang, Please open, read, and respond to the attached letter on behalf of Facebook, Inc. Thank you. G...
The Hitchhiker’s Guide to Online Anonymity
💡 TLDR: This is an open-source non-profit detailed and maintained guide on online anonymity (in addition to Privacy/Security). I've been writing/updating it for the past months. It covers Windows/Linux/MacOS/Whonix/TAILS/Qubes OS and more. It's written with hope for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed/censored anywhere!
The whole guide is backed up by many external references (over 500 external references, many of them academic) and is not sponsored by any commercial entity.
The guide is presented in a "book format" (Online ,or PDF with Light and Dark themes) and is quite a long read with over 180 pages of information (not counting the many 500+ external references). But there are ways you can read some parts and not others depending on your interest (and this is also explained in the introduction).
* Project Website: https://anonymousplanet.org
* Mirror: https://mirror.anonymousplanet.org
* Mirror: https://anonymousplanet.github.io/thgtoa/guide.html
* Tor Mirror: http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion
💡 Online Guide:
* Online Version (Dark Theme): https://anonymousplanet.org/guide.html
* Online Version Mirror (Dark Theme): https://mirror.anonymousplanet.org/guide.html
* Online Version Tor Mirror (Dark Theme): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.html
💡 PDFs:
* PDF (Light Theme): https://anonymousplanet.org/guide.pdf
* PDF (Light Theme Mirror): https://mirror.anonymousplanet.org/guide.pdf
* PDF (Light Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.pdf
* PDF (Dark Theme): https://anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Mirror): https://mirror.anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide-dark.pdf
💡 Changelog:
* https://anonymousplanet.org/CHANGELOG.html
* https://mirror.anonymousplanet.org/CHANGELOG.html
* http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/CHANGELOG.html
💡 Archives:
* Archive.org: https://web.archive.org/web/https://anonymousplanet.org/guide.html
* Archive.today: https://archive.fo/anonymousplanet.org/guide.html
* Archive.today over Tor: http://archivecaslytosk.onion/anonymousplanet.org/guide.html
* Cryptpad.fr: https://cryptpad.fr/drive/#/2/drive/view/Ughm9CjQJCwB8BIppdtvj5zy4PyE-8Gxn11x9zaqJLI/
Feel free to share and contribute through the repository at https://github.com/AnonymousPlanet/thgtoa
👉🏼 Follow me on:
* Mastodon: https://mastodon.online/@anonypla
Any constructive opinion/idea/criticism is welcome if you spot any issue. Many changes have been done based based on suggestions from redditors. Don't be too harsh tho. Remember it's still a "work in progress" draft.
📡 @NoGoolag 📡 @Libreware
#guide #anonymity #privacy #anonymousplanet
💡 TLDR: This is an open-source non-profit detailed and maintained guide on online anonymity (in addition to Privacy/Security). I've been writing/updating it for the past months. It covers Windows/Linux/MacOS/Whonix/TAILS/Qubes OS and more. It's written with hope for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed/censored anywhere!
The whole guide is backed up by many external references (over 500 external references, many of them academic) and is not sponsored by any commercial entity.
The guide is presented in a "book format" (Online ,or PDF with Light and Dark themes) and is quite a long read with over 180 pages of information (not counting the many 500+ external references). But there are ways you can read some parts and not others depending on your interest (and this is also explained in the introduction).
* Project Website: https://anonymousplanet.org
* Mirror: https://mirror.anonymousplanet.org
* Mirror: https://anonymousplanet.github.io/thgtoa/guide.html
* Tor Mirror: http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion
💡 Online Guide:
* Online Version (Dark Theme): https://anonymousplanet.org/guide.html
* Online Version Mirror (Dark Theme): https://mirror.anonymousplanet.org/guide.html
* Online Version Tor Mirror (Dark Theme): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.html
💡 PDFs:
* PDF (Light Theme): https://anonymousplanet.org/guide.pdf
* PDF (Light Theme Mirror): https://mirror.anonymousplanet.org/guide.pdf
* PDF (Light Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.pdf
* PDF (Dark Theme): https://anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Mirror): https://mirror.anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide-dark.pdf
💡 Changelog:
* https://anonymousplanet.org/CHANGELOG.html
* https://mirror.anonymousplanet.org/CHANGELOG.html
* http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/CHANGELOG.html
💡 Archives:
* Archive.org: https://web.archive.org/web/https://anonymousplanet.org/guide.html
* Archive.today: https://archive.fo/anonymousplanet.org/guide.html
* Archive.today over Tor: http://archivecaslytosk.onion/anonymousplanet.org/guide.html
* Cryptpad.fr: https://cryptpad.fr/drive/#/2/drive/view/Ughm9CjQJCwB8BIppdtvj5zy4PyE-8Gxn11x9zaqJLI/
Feel free to share and contribute through the repository at https://github.com/AnonymousPlanet/thgtoa
👉🏼 Follow me on:
* Mastodon: https://mastodon.online/@anonypla
Any constructive opinion/idea/criticism is welcome if you spot any issue. Many changes have been done based based on suggestions from redditors. Don't be too harsh tho. Remember it's still a "work in progress" draft.
