<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Simplified Privacy</title>
    <link>http://localhost/</link>
    <description>Recent content on Simplified Privacy</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 01 Aug 2024 10:00:00 -0700</lastBuildDate>
    <atom:link href="http://localhost/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>DeGoogled Phones</title>
      <link>http://localhost/they-see-everything/</link>
      <pubDate>Thu, 01 Aug 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/they-see-everything/</guid>
      <description>With a stock version of Android or iPhone, Google/Apple can see: –Everything you say and who you said it to on every app.&#xA;–All push notifications you get&#xA;–24/7 location tracking with who is standing next to you&#xA;–You don’t own anything, Google or Apple see all passwords&#xA;–You don’t own cryptocurrency, they see your private keys&#xA;–You don’t own Nostr accounts, they see your private keys&#xA;With a regular Android or iPhone, you’re basically a Big Tech slave.</description>
    </item>
    <item>
      <title>John Galt</title>
      <link>http://localhost/jhon-galt/</link>
      <pubDate>Thu, 01 Aug 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/jhon-galt/</guid>
      <description>Who is John Galt? He is concerned about human and digital rights being eroded by the tyranny of the status quo.&#xA;He dislikes censorship, endless wars, and the corrupt fractional reserve banking system. As a man of optimism, he instead advocates for change through freedom respecting technology. Only by individuals learning skills to empower themselves, can we be free.</description>
    </item>
    <item>
      <title>Fight Cloudflare with Arweave</title>
      <link>http://localhost/arweave-cloudflare-cdn.html</link>
      <pubDate>Thu, 01 Aug 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/arweave-cloudflare-cdn.html</guid>
      <description>Our new website is on Arweave, a solution to Cloudflare. Let’s break it down: Problem: Cloudflare breaks SSL encryption and acts as a man-in-the-middle to see all passwords. And by seeing the bulk of all traffic, they are able to do mass surveillance.&#xA;Issue: When you bring up getting off Cloudflare with website creators, they say “But what about DDoS?”. And then you’re just directing them to less centralized alternatives, which could become the “next cloudflare” if they got popular.</description>
    </item>
    <item>
      <title>Adam</title>
      <link>http://localhost/adam/</link>
      <pubDate>Sat, 27 Jul 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/adam/</guid>
      <description>For desktop or laptop Linux troubleshooting, this is your man. Adam is passionate about open source, privacy, and security. He’s always on the look-out for FOSS solutions for everything. He can help solve many privacy and Linux questions and issues as well as privacy respecting alternatives.&#xA;He is active on SoloLearn, a coding teaching website, with over 100 followers. Please note this link has a Google captcha beyond our control:</description>
    </item>
    <item>
      <title>Tyler</title>
      <link>http://localhost/tyler/</link>
      <pubDate>Fri, 26 Jul 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/tyler/</guid>
      <description>Let’s make a deal. Tyler networks with relevant businesses to educate them on the benefits of using Encryption as Identity and freedom preserving technology. We can get a free quote to you.</description>
    </item>
    <item>
      <title>Contact</title>
      <link>http://localhost/contact.html</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/contact.html</guid>
      <description>Session 1-on-1 Contact: Support&#xA;Subscribe to Content: Simple&#xA;(this is a bot, like an uncensored email lists)&#xA;Signal Here’s our Signal #:&#xA;+855 68 504 905&#xA;(spacing matters for Signal)&#xA;SimpleX 1-on-1: https://simplex.chat/contact#/?v=2-5&amp;smp=smp%3A%2F%2FenEkec4hlR3UtKx2NMpOUK_K4ZuDxjWBO1d9Y4YXVaA%3D%40smp14.simplex.im%2FfhWzbo2n3wxqg6gAvAgVf1x_viSrBi2X%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAGVMQ9_Dq592TxhVckR48CiVpkRK9Ew5RTMv_MeyB0zQ%253D%26srv%3Daspkyu2sopsnizbyfabtsicikr2s4r3ti35jogbcekhm3fsoeyjvgrid.onion XMPP We self-host our XMPP.&#xA;XMPP@SimplifiedPrivacy.is&#xA;OMEMO fingerprint:&#xA;ef5820fc2fb5ea45da378ed5e7291fcfbe5c9adbe4389386a288c3383e1a8506 Matrix We self-host our Matrix.&#xA;@Support:Matrix.SimplifiedPrivacy.is&#xA;Nostr Don&amp;rsquo;t send it gift wrapped because gossip doesn&amp;rsquo;t support it.&#xA;npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6 Self-host Email (remove the spaces)&#xA;support [at] liberty ocean horizons [dot] c o m</description>
    </item>
    <item>
      <title>Donations</title>
      <link>http://localhost/donate.html</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/donate.html</guid>
      <description>Open Source Donations We use the money for servers, development of original open source software, and video animation:&#xA;Monero (XMR) 89gbof7fHub9dSMGVX2mGhDggU8TWXuFtGxbKefVNCpWCa377BS8uPzRr831Qd86FWRvPDTrvjkbHYZHgs5nmohRL5j1KiH Bitcoin Lightning: SimplifiedPrivacy@getalby.com&#xA;Bitcoin Layer 1: bc1qwjvu62f3ew4l4w884jgyeq3xcu6pmyc8sau8vq</description>
    </item>
    <item>
      <title>Frequently Asked Questions</title>
      <link>http://localhost/faq.html</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/faq.html</guid>
      <description>Table of Contents Emails Linux Customized Privacy Advice Cryptocurrency Consultation Legal Phones XMPP Tor Entrances&#xA;Do you accept fiat money? No, we only accept cryptocurrency. Cryptocurrency offers more privacy and fits better with our mission of a more decentralized and uncensored internet. We reject central banking as legitimate. Inflation is a form of slavery.&#xA;Where can I get cryptocurrency? We have an entire article on this subject found here:&#xA;Link What cryptocurrencies do you accept?</description>
    </item>
    <item>
      <title>Matrix Room</title>
      <link>http://localhost/contact/matrix.html</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/contact/matrix.html</guid>
      <description>Matrix We are active on Matrix.&#xA;Here&amp;rsquo;s the Group Chat: This has many people. Keep in mind the group chat is public and unencrypted.&#xA;Go to join group, then enter this into your client:&#xA;public:matrix.simplifiedprivacy.is Here&amp;rsquo;s the 1-on-1 Support This is direct to a single person from Simplified Privacy to help you&#xA;@Support:Matrix.SimplifiedPrivacy.is </description>
    </item>
    <item>
      <title>Resources</title>
      <link>http://localhost/resources.html</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/resources.html</guid>
      <description>Internal Resources We host a variety of free privacy services for your convenience and freedom.&#xA;Matrix &amp;amp; XMPP Matrix and XMPP servers you can get an account for free, just ask&#xA;SimpleX SimpleX Message Server: smp://5TTeFvM5KIUDVsIcLD6n0xxq2tczKciMy6mdurzpPLw=@smp.chameleon.to:15223 XFTP: xftp://Lwwsu2vmkIKixxD5j4Skx8MDpxao5_pbfgE0Xj4RZ-I=@xftp.chameleon.to:15443&#xA;Add these to your SimpleX app!&#xA;RebelNet Rebelnet.me is a free message board for politics/technology using Nostr and Ethereum keypairs.&#xA;Subscribe Subscribe on Nostr, Bastyon, or Session to find out about new resources being offered!</description>
    </item>
    <item>
      <title>SimpleX Room</title>
      <link>http://localhost/contact/simplex.html</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/contact/simplex.html</guid>
      <description>SimpleX We are active on SimpleX.&#xA;Here&amp;rsquo;s the Group Chat: This has many people. https://simplex.chat/contact#/?v=2-4&amp;amp;smp=smp%3A%2F%2Fhpq7_4gGJiilmz5Rf-CswuU5kZGkm_zOIooSw6yALRg%3D%40smp5.simplex.im%2FXVf2UZLG2NxirJJlkO-yjU3BjbnK-QBo%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAy8t1QqQ_sOovdEAfXlWvWKH9dw-7kwl5menGf4JI8hU%253D%26srv%3Djjbyvoemxysm7qxap7m5d5m35jzv5qq6gnlv7s4rsn7tdwwmuqciwpid.onion&amp;amp;data=%7B%22type%22%3A%22group%22%2C%22groupLinkId%22%3A%225tJ0uL-PgZB4UjSIsbnyJQ%3D%3D%22%7D&#xA;Here&amp;rsquo;s the 1-on-1 Support This is direct to a single person from Simplified Privacy to help you https://simplex.chat/contact#/?v=2-5&amp;amp;smp=smp%3A%2F%2FenEkec4hlR3UtKx2NMpOUK_K4ZuDxjWBO1d9Y4YXVaA%3D%40smp14.simplex.im%2FfhWzbo2n3wxqg6gAvAgVf1x_viSrBi2X%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAGVMQ9_Dq592TxhVckR48CiVpkRK9Ew5RTMv_MeyB0zQ%253D%26srv%3Daspkyu2sopsnizbyfabtsicikr2s4r3ti35jogbcekhm3fsoeyjvgrid.onion </description>
    </item>
    <item>
      <title>XMPP Room</title>
      <link>http://localhost/contact/xmpp.html</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/contact/xmpp.html</guid>
      <description>XMPP We are active on XMPP.&#xA;Here&amp;rsquo;s the Group Chat (MUC): This has many people. Keep in mind the group chat is public and only has SSL encryption.&#xA;Go to join group, then enter this MUC into your client:&#xA;simplifiedprivacy@subscribe.simplifiedprivacy.is Here&amp;rsquo;s the 1-on-1 Support This is direct to a single person from Simplified Privacy to help you&#xA;XMPP@SimplifiedPrivacy.is OMEMO fingerprint:&#xA;ef5820fc2fb5ea45da378ed5e7291fcfbe5c9adbe4389386a288c3383e1a8506</description>
    </item>
    <item>
      <title>Zenaku</title>
      <link>http://localhost/zenaku-ocho-rios/</link>
      <pubDate>Sat, 20 Jul 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/zenaku-ocho-rios/</guid>
      <description>Zenaku has designed this website and animated Simplified Privacy’s videos. He’s available to bring your ideas to life. He understands technical topics such as blockchain and can clearly explain your product or brand. Additionally, he can deliver Linux support in Spanish, especially with Ubuntu issues.&#xA;Spanish lessons for English speakers can also be arranged via encrypted chat.</description>
    </item>
    <item>
      <title>Cloud Combo Package: Email, Docs, &amp; Chat</title>
      <link>http://localhost/email-cloud-combo/</link>
      <pubDate>Thu, 20 Jun 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/email-cloud-combo/</guid>
      <description>The Truth&#xA;Why should you have a self-hosted email? Because without it, you don’t own anything. Most websites force you to link an email, and the email can reset the password. And because email forces you to trust the provider, the provider really owns your accounts.&#xA;Don’t use Protonmail. Protonmail’s encryption is a conflict of interest. As they are protecting you from themselves. By registering a legal company, this forces them to comply with invasive orders from corrupt governments in violation of their own laws.</description>
    </item>
    <item>
      <title>Customized Privacy Consultation</title>
      <link>http://localhost/custom-consult/</link>
      <pubDate>Thu, 20 Jun 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/custom-consult/</guid>
      <description>These are just a few examples of the many things we can help with: Phones DeGoogle your Phone&#xA;Anonymous phone numbers, service, &amp;amp; evading geolocation&#xA;Isolating spyware apps using virtual emulated phones&#xA;Routers Avoid ISP surveillance of your devices &amp;amp; MAC addresses&#xA;Install an open source operating system on your router&#xA;Tech support for privacy routers&#xA;Putting a VPN on your router&#xA;Anonymity Hosting Websites/Blogs Anonymously &amp;amp; Censorship-resistance&#xA;Evade global internet monitoring (global passive adversary)</description>
    </item>
    <item>
      <title>Digital Hug</title>
      <link>http://localhost/digital-hug/</link>
      <pubDate>Thu, 20 Jun 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/digital-hug/</guid>
      <description>Digital Hug is the original author of Simplified Privacy’s Session Bot software. She wrote it in JavaScript and Python. This software allows Session to be used like an email list or decentralized Telegram, without a reliance on traditional internet DNS for censorship resistance.</description>
    </item>
    <item>
      <title>Goose</title>
      <link>http://localhost/goose/</link>
      <pubDate>Thu, 20 Jun 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/goose/</guid>
      <description>Goose directly handles customer orders and makes sure you have a smooth experience. Reach out to him at the main encrypted company accounts during western hemisphere business hours. (minus UTC).</description>
    </item>
    <item>
      <title>Linux Tech Support</title>
      <link>http://localhost/linux-tech-support-info/</link>
      <pubDate>Thu, 20 Jun 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/linux-tech-support-info/</guid>
      <description>These are just a few examples of the many things we can help with: Installs Coming from Windows? Dual Partition Installs/Repairs&#xA;Coming from Mac? Get help setting up your system to look just like iOS.&#xA;Fixing Errors We&amp;rsquo;ll solve your headache Save yourself time&#xA;Free Quotes Find out how involved it is&#xA;Variety Server or Home PCs&#xA;Huge variety of distros (such as Debian, Arch, Mint, Ubuntu, Whonix, Tails)&#xA;Support via audio or text</description>
    </item>
    <item>
      <title>Shadow Rebel</title>
      <link>http://localhost/shadow-rebel/</link>
      <pubDate>Thu, 20 Jun 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/shadow-rebel/</guid>
      <description>Shadow Rebel is engaged in unpaid free speech talking under a GNU public license. It just so happens that we release this free speech talking he records and publicly torrents under an open license as our videos. We don’t pay him, so there’s no tax or regulation.&#xA;He has spoken in person at local Libertarian party meetings. And his videos on internet censorship has been featured in the popular political Youtube channel VisualPolitik, which has over a million subscribers.</description>
    </item>
    <item>
      <title>Why is Telegram horrible</title>
      <link>http://localhost/why-is-telegram-horrible/</link>
      <pubDate>Sun, 16 Jun 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/why-is-telegram-horrible/</guid>
      <description>No MetaData Protection (Who and When)&#xA;Only Mobile is Encrypted (Phones have insecure hardware) [1]&#xA;Invented their own encryption algorithm Unaudited with a history of security vulnerabilities [2]&#xA;Most VoIP Numbers Blocked This how you could use crypto to hide who you are.&#xA;Tor Often Blocked Very strict &amp;ldquo;spam&amp;rdquo; filters, even if you just write one person.&#xA;History of handing over to police [3]&#xA;Centralized Telegram has a dictorship control over you.</description>
    </item>
    <item>
      <title>Leaked Lies at Google</title>
      <link>http://localhost/leaked-google-lies/</link>
      <pubDate>Tue, 11 Jun 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/leaked-google-lies/</guid>
      <description>Lied that they track users clicks as a factor for search rankings [1][3]&#xA;Lied about using data from Chrome browser for search, including clicks. This contradicted their sworn testimony to the Department of Justice on anti-trust. [1][3]&#xA;Lied about having a sandbox (to prevent “some” or new sites from ranking) [1][2][3]&#xA;Purposefully gave smaller “personal” sites their own category which ranked lower, EVEN IF they had more relevant information. To favor larger brands.</description>
    </item>
    <item>
      <title>Monero Tips added to RebelNet! [Q&amp;A]</title>
      <link>http://localhost/monero-tips-rebelnet/</link>
      <pubDate>Mon, 03 Jun 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/monero-tips-rebelnet/</guid>
      <description>RebelNet goes live with Monero tips. Here’s the information: Question: How do I tip others?&#xA;Answer: First hit the Monero icon at the bottom of the post. The address and an uptrend button will appear. Copy paste the XMR address into your off-platform wallet, and then hit the uptrend button to signify you sent it. It will prompt you to sign with your SOCIAL keys (Nostr or Eth) and then you know it’s sent when it increases the counter.</description>
    </item>
    <item>
      <title>0thell0</title>
      <link>http://localhost/othello/</link>
      <pubDate>Sat, 01 Jun 2024 10:00:00 -0700</pubDate>
      <guid>http://localhost/othello/</guid>
      <description>0thell0 has worked on the RebelNet front-end to integrate Monero tips and Ethereum Push Channel subscriptions. He works in coordination with DegenRocket.</description>
    </item>
    <item>
      <title>New Shocking Instagram Social Engineering revealed!</title>
      <link>http://localhost/instagram-social-engineering/</link>
      <pubDate>Mon, 27 May 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/instagram-social-engineering/</guid>
      <description>We all know that Meta and other Big Tech social media algorithms will “customize” the feed for each individual account, which is a fancy slang phrase for customized propaganda. But what you may have been unaware of is that NOT ONLY are the posts themselves altered, but also the COMMENTS.&#xA;If ever there was a better reason to switch to Nostr…&#xA;New evidence of social engineering in the comments section has come forth (see below), and this has shocking ramifications for the ability of governments and Big Tech to manipulate and distort our entire worldview of how popular certain concepts are.</description>
    </item>
    <item>
      <title>Quick Recap of the Libertarian Convention!</title>
      <link>http://localhost/libertarian-convention/</link>
