AI is not going to replace humans. Humans who use AI are going to replace ordinary humans. The sad part is that 33% of humans do not have internet access. #AI = 11,000-year-old human slavery will be back!
GM #Nostr πŸ«‚πŸ’œβš‘ People who are not trustworthy are the ones who are most suspicious about everything.
πŸŒπŸ” Personal data protection during investigations for OSINT specialist. Part 1 - Traffic tunneling. Traffic tunneling in the context of data protection is necessary to hide the real IP address of your computer and many other network data about your connection + in our case it is also necessary to encrypt traffic from the Internet provider and everyone who is "sitting on the wire". πŸ“‘ We will need a VPN + VPN bundle. ❓ Why not just VPN? By means of a request to the provider/SORM - it is possible to obtain data about who was connected to this IP address (VPN) at that time and in response to this request you will be given away, and you will not even have to request data from the VPN itself or the data center where this VPN is located - deanonymization will occur bypassing this. Why not links with anonymizers like TOR? (VPN + TOR, VPN + Lokinet, VPN + i2p, etc.). 1. Such connections often provide low connection speeds , which is not suitable for online investigations. 2. Such anonymizers (TOR, i2p, Lokinet) often have a "dirty" IP address - therefore, with such an IP address, it will be impossible to register accounts for investigations, and sometimes you will not even be able to simply access a website with such IP addresses. 3. Doubtful privacy of transmitted data - often the output nodes of such anonymizers are monitored for the purpose of intercepting data/deanonymization/theft of cryptocurrency, etc. Accordingly, the fact that you are digging on someone may become known to someone else. So, we have decided on the type of protection. Let's move on. βš™ How to set up? There are 2 options: 1. Special clients of VPN services that have a double VPN function. For example, the VPN provider iVPN has the ability to enable double VPN mode directly from the official client. 2. 1 VPN on the host - 2 VPN on the virtual machine for work. ⁉️ How to use? Each investigation has its own IP address. You can't use the same IP address for different investigations - otherwise the investigations can be linked together and it will be easy to understand that the same person is behind them all. ⛓‍πŸ’₯ Killswitch is a function that if the VPN is turned off, then the entire Internet on the computer is turned off. The Internet bypassing the VPN does not work. Be sure to enable this function in your VPN client (iVPN also has this function). Before starting the investigation, visit the site - it will show how your computer looks from the site. There you can check the IP address (so that it is from the second VPN) and check some device fingerprints. This is necessary for a check before the investigation - so as not to forget to turn on something.
What’s your age and how often do you talk to your parents?
User Privacy in Linux
Soonβ„’ is Now! Sidekick is officially out in the wild and ready to join you on your private crypto adventures. Go find your forgotten older phone and visit sidekick.monerujo.app for all the info. πŸ”πŸ“±πŸ“²πŸ’Έ #Monero
πŸ—Ί New way to use maps When talking about maps and computers, the truth is that it was enough to make you cry in terms of privacy. All we had was the OpenStreetMap website, and yes, it worked but admittedly it wasn't particularly "attractive" in terms of interface. But the already well-known OsmAnd, creators of the map application for the phone OsmAnd+ have launched their web version This web version is now available and adds even more tools and possibly development in this aspect. Don't be overwhelmed by despair, we have tools OsmAnd Web:
πŸ“± Telegram could give away your IP address Recently, Pavel Durov, founder of Telegram, made some statements on his telegram channel as usual, but something stood out that caught people's attention: We have made it clear that IP addresses and phone numbers of those who violate our rules may be disclosed to relevant authorities in response to valid legal requests. In reference to Telegram's own terms and conditions. He also points out: Telegram Search is meant for finding friends and discovering news, not promoting illegal products. We won't let bad actors compromise the integrity of our platform Many now argue that Telegram has therefore changed after the arrest of Pavel Durov. The reality is that ANY COMPANY, and I repeat, any company you use will have to obey the rule of law. And in the event of any legal request, your IP address and/or telephone number will be provided if applicable. Although you can protect yourself with a good VPN /TOR and/or a temporary phone number.