📡 @NoGoolag 📡 @Libreware
#guide #anonymity #privacy #anonymousplanet
🔥1
Rclone Remount
Remount cloud storage locally during boot via rclone & fusermount directly on your Android powered smart device.
Virtually limitless storage expansion with support for dozens of cloud providers including Dropbox, GDrive, OneDrive, SFTP & many more. Extremely useful for devices without physical storage expansion capabilities. Also great for streaming large media files without need for full caching. Binaries compiled using Termux.
Features:
Support for arm, arm64, & x86
Huge list of supported cloud storage providers
Apps with ability to specify paths can access /mnt/cloud/
Most file explorers work just fine (issue #9)
Mount points use names of remote(s) in rclone.conf
Specify custom rclone params for each remote via /sdcard/.rclone/.REMOTE.param
Access remotes via http://127.0.0.1:38762
Access remotes via ftp://127.0.0.1:38763
Mount bind to /sdcard/ (see issue #5)
Support for Work Profiles
https://github.com/Magisk-Modules-Repo/com.piyushgarg.rclone
#rclone #remount #cloud #alternatives
Remount cloud storage locally during boot via rclone & fusermount directly on your Android powered smart device.
Virtually limitless storage expansion with support for dozens of cloud providers including Dropbox, GDrive, OneDrive, SFTP & many more. Extremely useful for devices without physical storage expansion capabilities. Also great for streaming large media files without need for full caching. Binaries compiled using Termux.
Features:
Support for arm, arm64, & x86
Huge list of supported cloud storage providers
Apps with ability to specify paths can access /mnt/cloud/
Most file explorers work just fine (issue #9)
Mount points use names of remote(s) in rclone.conf
Specify custom rclone params for each remote via /sdcard/.rclone/.REMOTE.param
Access remotes via http://127.0.0.1:38762
Access remotes via ftp://127.0.0.1:38763
Mount bind to /sdcard/ (see issue #5)
Support for Work Profiles
https://github.com/Magisk-Modules-Repo/com.piyushgarg.rclone
#rclone #remount #cloud #alternatives
GitHub
GitHub - Magisk-Modules-Repo/com.piyushgarg.rclone
Contribute to Magisk-Modules-Repo/com.piyushgarg.rclone development by creating an account on GitHub.
👍1
Best Open Source Slack Alternatives for Team Communication
https://itsfoss.com/open-source-slack-alternative/
Zulip: An Interesting Open-Source Alternative to Slack
https://itsfoss.com/zulip/
@itsfoss_official
#slack #collaboration #teams #sw #alternatives
https://itsfoss.com/open-source-slack-alternative/
Zulip: An Interesting Open-Source Alternative to Slack
https://itsfoss.com/zulip/
@itsfoss_official
#slack #collaboration #teams #sw #alternatives
It's FOSS
Ditch Slack With These Open Source Team Chat Tools
Here, we shall take a look at the best open source slack alternatives that you can choose to communicate with your team at work.
Did I just stumble onto a Spotify replacement?
Official Community | Telegram Channel |Telegram Chat Odysee | Hive | Minds
Today in my research for the open-source survival library, I found Nuclear - a music streaming program which pulls from multiple free sources. Check it out.
https://nuclear.js.org/
I'm quite enjoying the experience, I was able to add my favorite albums to a playlist in less than a few minutes.
The open-source survival library releases with 40+ incredibly useful open-source applications for users on all platforms. Don't miss it, sign up to our email list on takebackourtech.org
Join our official groups:
@takebackourtech
@takebackourtech_chat
Official Community | Telegram Channel |Telegram Chat Odysee | Hive | Minds
Today in my research for the open-source survival library, I found Nuclear - a music streaming program which pulls from multiple free sources. Check it out.
https://nuclear.js.org/
I'm quite enjoying the experience, I was able to add my favorite albums to a playlist in less than a few minutes.