      <pubDate>Mon, 27 May 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/libertarian-convention/</guid>
      <description>The goal of the Libertarian Convention was to select a presidential nominee. Here’s a quick recap:&#xA;Mises Caucus The Mises Caucus is an ideologically pure group, with Tom Woods, Dave Smith, and many others with an anti-lockdown message. This Caucus was backing Michael Rectenwald for the official nomination, but he lost to Oliver Chase&#xA;Oliver Chase Oliver Chase is anti-war and has many of the Libertarian principles, but he isn’t as ideologically pure on a few issues.</description>
    </item>
    <item>
      <title>Freedom Tech Alternatives List</title>
      <link>http://localhost/freedom-tech/</link>
      <pubDate>Sun, 26 May 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/freedom-tech/</guid>
      <description>You can disagree with my choices, but don’t let that be the reason you stay trapped. Twitter -&amp;gt; Nostr&#xA;Discord -&amp;gt; Matrix/IRC&#xA;Telegram -&amp;gt; Session&#xA;WhatsApp -&amp;gt; Signal/SimpleX&#xA;Gmail -&amp;gt; Self-host&#xA;Reddit -&amp;gt; RebelNet.me&#xA;Google docs -&amp;gt; Cryptpad&#xA;Dropbox -&amp;gt; NextCloud&#xA;Between Devices → SyncThing&#xA;SMS -&amp;gt; VoIP (if you have to)&#xA;Robinhood -&amp;gt; Hugo’s Way&#xA;Netflix -&amp;gt; LibreY Torrents&#xA;DocuSign -&amp;gt; Detached PGP on Arweave&#xA;Cash -&amp;gt; Monero&#xA;Archive.io -&amp;gt; Arweave</description>
    </item>
    <item>
      <title>How Google’s AI is harmful</title>
      <link>http://localhost/google-ai/</link>
      <pubDate>Sat, 25 May 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/google-ai/</guid>
      <description>The Rise of Google&amp;rsquo;s Influence Google initially gained prominence by analyzing web traffic and links, effectively reflecting the choices and popularity of the market. Its search engine&amp;rsquo;s ranking system was designed to mirror the collective preferences of internet users.&#xA;The Shift to AI and Information Control In recent years, Google has transitioned from a tool that aids in finding information to one that interprets and dictates what constitutes truth. With the integration of AI, Google&amp;rsquo;s capabilities now extend beyond mere summaries to influencing public opinion.</description>
    </item>
    <item>
      <title>How to Reduce Google’s Control Over You</title>
      <link>http://localhost/how-to-reduce-googles-control-over-you/</link>
      <pubDate>Sat, 25 May 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/how-to-reduce-googles-control-over-you/</guid>
      <description>Break Free There’s a huge number of steps you can take to reduce Google’s power and influence over your business and personal life.&#xA;Google Search: Mojeek, MetaGer, SearX, Brave Search, Duckduckgo Google Android: GrapheneOS, CalyxOS&#xA;Chrome Browser: LibreWolf, Brave, Ungoogled Chromium, Tor, Icecat&#xA;Google Docs: Cryptpad, NextCloud&#xA;Google Drive: Nextcloud, Ente.io (Photos), SyncThing&#xA;Google Meet: Jitsi, Brave’s Video Meet, Matrix (there’s a new web browser platform)&#xA;Gmail: Self-hosted: Mail-in-a-box, Luke Smith scripts, Mailu, iRedMail</description>
    </item>
    <item>
      <title>Socialist Fediverse vs Libertarian CypherPunks</title>
      <link>http://localhost/fediverse-vs-liberty/</link>
      <pubDate>Fri, 24 May 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/fediverse-vs-liberty/</guid>
      <description>Socialist Fediverse Brainwashed Mastodon and Lemmy users hate everything to do with capitalism. As part of their irrational dislike for Capitalism (which is really a call for violent theft), these moronic socialists favor Linux and open source software because of the lack of a business model. They fail to realize that banning anyone on the Fediverse even attempting any kind of business, is a quick way to degrade open source development.</description>
    </item>
    <item>
      <title>Microsoft will give Windows PCs a ‘photographic memory’</title>
      <link>http://localhost/windows-recall-photographic/</link>
      <pubDate>Tue, 21 May 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/windows-recall-photographic/</guid>
      <description>Mass Surveillance Recall Microsoft has unveiled their new mass surveillance tool, by revealing AI baked into Windows and the hardware itself that will take screenshots every few seconds and store and analyze this with AI. They are nicknaming this “Recall” and marketing it as Windows having photographic memory. It stores everything you’ve worked on and done to “know about you” or “better serve you”.&#xA;Elon Musk Even MSN, which is normally a propaganda outlet for the regime, prominently displays criticism of Elon Musk likening it to the fictional dystopia Black Mirror.</description>
    </item>
    <item>
      <title>Deleted Nudes Permanently Leak on Apple?!</title>
      <link>http://localhost/apple-leaks-forever/</link>
      <pubDate>Sat, 18 May 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/apple-leaks-forever/</guid>
      <description>New iOS update is resurfacing deleted files that users thought were gone.&#xA;In some cases, nude photos, after the user wiped it and sold the device.&#xA;According to the Verge, quote:&#xA;“Apple appears to have a bug that’s dredging up data that iPhone owners thought was gone. Some iPhone owners are reporting that, after updating their phones to iOS 17.5, their deleted photos — some quite old — are popping up again, according to a Reddit thread that MacRumors spotted.</description>
    </item>
    <item>
      <title>4 Open Source Software/Apps for your Liberty &amp; Pleasure!</title>
      <link>http://localhost/foss-apps/</link>
      <pubDate>Fri, 17 May 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/foss-apps/</guid>
      <description>MPV Super high quality video player. Open MPV and VLC side by side on something like Game of Thrones and you’ll immediately see the graphics are just on another level. In fact, when I drank Moonshine, an elf told me that the ONLY way Stevie Wonder could see movies was MPV.&#xA;Zathura Fastest PDF reader in the wild west. If you lined up every PDF reader and opened them side by side, Zathura will outgun every other one in record time.</description>
    </item>
    <item>
      <title>Get a Free Month of VoIP from JMP Chat?</title>
      <link>http://localhost/jmp-chat/</link>
      <pubDate>Thu, 16 May 2024 00:06:00 +0000</pubDate>
      <guid>http://localhost/jmp-chat/</guid>
      <description>Simplified Privacy now has a promotional deal with VoIP provider JMP Chat. If you get a VPS from us with XMPP, email, and cryptpad docs, we’ll throw in a free month of JMP Chat VoIP to hook into your XMPP account. JMP Chat works by converting SMS texts and regular phone calls to open source XMPP. So it hides your location and keeps your name off the billing by using crypto.</description>
    </item>
    <item>
      <title>Internet Structure is Lame. (&amp; how to fix it)</title>
      <link>http://localhost/internet-structure-lame/</link>
      <pubDate>Mon, 13 May 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/internet-structure-lame/</guid>
      <description>The problem: a) Domain names are the government&amp;rsquo;s opinion of your identity&#xA;b) SSL Encryption is not even based on these flawed domains, even worse than that, it&amp;rsquo;s based on locations, so the cloud host owns everything&#xA;c) Even worse than that, not just the cloud host owns it, but on top of that Cloudflare sees everything. You submit your password, Cloudflare&amp;rsquo;s CDN sees it. They own every account you thought you owned.</description>
    </item>
    <item>
      <title>Cryptpad vs NextCloud: the anti-Google.</title>
      <link>http://localhost/cryptpad-vs-nextcloud/</link>
      <pubDate>Sat, 11 May 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/cryptpad-vs-nextcloud/</guid>
      <description>Toxic Google Docs Google docs is so toxic, because it fingerprints your writing style and keyboard mannerisms, to permanently and maliciously identify other new accounts as you. [1] They will claim this is to show you “relevant ads”, but we’ve documented numerous times their contracts with governments to mold society’s opinions and jail users. [2][3]&#xA;Unusable In order to make sure they can maliciously identify you for profit, Google docs will not display correctly, unless you disable aggressive fingerprint blocking techniques.</description>
    </item>
    <item>
      <title>Decloaking VPN traffic: New critical vulnerability</title>
      <link>http://localhost/novel-attack-vpn-tunnelvision/</link>
      <pubDate>Tue, 07 May 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/novel-attack-vpn-tunnelvision/</guid>
      <description>Tinfoil Hat Remember all the people calling me a tinfoil hat wacko for insisting on open source routers?&#xA;TunnelVision There is a new critical VPN vulnerability from Leviathan Security group, which they call “TunnelVision”. It allows the ISP or local router to see the VPN traffic by abusing the DHCP client and option 121&#xA;Here’s the basics: LAN –It uses the local area network, so we’re talking about a hostile router</description>
    </item>
    <item>
      <title>But I have to get reach -Big Tech users</title>
      <link>http://localhost/but-i-have-to-get-reach-big-tech-users/</link>
      <pubDate>Sat, 04 May 2024 06:00:00 +0000</pubDate>
      <guid>http://localhost/but-i-have-to-get-reach-big-tech-users/</guid>
      <description>Some cling to Big Tech social media with the flawed logic of “Oh well Nostr, Session, or Eth push channels sound nice, but I have to get reach. I have to be where the people are.”&#xA;But just creating an account by itself doesn’t get you reach on Youtube, Twitter, Discord, or Telegram. You need fans to even show up in search, or have your stuff retweeted. So the more heavily invested you are in the corrupt censorship platform, the more benefit you’d get.</description>
    </item>
    <item>
      <title>RebelNet Tutorials By Type</title>
      <link>http://localhost/rebelnet-tutorials/</link>
      <pubDate>Fri, 03 May 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/rebelnet-tutorials/</guid>
      <description>RebelNet Video Tutorials grouped by type. Nostr Browser: IceRaven (Firefox based) Nostr&#xA;Android&#xA;Extension: Nos2x-fox&#xA;No Google Store. No Pop-ups.&#xA;https://rebelnet.me/news/0xc5c7e9706d65f10d29&#xA;Browser: Kiwi Browser (Chromium-based) Nostr&#xA;Android&#xA;Extension: Flamingo&#xA;https://rebelnet.me/news/0x1f5746859145503128&#xA;Desktop Nostr&#xA;Browser: Any&#xA;Extensions: Nos2x, Flamingo&#xA;https://rebelnet.me/news/0x7480de270c36863343&#xA;Ethereum Mobile &amp;amp; desktop Browser: Any&#xA;Extension: MetaMask&#xA;https://rebelnet.me/news/0x78e2b8d7a367de3534&#xA;You can also use Brave Browser’s built-in Ethereum wallet to avoid any external extension store if you like.</description>
    </item>
    <item>
      <title>Ditch Youtube subs: Ethereum Push Channels</title>
      <link>http://localhost/ditch-youtube-subs-ethereum-push-channels/</link>
      <pubDate>Thu, 02 May 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/ditch-youtube-subs-ethereum-push-channels/</guid>
      <description>Anti-Eth Fanbase Our website fanbase is a mix of Monero maxis and Bitcoin-Maxis.&#xA;But zero Eth fans. This is why I know I’m going to get a lot of shit for promoting Ethereum push channels as a substitute for Youtube subscriptions that aren’t as sensitive to time, to compliment Nostr’s substitute for a fast trending Twitter. And Eth channels have far better discovery and can spread in ways that Session messenger can not.</description>
    </item>
    <item>
      <title>Update: Feather Wallet 2.6.7 Released. Fixes issue</title>
      <link>http://localhost/feather-wallet-minor-issue-will-be-fixed-shortly/</link>
      <pubDate>Mon, 29 Apr 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/feather-wallet-minor-issue-will-be-fixed-shortly/</guid>
      <description>Update from previous article: You have to update Feather wallet, it fixes a previous minor error with sending Monero. This new version is 2.6.7, and I confirmed it works. Your funds are safe. Update right in the wallet. Spread the word.&#xA;Original article 1 day prior: Feather wallet has an issue.&#xA;Version 2.6.5 may potentially get a failed transaction on sending funds.&#xA;Version 2.6.6 has issues with starting up on Linux.</description>
    </item>
    <item>
      <title>Why should you try RebelNet.me ?</title>
      <link>http://localhost/why-should-you-try-rebelnet-me/</link>
      <pubDate>Sun, 28 Apr 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/why-should-you-try-rebelnet-me/</guid>
      <description>Why RebelNet? Reach is not based on followers. You can be heard based on merit. But you can increase your followers on “Native Nostr”, so it’s productive.&#xA;Most Nostr clients don’t differentiate between different people reposting the same content. This leads to an annoying echo chamber of scrolling through the same thing, and sets up posts to be an all or nothing chance at going viral&#xA;Native Nostr is highly sensitive to time.</description>
    </item>
    <item>
      <title>RebelNet is born</title>
      <link>http://localhost/rebelnet-born/</link>
      <pubDate>Sat, 27 Apr 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/rebelnet-born/</guid>
      <description>We’re rebranding our “encryption as identity” social network, Meet, the Rebel Net, https://rebelnet.me/news/0xad937afc3901f9e4c6 The focus of this instance will be: -Libertarian, AnCap, Political news&#xA;-CypherPunk Tech&#xA;-Agora networking &amp;amp; Meeting new people (Nostr/Eth channels/IPFS pages)&#xA;Nostr: Firefox/Tor? Nos2fx extension&#xA;Brave/Chromium? Nos2x or Flamingo&#xA;Mobile? Kiwi Browser w/ Nos2x or Flamingo.&#xA;Don’t trust anything? Make a new keypair, that’s fine. You get heard regardless of followers.&#xA;Ethereum Push channels: Desktop? MetaMask browser extension</description>
    </item>
    <item>
      <title>Privacy Checklist</title>
      <link>http://localhost/privacy-checklist/</link>
      <pubDate>Mon, 22 Apr 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/privacy-checklist/</guid>
      <description>Privacy Checklist Here’s some concrete steps you can take to aid you on your journey.&#xA;Step 1. Learn Linux It’s easier than you think. You don’t need the command line, and the software compatibility isn’t as big a deal as it used to be, because a lot is in a web browser now. Over the last 10 years, Linux has improved dramatically, while as Microsoft Windows has gotten worse due to their increased surveillance wasting more and more resources.</description>
    </item>
    <item>
      <title>Buy the Dip?! Biden says US won’t back Israeli response to Iran</title>
      <link>http://localhost/buy-dip-peace-news/</link>
      <pubDate>Sun, 14 Apr 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/buy-dip-peace-news/</guid>
      <description>Above is the one hour (1h) chart at noon UTC Sunday April 14.&#xA;Some cypherpunks are confused as to why cryptocurrency prices are affected by war in this situation.&#xA;And the answer is that Wall Street considers crypto to be a tech stock, especially after the US Bitcoin ETF. And at the highest end of the risk spectrum. Therefore, considering the traditional markets like the NASDAQ are closed, the leveraged traders short sell risk where they can in the only 24/7 market.</description>
    </item>
    <item>
      <title>Interview: Facebook ban erased 17 years of her photos…</title>
      <link>http://localhost/facebook-ban/</link>
      <pubDate>Fri, 12 Apr 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/facebook-ban/</guid>
      <description>Censored Meta permanently banned this harmless woman across Facebook, Instagram, and Threads for a single Trump meme, erasing 17 years of photos, her memories, and her only means of reaching some international friends.&#xA;Simplified Privacy interviewed “Dog Mother”. While at first reluctant, she agreed in order to warn others about trusting Big Tech, and to switch to Nostr, before it’s too late,&#xA;Interview Thank you for taking the time to chat with me today.</description>
    </item>
    <item>
      <title>Protonmail makes it harder on burners</title>
      <link>http://localhost/protonmail-burners/</link>
      <pubDate>Fri, 12 Apr 2024 06:00:00 +0000</pubDate>
      <guid>http://localhost/protonmail-burners/</guid>
      <description>Deleting Inactives Protonmail just announced they are now deleting inactive accounts, making it a huge pain in the ass for you to have many different free burner emails.&#xA;Passive Surveillance As we all know, passive surveillance with email is a huge problem, as many dumb websites force insecure email authentication to login to their services. And so a single email provider can then easily see all your activity across the entire internet.</description>
    </item>
    <item>
      <title>CLI Session Bot Release Notes</title>
      <link>http://localhost/cli-session-bot-notes/</link>
      <pubDate>Thu, 11 Apr 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/cli-session-bot-notes/</guid>
      <description>Session CLI Note: This article is only intended for those that intend to run the Session bot, and not everyday readers. What if you could self-custody your communication like a crypto wallet? CLI Simplified Privacy has created both command line (CLI) and graphical interface (GUI) Session bot software, and you can use either.&#xA;The CLI version is far better for servers and for the distribution list to scale. The GUI version is more appropriate for a home user with a small list and less technical experience.</description>
