

No, but they see that you are connected to a tor entry node and that someone is sending you data. From this they can conclude that you are running a tor proxy.
Dev from Germany, also interested in DnD and some video games


No, but they see that you are connected to a tor entry node and that someone is sending you data. From this they can conclude that you are running a tor proxy.


Most apps typically use Google services for notifications, so all apps use one single service running all the time.
Without Google, apps can develop a fallback where each app polls for its own notifications, but continously running a service per app costs battery, so the services do not run all the time. This is the reason why notifications are delayed.


What would a vpn do for you with snowflake? Hide your IP from tor entry nodes and the bridge user. I mean sure more vpn is always great, but running snowflake without a vpn seems less bad than surfing the web without a vpn.
There are no legal risks in forwarding traffic to an entry node and your ISP knowing that you use snowflake also isnt really an issue.


Snowflake is different though, because you just forward encrypted traffic from users into tor. Your just a bridge from one network into another and don’t send any malicious data data to random servers. Only the exit nodes have that legal issue.


What are your typical fidgeting algs? Mine are:
Other than U-perm, theses are just random moves that feel nice and cycle relatively quickly. Ive forgotten many of the PLLs, but I remember that some of them felt really satisfying


Oh no, wouldn’t anyone think of the billion dollar companies? The Chinese are stealing the models that they have spent so much effort on getting all the training data. What a shame.
Protons mobile app doesn’t have an independent push notification service. If you’re not using Google play, you will not get push notifications.
Not the end of the world, but may be a deal breaker for some.


For what. Thats a lot of effort for a small userbase. And most importantly a userbase that doesn’t see Google ads. Custom hardware is expensive and doesn’t provide much additional data for most users and provides unprofitable data for degoogled phones.
Google doesnt spy on us just because they are evil. They spy on us to sell more expensive targeted ads.


The anonymous credential signature scheme that is planned to be used is BBS#, I don’t know how it handles revocation.
Additionally, BBS# proposes a solution for device-binding from ECDSA-signatures, relying on re-randomization of ECDSA signatures and public keys. Furthermore, a trust model for BBS# that covers revocation and proof of validity is defined in [BBT2025].
[BBT2025]: Trust Model : Securing digital identity with advanced cryptographic algorithms, available at https://github.com/Orange-OpenSource/BBS-SHARP-doc-eudi-wallet , 2025
I haven’t found where in that source the implementation of revocation is discussed.
Seems like no ways of enabling privacy preserving revocation with bbs# are known jet. This means that arithmetic circuit based proofs would be the only way to enable revocation. And as they can prove any statement in NP with ZK, the fact that they can prove that a revocation id is not part of a given list is obvious. https://github.com/eu-digital-identity-wallet/eudi-doc-standards-and-technical-specifications/blob/main/docs/technical-specifications/ts4-zkp.md#22-proofs-for-arithmetic-circuits-programmable-zkps
https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/main-51.pdf As crescent by Microsoft is one of the considered implemations, this paper is probably the most relevant work on revocation of anonymous credentials.


The reason why it works is a bit complicated, but basically the trick is that the signatures are not immutable. Given a valid signature, it is possible to create a new valid signature over the same content that is not linkable to the original one. This means that it is still possible to derive, what authority signed the document, but the authority cannot know in which transaction it has signed that specific document.
I wanted to get in contact with a researcher that didn’t have a public university mail and instead linked to his LinkedIn. I wasnt able to see his contact info unless logging in and I couldn’t contact him without paying LinkedIn, so I didn’t contact him…
Great networking platform /s


And if you don’t want the government to know what sites you visit, have sites route the request through a proxy.
Actually, no on the fly communication with the issuer is required for selective disclose. You just need a signed document with individually salted hashes of different properties and you can create a zero knowledge proof non-interactively. Zero knowledge meaning that truely nothing but the disclosed property (age > 18, County == DE, or whatever) is communicated to anyone.
Theres a lot of other cool stuff that can be done with zero knowledge digital identity wallets. You could for example hash your pubkey together with the service providers pk and disclose that as a per service ID, but not reveal your pk. This allows linkability within one service (as a login method for example) while preventing cross service linkability.


I think it really doesn’t matter if a reaction video used the youtube player or vlc with ytdl. If its transformative content its fine, if its a re-upload with a facecam in the corner then not. Technology isn’t the problem here.


Soweit ich weiß hilft Snowflake nicht, um die Internet sperren zu umgehen, da es sich eben nicht um DNS sperren, sondern um blockieren von routing allgemein handelt.
Snowflake hilft aber Leuten, die einen Weg gefunden haben, diese Sperren zu umgehen, ihre Identität zu schützen.
Starlink wird zum Beispiel genutzt, wobei das wohl auch versucht wird zu verhindern durch jamming.


Im not a big fan of meta and WhatsApp, but these claims are a bit much. Any employee gets access to messages through a well documented internal process? “No separate decryption step is required” , so the WhatsApp CLIENT is not doing any actual e2e encryption and no attempt at reverse engineering or traffic analysis has ever seen that this is the case?
Where can one see, what these whistleblowers have actually published? I would expect to see this “simple process” and how that interface actually works… And I would expect any journalist to request some proof (show me the last message i sent to Alice) before trusting an anonymous whistleblower making such an extraordinary claim.
From what I heard so far, that anonymous whistleblower could be a troll or an ex-employee who just wants to cause some trouble for meta.
We should not trust anything blindly, even if it fits with our view of the world. Meta is an evil company, but as long as there is no indication for these specific allegations to be true, we should treat them as unfounded allegations.
Well maybe Europe can become the center of science again.


But only if Von der Leyen isnt in charge. We already had that here in Germany, didn’t work out too well for our army.
I don’t think that googles mail Client supports pgp. And if you use a client you trust with Google mail, the content of your mail is encrypted.
They will still use metadata to track who you are talking to and about what. The Mail subject is metadata and therefore not encrypted.
So to keep your conversations private, dont use gmail, and probably don’t use mail at all, use something build with encryption in mind.


Its main “security” feature is that they are uncooperative towards most governments. If a government makes a legally binding request to signal, they recieve IP, Account creation date and other unavoidable stuff and signal is transparent about that. If telegram gets that request, they probably ignore it, but maybe they don’t and there is no way to know as a user.
Also telegram is the platform of drug dealers, nazis and conspiracy theorists. So even if it had e2e by default, I would still prefer using another platform.
That you’re even suggesting this tells me that you don’t use tor regularly. Many clearnet sites dont want to be accessed through tor and will just block you. If you encounter any recaptchas thats basically a dead end. The time from opening the browser to having a fully loaded site is minutes.
If you don’t plan on doing serious crimes and your not an opposition leader in a totalitarian state, tor is not a good default browser.