The open-source survival library releases with 40+ incredibly useful open-source applications for users on all platforms. Don't miss it, sign up to our email list on takebackourtech.org
Join our official groups:
@takebackourtech
@takebackourtech_chat
Spotfy.one – Privacy-aware and login-free Spotify clone
https://spotfy.one
This directly plays embedded YouTube videos by searching videos from metadata without even a proxy
Not privacy aware, but an alternative way to play songs from YouTube
You can rather play videos from newpipe with background playback
#SpotfyOne #spotify
https://spotfy.one
This directly plays embedded YouTube videos by searching videos from metadata without even a proxy
Not privacy aware, but an alternative way to play songs from YouTube
You can rather play videos from newpipe with background playback
#SpotfyOne #spotify
Android Tool
Program to manage control Android devices with Fastboot and ADB
Main Features:
Batch and single app installation (.apk files)
Disable, enable or uninstall system apps
Open, force stop or clear data of your apps
Receive and save logs from your device
Install or boot custom recovery or wipe partitions
Save apps list
Always relevant links to firmware and everything you need
And more
https://github.com/fast-geek/Android-Tool
Download - https://github.com/fast-geek/Android-Tool/releases
Telegram channel - @android_tooI
Telegram chat - @android_tooI_chat
4PDA thread - https://4pda.to/forum/index.php?showtopic=1000362
📡 @NoGoolag 📡 @Libreware
#adb #fastboot
Program to manage control Android devices with Fastboot and ADB
Main Features:
Batch and single app installation (.apk files)
Disable, enable or uninstall system apps
Open, force stop or clear data of your apps
Receive and save logs from your device
Install or boot custom recovery or wipe partitions
Save apps list
Always relevant links to firmware and everything you need
And more
https://github.com/fast-geek/Android-Tool
Download - https://github.com/fast-geek/Android-Tool/releases
Telegram channel - @android_tooI
Telegram chat - @android_tooI_chat
4PDA thread - https://4pda.to/forum/index.php?showtopic=1000362
📡 @NoGoolag 📡 @Libreware
#adb #fastboot
The EFF launched an apk downloader that scans for malware.
https://www.eff.org/deeplinks/2021/09/introducing-apkeep-eff-threat-labs-new-apk-downloader
https://github.com/EFForg/apkeep
📡 @NoGoolag 📡 @Libreware
#apkeep #apk
https://www.eff.org/deeplinks/2021/09/introducing-apkeep-eff-threat-labs-new-apk-downloader
https://github.com/EFForg/apkeep
📡 @NoGoolag 📡 @Libreware
#apkeep #apk
Electronic Frontier Foundation
Introducing “apkeep,” EFF Threat Lab’s new APK Downloader
To track state-sponsored malware and combat the stalkerware of abusive partners, you need tools. Safe, reliable, and fast tools. That’s why EFF’s Threat Lab is proud to announce our very own tool to
Forwarded from Beechat Network
With the Beechat Clip in late stages of development, we would like to invite everyone to share their questions and comments in our Telegram chat. See you there! https://t.me/joinchat/BqWmuLmQ9LcxOTk8
Be careful for #MicroG users: Current version is NOT secure for login with your Google Account. It will show your email/password in cleartext in logcat.
It doesn't matter if you have root or not, you only need logcat access to exploit it.
Check the issue here
https://github.com/microg/GmsCore/issues/1567
It doesn't matter if you have root or not, you only need logcat access to exploit it.
Check the issue here
https://github.com/microg/GmsCore/issues/1567
GitHub
GmsCore leaking Google account password on login · Issue #1567 · microg/GmsCore
Describe the bug On login, there are logs with D tag from GmsAuthLoginBrowser shows my Google account mail address and password. It even shows up when adb is run without root, which is not good for...
Briar 1.3.8 release today
https://briarproject.org/news/2021-briar-1.3-released/
Official Briar fdroid repository:
https://briarproject.org/fdroid/repo/?fingerprint=1FB874BEE7276D28ECB2C9B06E8A122EC4BCB4008161436CE474C257CBF49BD6
#briar #im #p2p
https://briarproject.org/news/2021-briar-1.3-released/
Official Briar fdroid repository:
https://briarproject.org/fdroid/repo/?fingerprint=1FB874BEE7276D28ECB2C9B06E8A122EC4BCB4008161436CE474C257CBF49BD6
#briar #im #p2p
briarproject.org
Briar 1.3 released - image attachments, profile images and disappearing messages - Briar
Press release The Briar Project released version 1.3 of its Android app today. Thanks to support from eQualit.ie, this release adds several new features that have been requested by many users over the years.
