mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

672
comptes actifs

#orbot

0 message0 participant0 message aujourd’hui
A répondu dans un fil de discussion

@harmonia_amanda
#Orbot, pour l'utilisation de Tor.
#HashDroid, pour créer et vérifier des sommes de contrôle.
#TableTop, pour convertir des nombres, décoder des messages, lancer des dés, etc.
#Conversations, pour clavarder (mais ça permet d'autres choses, comme le partage de fichiers, la visio…).
– Bon, après, #OrganicMaps et #StreetComplete ont déjà été mentionnées, alors je vais m'arrêter là…

Suite du fil

#WhatsMissing is an #Android-#ROM that is the equivalent of @tails_live / @tails / #Tails, which includes @torproject / #Tor and @guardianproject / #Orbot support form the get-go and forces everything through Tor if not only allows to connect to #OnionSedvices using #orWall...

  • Because that would have a similar audience and really complement peoples' needs.

Ideally make it like an #image file to put on a #RaspberryPi #CM5 / #CM4 / #Pi400 / #Pi500 / #Pi4 / #Pi5 to work with a bunch of #WWAN modules for #data, #SMS & #calling (needed with some SIMs to get shit done)...

Suite du fil

Issues aside it's now 15 years since I started using #Tor / @torproject & @guardianproject / #Orbot on #Android full-time.

Because in #EDGEland they yeet users to 64kBit/s if not even lower to 16kBit/s past paid bandwith and instead of properly renegotiating the bandwith, they trottle connections by reducing the packet rate / dropping packets, making it as #laggy as a #GSO-based #SATCOM connection!

  • On top of that, almost all #MNO|s & #MVNO|s illegally use RFC1918 Address space, *espechally 10.0.0.0/8 for #CGNAT, thus bricking #VPN|s and sadly @BNetzA doesn't really give a damn!
#mno#MVNO#cgnat
A répondu dans un fil de discussion

@craige @jwz @claudius @mathowie I've played with #SimpleX chat before. I don't know if it's ready for primetime yet, but I'd definitely keep an eye on it. As it stands, I'd love to recommend #Signal #SignalMessenger, because I think it has better UX (and less metadata via sealed sender) than #Matrix with its #Element client. But Matrix does not require phone numbers. So, my current recommendation to anybody organizing vulnerable people is to use Matrix rather than Signal, and to ensure that users run it over #tor via the #orbot app.

A répondu dans un fil de discussion

@jwildeboer Additional recommendations for hardening your #Signal #SignalMessenger application:

* Also install #Orbot, and have all Signal traffic routed through it.
* Configure Orbot to *not* use reduced padding.
* Configure Orbot to use different routes for all hosts, ports, and clients.
* Configure the Orbot VPN to be always-on (Android VPN settings).
* Configure Signal to allow sealed sender from anybody.
* Configure Signal to require PIN for re-registration.
* Configure Signal's chat defaults to erase after a certain period of time.

Signal is a big juicy target with tons of metadata about who is talking to who going over the wire at any given time. The contents of the communication are encrypted, but the metadata is not. And remember: "we kill people based on metadata" (abcnews.go.com/blogs/headlines). If the fascists are willing to kill people based off of metadata, then they're certainly willing to surveil, harass, arrest, and imprison people based off of metadata.

These hardening efforts make building up a social graph from metadata more difficult. Unfortunately, you have to do it yourself, as Signal has made it clear on multiple occasions that it does not view network-layer anonymity as within its scope:

>Signal instantly dismissed my report, saying it wasn't their responsibility and it was up to users to hide their identity: "Signal has never attempted to fully replicate the set of network-layer anonymity features that projects like Wireguard, Tor, and other open-source VPN software can provide".
>
>gist.github.com/hackermondev/4

@signalapp @torproject

A répondu dans un fil de discussion

@ploum

And as you are able to, run your own #Tor server!

You can do this easily, just install #Orbot on an Android device, or tor on a Linux laptop, and enable "relay" mode.

This will not be an exit node, so there is no danger for you.

For phones, you can buy an ethernet+charging dongle like this here, to get better speeds and stability and keep your wifi unoccupied:

amazon.de/gp/aw/d/B0CNKH5GSG

You can also run #i2p with the #i2pd Android app.

Both via #Obtainium:

apps.obtainium.imranr.dev

I often feel the struggle of using a Google Pixel (P7) with #GrapheneOS. Most of my friends have the latest iPhone's and can do pretty much everything faster than I can. This is not a Graphene issue as such, I also use #orbot to route most of my traffic through #Tor, making my connection a little slower. I've also got strict DNS rules setup through #NextDNS and I occasionally get caught out trying to access a blocked site...

A répondu dans un fil de discussion

@ActuallyAubrey That depends on the juristiction in question, the plan & provider in question as well as used hardware in question.

  • In case of even remotely suspected #Stalkerware I do recommend to get personally-owned, controlled, secured and hidden hardware to enable unsurveiled comms.