    </item>
    <item>
      <title>Session vs Nostr</title>
      <link>http://localhost/session-v-nostr/</link>
      <pubDate>Mon, 08 Apr 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/session-v-nostr/</guid>
      <description>Session vs Nostr Session and Nostr both: Use static, locally generated, public-private encryption keypairs&#xA;Connect to public nodes/relays to hold messages&#xA;Identity is disconnected from location or government domains&#xA;Hard to censor individuals.&#xA;Don’t rotate keys, but…&#xA;Session lets you assign your blockchain name to a new keypair manually if your private key is compromised. This is like “Nostr with an undo button”.&#xA;Misunderstood Session is marketed as privacy, but its true strength is censorship resistance.</description>
    </item>
    <item>
      <title>Why Session’s censorship resistance is the strongest</title>
      <link>http://localhost/uncensored/</link>
      <pubDate>Mon, 08 Apr 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/uncensored/</guid>
      <description>Explain it to me like I’m 16, a) Encryption has a public key and a private key.&#xA;b) Nostr, Tor Onions, and Session all use encryption as identity, with the public key as your username, and the private key as your password&#xA;c) If the government obtains your private key for Nostr or Tor Onion, it’s game over. You lost.&#xA;d) But if the government gets your Session private key, you then re-assign your username on the blockchain to another account with a 2nd key.</description>
    </item>
    <item>
      <title>Libertarian Institute Partnership</title>
      <link>http://localhost/libertarian-institute/</link>
      <pubDate>Wed, 03 Apr 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/libertarian-institute/</guid>
      <description>Partnership Simplified Privacy is proud to announce our partnership with the Libertarian Institute to promote, manage, and setup services for their Session &amp;amp; Nostr!&#xA;The Libertarian Institute features many amazing authors, podcasters, and influencers:&#xA;Scott Horton&#xA;Sheldon Richman&#xA;Laurie Calhoun&#xA;James Bovard&#xA;Ted G. Carpenter&#xA;Kyle Anzalone&#xA;Keith Knight&#xA;And Tom Woods&#xA;This is a big opportunity for privacy and freedom technology to spread, and to raise awareness of the dangers of using Big Tech surveillance infrastructure that is looking to actively censor and crush Libertarians.</description>
    </item>
    <item>
      <title>Why you need to be on Nostr</title>
      <link>http://localhost/why-you-need-nostr/</link>
      <pubDate>Wed, 03 Apr 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/why-you-need-nostr/</guid>
      <description>The problem is that you lack control… People mistakenly only think of censorship in terms of controversial political speech. But the real underlying issue for ANY business is that in order to reach and convert more customers, you have to convert them in the environment they are already in, but that is a space you do not control or own.&#xA;SEO If we’re talking about SEO, you don’t control Google’s algorithm.</description>
    </item>
    <item>
      <title>Is Email Private? Easy Basics</title>
      <link>http://localhost/email-basics/</link>
      <pubDate>Sun, 31 Mar 2024 06:00:00 +0000</pubDate>
      <guid>http://localhost/email-basics/</guid>
      <description>Question: Is email encrypted or private?&#xA;Answer: Let’s take a step back and learn how the web works. Domains point to IP addresses or physical locations. The physical location registers encryption keys with a certificate authority. Then when an email is sent, it looks up what IP address to send it to and the public encryption key. When it gets to that physical location, it’s then unencrypted. So it’s only encrypted in transport.</description>
    </item>
    <item>
      <title>Open Letter to LewRockwell &amp; Mercola</title>
      <link>http://localhost/letter-to-lewrockwell/</link>
      <pubDate>Thu, 28 Mar 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/letter-to-lewrockwell/</guid>
      <description>Dear Dr. Mercola, Article Your article on LewRockwell on “Ditching Google” obviously has messages we agree with, however your privacy suggestions at the end are unfortunately flawed. This is an open letter we are publishing on our website, so the community can benefit and learn as well.&#xA;Privacy Policy Your suggestion of reading the privacy policy for every website people visit to avoid Google analytics is not practical and assumes honesty.</description>
    </item>
    <item>
      <title>Guide to “Good” Nostr Relays (Tor Onions, No Big Tech, &amp; XMR)</title>
      <link>http://localhost/nostr-relay-guide/</link>
      <pubDate>Wed, 27 Mar 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/nostr-relay-guide/</guid>
      <description>This is a guide to avoiding Nostr censorship by better understanding its relays. How Relays Work On Nostr, users both post and receive content from relays. You get to pick which ones YOU post to, but you can’t pick which ones the people you’re following post to.&#xA;HOWEVER, your client automatically figures out which relays the person you’re pulling content posts to, compared to the other people you’re following. And then the client automatically pulls all these together from the SAME relay to make it faster.</description>
    </item>
    <item>
      <title>List of Nostr Relays by Cloud Company</title>
      <link>http://localhost/nostr-relays-by-company/</link>
      <pubDate>Wed, 27 Mar 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/nostr-relays-by-company/</guid>
      <description>You want to post and read from a variety of different companies for decentralization.&#xA;Bytefilter SethforPrivacy is a good one&#xA;(not big tech)&#xA;wss://nostr.sethforprivacy.com/&#xA;swissns GmbH wss://nostr.thank.eu&#xA;Nubes wss://nostr21.com&#xA;Akamai (Linode) wss://nostr-pub.wellorder.net&#xA;MULTACOM CORPORATION wss://offchain.pub&#xA;GoDaddy wss://relay.nostriches.org&#xA;IONOS SE wss://lightningrelay.com&#xA;The Constant Company, LLC wss://purplepag.es/&#xA;MULTACOM CORPORATION wss://nostr.bitcoiner.social&#xA;Digital Ocean wss://relay.nostrati.com&#xA;Pick One ONLY ONE Cloudflare: Cloudflare, Inc.&#xA;wss://relay.damus.io&#xA;Cloudflare, Inc.&#xA;wss://relay.snort.social&#xA;Cloudflare, Inc.&#xA;wss://nostr.wine/&#xA;Cloudflare, Inc.&#xA;wss://pyramid.fiatjaf.com&#xA;Cloudflare, Inc.</description>
    </item>
    <item>
      <title>Tor Onion Nostr Guide: Best Apps</title>
      <link>http://localhost/tor-nostr/</link>
      <pubDate>Tue, 26 Mar 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/tor-nostr/</guid>
      <description>Mobile For Tor on mobile, with a client such as Amethyst, your choices are:&#xA;Orbot&#xA;InvizPro&#xA;Keep in mind that both of these do NOT switch Tor circuits for different apps like Whonix does. So the Tor exit sees your other apps, which if they are something like a KYC Telegram or Signal number, doxes your Nostr account.&#xA;If you’re just doing random fun shit, who cares. But if you really care, then you can either do different profiles on Graphene, toggle networking off, or use Calyx’s firewall app.</description>
    </item>
    <item>
      <title>Summary of Guides</title>
      <link>http://localhost/summary/</link>
      <pubDate>Mon, 25 Mar 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/summary/</guid>
      <description>What’s the best ___________ ? Pro/Con of Phone Numbers/Services, Link&#xA;Best VPS hosts, Link&#xA;How VoIP works, Link&#xA;Best Crypto-&amp;gt;Crypto “No KYC” Swap Sites: Link&#xA;Best Crypto→ Fiat gift cards: Link&#xA;Types of DeGoogled Phones, Link&#xA;Pro/Con of Linux Distros, Link&#xA;Pro/Con of Private Routers Link&#xA;Pro/Con of Virtual Machines, Link&#xA;Best Agora Societies, Link&#xA;Best Google Alternatives, Link&#xA;Best email? Check out, Link&#xA;If you find our work of value, please consider a micro donation.</description>
    </item>
    <item>
      <title>Spain has banned Telegram. Defending Session</title>
      <link>http://localhost/spain-has-banned-telegram-defending-session/</link>
      <pubDate>Sat, 23 Mar 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/spain-has-banned-telegram-defending-session/</guid>
      <description>Spain has banned Telegram, and they are claiming this is over copyright violations of users, that Telegram is failing to police. [1] Now some users will be forced to consider decentralized solutions. As I have repeated many times, Session messenger empowers users to defy state level censorship, with its unique blockchain based DNS that completely separates physical locations from identity.&#xA;With Session, if the location of the VPS or device is discovered, the user can rotate the blockchain name to a new public key.</description>
    </item>
    <item>
      <title>How to Download Youtubes (DeGoogle)</title>
      <link>http://localhost/how-to-download-youtubes/</link>
      <pubDate>Wed, 20 Mar 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/how-to-download-youtubes/</guid>
      <description>One of our readers asked if there’s an open source way to download Youtube videos, for music mp3 or the entire video. Yes, there is.&#xA;For web browser, Invidious There’s Invidious.io. You can use their list of instances or get served up a fresh one from farside.link&#xA;Cobalt One of our readers BrikoX, suggested Cobalt.tools&#xA;Which has the source code here: https://github.com/wukko/cobalt&#xA;Put Some of our Nostr readers suggested put.io for speed and convenience, but keep in mind its not open source.</description>
    </item>
    <item>
      <title>Hack on France’s government database! Will it stop VPN restrictions?</title>
      <link>http://localhost/france-hack-vpn-restrictions/</link>
      <pubDate>Sat, 16 Mar 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/france-hack-vpn-restrictions/</guid>
      <description>Simplified Privacy questions the legitimacy of France’s new heavy VPN restrictions, when their own government failed to secure data on their citizens. In a shocking new hack, the data of 43 million French citizens was leaked onto the darkweb. According to Bleeping Computer, the hack was of a French government unemployment agency and included massive sensitive personal details including. Quote,&#xA;-Full name -Date of birth&#xA;-Place of birth&#xA;-Social security number (NIR)</description>
    </item>
    <item>
      <title>Unproven Proprietary Software Jails Bitcoin User</title>
      <link>http://localhost/unproven-proprietary-chainalysis-software-jails-bitcoin-user/</link>
      <pubDate>Fri, 15 Mar 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/unproven-proprietary-chainalysis-software-jails-bitcoin-user/</guid>
      <description>Dangerous legal precedent Because the only hard evidence for him to potentially serve 20 years in prison is that his KYC Bitcoin went through many hops and wallets, before being used later to supposedly buy a domain name. This domain was then used for a Bitcoin privacy service, that had not yet even been declared illegal during its initial operation. That’s why it operated on both the clearweb and Tor.</description>
    </item>
    <item>
      <title>Monero Update Released!</title>
      <link>http://localhost/monero-update-released/</link>
      <pubDate>Sun, 10 Mar 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/monero-update-released/</guid>
      <description>Binaries for Official Monero v0.18.3.2 are now available at getmonero.org&#xA;Also Feather wallet: Go to help -&amp;gt; Check for updates&#xA;Update your wallets! This has the fee fix! </description>
    </item>
    <item>
      <title>Working Monero Nodes</title>
      <link>http://localhost/working-monero-nodes/</link>
      <pubDate>Sat, 09 Mar 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/working-monero-nodes/</guid>
      <description>This is a list of working Monero nodes from the community. Simplified Privacy server: 111.90.140.158:18081&#xA;Others from Monero Matrix: 10.150.0.22:18081&#xA;192.168.1.150:18081&#xA;15.204.197.8:18081&#xA;dtrnd4in2igrtfx2c45ghf2drns3doddmcsfy6b5gjw5iinukd33slqd.onion:18081&#xA;node3-us.monero.love:18081&#xA;node.tux.pizza:443 (SSL)&#xA;edge7.servebeer.com:18089&#xA;node.chaoswg.dev:443 (SSL)&#xA;node.xmr.cz:18081&#xA;Contact us to get your node on the list. </description>
    </item>
    <item>
      <title>Monero Spam Attack, is Nostr’s Creator to Blame?</title>
      <link>http://localhost/monero-attack-nostr/</link>
      <pubDate>Fri, 08 Mar 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/monero-attack-nostr/</guid>
      <description>Fee Bug There is currently a fee bug with Monero, that the wallet doesn’t automatically bump the fee when there is a backlog.&#xA;This fee bug is causing sync issues with many wallets, because a large txpool causes a lot of load on public nodes. Monero official GUI, CLI, feather, and some Cake nodes are affected.&#xA;The bug has already been solved with Anonero.io, and other wallets will be rolling out fixes shortly.</description>
    </item>
    <item>
      <title>How to Use RebelNet w/ Nostr (Previously Linked-out)</title>
      <link>http://localhost/nostr-linked-out/</link>
      <pubDate>Fri, 08 Mar 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/nostr-linked-out/</guid>
      <description>How to Use RebelNet w/ Nostr (Previously Linked-out) This is a guide to using Nostr with RebelNet.me. This previous article goes over what this.&#xA;Linked-Out.me is a network of federated websites. Normally with a website, you enter a password into the website. But with encryption based social networks such as Nostr, you “sign” posts to prove it’s you. So the website never sees your password and this empowers the end user.</description>
    </item>
    <item>
      <title>Moral value is Objective, while Economic value is Subjective</title>
      <link>http://localhost/objective-subjective/</link>
      <pubDate>Thu, 07 Mar 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/objective-subjective/</guid>
      <description>Morality is Objective Ayn Rand’s iconic writings laid out a foundation for “Objectivism”, which taught that morality is objective and man must use logic and reason to formulate how to live.&#xA;In my words, if morality is subjective there is no purpose.&#xA;I can commit crimes and say “oh but to me it feels right”.&#xA;And using reason, we can determine that the only time violence is moral, is to defend against others who do so.</description>
    </item>
    <item>
      <title>Big Tech Hall of Shame</title>
      <link>http://localhost/big-tech-hall-of-shame/</link>
      <pubDate>Sat, 02 Mar 2024 01:34:00 +0000</pubDate>
      <guid>http://localhost/big-tech-hall-of-shame/</guid>
      <description>Hive.io / PeakD Uncensored Hive is a Nostr competitor. But the entire platform is built on the lie that you’re uncensored.&#xA;Cloudflare sees They say you own your identity, but yet they sell you the encryption keypair, and it’s served from a Cloudflare server. So the government can see the private key that you paid for, to do “uncensored” posting. Hive can fix it, please listen to me.&#xA;Local Keypair Have your users create a keypair locally in your browser extension.</description>
    </item>
    <item>
      <title>Signal Usernames for DESKTOP just rolled out</title>
      <link>http://localhost/signal-usernames-desktop/</link>
      <pubDate>Thu, 29 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/signal-usernames-desktop/</guid>
      <description>Flatpak If you got flatpak, just do “flatpak update”&#xA;If you got it through your distro like apt, depends on the distro when ready.&#xA;Arch AUR Package is ready now:&#xA;https://archlinux.org/packages/extra/x86_64/signal-desktop/&#xA;Mobile: Molly Now for mobile, you want to avoid corrupt Google Play. But that’s where the update is.&#xA;So if you’re having issues with getting the update via APK android, and you’re dying to get it now, then if you use Molly, it will give you access:</description>
    </item>
    <item>
      <title>Crypto Anarchy vs Anarcho Capitalism</title>
      <link>http://localhost/crypto-anarchy-ancap-agora/</link>
      <pubDate>Tue, 27 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/crypto-anarchy-ancap-agora/</guid>
      <description>Overview In this article we’ll discuss the differences between the phrases: Anarcho Capitalism, Crypto Anarchy, and Agorism.&#xA;Anarcho Capitalism (abbreviated AnCap) is an openly advertised political movement that promotes free markets and an abolition of the state. Most AnCaps will OPENLY tell you they are part of this movement, and it shares many similarities with Libertarians. Libertarians and AnCaps only really differ on should the government run a socialized police force and army.</description>
    </item>
    <item>
      <title>Ubuntu Bitcoin Snap Hack, yet CEO is still clueless</title>
      <link>http://localhost/ubuntu-crypto-snap-scam/</link>
      <pubDate>Sun, 25 Feb 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/ubuntu-crypto-snap-scam/</guid>
      <description>Scam Exodus A scammer got a fake version of Exodus wallet in Canonical’s Ubuntu snap store. This fake scam wallet drained nearly half a million USD worth in cryptocurrency from a user. The scammer was able to fake Exodus wallet’s logo without anyone from the company or Canonical noticing. It sucks for that guy who lost so much. But the even sadder part is that Ubuntu just doesn’t get it. Quoting Mark Shuttleworth, CEO of Canonical,</description>