With today’s release, users can upload profile…
With today’s release, users can upload profile…
Netdata
Distributed, real-time monitoring Agent collects thousands of metrics from systems, hardware, containers, and applications with zero configuration. It runs permanently on all your physical/virtual servers, containers, cloud deployments, and edge/IoT devices, and is perfectly safe to install on your systems mid-incident without any preparation.
You can install Netdata on most Linux distributions (Ubuntu, Debian, CentOS, and more), container platforms (Kubernetes clusters, Docker), and many other operating systems (FreeBSD, macOS). No sudo required.
Netdata is designed by system administrators, DevOps engineers, and developers to collect everything, help you visualize metrics, troubleshoot complex performance problems, and make data interoperable with the rest of your monitoring stack.
https://www.netdata.cloud
https://github.com/netdata/netdata
#netdata #monitoring
Distributed, real-time monitoring Agent collects thousands of metrics from systems, hardware, containers, and applications with zero configuration. It runs permanently on all your physical/virtual servers, containers, cloud deployments, and edge/IoT devices, and is perfectly safe to install on your systems mid-incident without any preparation.
You can install Netdata on most Linux distributions (Ubuntu, Debian, CentOS, and more), container platforms (Kubernetes clusters, Docker), and many other operating systems (FreeBSD, macOS). No sudo required.
Netdata is designed by system administrators, DevOps engineers, and developers to collect everything, help you visualize metrics, troubleshoot complex performance problems, and make data interoperable with the rest of your monitoring stack.
https://www.netdata.cloud
https://github.com/netdata/netdata
#netdata #monitoring
www.netdata.cloud
Netdata: Monitoring and troubleshooting transformed
Real-time infrastructure monitoring with per-second metrics, ML anomaly detection, and AI troubleshooting. Open source, #1 on GitHub. Cut MTTR by 80%.
As we continue to live under increasingly dystopian regimes, the need for secure communications is more vital than ever. Telegram has been a great resource and platform for disseminating information and content, but it certainly isn't perfect either.
Some research was done into which digital communication protocols are most ideal for our purposes:
https://telegra.ph/WEbHqRllMIfQa5YzpTSJBrNxfo6tu9-Digital-Communication-Protocols-09-08
The top picks are as follows and are in no particular order:
XMPP
NextCloud
Jami
Briar
Tox
Kontalk
Delta Chat
Bitmessage
Ricochet
Status
Scuttlebot
Session has not had an E2E audit completed yet, but not a bad choice
ȱ
Protocol for SYnchronous Conferencing (PSYC)
Matrix is not recommended: https://www.hackea.org/notas/matrix.html
CAUTION: peer-to-peer communications reveal one's IP address to each other, so using a reliable VPN, proxy, or TOR is advised. Briar is an exception to this rule, as it uses either Bluetooth range or the local network it's connected to; else all traffic goes through TOR. Ones without servers are ideal, such as: Jami, Tox, Ricochet, Status, Scuttlebot, ȱ, and PSYC-2. Some are still in development and may be prone to bugs.
Keep these options in mind when communicating with your clique. Many of us belong to private groups on Telegram which are presumably free from moderator surveillance (or at least interference), but ultimately we should transition to a more durable platform that will be unable to censor our messages. Try a few out and see what works for you and your crew.
#im
Some research was done into which digital communication protocols are most ideal for our purposes:
https://telegra.ph/WEbHqRllMIfQa5YzpTSJBrNxfo6tu9-Digital-Communication-Protocols-09-08
The top picks are as follows and are in no particular order:
XMPP
NextCloud
Jami
Briar
Tox
Kontalk
Delta Chat
Bitmessage
Ricochet
Status
Scuttlebot
Session has not had an E2E audit completed yet, but not a bad choice
ȱ
Protocol for SYnchronous Conferencing (PSYC)
Matrix is not recommended: https://www.hackea.org/notas/matrix.html
CAUTION: peer-to-peer communications reveal one's IP address to each other, so using a reliable VPN, proxy, or TOR is advised. Briar is an exception to this rule, as it uses either Bluetooth range or the local network it's connected to; else all traffic goes through TOR. Ones without servers are ideal, such as: Jami, Tox, Ricochet, Status, Scuttlebot, ȱ, and PSYC-2. Some are still in development and may be prone to bugs.
Keep these options in mind when communicating with your clique. Many of us belong to private groups on Telegram which are presumably free from moderator surveillance (or at least interference), but ultimately we should transition to a more durable platform that will be unable to censor our messages. Try a few out and see what works for you and your crew.
#im
Telegraph
WEbHqRllMIfQa5YzpTSJBrNxfo6tu9 Digital Communication Protocols.