Consider telephony & SMS inherently & unfixably insecure.

  • If in doubt get a new Android with an anonymous prepaid SIM that has affordable data options and use @torproject / #TorBrowser and #Orbot with #TorBridges on ports 80 & 443 which use #meek & #webtunnel transports, so any surveiling party will only see non-suspicious HTTPS traffic.

OFC a maliciously configured CPE/Router can log & report all pachets that travel through, but #DNS & #HTTP or any unencrypted comms are susceptible.

A répondu dans un fil de discussion

@delta TBH, I think that #deltaChat, alongside @monocles / #monoclesChat is one of the few real #E2EE #Chat & #Messaging solutions (which allow for full #SelfCustody of keys as well as being based on #OpenStandards for a #MultiVendor & #MultiProvider ecosystem) and even out-of-band verification and key exchange...

  • The main difference is that deltaChat implements #PGP/MIME on #IMAP+#SMTP, which may be easier to setup in some cases and also offer an easy pipeline to archival requirements in #business setups whilst #monocles chat uses #XMPP+#OMEMO first and supports PGP/MIME as a secondary option, making it a good option in individual setups...

Needless to say both support using @torproject / #Tor via #Orbot and thus connecting to an #OnionService or just anonymously connecting to the server one personally chooses...

  • So unless a provider explicitly bans Tor proactively, they'll work just fine.

The advantage of XMPP is that it also allows for calls, whereas I've to see how one can do Group Chats on deltaChat at all...

2024 年 3 月 1 日。#Snowflake 在中国和俄罗斯出现连接问题,影响 #Tor 浏览器用户和 #Orbot 用户。

根据用户反馈,从 3 月 1 日开始,Snowflake 在中国和俄罗斯出现连接问题。具体表现为 Tor 浏览器无法启动引导,如果检查日志文件,会显示类似这样的提醒:

[notice] Managed proxy "./client": offer created
[notice] Managed proxy "./client": broker failure Unexpected error, no answer.

Tor 官方论坛提醒大家:如果遇到这个问题,可以尝试手动添加网桥地址来解决。具体地址请见官方论坛的这个帖子:

forum.torproject.org/t/fix-pro

如果按照这个帖子的做法仍然无法连接,欢迎在这里留言,或者在 Tor 的官方论坛反馈。

祝大家周末愉快!

Tor Project Forum · (Fix) Problems with Snowflake since 2024-03-01:"broker failure Unexpected error, no answer."Some users reported having issues with Snowflake since today, 2024-03-01. This seems to be a similar issue to the one that happened last year. The symptom of the problem is that Tor doesn’t make progress in bootstrapping. If you look at the Tor log, you will see messages like this: [notice] Managed proxy "./client": offer created [notice] Managed proxy "./client": broker failure Unexpected error, no answer. Workarounds Tor Browser You can try working around the problem yourself by entering ma...

2024 年 2 月。介绍 #Orbot 的“善举模式”(Kindness Mode)。

我们以前介绍过 Orbot,详情请见这一串嘟文:

mastodon.social/@tor4zh/111784

今天要介绍的是 Orbot 的“善举模式”,使用这个功能,你就可以帮助别人连接到 Tor 网络。

1. 请确认你生活的地区没有网络封锁,或者只有很少的网络封锁。

2. 在手机上(支持 Android 和 iOS)安装 Orbot。(详见上面那条链接)

3. 打开手机的“善举模式”,保持激活状态就行。

这样一来,那些使用 #Tor 浏览器 #Snowflake 功能的人就能连接到你的手机,再进一步连接到 Tor 网络。

这样帮助别人连接,不会伤害你的手机电池,也不拖慢网速,更不会泄露数据。

这可能是普通人最容易帮助别人突破网络封锁的方式,也是最容易给 Tor 网络做出贡献的方式。要不要来试试?

MastodonTor 中文指南 (@tor4zh@mastodon.social)介绍基于 Tor 网络的手机端 VPN 软件 Orbot。它由 Guardian 项目开发和维护,Tor 官方也推荐使用。 Orbot 使用 Tor 网络加密你的互联网流量,并通过世界各地一系列节点隐藏流量。而且可以设置白名单,也就是可以只针对特定的 APP 使用 VPN,其它 APP 仍然直连上网。 大家以前熟悉的是 Tor 浏览器,通过它来加密和隐藏网络流量,它很方便但也存在局限,就是只能通过浏览器。移动互联网时代,大家使用 APP 远远多于浏览器,Orbot 应运而生。 下载和安装: 1. Android 用户可以从 Google Play Store 下载。 2. 中国大陆地区不能使用 Play Store 的用户,可以从 F-droid 下载。但 F-droid 默认仓库里没有 Orbot,需要手动添加 Guardian 项目的仓库之后才能找到。添加方法请见这里第 5 条:https://mastodon.social/@tor4zh/111772167128966369 3. iOS 用户可以从 App Store 下载,但使用中国区 Apple ID 找不到它,建议注册美国区 Apple ID。