    </item>
    <item>
      <title>Original GUI Version of Session Bot Software</title>
      <link>http://localhost/release-session-bot/</link>
      <pubDate>Sat, 24 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/release-session-bot/</guid>
      <description>Original GUI This is for the original GUI version of the Session bot software, we have since upgraded to a CLI version, which has Electron stripped for better scaling and interaction with the Session protocol. However this version is still useful for home users that are less technical, and have a smaller list to distribute to.&#xA;What if you could self-custody your communication like a crypto wallet? Today, Simplified Privacy is open sourcing the code that cost months of time and 2 grand to develop.</description>
    </item>
    <item>
      <title>Original GUI version of Session Bot: Install Instructions</title>
      <link>http://localhost/session-bot-install/</link>
      <pubDate>Sat, 24 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/session-bot-install/</guid>
      <description>Overview: This is an overview on how to setup the original GUI version of the Bot on a fresh VPS, please note that we now offer a CLI version to avoid the hassle of VNC setup. For the GUI version, the VPS requires a graphical environment used through the VNC. The first few steps are setting up the VNC and users. If it’s run on a home computer, then this is not required obviously.</description>
    </item>
    <item>
      <title>Session Bot: Technical Overview</title>
      <link>http://localhost/session-bot-tech-overview/</link>
      <pubDate>Sat, 24 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/session-bot-tech-overview/</guid>
      <description>Overview This technical overview is for the original GUI Version, however, the new CLI version works the same way. It just doesn’t use PyGUI and instead is Session’s JavaScript code stripped of Electrum.&#xA;FAST Overview Core Bot Functionality: a) Accept incoming new requests&#xA;b) Respond to users with custom pre-made messages&#xA;c) Anti-DDoS Tactics in replies&#xA;d) Sends out your new content to the free or premium list&#xA;e) Bills in XMR or BTC-Lightning</description>
    </item>
    <item>
      <title>Libertarian CypherPunk Podcasts</title>
      <link>http://localhost/libertarian-cypherpunk-podcasts/</link>
      <pubDate>Fri, 23 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/libertarian-cypherpunk-podcasts/</guid>
      <description>CypherPunk The Journey A CypherPunk is someone who uses privacy and encryption to advocate for and advance freedom and civil liberties. This doesn’t come out of nowhere on a whim, but requires a deep knowledge of technology, politics, and philosophy. This list can help guide you on that journey, but ultimately it can only be done by you.&#xA;RSS These should be listened to on AntennaPod using RSS, so you get it direct from the source, and NOT the “Apple Store” because of censorship/surveillance.</description>
    </item>
    <item>
      <title>LunarDAO Twitter Spaces Event</title>
      <link>http://localhost/lunardao/</link>
      <pubDate>Wed, 21 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/lunardao/</guid>
      <description>LunarDAO LunarPunk LunarDAO is a controversial privacy-focused DAO investing in privacy and freedom projects. They promote the idea of a LunarPunk, which is a collective group resistance to rebel against the corruption in both the traditional fiat financial sector and cryptocurrency ecosystems, with the end goal of promoting individual freedom.&#xA;SolarPunks LunarDAO labels many cryptocurrencies as “SolarPunks”, because these projects assume that the government will allow them to exist. This assumption enables the government to ban the project because they rely on Big Tech or do not have clear adversarial thinking in their foundational infrastructure.</description>
    </item>
    <item>
      <title>New Usernames? New Signal Group</title>
      <link>http://localhost/signalgroup/</link>
      <pubDate>Wed, 21 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/signalgroup/</guid>
      <description>Obviously we prefer Session, SimpleX, &amp;amp; XMPP over Signal. Signal still requires a number to register and is completely centralized to Amazon’s AWS. Tucker Carlson’s Signal was compromised.&#xA;This being said, it’s 1000 times better than SMS or WhatsApp groups. And we want to make privacy accessible to anyone. So to celebrate Signal’s new feature of allowing usernames to hide your phone number from group members, we now have a Signal Group:</description>
    </item>
    <item>
      <title>Why Privacy? Depends on Who’s Asking…</title>
      <link>http://localhost/why-privacy/</link>
      <pubDate>Sat, 17 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/why-privacy/</guid>
      <description>Explain it to me like I’m… Black AI firm Palentir sells preemptive surveillance data to the LA police to use traffic cameras for targeted racist “pre-crime” frisking. [1] Let’s see what we can find BEFORE crimes are done…&#xA;Muslim Salaat First, an app that reminds Muslims when to pray, sells user data to both the FBI and ICE to consistently track user locations. [2] As Guantánamo Bay tortures prisoners without even a trial.</description>
    </item>
    <item>
      <title>After this court ruling, EU Chat Control is dead</title>
      <link>http://localhost/court-rules-against-eu-chat-control/</link>
      <pubDate>Fri, 16 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/court-rules-against-eu-chat-control/</guid>
      <description>European Union politicians have been trying to pass “Chat Control” which would ban end-to-end encrypted communications. A new big court ruling on Telegram is a game changer for this. Let’s first get a very BRIEF context for this court ruling. Context Previously So PRIOR to Russia’s invasion of Ukraine, Russia was previously abiding by the European Court of Human Rights (ECHR). This EU court was hearing a case of Russia’s government against Telegram, with the Russian government demanding a backdoor and the decryption of data.</description>
    </item>
    <item>
      <title>The Tyranny of KYC</title>
      <link>http://localhost/kyc-tyranny/</link>
      <pubDate>Thu, 15 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/kyc-tyranny/</guid>
      <description>History of KYC KYC&amp;rsquo;s Birth KYC was initially created in the wake of the September 11 terrorist attacks to supposedly stop terrorist financing, but it’s the US government that funded Al-Qaeda BOTH before and after 9/11.&#xA;Before 9/11 Osama-bin-laden originally was financed with “Operation Cyclone” in the 1970s to stop soviet influence in Afghanistan. [1] That’s how he got rich enough to do 9/11.&#xA;After 9/11 Then AFTER 9/11, the US funded Al-Qaeda in Syria, to overthrow the Syrian president Bashar-al-Assad.</description>
    </item>
    <item>
      <title>4 Reasons Monero Won’t Die like Tornado Cash</title>
      <link>http://localhost/monero-vs-tornado-cash/</link>
      <pubDate>Wed, 14 Feb 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/monero-vs-tornado-cash/</guid>
      <description>Reason 4. Mixer vs Native Currency Tornado is transparent Tornado Cash was a mixer for Ethereum. This means anyone can clearly see which funds are coming from it, making it easy to sanction. On the other hand, if any transparent crypto was traded for, or from Monero, the public blockchain wouldn’t show it. When you combine this with privacy properties like hidden senders from Bitcoin Lightning, or even recent atomic swap developments with Bitcoin Cash using CashFusion [1], it’s not even clear whose trading into XMR, even if the government is an undercover direct seller.</description>
    </item>
    <item>
      <title>AnonShop ain’t so Anonymous</title>
      <link>http://localhost/fake-anonshop/</link>
      <pubDate>Sat, 10 Feb 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/fake-anonshop/</guid>
      <description>Mullvad Changed… For those of you who don’t know, we’re waging a war against involuntary Big Tech. Thanks to you sharing our article criticizing Mullvad’s use of Gmail, they just started self-hosting emails:&#xA;Read the full article&#xA;Huge win for freedom, because it shows that it’s possible to get someone to give a shit. But unfortunately, there’s still a lot of work to be done. The overwhelming majority of privacy/political freedom/crypto sites all use it and do not give one diddly squat.</description>
    </item>
    <item>
      <title>PGP Directory (IPFS)</title>
      <link>http://localhost/pgp-directory/</link>
      <pubDate>Fri, 09 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/pgp-directory/</guid>
      <description>PGP Directory (on IPFS) To read about why this directory exists click here&#xA;Overview SimplifiedPrivacy.sol or SimplifiedPrivacy.x is an uncensored free public directory of PGP keys for popular open source software on IPFS using solana and/or unstoppable domains. Our goal is to weaponize blockchain based DNS to prevent Github or Cloud company backdoors. This directory acts a neutral third party verification tool, not tied to a physical location, like traditional domains.</description>
    </item>
    <item>
      <title>How to Use IPFS on Brave Browser</title>
      <link>http://localhost/ipfs-brave-browser/</link>
      <pubDate>Thu, 08 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/ipfs-brave-browser/</guid>
      <description>How to Use IPFS on Brave Browser Let’s learn how to access IPFS websites with unstoppable domains. Remember an unstoppable domain points to an IPFS address (called a CID). First under Brave browser, go to the settings section, then Web 3 tab.&#xA;Next we’re going to enable the IPFS Companion extension. And when it pops up, were going to add the extension.&#xA;Then on this same page, at the top for Method to resolve IPFS resources, hit “Brave Local Node”.</description>
    </item>
    <item>
      <title>3 Ways to Cope with XMR Losses</title>
      <link>http://localhost/loss/</link>
      <pubDate>Wed, 07 Feb 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/loss/</guid>
      <description>Monero is already starting to bounce as I write this.&#xA;1. Realize it hurts twice as much to lose, so stop looking at the price Psychology It’s been well documented that losing hurts more than the joy of winning. Psychology Today cites a Khaneman 2011 paper:&#xA;“We are more upset about losing $10 than we are happy about finding $10. Roughly speaking, losses hurt about twice as much as gains make you feel good” (Khaneman, 2011) [link] Stop looking at it So if your net worth fluctuating up and down is causing you more distress than joy, consider not sitting and looking at it.</description>
    </item>
    <item>
      <title>Avoid Github Backdoors w/ Our New PGP Directory on IPFS</title>
      <link>http://localhost/ipfs-pgp-directory/</link>
      <pubDate>Wed, 07 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/ipfs-pgp-directory/</guid>
      <description>Our privacy eco-system is flawed GetMonero GetMonero.org is on Cloudflare, linked to a Github PGP key. The same Github that took down Tornado Cash in a crisis. The same Cloudflare that hazes Tor.&#xA;Whonix Whonix.org and it’s Public PGP key are on Hetzner. The same cloud company that compromised an XMPP server at the request of the German government.&#xA;The Point: Developers sign binaries with PGP keys, but we trust Microsoft’s Github and government domains to deliver to us accurate public keys to begin with.</description>
    </item>
    <item>
      <title>Binance delists Monero.</title>
      <link>http://localhost/binance/</link>
      <pubDate>Tue, 06 Feb 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/binance/</guid>
      <description>Delisting Price Huge price impact. XMR down 30%&#xA;Binance Withdrawal Withdrawal supported till May 20th&#xA;Swap Sites Some swap sites temporarily can’t do XMR, such as ExCh&#xA;Nodes Some nodes are having issues connecting.&#xA;The Point: If ever there was a time to test your faith, this is it. Stay strong. Stay calm. Stay rational.&#xA;Fraud allegations There were many allegations of Binance not even having the XMR they claimed to.</description>
    </item>
    <item>
      <title>Bitcoin Lightning Privacy w/ Juraj Bednar</title>
      <link>http://localhost/juraj/</link>
      <pubDate>Tue, 06 Feb 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/juraj/</guid>
      <description>Juraj Bednar is the author of “Author of Cryptocurrencies: Hack your way to a better life” and “Cypherpunk visions and trends” You can find him on Nostr here:&#xA;npub1m2mvvpjugwdehtaskrcl7ksvdqnnhnjur9v6g9v266nss504q7mqvlr8p9&#xA;And his website with articles &amp;amp; podcasts: HackYourself.io&#xA;Simplified Privacy:&#xA;Thanks for coming on. I’d like to discuss Bitcoin Lightning privacy, what it’s current strengths and limitations are. For readers who are not familiar, can you give us a brief overview of how Lightning preserves privacy?</description>
    </item>
    <item>
      <title>VeraCrypt is Monero’s best friend</title>
      <link>http://localhost/veracrypt/</link>
      <pubDate>Sun, 04 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/veracrypt/</guid>
      <description>VeraCrypt Basics VeraCrypt is an open source encrypted virtual drive tool. Basically it makes these containers that you can put files inside, and specifically I’m recommending KeePass files with your Monero seed phrases.&#xA;So, KeePass database files inside VeraCrypt. This could then go for cold storage on an external drive(s). You can put actual Monero wallet files in there as well.&#xA;Use When you go to look for them on Linux, it will be in the user/media folder.</description>
    </item>
    <item>
      <title>Sources: Why KVM Whonix over Oracle VirtualBox</title>
      <link>http://localhost/Sources/why-kvm-whonix/</link>
      <pubDate>Thu, 01 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/why-kvm-whonix/</guid>
      <description>Read complete article here [1] Whonix Whonix documentation on KVM vs Oracle&#xA;https://www.whonix.org/wiki/KVM#What_is_KVM?&#xA;[2] The Register https://www.theregister.com/2013/08/13/larry_ellison_on_google_and_nsa&#xA;[3] Tech in Asia Larry Ellison Data Privacy&#xA;https://www.techinasia.com/orcales-larry-ellison-data-privacy-working-japan/&#xA;[4] Spice Works Oracle Faces Class-Action Lawsuit for Collecting, Profiling, and Selling the Data of 5B Users&#xA;https://www.spiceworks.com/it-security/data-security/news/oracle-class-action-lawsuit/&#xA;[5] Tech HQ Oracle facing data backlash for violating the privacy of billions&#xA;https://techhq.com/2022/08/oracle-facing-data-backlash-for-violating-the-privacy-of-billions/</description>
    </item>
    <item>
      <title>Why KVM Whonix over Oracle VirtualBox</title>
      <link>http://localhost/why-kvm-whonix/</link>
      <pubDate>Thu, 01 Feb 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/why-kvm-whonix/</guid>
      <description>6 Reasons to Run Whonix in KVM VirtManager over Oracle VirtualBox Reason 1 Oracle is an NSA contractor and the copy-paste extension pack isn’t open source. Oracle’s previous CEO Larry Ellison not only criticized Edward Snowden, but literally praised the NSA. Quote “It’s great,” Ellison said of the domestic spying. “It’s great, it’s essential.” [2] Further quoting from his talks “Snowden had yet to identify a single person who had been “wrongly injured” by the NSA’s data collection.</description>
    </item>
    <item>
      <title>The NSA made SELinux.. can you trust it?</title>
      <link>http://localhost/selinux/</link>
      <pubDate>Wed, 31 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/selinux/</guid>
      <description>MAC There’s this fancy word called “Mandatory Access Control” or MAC. Don’t be fooled by how big a word it is, it’s simple. It just decides what a file or program can access on the system with clearly defined rules and labels.&#xA;Think of the analogy of a nightclub. The bouncer at the front is like the firewall rules or you deciding to download it. But then once it’s inside the club, where can it go?</description>
    </item>
    <item>
      <title>Simplified Privacy on Monero Talk</title>
      <link>http://localhost/monerotalk/</link>
      <pubDate>Tue, 30 Jan 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/monerotalk/</guid>
      <description>Podcast Simplified Privacy’s Shadow Rebel appeared on the Monero Talk podcast, to discuss the new Session bot software the firm has been creating. This would allow for the uncensored distribution of content, even under the harshest conditions such as an outright Monero ban.&#xA;Session Bot See the instance setup yourself, by sending a message on Session to the ID: “MoneroTalk” One word, without quotes. You can download session at getsession.org</description>
    </item>
    <item>
      <title>Sources: Why is Google bad for your business?</title>
      <link>http://localhost/Sources/googledocs/</link>
      <pubDate>Sun, 28 Jan 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/Sources/googledocs/</guid>