Once upon a time I discovered a Google sheet link in a Telegram post with a table of digital communication protocols, listing 89 rows of software and 32 columns of their features or additional information. I saved a copy, but the table may yet be updated.
Instant messaging apps review
I tested a lot & mulled on this for a while.
Our goal was something less centralized, more private & harder to take down or block.
BRIAR is good & with p2p modes to be censorship resistant if internet is cut, but you have to invite each user separately to a group which is a pain
XMPP is archaic & behaves like a traditional one to one messenger. Yes, groups are there but are more like texting groups & you can't tag or reply to anyone directly.
MATRIX is better but ends up being 3rd party centralized because hosting yourself is a hog, which means you're bound by that hosted server & all those rules, giving up your email credentials, getting possibly kicked off, etc. Matrix.org server started requiring email verification for instance.
Matrix doesn't encrypt metadata, your IP is visible to others in chats.
The last 2 require a hosted server somewhere for large groups to function properly, and so does SESSION since it too has no servers of it's own. But its way lighter than Matrix & can be hosted on a mediocre VPS (which I've done, I can pay, its cheap its fine). The added benefit of Session is everything is onion routed automatically, and there's zero identifying factors when creating an ID. No phone numbers, no emails, nothing. Restore that ID on a new device using a cryptic passphrase, or start a new one if you want.
Check out @Nogoolag room with SESSION:
http://chat.nogoolag.com/nogoolag?public_key=53b45de08520eb3af97933e9a4991e74e26972ee91cc94e6a05da03d956d4313
#im #session
I tested a lot & mulled on this for a while.
Our goal was something less centralized, more private & harder to take down or block.
BRIAR is good & with p2p modes to be censorship resistant if internet is cut, but you have to invite each user separately to a group which is a pain
XMPP is archaic & behaves like a traditional one to one messenger. Yes, groups are there but are more like texting groups & you can't tag or reply to anyone directly.
MATRIX is better but ends up being 3rd party centralized because hosting yourself is a hog, which means you're bound by that hosted server & all those rules, giving up your email credentials, getting possibly kicked off, etc. Matrix.org server started requiring email verification for instance.
Matrix doesn't encrypt metadata, your IP is visible to others in chats.
The last 2 require a hosted server somewhere for large groups to function properly, and so does SESSION since it too has no servers of it's own. But its way lighter than Matrix & can be hosted on a mediocre VPS (which I've done, I can pay, its cheap its fine). The added benefit of Session is everything is onion routed automatically, and there's zero identifying factors when creating an ID. No phone numbers, no emails, nothing. Restore that ID on a new device using a cryptic passphrase, or start a new one if you want.
Check out @Nogoolag room with SESSION:
http://chat.nogoolag.com/nogoolag?public_key=53b45de08520eb3af97933e9a4991e74e26972ee91cc94e6a05da03d956d4313
#im #session
Media is too big
VIEW IN TELEGRAM
Texting with Zero Cell Service? What a Meshtastic Idea! LoRa and GPS For Off-Grid Communication
https://meshtastic.org
https://youtu.be/gqAsWtIjHUY
In this video I discuss the Meshtastic project and what kinds of features it has. It is an off-grid texting mesh network using inexpensive LoRa boards. for 10-20 dollars each you can buy a few radios and setup a way to communicate if you don't have cell phone service in a remote area. With GPS, you can even see where everyone in your group is at on a map
#meshtatic #im #p2p #lora
https://meshtastic.org
https://youtu.be/gqAsWtIjHUY
In this video I discuss the Meshtastic project and what kinds of features it has. It is an off-grid texting mesh network using inexpensive LoRa boards. for 10-20 dollars each you can buy a few radios and setup a way to communicate if you don't have cell phone service in a remote area. With GPS, you can even see where everyone in your group is at on a map
#meshtatic #im #p2p #lora
Read Aloud
Text to Speech Voice Reader extension for your browser
https://github.com/ken107/read-aloud
Firefox: https://addons.mozilla.org/en-US/firefox/addon/read-aloud/
Chromium: https://chrome.google.com/webstore/detail/read-aloud-a-text-to-spee/hdhinadidafjejdhmfkjgnolgimiaplp
#readaloud #tts #browser
Text to Speech Voice Reader extension for your browser
https://github.com/ken107/read-aloud
Firefox: https://addons.mozilla.org/en-US/firefox/addon/read-aloud/
Chromium: https://chrome.google.com/webstore/detail/read-aloud-a-text-to-spee/hdhinadidafjejdhmfkjgnolgimiaplp
#readaloud #tts #browser
GitHub
GitHub - ken107/read-aloud: An awesome browser extension that reads aloud webpage content with one click
An awesome browser extension that reads aloud webpage content with one click - ken107/read-aloud
Anxray
Another Proxychain Tool With Xray Core [Gpl v3]
Proxy Protocol
SOCKS (4/4a/5)
HTTP(S)
SSH
Shadowsocks
ShadowsocksR
VMess
VLESS with XTLS support
Trojan with XTLS support
Snell
Trojan-Go ( trojan-go-plugin )
NaïveProxy ( naive-plugin )
relaybaton ( relaybaton-plugin )
Brook ( brook-plugin )
Hysteria ( hysteria-plugin )
WireGuard ( wireguard-plugin )
ROOT required
Ping Tunnel ( pingtunnel-plugin )
Features
Full basic features
Xray WebSocket browser dialer
Option to change the notification update interval
A Chinese apps scanner (based on dex classpath scanning, so it may be slower)
Proxy chain
Balancer
Advanced routing with outbound profile selection
Reverse proxy
Custom config (Xray / Trojan-Go)
Traffic statistics support, including real-time display and cumulative statistics
Foreground status based routing support
Source/issue tracker : https://github.com/XTLS/AnXray
Fdroid [izzyondroid] : https://f-droid.org/packages/io.nekohasekai.anXray/
Telegram update channel : https://t.me/anxray
#anxray
Another Proxychain Tool With Xray Core [Gpl v3]
Proxy Protocol
SOCKS (4/4a/5)
HTTP(S)
SSH
Shadowsocks
ShadowsocksR
VMess
VLESS with XTLS support
Trojan with XTLS support
Snell
Trojan-Go ( trojan-go-plugin )
NaïveProxy ( naive-plugin )
relaybaton ( relaybaton-plugin )
Brook ( brook-plugin )
Hysteria ( hysteria-plugin )
WireGuard ( wireguard-plugin )
ROOT required
Ping Tunnel ( pingtunnel-plugin )
Features
Full basic features
Xray WebSocket browser dialer
Option to change the notification update interval
A Chinese apps scanner (based on dex classpath scanning, so it may be slower)
Proxy chain
Balancer
Advanced routing with outbound profile selection
Reverse proxy
Custom config (Xray / Trojan-Go)
Traffic statistics support, including real-time display and cumulative statistics
Foreground status based routing support
Source/issue tracker : https://github.com/XTLS/AnXray
Fdroid [izzyondroid] : https://f-droid.org/packages/io.nekohasekai.anXray/
Telegram update channel : https://t.me/anxray
#anxray
tFileTransporter
Transfer apps, images and files to Android Devices and PCs
Use UDP Broadcast or WiFi P2P create connections, Use TCP protocol to transfer files. This program builds with RxJava and Kotlin Coroutines.
Android:
https://github.com/Tans5/tFileTransporter
F-droid (Izzy repo): https://f-droid.org/packages/com.tans.tfiletransporter/
Play Store: https://play.google.com/store/apps/details?id=com.tans.tfiletransporter
Desktop:
https://github.com/Tans5/tFileTransfer_desktop
#tFileTransporter #transfer #share
Transfer apps, images and files to Android Devices and PCs
Use UDP Broadcast or WiFi P2P create connections, Use TCP protocol to transfer files. This program builds with RxJava and Kotlin Coroutines.
Android:
https://github.com/Tans5/tFileTransporter
F-droid (Izzy repo): https://f-droid.org/packages/com.tans.tfiletransporter/
Play Store: https://play.google.com/store/apps/details?id=com.tans.tfiletransporter
Desktop:
https://github.com/Tans5/tFileTransfer_desktop
#tFileTransporter #transfer #share
GitHub
GitHub - Tans5/tFileTransporter: An Android application could transfer/share APPS, IMAGES and any FILES to Android devices or PCs.
An Android application could transfer/share APPS, IMAGES and any FILES to Android devices or PCs. - Tans5/tFileTransporter
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version
Security and Counter-Surveillance - Information Against the Police State
https://t.me/RevToolboxRedux/2559
What To Do When You're Arrested
https://t.me/RevToolboxRedux/2585
Surveillance Self Defense in Public Spaces
https://t.me/RevToolboxRedux/2755
Movement Defense Means All of Us - A guide to building resilient movements and countering repression.