      <description>Read complete article here [1] YFS Magazine 3 Reasons Why @Gmail.com For Business Is A Bad Idea&#xA;By Maggie Aland&#xA;https://yfsmagazine.com/2018/10/04/3-reasons-why-gmail-for-business-is-a-bad-idea/&#xA;[2] TechnologyHQ Reasons Not To Use Gmail For Your Business&#xA;March 30, 2021&#xA;technologyhq.org/reasons-not-to-use-gmail-for-your-business/ [4a] Simplified Privacy Google’s Surveillance: The Shocking Truth&#xA;Internal Link&#xA;[4b] Brave Dr Johnny Ryan Chief Policy &amp;amp; Industry Relations Officer at Brave&#xA;https://brave.com/static-assets/files/explanatory_note_google_RTB_and_push_pages.pdf&#xA;[4c] PacktPub Google is circumventing GDPR, reveals Brave’s investigation for the Authorized Buyers ad business case</description>
    </item>
    <item>
      <title>Why is Google bad for your business?</title>
      <link>http://localhost/googledocs/</link>
      <pubDate>Sun, 28 Jan 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/googledocs/</guid>
      <description>Google Docs &amp;amp; Gmail Mandated Does your company mandate Google docs, email, or meet? Well, everyone knows Google docs are free, and so any random clown can access them. Because of the complete lack of any type of exclusivity or advanced knowledge, we present compelling arguments that to use them in a corporate setting, not only gives the appearance of poverty and laziness, but encourages decreased revenue and team building.</description>
    </item>
    <item>
      <title>6 Fast &amp; Hard-Hitting Reasons Fiat Money is Corrupt…</title>
      <link>http://localhost/6-fast-and-hard/</link>
      <pubDate>Fri, 26 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/6-fast-and-hard/</guid>
      <description>Reason 1. USA murders anyone not selling oil in USD Hillary Clinton’s leaked emails from Wikileaks show that the true motivation to intervene in Libya was Gaddafi switching from selling oil in USD to gold. [1]&#xA;Most anti-government media speculates that the true motivation for the invasion of Iraq, was right before Saddam Hussein moved to switch from selling oil in USD to euros. [2]&#xA;Reason 2. Central Banks fund and enable war As the book Creature on Jekyll Island goes over in painstaking detail, printing money to buy government bonds, to fund war is what enabled history’s bloodiest battles.</description>
    </item>
    <item>
      <title>Nostr’s Most Secure Client, Interview w/ Gossip’s Mike Dilger</title>
      <link>http://localhost/gossip/</link>
      <pubDate>Thu, 25 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/gossip/</guid>
      <description>Our interview with Mike Dilger, lead Dev of the Nostr Client Gossip Unique Simplified Privacy:&#xA;What makes Gossip unique? I believe you were telling me a few months ago about your method of fetching messages from servers, that has influenced other Nostr client developers to incorporate Gossip’s model.&#xA;Mike: The gossip client started out with the goal of following people not relays. Since you can’t control which relays other people use, it was immediately apparent to me, that gossip couldn’t connect to a fixed set of relays.</description>
    </item>
    <item>
      <title>Pro/Con Crypto-to-Crypto “No KYC” Swap Websites</title>
      <link>http://localhost/swaps/</link>
      <pubDate>Sat, 20 Jan 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/swaps/</guid>
      <description>These are all sites for Monero, BTC Lightning, and others. These are NOT real atomic swaps, that will be a different article. Atomic swaps usually cost more and can’t be in a web browser.&#xA;Trocador.app Free fees, but it’s just a front-end with Cloudflare&#xA;Pro: Acts as a no-fee No-JavaScript crypto-to-crypto swap front end for different exchanges, so you get the best rate and change counterparty risk to Trocador. They use the word atomic swap, but in a browser this doesn’t eliminate counterparty risk, it just changes it from the exchange to Trocador.</description>
    </item>
    <item>
      <title>VoIP 101: Hiding your location</title>
      <link>http://localhost/voip/</link>
      <pubDate>Sat, 20 Jan 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/voip/</guid>
      <description>SMS Sucks SMS and regular phone calls are horrible. It’s completely insecure, location dependent, isn’t good at international calls, and there’s NO BENEFIT over end-to-end encrypted messengers. Only through pure propaganda has the population been conditioned to accept this surveillance and control. But IF you HAVE to use SMS then use VoIP.&#xA;What is VoIP? VoIP stands for Voice Over Internet Protocol. It’s regular phone calls and SMS but through the internet, instead of a cellphone tower.</description>
    </item>
    <item>
      <title>AI backfires on Big Tech</title>
      <link>http://localhost/ai/</link>
      <pubDate>Fri, 19 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/ai/</guid>
      <description>Universities Say Google is Spam Google and Microsoft mouth off about AI helping the consumer save time, but new academic studies show that generative AI has degraded the quality of Google and Bing’s search results. Leipzig University and Bauhaus-Universität Weimar released a paper entitled “Is Google Getting Worse? A Longitudinal Investigation of SEO Spam in Search Engines”, which clearly demonstrates that AI has rotted the results with massive amounts of low quality spam.</description>
    </item>
    <item>
      <title>People often confuse privacy and security</title>
      <link>http://localhost/security/</link>
      <pubDate>Wed, 17 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/security/</guid>
      <description>Corporations protecting themselves from random citizens is security.&#xA;Citizens protecting themselves from large corporations or corrupt governments is privacy.&#xA;Privacy is harder Privacy is everything associated with security PLUS a distrust in a third party to do that security.&#xA;Therefore, privacy is much more difficult than security. Because pure security can be just hiring a company to do the work for you.&#xA;Security is better business Pure security can be closed source, and therefore has a better business model and corporate resources.</description>
    </item>
    <item>
      <title>They wish to digitally cage us</title>
      <link>http://localhost/cage/</link>
      <pubDate>Tue, 16 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/cage/</guid>
      <description>Propaganda I’m disputing the legitimacy of our society’s infrastructure.&#xA;DNS Domain names are not owned, it’s just an entry in the pseudo-government database&#xA;It’s the government’s opinion. I will not comply, I’m using Session, Nostr, Tor Onions, &amp;amp; IPFS&#xA;Fiat Money Bank Fiat is not owned, it’s just an entry in the pseudo-government database&#xA;It’s the government’s opinion of my wealth. I only accept cryptocurrency&#xA;Shove those bank notes where the sun don’t shine.</description>
    </item>
    <item>
      <title>Mullvad uses Gmail [update: they changed]</title>
      <link>http://localhost/mullvadgmail/</link>
      <pubDate>Sat, 13 Jan 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/mullvadgmail/</guid>
      <description>Update: This was originally an article criticizing Mullvad’s use of Gmail, and surprisingly thanks to you guys sharing it, they actually changed as we update here. Original Text: Here is the original text of the now outdated article to show that change is possible and as the update explains, how it can be used for good:&#xA;The VPN company Mullvad mouths off “privacy is a right”, but deep down they don’t really give a shit.</description>
    </item>
    <item>
      <title>uBlock Origin: Complete Guide (Domain by Domain)</title>
      <link>http://localhost/ublock/</link>
      <pubDate>Fri, 12 Jan 2024 05:40:00 +0000</pubDate>
      <guid>http://localhost/ublock/</guid>
      <description>uBlock Origin uBlock Origin is a super useful browser extension to see what third party JavaScript a website is using. Very often you can block this JavaScript and still get near full functionality or partial depending on what they use.&#xA;First we’ll go over the basics (you can skip this if you already know), and then go Domain by Domain, so you can only allow what you absolutely need.&#xA;Basics (skip if you know) Extension Overview The uBlock extension is by default included in the browser LibreWolf, so if you don’t want to even go to the Mozilla or corrupt Google extension store, then that’s a good way to get it.</description>
    </item>
    <item>
      <title>11 Real World Agora Societies</title>
      <link>http://localhost/get-a-free-month-of-voip-from-jmp-chat/</link>
      <pubDate>Thu, 11 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/get-a-free-month-of-voip-from-jmp-chat/</guid>
      <description>1. Freedom Cells This is a networking website where you can meet people to form or join communities. It’s NOT about an internet site, it’s about the in-person. This movement is spreading globally, and already has a decent presence in Mexico and Texas&#xA;“Through building and supporting alternative systems such as local food networks, health services, mutual defense groups, counter-economies and communication networks, Freedom Cell members will be able to decouple themselves from the state and other institutions they deem unworthy of their support.</description>
    </item>
    <item>
      <title>Hosting with Cloudflare is like being homeless</title>
      <link>http://localhost/cloudflare/</link>
      <pubDate>Wed, 10 Jan 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/cloudflare/</guid>
      <description>The modern internet is totally corrupt. Let’s dive in to why…&#xA;Content Delivery Networks (CDN) Closer to You Content delivery networks are global servers spread out around the world that keep a copy of a website closer to you, to serve it to you. By being physically closer to the end user, it speeds up the website’s delivery. However, the negative of this is that it has a tendency to centralize power for the entire internet to a few large players and that has big privacy effects.</description>
    </item>
    <item>
      <title>Pro/Con of Private Routers (Operating Systems)</title>
      <link>http://localhost/router/</link>
      <pubDate>Sat, 06 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/router/</guid>
      <description>Spying The router you get from your ISP is designed to spy on you. It knows which devices are sending which traffic and what guests are connecting to it. If you don’t use a VPN every second, then when you take the VPN down, you’re vulnerable to hackers first hacking the router, to then install malware on your devices (phones/laptop). For example Wikileaks shows the CIA loves to do this</description>
    </item>
    <item>
      <title>Where are messages stored?</title>
      <link>http://localhost/servers/</link>
      <pubDate>Sat, 06 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/servers/</guid>
      <description>Let’s analyze where things really get stored with different protocols and tools.&#xA;Signal: Amazon&#xA;Session: Decentralized database w/ pay in crypto&#xA;XMPP: Self-hosted federated&#xA;the word “federated” means cross-communication of servers like email&#xA;Matrix: federated (in theory)&#xA;SimpleX: two federated self-hosted servers,&#xA;they pick your send, you pick your receive&#xA;Briar: No servers, peer-to-peer&#xA;They gotta be online&#xA;Keet: Like Briar, it&amp;rsquo;s peer-to-peer&#xA;Unlike Briar, it doesn&amp;rsquo;t work with Tor, because it&amp;rsquo;s &amp;ldquo;holepunching&amp;rdquo; (connecting) via UDP packets</description>
    </item>
    <item>
      <title>How Streaming Services train you for Obedience</title>
      <link>http://localhost/stream/</link>
      <pubDate>Fri, 05 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/stream/</guid>
      <description>Obedience Training With novel ways of thinking about propaganda and obedience training, this short post will recommend:&#xA;a) stop watching television&#xA;b) stop streaming services&#xA;c) stop Spotify/music streaming&#xA;Television Passive Television not only rots your brain with low level dribble, but you are a passive consumer. The goal of television is to force-feed you content, instead of having you actively decide or evaluate choices. This trains you to accept authority, as eventually the two choices can turn to one.</description>
    </item>
    <item>
      <title>Privacy Guru Michael Bazzell abruptly ends all podcasts, what can we learn?</title>
      <link>http://localhost/bazzell/</link>
      <pubDate>Fri, 05 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/bazzell/</guid>
      <description>Bazzell quits What can be learned? Michael Bazzell was an American privacy author and podcaster. We liked his content a lot, and it’s a shame he stopped doing his podcast. Nobody knows why he stopped, but perhaps there’s still knowledge to be gleamed. One of our readers on Nostr asked us how our content differs from Bazzell.&#xA;Different Philosophies We respect him greatly and this is not a critique, but simply we are targeting a different audience.</description>
    </item>
    <item>
      <title>Can people be changed?</title>
      <link>http://localhost/googlebitch/</link>
      <pubDate>Wed, 03 Jan 2024 06:00:00 -0700</pubDate>
      <guid>http://localhost/googlebitch/</guid>
      <description>The Challenge of Convincing People to Abandon Surveillance Technology&#xA;Convincing people to abandon surveillance technology is no easy feat. Recently, a reader on Nostr questioned the necessity of switching from Google products. We&amp;rsquo;ll address his concerns and argue for why he should consider alternatives.&#xA;Does it Matter? He said:&#xA;“I keep thinking, to what extent does it matter? In other words, what am I protecting myself from, if I, let’s say, use a degoogled phone?</description>
    </item>
    <item>
      <title>Agorism: Improve your mindset with this philosophy.</title>
      <link>http://localhost/agora/</link>
      <pubDate>Tue, 02 Jan 2024 00:00:00 +0000</pubDate>
      <guid>http://localhost/agora/</guid>
      <description>Textbook Definition: Agorism is a social philosophy that advocates creating a society in which all relations between people are voluntary exchanges by means of counter-economics, engaging in a nonviolent revolution. Agorism has similar elements to anarcho-capitalism, but unlike some anarcho-capitalists, most agorists are strictly opposed to voting as a strategy for achieving their desired outcomes.&#xA;My Definition: Agorism is rejecting a government-run society (which is violence) through self-action (which is voluntary entrepreneurship).</description>
    </item>
    <item>
      <title>2023 CypherPunk New Years Wrap-up</title>
      <link>http://localhost/cypherpunk2023/</link>
      <pubDate>Fri, 29 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/cypherpunk2023/</guid>
      <description>No. 17. Tutanota Honeypot Tutanota suddenly stopped supporting Tor Browser, leading to potential fingerprinting, as Canadian police allege it’s a honeypot in court. Tutanota denies this claims.&#xA;No. 16. Microsoft Hacked Microsoft’s Email Software was hacked by the Chinese, becoming my favorite talking point to promote self-hosted open source email&#xA;No. 15. Reddit freedom Reddit failed to ban front-ends. After a long blackout battle in which many third party apps broke, I still use farside.</description>
    </item>
    <item>
      <title>Layer 2 Internet? Peer-to-peer WiFi &amp; LoRaWAN</title>
      <link>http://localhost/layer2wifi/</link>
      <pubDate>Thu, 28 Dec 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/layer2wifi/</guid>
      <description>Layer 2 Peer to Peer The idea of buying WiFi or messaging communication on a layer 2 internet or No KYC peer-to-peer internet that completely reject’s the government’s infrastructure and surveillance is very appealing. The ideal situation is using some kind of no-government DNS messenger such as Briar with bluetooth or LoRaWAN messengers with layer 2 internet. However, many projects have implementations of this that are either not yet ready for real use, or I disagree with their approach.</description>
    </item>
    <item>
      <title>9 Dangers of Google’s Power</title>
      <link>http://localhost/googledangers/</link>
      <pubDate>Wed, 27 Dec 2023 06:00:00 -0700</pubDate>
      <guid>http://localhost/googledangers/</guid>
      <description>Some people will question you why not just write them on a Gmail? It’s convenient. Well here’s 9 Dangers of Google’s power&#xA;1. Government is their customer The government is their data customer, so you’ve lost your civil liberties because Google can now act on the government’s behalf to do things that otherwise would be illegal for the government to do directly.&#xA;2. Fake Choice Supposedly you have a choice in this, but the more powerful they are, the harder it is to avoid.</description>
    </item>
    <item>
      <title>Why Session’s censorship resistance is the strongest</title>
      <link>http://localhost/uncensored/</link>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/uncensored/</guid>
      <description>Question: Why does Session messenger have the strongest censorship resistance known to man? Explain it to me like I’m 16, a) Encryption has a public key and a private key.&#xA;b) Nostr, Tor Onions, and Session all use encryption as identity, with the public key as your username, and the private key as your password&#xA;c) If the government obtains your private key for Nostr or Tor Onion, it’s game over.</description>
    </item>
    <item>
      <title>VM Burner Phones: Complete Guide</title>
      <link>http://localhost/vmburners/</link>