https://t.me/RevToolboxRedux/2070
No Badjacketing - The State Wants To Kill Us, Let's Not Cooperate (important article)
https://t.me/RevToolboxRedux/2915
Why Misogynists Make Great Informants
https://t.me/RevToolboxRedux/2916
Digital Communication Protocols Beyond Telegram
https://t.me/RevToolboxRedux/3338
Police Infiltrators - the ultimate betrayal
https://t.me/RevToolboxRedux/2502
Privacy/Security Resource list
https://t.me/RevToolboxRedux/12
Some tips on staying secure online
https://t.me/RevToolboxRedux/157
Elicitation - subtly soliciting information
https://t.me/RevToolboxRedux/167
Telegram tips for group/channel admins (old)
https://t.me/RevToolboxRedux/198
Breaking News Consumer's Handbook
https://t.me/RevToolboxRedux/209
Antifascism is Self Defense
https://t.me/RevToolboxRedux/264
Digital security resources for activists
https://t.me/RevToolboxRedux/267
Know Your Rights - A Crashcourse 4 Protesters (Don't Shoot PDX)
https://t.me/RevToolboxRedux/273
Best Practices for Signal Threads
https://t.me/RevToolboxRedux/280
The Riot is One Night But Metadata is Forever
https://t.me/RevToolboxRedux/293
Never Talk to the Cops
https://t.me/RevToolboxRedux/294
Before Posting Ask Yourself - does this pose a risk?
https://t.me/RevToolboxRedux/295
Surveillance Self Defense (EFF)
https://t.me/RevToolboxRedux/309
How To Make It Harder for Cops to Do Their Jobs
https://t.me/RevToolboxRedux/310
Beating FBI Surveillance
https://t.me/RevToolboxRedux/319
How To Find Hidden Cameras
https://t.me/RevToolboxRedux/334
DIY Faraday Bag (untested)
https://t.me/RevToolboxRedux/327
Guide to IMSI Catchers (Fake Cell Towers)
https://t.me/RevToolboxRedux/337
Covering Cameras w/ Umbrellas
https://t.me/RevToolboxRedux/369
Getting Started - Telegram Anonymity
https://t.me/RevToolboxRedux/370
Tails OS Leaflet
https://t.me/RevToolboxRedux/378
Car Brigade Techniques
https://t.me/RevToolboxRedux/407
Beware Swoopers
https://t.me/RevToolboxRedux/431
Spread Good Info! S.A.L.U.T.E.
https://t.me/RevToolboxRedux/436
Anarchist Direct Actions - A Challenge for Law Enforcement
https://t.me/RevToolboxRedux/462
What To Do If You Are Stopped by the Police
https://t.me/RevToolboxRedux/465
Criptica. Resistencia Digital (espanol)
https://t.me/RevToolboxRedux/467
Which Apps Are Secure and End-to-End Encrypted?
https://t.me/RevToolboxRedux/495
When the Police Knock on Your Door
https://t.me/RevToolboxRedux/517
Dress for Success - Disguise without Bloc
https://t.me/RevToolboxRedux/518
Look Out for Fascist Entryism
https://t.me/RevToolboxRedux/520
What to Do If You Receive an Unsolicited Message
https://t.me/RevToolboxRedux/528
PDX Decentralized Comms Ruleset
https://t.me/RevToolboxRedux/536
Only Networks Can Defeat Networks - decentralized digital struggle
https://t.me/RevToolboxRedux/607
The Basics of Firearm Safety
https://t.me/RevToolboxRedux/643
Assertive Intervention and Deescalation Tools and Tips
https://t.me/RevToolboxRedux/646
Faraday Bag from CLDC
https://t.me/RevToolboxRedux/652
How to Lock Your SIM Card
https://t.me/RevToolboxRedux/683
How to Spot NYPD Unmarked Cars
https://t.me/RevToolboxRedux/685
Digital Safety at Protests
https://t.me/RevToolboxRedux/687
Crossing the U.S. Border - crimethinc
https://t.me/RevToolboxRedux/742
Gentleman's Guide to Forum Spies and Spooks
https://t.me/RevToolboxRedux/750
Atlas of Surveillance - Documenting Police Tech
https://t.me/RevToolboxRedux/784
2 Twitter Alternatives
https://t.me/RevToolboxRedux/786
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version
Security and Counter-Surveillance - Information Against the Police State
https://t.me/RevToolboxRedux/2559
What To Do When You're Arrested
https://t.me/RevToolboxRedux/2585
Surveillance Self Defense in Public Spaces
https://t.me/RevToolboxRedux/2755
Movement Defense Means All of Us - A guide to building resilient movements and countering repression.