      <pubDate>Sun, 24 Dec 2023 06:00:00 +0000</pubDate>
      <guid>http://localhost/vmburners/</guid>
      <description>DeGoogled VM Did you know that you can create a virtual machine of a DeGoogled Android on your desktop Linux PC, to create infinite fast burner phones to isolate spyware apps?&#xA;WhatsApp, Telegram, CashApp, Hushed Bitcoin SMS, Facebook,&#xA;These apps all worked for me on a VM of LineageOS.&#xA;Pegasus Research by Amnesty International and the Intercept have presented significant evidence that apps such as “WhatsApp” by Meta are vulnerable to “0-click” Pegasus malware that can completely take control and do surveillance your phone without you ever even clicking a link.</description>
    </item>
    <item>
      <title>GL.inet Travel Routers: Private or Tyranny?</title>
      <link>http://localhost/glinet/</link>
      <pubDate>Sat, 23 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/glinet/</guid>
      <description>One of our readers asked “Is it okay to use GL.inet routers?” For those of you unfamiliar, these are tiny “micro” travel routers that fit in the palm of your hand with a VPN/Tor toggle switch on them. Most Glinet routers are smaller that your phone. And my answer is that it depends what the Gl.inet router is being used for.&#xA;Inside house VPN Speed The main disadvantage of Glinet is that both VPNs and Tor are both going to be much slower than the same VPN/Tor on a computer, enterprise firewall, or home router.</description>
    </item>
    <item>
      <title>Flare isn’t the Nostr solution you think it is</title>
      <link>http://localhost/flare/</link>
      <pubDate>Fri, 22 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/flare/</guid>
      <description>Fake Flare.pub is supposed to be a decentralized video app for Nostr&#xA;Unclear Claims It is unclear how Flare prevents Flare itself from deleting your videos, as Nostr’s protocol doesn’t store videos, the relays store messages. Even worse than Nostr’s regular images being on 1 random server with government DNS, Flare centralizes that to a single entity. And even worse than that, Flare has chosen Amazon AWS with Google 3rd party JavaScript on his main website.</description>
    </item>
    <item>
      <title>Sources: Tyranny of Microsoft</title>
      <link>http://localhost/sources/microsoft/</link>
      <pubDate>Thu, 21 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/sources/microsoft/</guid>
      <description> Read complete article here </description>
    </item>
    <item>
      <title>Tyranny of Microsoft</title>
      <link>http://localhost/microsoft/</link>
      <pubDate>Thu, 21 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/microsoft/</guid>
      <description>Power Rather than allow websites to host the content themselves, Microsoft will subvert websites’ authority and post it on MSM.com. Then promote their bullshit proxy copy on their ad-revenue site via their Bing search. For example you search “Coindesk Bitcoin ETF” and it gives you “Coindesk via MSM”.&#xA;This has quite a few effects: a) Microsoft leaches ad revenue&#xA;b) It creates dependency and submission from the websites that they can’t cut off the traffic from Bing, because the other search engines such as Google and Brave are now ranking the MSM version, and not the original.</description>
    </item>
    <item>
      <title>Pro-Con of DeGoogled Phone Operating Systems</title>
      <link>http://localhost/degoogledphones/</link>
      <pubDate>Wed, 20 Dec 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/degoogledphones/</guid>
      <description>DeGoogled Phones There are a few different DeGoogled Phone operating systems. What this means is the operating system that you replace the stock version of Google’s Android with by flashing it. Let’s go over some of the benefits and weaknesses of these choices:&#xA;GrapheneOS Pro: Good optional sandbox for Google push. And advanced security features such as:&#xA;a) Hardened to resist memory attacks&#xA;b) Better sandboxing (hardened access policies)&#xA;c) Enhanced verified boot</description>
    </item>
    <item>
      <title>How to Stop Pegasus Malware</title>
      <link>http://localhost/pegasus/</link>
      <pubDate>Mon, 18 Dec 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/pegasus/</guid>
      <description>What is Pegasus? Pegasus is targeted cellphone malware by the NSO Group sold to governments.&#xA;It’s regularly used against human rights activists.&#xA;How can you stop Pegasus? Well, you can’t stop it per say (except choice G below). But you can reduce risk with SOME of the steps below:&#xA;a) GrapheneOS GrapheneOS reduces buffer overflows with a hardened memory malloc.&#xA;Buffer Overflows A buffer overflow attack is when memory is corrupted to leak information.</description>
    </item>
    <item>
      <title>Elizabeth Warren says “Ban Bitcoin” but it’s Israel that funded Hamas</title>
      <link>http://localhost/elizabeth-warren/</link>
      <pubDate>Sat, 16 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/elizabeth-warren/</guid>
      <description>Warren’s defacto ban: Elizabeth Warren has again pushed for sweeping regulatory changes with the supposed purpose of cracking down on cryptocurrency’s use in terrorist financing. She said “We need new laws to crack down on crypto’s use in enabling terrorist groups” [1] She wishes to force all Bitcoin and cryptocurrency open source wallet providers and miner/node infrastructure to do AML/KYC checks, which is impossible for a decentralized permissionless system. Therefore, Warren effectively wants to ban it.</description>
    </item>
    <item>
      <title>Nostr Phising: Avoid Getting Your Bitcoin Stolen</title>
      <link>http://localhost/nostrsecurity/</link>
      <pubDate>Sat, 16 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/nostrsecurity/</guid>
      <description>Nostr&amp;rsquo;s Privacy Flaw Nostr’s privacy flaw is that anyone can see the metadata in real time of who is messaging who. Ameythst client currently lets you literally login as them, just the DM itself is jibberish. When you combine this with the fact that most Nostr users have Bitcoin and are constantly downloading or trying out new clients, this makes Nostr the ultimate place for phishing scams. Even if Bitcoin is not gotten directly, simply tricking someone into entering their private key into a scam client can be used to make them pay Bitcoin to not wreck their account.</description>
    </item>
    <item>
      <title>Sources: Elizabeth Warren says “Ban Bitcoin” but it’s Israel that funded Hamas</title>
      <link>http://localhost/Sources/elizabeth-warren/</link>
      <pubDate>Sat, 16 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/elizabeth-warren/</guid>
      <description>Read complete article here Sources for: Elizabeth Warren says “ban Bitcoin” but it’s Israel that funded Hamas. Original article link found here.&#xA;[1] Elizabeth Warren Warren Expands Coalition of Banking Committee Support for Bill Cracking Down on Crypto’s Use in Money Laundering, Drug Trafficking, Sanctions Evasion&#xA;https://www.warren.senate.gov/newsroom/press-releases/warren-expands-coalition-of-banking-committee-support-for-bill-cracking-down-on-cryptos-use-in-money-laundering-drug-trafficking-sanctions-evasion&#xA;[2] WSJ Why Hamas Uses Crypto to Raise Money&#xA;https://www.wsj.com/finance/why-hamas-uses-crypto-to-raise-money-b40597ec&#xA;[3] Elliptic Blockchain analytics company&#xA;https://www.elliptic.co/blog/setting-the-record-straight-on-crypto-crowdfunding-by-hamas&#xA;Elliptic said: “There is no evidence to suggest that crypto fundraising has raised anything close to this amount, and data provided by Elliptic and others has been misinterpreted.</description>
    </item>
    <item>
      <title>Showdown: Signal, Session, SimpleX, Matrix, XMPP, vs Briar</title>
      <link>http://localhost/messengers/</link>
      <pubDate>Fri, 15 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/messengers/</guid>
      <description>Let’s compare Signal, Session, SimpleX, Matrix, XMPP, and Briar, so you can decide which one is right for your particular situation. Who is the… Most adopted by everyday people:&#xA;Signal&#xA;Most adopted on darkweb:&#xA;XMPP&#xA;Most adopted by corporations:&#xA;Matrix&#xA;Most adopted by militaries:&#xA;XMPP&#xA;Least Censored for individuals:&#xA;Session&#xA;Least Censored against platform level bans:&#xA;Briar&#xA;Most likely to confuse criminal courtrooms:&#xA;SimpleX&#xA;Best for Journalists:&#xA;Session&#xA;(due to first contact metadata &amp;amp; verification of identity)</description>
    </item>
    <item>
      <title>Public Backlash Forces Extension on US Surveillance Decision</title>
      <link>http://localhost/decision/</link>
      <pubDate>Wed, 13 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/decision/</guid>
      <description>Update 2 days later: The FISA Section 702 did pass with the Defense Budget Conflict Today was supposed to be a pivotal moment where the US surveillance programs (that allow warrantless wiretapping) would either be reformed or expanded. Dual competing versions of the new bills were supposed to be voted on today in Congress with only one moving forward. Instead surprisingly, due to public backlash, the Speaker of the House decided to pull both versions of the bills from being voted on, and moved to extend the status quo.</description>
    </item>
    <item>
      <title>Epic win against Google</title>
      <link>http://localhost/epicgoogle/</link>
      <pubDate>Tue, 12 Dec 2023 06:00:00 -0700</pubDate>
      <guid>http://localhost/epicgoogle/</guid>
      <description>Illegal Monopoly Huge win for Epic Games in their court case against Google. The California court decided that Google’s Play app store operated as an illegal monopoly and the case also challenged the transaction fees of up to 30% that Google imposes on Android app developers.&#xA;Fast Key Highlights: a) It’s still unclear what the penalty will be, court won’t rule on this till January&#xA;b) There’s speculation in the media that this could lead to forcing Google to offer alternative app stores</description>
    </item>
    <item>
      <title>How to Convince Friends to Leave WhatsApp &amp; SMS</title>
      <link>http://localhost/posts/private-messegers/how-to/how-to.html</link>
      <pubDate>Tue, 12 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/posts/private-messegers/how-to/how-to.html</guid>
      <description>While Signal is very centralized and has metadata leak issues compared to Session, SimpleX, and self-hosted XMPP, it’s still way better than WhatsApp or SMS. So Signal is the low-hanging fruit that can be used to transition low-tech normies in your life to freedom. In this article, we’ll focus on example psychological tactics to shift your friends off WhatsApp and SMS.&#xA;”But I already use WhatsApp”. Did you know Signal was made by the same guy who also made WhatsApp?</description>
    </item>
    <item>
      <title>Pro/Con of Nostr Clients</title>
      <link>http://localhost/nostr/</link>
      <pubDate>Sun, 10 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/nostr/</guid>
      <description>Nostr Clients Nostr is similar to a decentralized version of Twitter. The protocol let’s you use any client, just like Bitcoin or Monero allow you to use any wallet. Anyone can make their own client. Here’s a few of the popular ones:&#xA;Iris.to Pro: Everyone has a web browser, so it’s easy for beginners to on-board. Simple easy layout.&#xA;Con: They use CloudFlare, so do NOT let the website see your private key.</description>
    </item>
    <item>
      <title>Super useful (&amp; legal) Tor Onion links</title>
      <link>http://localhost/onions/</link>
      <pubDate>Sun, 10 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/onions/</guid>
      <description>Here’s a list of some excellent resources for Tor that are completely legal. Most of them are related to privacy. We do not post any illegal content. Clear web: Exch.cx hszyoqwrcp7cxlxnqmovp6vjvmnwj33g4wviuxqzq47emieaxjaperyd.onion&#xA;Swap crypto to crypto without CloudFlare or Big Tech. 0.5% fee.&#xA;Con: They get DDoS’ed a lot, but check back in a few hours if down.&#xA;Clear web: RoboSats.com robosats6tkf3eva7x2voqso3a5wcorsnw34jveyxfqi2fu7oyheasid.onion&#xA;Peer-to-peer Bitcoin Lightning for fiat/XMR.&#xA;Clear web: WizardSwap.io wizardswgtu2ovor7r2esg3cxdpt7tv4nrugi32lldv53zmtonbz6sid.onion</description>
    </item>
    <item>
      <title>How to Buy Crypto Fast &amp; Privately</title>
      <link>http://localhost/crypto/</link>
      <pubDate>Fri, 08 Dec 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/crypto/</guid>
      <description>Our company only accepts cryptocurrency. So the question for new users is, where do you buy crypto? Well it depends on what country you live in and how you want to pay. Credit cards Credit card purchases are the most convenient but usually make you pay the vendor fee of 2% or more.&#xA;Exodus Wallet If you’re looking to use a credit card quickly then Exodus wallet allows you buy Bitcoin or Monero fast within the app itself.</description>
    </item>
    <item>
      <title>Gov Requests on Apple-Google push notifications</title>
      <link>http://localhost/push/</link>
      <pubDate>Fri, 08 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/push/</guid>
      <description>We posted a recent Vice article about the US government requesting nearly all Apple and Google push notifications:&#xA;https://www.vice.com/en/article/wxjbv9/apple-just-confirmed-governments-are-spying-on-peoples-phones-with-push-notifications&#xA;This article discusses how these companies are now coming forward and being honest for the first time about the high quantity of requests they are getting, after a senator made it public. One of our readers on Nostr asked “I can’t switch to Graphene, what can I do?”&#xA;Well obviously switching to an operating system that isn’t maliciously collecting the data to begin with is the ideal solution.</description>
    </item>
    <item>
      <title>Burner Email Services (Pro/Con review)</title>
      <link>http://localhost/burner-email/</link>
      <pubDate>Wed, 06 Dec 2023 06:00:00 +0000</pubDate>
      <guid>http://localhost/burner-email/</guid>
      <description>5july.org Pro: Our Number 1 recommendation for burner privacy. Based in Sweden, this reliable honest non-profit uses Bahnhof (a previous Wikileaks host). No CloudFlare, No Google analytics.&#xA;Con: Only 1 domain to pick from. Often/sometimes it doesn’t function. I don’t think it’s the providers blocking it. I think 5july is just too poor for good maintenance because they have no business model.&#xA;GuerrillaMail.com Pro: Large userbase is good for anonymity. It works without JavaScript (for incoming) and Tor isn’t blocked.</description>
    </item>
    <item>
      <title>Alpha Test of a brand new social network</title>
      <link>http://localhost/alphasession/</link>
      <pubDate>Mon, 04 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/alphasession/</guid>
      <description>Reddit has cracked down with intense surveillance and censorship.&#xA;Even worse, Microsoft’s Linked-In broadcasts your sensitive data the world. They demand SMS verification, restrict VPNs, and asks for photo ID to scan your eyeballs. By having all your information public, your haters can try to get you fired.&#xA;Instead, join a fun Liberty-Agora community, where people discuss technology, politics, vendors post their sales, and entrepreneurs can post crypto job ads. Meet Linked-Out.</description>
    </item>
    <item>
      <title>Best Client for Tor Nostr? Gossip</title>
      <link>http://localhost/nostrtor/</link>
      <pubDate>Sun, 03 Dec 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/nostrtor/</guid>
      <description>Nostr has horrible Tor support as it’s very slow to connect to all of these relays. Here’s some tips:&#xA;Gossip a. Use the Gossip Client on desktop (Linux is supported btw).&#xA;We love Whonix, but you could use any other tools such as ParrotOS, Tails, or even just command line software.&#xA;Then modify the following settings in Gossip:&#xA;a) Turn off avatars&#xA;b) Turn the refresh rate for the timeline to the slowest</description>
    </item>
    <item>
      <title>Monero’s Flaws Make it More Valuable</title>
      <link>http://localhost/moneroflaws/</link>
      <pubDate>Tue, 28 Nov 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/moneroflaws/</guid>
      <description>Premise In the movie 8 mile, the rapper Eminem attacks himself first to leave his enemy speechless after. We replicate this strategy by openly pointing out Monero’s vulnerabilities to deprive our enemies of criticism and then weaponize their ideas against them.&#xA;You would get a lot out of subscribing for free to our new content by email, by Session messenger, via RSS feed, or on Nostr.&#xA;Criticism #1: Monero’s delistings hurt adoption Response: It’s true that Monero gets delisted from centralized KYC exchanges that come under pressure from corrupt governments acting against their own constitutions.</description>
    </item>
    <item>
      <title>DeGoogled Life</title>
      <link>http://localhost/degoogled-life/</link>
      <pubDate>Mon, 27 Nov 2023 06:00:00 -0700</pubDate>
      <guid>http://localhost/degoogled-life/</guid>
      <description>Some say Google is a monopoly. I say they are not even relevant! Literally every service that they provide has an alternative. The ONLY thing that they have is the network effect and peer pressure. But as they continue to abuse the population’s privacy, their power will erode.&#xA;Chrome Browser: LibreWolf, Brave, Icecat, vanilla Firefox, Tor&#xA;Google Android: GrapheneOS, Calyx, Divest/Lineage, Linux phones like Pine&#xA;Google Search: MetaGer, Mojeek, SearXNG w/ farside.</description>
    </item>
    <item>
      <title>Pro-Con of Linux Distributions</title>
      <link>http://localhost/linux-distros/</link>
      <pubDate>Mon, 20 Nov 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/linux-distros/</guid>
      <description>Linux Distros There are some security advantages to certain Linux distributions over others that of course have to be balanced with convenience for your specific situation.&#xA;Linux Mint Pro: Very stable, things are likely to just work. Updates rarely break the system. And installs of Ubuntu versions of software usually work, but you don’t get the slow speed of Ubuntu’s snaps.&#xA;Con: Very slow update cycle, so you’re getting security updates last.</description>
    </item>
    <item>
      <title>Pro/Con of Anonymous VPS Hosts</title>
      <link>http://localhost/vps/</link>
      <pubDate>Mon, 20 Nov 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/vps/</guid>
      <description>Private VPS Reviews The best way to take control of your privacy and security is by hosting things yourself. This could be your own website, email, NextCloud, Mastodon, Notstr relay, crypto node, front-end service, or even your own proxy VPN. This list will compare the pros and cons of VPS hosts only if they allow anonymous sign-ups for cryptocurrency.&#xA;Servers.guru Pro: Very cheap. Very seamless setup, easy for beginners not used to SSH keys.</description>
    </item>
    <item>
      <title>Pro/Con of Search Engines</title>
      <link>http://localhost/search/</link>
      <pubDate>Sun, 19 Nov 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/search/</guid>
      <description>It’s good to use a variety of search engines with Tor and/or avoid the use of JavaScript which can fingerprint you as unique. You want to prevent any one party from seeing all of your search requests.&#xA;Brave Search Type: Engine&#xA;Pro: Good independent results that aren’t dependent on Google or Microsoft. Brave also has less of an authoritative pro-centralized power bias than “Bigger Tech”&#xA;Con: Brave uses Amazon Datacenters, and that’s a huge negative for decentralization and privacy.</description>
    </item>
    <item>
      <title>Pro-Con of “Privacy” Phone Numbers-Services</title>
      <link>http://localhost/burners/</link>
      <pubDate>Sat, 18 Nov 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/burners/</guid>
      <description>Privacy Phones We wanted to give an updated list on burner phones. Remember SMS is not private or encrypted. All you’re doing is hiding your physical location via VoIP or your identity via cryptocurrency payments.&#xA;JMP.chat Type: Number&#xA;Pro: No KYC VoIP to XMPP (or Matrix) for anonymous Bitcoin, so you’re using an open source client&#xA;Con: Only US and Canada numbers. They’re just reselling Bandwidth.com VoIP, which means that not only are you just paying more just for anonymity, but many services recognize these as Bandwidth VoIP numbers and will block you.</description>
    </item>
    <item>
      <title>Tips for Signal</title>
      <link>http://localhost/signal/</link>
      <pubDate>Mon, 23 Oct 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/signal/</guid>
      <description>Signal is flawed in that it’s centralized on Amazon servers, requires a phone number, and can not be self-hosted. However regular SMS is so horrible, and Signal is so intuitive for new users, that telling people not to use it likely does more harm to privacy than good.&#xA;Signal also recently announced that in the future there will be usernames, but this is still in beta and requires a phone number in the beta.</description>
    </item>
    <item>
      <title>Big Tech Abuses Medical Privacy</title>
      <link>http://localhost/big-tech-abuses-medical-privacy/</link>
      <pubDate>Sat, 25 Feb 2023 06:00:00 -0700</pubDate>
      <guid>http://localhost/big-tech-abuses-medical-privacy/</guid>
      <description>HIPAA fake Real Issue In the US, your medical records are protected by HIPAA but your internet medical browsing history on websites like WebMD is NOT. That is the kind of data that is being sold in ways that may hurt or embarrass you.&#xA;Data Sold If you have any kind of medical problem, even if it’s small, then you absolutely need to learn privacy. Medical data is among the highest paid data that’s collected, sold, and put into databases by a huge number of websites.</description>
    </item>
    <item>
      <title>Google Censors Freedom</title>
      <link>http://localhost/google-censors-freedom/</link>
      <pubDate>Sat, 25 Feb 2023 06:00:00 -0700</pubDate>
      <guid>http://localhost/google-censors-freedom/</guid>
      <description>This article presents evidence that Google promotes an agenda of centralized control through systematic censorship on its search, email, video, app store, and ad platforms of ideas promoting decentralized personal responsibility and anything critical of government power. You would get a lot out of subscribing for free to our new content by email, by Session messenger, via RSS feed, uncensored Ethereum push notifications, or on Nostr.&#xA;The sources for this article can be found here Political Bias Wikileaks Some say Google is biased to the left, but isn’t the left supposed to be anti-war?</description>
    </item>
    <item>
      <title>Google’s Surveillance: The Shocking Truth</title>
      <link>http://localhost/googles-surveillance-the-shocking-truth/</link>
      <pubDate>Sat, 25 Feb 2023 06:00:00 -0700</pubDate>
      <guid>http://localhost/googles-surveillance-the-shocking-truth/</guid>
      <description>Google is among the most malicious surveillance organizations: Search Saving all your Google searches, tied to your identity across devices [1] [2] [30]&#xA;Email Reading all your emails. Even if you don’t use Gmail directly, but you’re sending email to someone who does. [5] [6]&#xA;Web traffic Saving all your web traffic if the website uses Google Ads, Captchas, or Analytics (and over 85% of all websites use some of their services).</description>
    </item>
    <item>
      <title>Avoid this Monero Vulnerability</title>
      <link>http://localhost/avoid-this-monero-vulnerability/</link>
      <pubDate>Sat, 25 Feb 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/avoid-this-monero-vulnerability/</guid>
      <description>Love Monero, But We love Monero. It’s our favorite and number one recommended cryptocurrency. However, it does not offer completely perfect anonymity under all circumstances because there are some vulnerabilities (which we will discuss one of in this article). We will discuss not only how this particular vulnerability works, but also what you can do to avoid it. You would get a lot out of subscribing for free to our new content by email, by Session messenger, via RSS feed, uncensored Ethereum push notifications, or on Nostr.</description>
    </item>
    <item>
      <title>Browser Fingerprints Lead to Price Discrimination</title>
      <link>http://localhost/browser-fingerprints-lead-to-price-discrimination/</link>
      <pubDate>Sat, 25 Feb 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/browser-fingerprints-lead-to-price-discrimination/</guid>
      <description>Misconceptions Nothing to Hide Some people mistakenly believe they do not need to worry about online privacy because they have “nothing to hide.” In reality, your digital identity expressed through a browser fingerprint, cookies, and IP address will determine if you have to pay more for the same goods and services, what employment opportunities you’ll be presented with, and even housing and credit.&#xA;Equal Opportunity This article will give you an overview of the different types of discrimination caused by artificial intelligence algorithms accessing your data.</description>
    </item>
    <item>
      <title>Cryptocurrency ignores Open Source?</title>
      <link>http://localhost/cryptocurrency-ignores-open-source/</link>
      <pubDate>Fri, 24 Feb 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/cryptocurrency-ignores-open-source/</guid>
      <description>The Conflict Linux &amp;amp; Monero Very often, people treat open source software and cryptocurrency like two completely separate topics. These people mistakenly believe that Linux and Monero are two different unrelated tools to solve different problems.&#xA;MyMonero For example, some cryptocurrency exchanges force its users to run proprietary web software which is deeply integrated with its service, such as Google captchas or Authenticator, without even disclosing that free and open source alternatives exist.</description>
    </item>
    <item>
      <title>Desktop Environments: What you gotta know</title>
      <link>http://localhost/distros-dont-matter-but-desktop-environments-do/</link>
      <pubDate>Fri, 24 Feb 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/distros-dont-matter-but-desktop-environments-do/</guid>
      <description>Desktop Environment Many new Linux users ask which distribution is the best, when actually they should be asking about the desktop environment.&#xA;The desktop environment is the way the operating system’s display and interface looks. It is a huge part of a Linux user’s experience and will make or break a new user’s interest in continuing to use Linux. If you’re new to Linux, you’d really enjoy subscribing for free to our new content by email, by Session messenger, or RSS feed.</description>
    </item>
    <item>
      <title>Distros Don’t Matter Much</title>
      <link>http://localhost/distros-dont-matter-much/</link>
      <pubDate>Fri, 24 Feb 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/distros-dont-matter-much/</guid>
      <description>Distros don&amp;rsquo;t matter Linux distributions don’t matter that much. They should only be the focus of highly advanced users for the purpose of extreme security against very sophisticated and resourceful adversaries. Among the distributions for beginners, there is not that much difference. You will get a lot out of subscribing for free to our new content by email, by Session messenger, or RSS feed.&#xA;Linux vs distributions Same Kernel Linux is just a kernel, or core operating system, that allows software to interact with the hardware.</description>
    </item>
    <item>
      <title>Do I need to learn the Command Line?</title>
      <link>http://localhost/do-i-need-to-learn-the-command-line/</link>
      <pubDate>Fri, 24 Feb 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/do-i-need-to-learn-the-command-line/</guid>
      <description>Do you need the CLI? Many new Linux users wonder how much work is involved in switching from Windows or Apple to Linux. The number one question is, “Do you need to learn the command line?” The answer depends on what you want to be able to do with Linux. Not everyone will require the same knowledge of commands, and in fact some users might not need it at all. You can get the solid basics of Linux by subscribing for free to our new content by email, by Session messenger, or RSS feed.</description>
    </item>
    <item>
      <title>Linux’s Privacy Weakness??</title>
      <link>http://localhost/linuxs-privacy-weakness/</link>
      <pubDate>Fri, 24 Feb 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/linuxs-privacy-weakness/</guid>
      <description>Proprietary Software A lot of proprietary software, such as Google Chrome, Steam, Skype, and Discord, have a version programmed for Linux. However, you lose most of the privacy benefit of switching to Linux if you continue to use these programs. Yes, you’ve hidden your real IP address from Microsoft and Apple, but all the contents of your conversations and the websites you visit may all still be connected and monitored either directly on the proprietary platform, or potentially even metadata from outside the programs…</description>
    </item>
    <item>
      <title>Timeshift: Critical Linux n00b Tool!</title>
      <link>http://localhost/timeshift-critical-linux-n00b-tool/</link>
      <pubDate>Fri, 24 Feb 2023 05:40:00 +0000</pubDate>
      <guid>http://localhost/timeshift-critical-linux-n00b-tool/</guid>
      <description>Timeshift Save Software State Another important concept for Linux users is timeshift backups. Timeshift is a program that allows you to save a current state of your software and package manager. Then later in the future, if your computer has a complete malfunction or is broken, you can restore the system to its previous state. This tool is incredibly useful for helping you recover from a disaster.&#xA;Versatility Timeshift can be accessed by both the graphical user interface, as well as through the command line.</description>
    </item>
    <item>
      <title>Facebook is Corrupt Evil Spyware</title>
      <link>http://localhost/facebooks-corrupt-off-platform-surveillance/</link>
      <pubDate>Fri, 24 Feb 2023 01:34:00 +0000</pubDate>
      <guid>http://localhost/facebooks-corrupt-off-platform-surveillance/</guid>
      <description>The scary part of Facebook is the tracking that goes on OFF the platform. There’s a number of ways that Facebook maliciously does this including: a) Tracking your web traffic on other websites off Facebook&#xA;b) Keeping track of everyone you know to identify you using new anonymous devices, phone numbers, or emails&#xA;c) Reading, Storing, and Sharing your private personal chats with advertisers and governments&#xA;d) Permanently keeping track of and selling your location all the time, including who you happen to be standing near</description>
    </item>
    <item>
      <title>How you can be deanonymized through Tor</title>
      <link>http://localhost/how-you-can-be-deanonymized-through-tor/</link>
      <pubDate>Fri, 24 Feb 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/how-you-can-be-deanonymized-through-tor/</guid>
      <description>Tor is an excellent tool for privacy, and we do not recommend you avoid it. However, there are many limitations to be aware of and ways of using it that can compromise your anonymity on Tor. This article will discuss just a few of the ways, but there may be others that the public is unaware of. For example in 2017, the FBI dropped a case against a school worker accused of downloading child pornography because the FBI would have rather let him go than reveal the source code for how they deanonymitized him through Tor.</description>
    </item>
    <item>
      <title>Should you use a VPN with Tor?</title>
      <link>http://localhost/should-you-use-a-vpn-with-tor/</link>
      <pubDate>Fri, 24 Feb 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/should-you-use-a-vpn-with-tor/</guid>
      <description>There’s a heavy amount of debate over whether you should use a VPN with Tor. We will cover using a VPN either before or after launching Tor, but when people refer to this without explicitly saying which method, they usually mean putting a VPN on BEFORE Tor is used. So:&#xA;User → VPN → Tor → Website&#xA;VPN before Tor The use of a VPN with Tor is heavily debated among security experts.</description>
    </item>
    <item>
      <title>The irony of Brave&#39;s Tor</title>
      <link>http://localhost/brave-irony/</link>
      <pubDate>Fri, 24 Feb 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/brave-irony/</guid>
      <description>Fingerprint JavaScript is used by many websites to deliver content and perform services. Many sites use it as part of their core functionality. JavaScript also can be used to browser fingerprint and therefore serve content that’s appropriate for the end user’s browser and operating system versions, such as ensuring the content has the correct screen dimensions. While the purpose of JavaScript’s fingerprinting is to properly serve content to benefit the user, it can be used maliciously against the user to identity him or her through Tor.</description>
    </item>
    <item>
      <title>Tor 101: How’s this Work?</title>
      <link>http://localhost/tor-101-hows-this-work/</link>
      <pubDate>Fri, 24 Feb 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/tor-101-hows-this-work/</guid>
      <description>Tor is the most famous anonymous mixnet but there are others. Originally created by the US Navy, Tor is ironically often used in attempts to deceive governments. However, this is not its only purpose, as there are plenty of legitimate and legal reasons for wanting to be anonymous.&#xA;While Tor was originally created by the US government, its open source nature means that it’s not maliciously tracking you — at least on a backdoor code level.</description>
    </item>
    <item>
      <title>7 Awesome Open Source Phone Apps</title>
      <link>http://localhost/7-awesome-open-source-phone-apps/</link>
      <pubDate>Thu, 26 Jan 2023 00:00:00 +0000</pubDate>
      <guid>http://localhost/7-awesome-open-source-phone-apps/</guid>
      <description>In this article, we’ll go over our 7 favorite open source phone apps for Android. Most of them work on both degoogled and regular spyware phones and can be found in the F-Droid store. We’re skipping Signal, Session, and Briar, since we assume you already use them and we’ve covered them elsewhere. You would get a lot out of subscribing for free to our new content by email, by Session messenger, RSS feed, or Nostr.</description>
    </item>
    <item>
      <title>Briar: Peer-to-Peer messenger, designed for Regime Change</title>