https://t.me/RevToolboxRedux/2070
No Badjacketing - The State Wants To Kill Us, Let's Not Cooperate (important article)
https://t.me/RevToolboxRedux/2915
Why Misogynists Make Great Informants
https://t.me/RevToolboxRedux/2916
Digital Communication Protocols Beyond Telegram
https://t.me/RevToolboxRedux/3338
Police Infiltrators - the ultimate betrayal
https://t.me/RevToolboxRedux/2502
Privacy/Security Resource list
https://t.me/RevToolboxRedux/12
Some tips on staying secure online
https://t.me/RevToolboxRedux/157
Elicitation - subtly soliciting information
https://t.me/RevToolboxRedux/167
Telegram tips for group/channel admins (old)
https://t.me/RevToolboxRedux/198
Breaking News Consumer's Handbook
https://t.me/RevToolboxRedux/209
Antifascism is Self Defense
https://t.me/RevToolboxRedux/264
Digital security resources for activists
https://t.me/RevToolboxRedux/267
Know Your Rights - A Crashcourse 4 Protesters (Don't Shoot PDX)
https://t.me/RevToolboxRedux/273
Best Practices for Signal Threads
https://t.me/RevToolboxRedux/280
The Riot is One Night But Metadata is Forever
https://t.me/RevToolboxRedux/293
Never Talk to the Cops
https://t.me/RevToolboxRedux/294
Before Posting Ask Yourself - does this pose a risk?
https://t.me/RevToolboxRedux/295
Surveillance Self Defense (EFF)
https://t.me/RevToolboxRedux/309
How To Make It Harder for Cops to Do Their Jobs
https://t.me/RevToolboxRedux/310
Beating FBI Surveillance
https://t.me/RevToolboxRedux/319
How To Find Hidden Cameras
https://t.me/RevToolboxRedux/334
DIY Faraday Bag (untested)
https://t.me/RevToolboxRedux/327
Guide to IMSI Catchers (Fake Cell Towers)
https://t.me/RevToolboxRedux/337
Covering Cameras w/ Umbrellas
https://t.me/RevToolboxRedux/369
Getting Started - Telegram Anonymity
https://t.me/RevToolboxRedux/370
Tails OS Leaflet
https://t.me/RevToolboxRedux/378
Car Brigade Techniques
https://t.me/RevToolboxRedux/407
Beware Swoopers
https://t.me/RevToolboxRedux/431
Spread Good Info! S.A.L.U.T.E.
https://t.me/RevToolboxRedux/436
Anarchist Direct Actions - A Challenge for Law Enforcement
https://t.me/RevToolboxRedux/462
What To Do If You Are Stopped by the Police
https://t.me/RevToolboxRedux/465
Criptica. Resistencia Digital (espanol)
https://t.me/RevToolboxRedux/467
Which Apps Are Secure and End-to-End Encrypted?
https://t.me/RevToolboxRedux/495
When the Police Knock on Your Door
https://t.me/RevToolboxRedux/517
Dress for Success - Disguise without Bloc
https://t.me/RevToolboxRedux/518
Look Out for Fascist Entryism
https://t.me/RevToolboxRedux/520
What to Do If You Receive an Unsolicited Message
https://t.me/RevToolboxRedux/528
PDX Decentralized Comms Ruleset
https://t.me/RevToolboxRedux/536
Only Networks Can Defeat Networks - decentralized digital struggle
https://t.me/RevToolboxRedux/607
The Basics of Firearm Safety
https://t.me/RevToolboxRedux/643
Assertive Intervention and Deescalation Tools and Tips
https://t.me/RevToolboxRedux/646
Faraday Bag from CLDC
https://t.me/RevToolboxRedux/652
How to Lock Your SIM Card
https://t.me/RevToolboxRedux/683
How to Spot NYPD Unmarked Cars
https://t.me/RevToolboxRedux/685
Digital Safety at Protests
https://t.me/RevToolboxRedux/687
Crossing the U.S. Border - crimethinc
https://t.me/RevToolboxRedux/742
Gentleman's Guide to Forum Spies and Spooks
https://t.me/RevToolboxRedux/750
Atlas of Surveillance - Documenting Police Tech
https://t.me/RevToolboxRedux/784
2 Twitter Alternatives
https://t.me/RevToolboxRedux/786
Telegram
Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
If You Don't Need to Say It, Don't Say It (discussion
https://t.me/RevToolboxRedux/797
A Practical Security Handbook for Activists and Campaigns
https://t.me/RevToolboxRedux/814…
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
If You Don't Need to Say It, Don't Say It (discussion
https://t.me/RevToolboxRedux/797
A Practical Security Handbook for Activists and Campaigns
https://t.me/RevToolboxRedux/814…
❤1