      <link>http://localhost/briar-1-private-messenger-but-no-audio-calls/</link>
      <pubDate>Tue, 22 Nov 2022 00:00:00 +0000</pubDate>
      <guid>http://localhost/briar-1-private-messenger-but-no-audio-calls/</guid>
      <description>Briar is a decentralized peer-to-peer mixnet messenger that’s similar to Session. As a reminder, we wrote an article on Session here. The big difference between them is that Briar is purely peer-to-peer and so it requires the other person to be online to receive the message. While Briar is peer-to-peer, these messages can be first routed through Tor or in-person bluetooth. On the other hand, Session stores messages on a decentralized database called the Swarm, which is coordinated by blockchain incentives to enable you to receive the message anytime.</description>
    </item>
    <item>
      <title>XMPP: Decentralized Self-Sovereign Signal?</title>
      <link>http://localhost/xmpp-decentralized-signal-get-your-own-social-network/</link>
      <pubDate>Tue, 22 Nov 2022 00:00:00 +0000</pubDate>
      <guid>http://localhost/xmpp-decentralized-signal-get-your-own-social-network/</guid>
      <description>XMPP is an open source messaging protocol that’s very decentralized. It’s what’s called “federated,” which means that anyone can set up their own server, and these servers can all communicate through the same protocol.&#xA;This means you can easily talk to your friends on your own hidden social media network, while at the same time talk to strangers on other servers end-to-end encrypted. XMPP is similar to a decentralized version of Signal because you get end-to-end encryption but without trusting the Signal Foundation or Amazon AWS servers with your personal metadata such as who and when is communicating.</description>
    </item>
    <item>
      <title>Signal Messenger: Guide to Avoid Privacy Mistakes</title>
      <link>http://localhost/signal-messenger-guide-to-avoid-privacy-mistakes/</link>
      <pubDate>Mon, 07 Nov 2022 00:00:00 +0000</pubDate>
      <guid>http://localhost/signal-messenger-guide-to-avoid-privacy-mistakes/</guid>
      <description>Signal is an open source, end-to-end encrypted messaging protocol with a centralized Amazon cloud server. Even though the contents of your messages are encrypted, there are still mistakes you can make that compromise your privacy. There is supposedly a system to hide metadata called “sealed sender”, but as we will discuss, it is flawed. Here’s a bullet point overview; then we’ll move into a more detailed description and tips for use.</description>
    </item>
    <item>
      <title>Electrum Wallet: Good for beginners</title>
      <link>http://localhost/electrum-wallet-king-of-privacy/</link>
      <pubDate>Sun, 23 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/electrum-wallet-king-of-privacy/</guid>
      <description>Electrum Wallet New address Electrum Wallet is a free and open source cryptocurrency wallet that allows the user to create multiple temporary receiving addresses that are all different. These different receiving addresses then feed into a single wallet, which then all feed into the same wallet. The advantage of this is that it obfuscates the public blockchain trail and thus offers the user some low level (weak) privacy for cryptocurrencies that normally do not have any, such as Bitcoin and Litecoin.</description>
    </item>
    <item>
      <title>Monero 101: What You Need to Know</title>
      <link>http://localhost/monero-101-what-you-need-to-know/</link>
      <pubDate>Sun, 23 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/monero-101-what-you-need-to-know/</guid>
      <description>Work of Art Monero’s code is so beautiful that many people consider it a work of art. In this article, we’ll break down how and why the most private and anonymous cryptocurrency works. And you can join the Monero community by subscribing for free to our new content by email, by Session messenger, or RSS feed, or Nostr. Nostr is usually Bitcoin maxis, so we gotta represent XMR.&#xA;Private Blockchain Bitcoin is Transparent Other cryptocurrencies like Bitcoin have a publicly visible blockchain that anyone can see and use to track the movement of funds.</description>
    </item>
    <item>
      <title>Monero Wallets: Which is Right For You?</title>
      <link>http://localhost/monero-wallets-which-is-right-for-you/</link>
      <pubDate>Sun, 23 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/monero-wallets-which-is-right-for-you/</guid>
      <description>4 Wallets In our previous article we discussed how Monero (XMR) works. In this article, we’ll go over 4 popular XMR wallets. All of these are open source. Never use any Monero wallet that isn’t open source. And if you really want to take your privacy game to the next level, consider subscribing for free to our new content by email, by Session messenger, via RSS feed, our Ethereum push notification channel, or on Nostr.</description>
    </item>
    <item>
      <title>Best Vendors that Accept Cryptocurrency</title>
      <link>http://localhost/best-vendors-that-accept-cryptocurrency/</link>
      <pubDate>Thu, 20 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/best-vendors-that-accept-cryptocurrency/</guid>
      <description>Anonymous Purchases Where can you actually use cryptocurrency to buy things anonymously? Here we’ll go over a list of vendors and places that accept it. And if you really want to learn about real world crypto, subscribe for free to our new content by email, by Session messenger, via RSS feed, our Ethereum push notification channel, or on Nostr.&#xA;Bitrefill.com&#xA;We Love Bitrefill; it’s our number 1 choice for anonymous cryptocurrency shopping.</description>
    </item>
    <item>
      <title>Best Temporary Burner SMS Verification Services</title>
      <link>http://localhost/best-temporary-burner-sms-verification-services/</link>
      <pubDate>Mon, 17 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/best-temporary-burner-sms-verification-services/</guid>
      <description>SMS Burners In our previous article, we discussed great services for getting long term anonymous phone numbers and cell service. Now we’ll discuss temporary or one-time “burner” SMS verification services.&#xA;The purpose of this is getting a one-time verification text to sign up for some service without providing any of your identifying information. You would get a lot out of subscribing for free to our new content by email, by Session messenger, RSS feed, or Nostr.</description>
    </item>
    <item>
      <title>DeGoogled Phones 101: The Basics</title>
      <link>http://localhost/degoogled-phones-101-the-basics/</link>
      <pubDate>Mon, 17 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/degoogled-phones-101-the-basics/</guid>
      <description>DeGoogled Basics What is a degoogled phone? The term “degoogled phone” refers to an android with a custom open source operating system that does NOT have telemetry with Google. Its purpose is privacy.&#xA;What is Android? Android is an open source project created by Google. It is a framework for an operating system, but this open source version isn’t what you actually get when you buy a regular smartphone.&#xA;Difference? Q: I bought a regular smartphone from a normal retail store.</description>
    </item>
    <item>
      <title>How Smartphone Photos Leak Your GPS Location</title>
      <link>http://localhost/how-photos-leak-your-gps-location/</link>
      <pubDate>Mon, 17 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/how-photos-leak-your-gps-location/</guid>
      <description>Pics Leak Tags Location When you take a picture with a smartphone, it automatically puts your location within the picture’s metadata using the phone’s GPS. Metadata is information about a file, and anyone with the file can view this data, which not only includes the location but other information, such as the exact model of the phone and the time the picture was taken.&#xA;EXIF The technical name for this metadata, including location, is EXIF (Exchangeable Image File Format).</description>
    </item>
    <item>
      <title>OpenVPN vs WireGuard: Which one should you use?</title>
      <link>http://localhost/vpn-protocols-which-one-should-you-use/</link>
      <pubDate>Mon, 17 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/vpn-protocols-which-one-should-you-use/</guid>
      <description>Two Protocols Many VPNs offer the same protocols and give the user the option to choose from which protocol to use. The two most popular choices are OpenVPN and Wireguard. Each of them have different advantages and use cases. And if you really want to learn how to become a ghost, subscribe for free to our new content by email, by Session messenger, RSS feed, or Nostr.&#xA;OpenVPN 2001 OpenVPN has been around much longer than Wireguard.</description>
    </item>
    <item>
      <title>2FA on a PC: KeePass XC Tutorial</title>
      <link>http://localhost/2fa-on-a-pc-keepass-xc-tutorial/</link>
      <pubDate>Mon, 17 Oct 2022 00:00:00 +0000</pubDate>
      <guid>http://localhost/2fa-on-a-pc-keepass-xc-tutorial/</guid>
      <description>KeePass XC is a free and open source password manager that stores its database locally on your computer. It works on Linux, Windows, or MacOS. Your password and 2FA database is encrypted using 256-bit AES, which is the industry standard and academically accepted as secure. And if you really want to learn about cybersecurity, subscribe for free to our new content by email, by Session messenger, RSS feed, or Nostr.</description>
    </item>
    <item>
      <title>How to Hide Your Location from Cell Towers</title>
      <link>http://localhost/how-to-hide-your-location-from-cell-towers/</link>
      <pubDate>Mon, 17 Oct 2022 00:00:00 +0000</pubDate>
      <guid>http://localhost/how-to-hide-your-location-from-cell-towers/</guid>
      <description>Even if a phone isn’t directly tied to your name, by tracking your location they can see where the phone rests for the night. In this guide, we’ll go over how to properly hide your home’s location and identity from cellphone tower service providers. And if you really want to learn how to become a ghost, subscribe for free to our new content by email, by Session messenger, via RSS feed, our Ethereum push notification channel, or on Nostr.</description>
    </item>
    <item>
      <title>Why to Avoid 2FA on Phones</title>
      <link>http://localhost/why-to-avoid-2fa-on-phones/</link>
      <pubDate>Mon, 17 Oct 2022 00:00:00 +0000</pubDate>
      <guid>http://localhost/why-to-avoid-2fa-on-phones/</guid>
      <description>2FA or 2-Factor Authentication is a great security tool if you use an open source tool with method called TOTP. On the other hand, if you use Google Authenticator — or even worse, regular SMS texts — then it’s easy for predators to hack and surveillance you. The government and Google want to see what you’re doing, so if you not only show them, but verify your identity and physical location with an SMS SIM card, then you’ve become a bitch slave of the Empire.</description>
    </item>
    <item>
      <title>Browser Fingerprinting: What You Need to Know</title>
      <link>http://localhost/browser-fingerprinting-what-you-need-to-know/</link>
      <pubDate>Sun, 16 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/browser-fingerprinting-what-you-need-to-know/</guid>
      <description>Car Metaphor Tracker on Car The Electronic Frontier Foundation has a great metaphor to understand the difference between a cookie and browsing fingerprinting. A cookie is like putting a tracker on your car. The tracker’s owner can see everywhere you go until you remove it.&#xA;Picture of Car In contrast, browser fingerprinting is like taking a picture of the car. We know what model, year, license plate number, and state it’s registered.</description>
    </item>
    <item>
      <title>How to Stop Browser Fingerprinting</title>
      <link>http://localhost/how-to-stop-browser-fingerprinting/</link>
      <pubDate>Sun, 16 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/how-to-stop-browser-fingerprinting/</guid>
      <description>Avoiding fingerprinting In our previous article, we learned what browser fingerprinting is and some of the privacy dangers of having big tech companies or even random small websites fingerprint you, as the companies sell or share data with the bigger database advertising firms. Now we’ll discuss some tactics to actively avoid fingerprinting, which include:&#xA;a) Using Browsers with Blocking Features&#xA;b) Using a Variety of Browsers&#xA;c) Disabling Javascript&#xA;d) Using less tracked mirror websites</description>
    </item>
    <item>
      <title>VPN Mistakes to Avoid</title>
      <link>http://localhost/vpn-mistakes-to-avoid/</link>
      <pubDate>Sun, 16 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/vpn-mistakes-to-avoid/</guid>
      <description>Mistakes VPNs are a great tool for privacy, but they are often misunderstood and misused. Sometimes people believe that they are getting more privacy or anonymity than they actually are. Or other times, a user’s goals are possible, but were not executed correctly.&#xA;In this article, we will go over some basic common mistakes you should avoid when using a VPN. And to really learn the art of invisibility, subscribe for free to our new content by email, by Session messenger, RSS feed, or Nostr.</description>
    </item>
    <item>
      <title>How to Get Good Linux Software</title>
      <link>http://localhost/how-to-get-good-linux-software/</link>
      <pubDate>Sat, 15 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/how-to-get-good-linux-software/</guid>
      <description>Many people fear switching to Linux because they think that the software they want to use won’t be available. This is usually untrue for 4 reasons. You will get a lot out of subscribing for free to our new content by email or RSS feed.&#xA;Open Source Replacements FOSS First, Linux has a free and open source version of most things you’ll need, such as an office suite, photo effects editor, web browsers, video editors, email clients, and most things you can think of.</description>
    </item>
    <item>
      <title>Why Linux is more secure than Windows</title>
      <link>http://localhost/why-is-linux-more-secure-than-windows/</link>
      <pubDate>Sat, 15 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/why-is-linux-more-secure-than-windows/</guid>
      <description>Open Source First, Linux is open source, meaning anyone can view the code. Because of this, Linux does not have malicious tracking or anything that works against you.&#xA;Testing Flaws Because the code is readily available, Linux gives huge numbers of participants the ability to test security flaws. The operating system improves through the contributions of decentralized individuals looking over the code.&#xA;Merit Based Decentralized open source initiatives then progress through a merit based system, in which changes are adopted as they are shown to be needed.</description>
    </item>
    <item>
      <title>Linux has speed &amp; economic benefits</title>
      <link>http://localhost/linux-has-speed-economic-benefits/</link>
      <pubDate>Fri, 14 Oct 2022 05:40:00 +0000</pubDate>
      <guid>http://localhost/linux-has-speed-economic-benefits/</guid>
      <description>There are so many benefits to Linux beyond just privacy and security. Because Linux has less clutter without any of the corrupt Windows spyware, it allows for faster load times. When you boot up the operating system, you can get going faster. Whenever you run an application, the kernel (which is the main part of the operating system) can process that information faster. A great way to learn the foundations of Linux and privacy is by subscribing for free to our new content by email, by Session messenger, RSS feed, or Nostr.</description>
    </item>
    <item>
      <title>Virtual Machines for Privacy 101</title>
      <link>http://localhost/virtual-machines-for-privacy-101/</link>
      <pubDate>Wed, 17 Aug 2022 06:00:00 +0000</pubDate>
      <guid>http://localhost/virtual-machines-for-privacy-101/</guid>
      <description>VMs One technique for dealing with fingerprinting is to use Virtual Machines (VMs)&#xA;A Virtual Machine is a software emulated recreation of a smaller computer that runs in an isolated partition of a real physical computer’s hardware. In other words, it’s a tiny isolated fake computer inside a real computer.&#xA;What is the Cloud? Virtual Machines separates the computer’s functionality from the physical hardware that it’s hosted on. And this is the basis for cloud computing.</description>
    </item>
    <item>
      <title>Apple’s “Pro-Privacy Stance” is Propaganda</title>
      <link>http://localhost/apples-privacy-is-propaganda/</link>
      <pubDate>Mon, 01 Jan 0001 10:00:00 -0700</pubDate>
      <guid>http://localhost/apples-privacy-is-propaganda/</guid>
      <description>Apple is the #1 surveillance organization in the world, with powers far greater than Google or Facebook. Yet they have managed to convince the masses of sheep consumers that Apple is focused on privacy with its billboards and video ads.&#xA;This is primarily because most people do not understand the technology and have not actually read Apple’s legal terms of service. /nYou can learn a ton about privacy by subscribing for free to our new content by email, by Session messenger, or RSS feed.</description>
    </item>
    <item>
      <title>Sources: Google’s Surveillance: The Shocking Truth</title>
      <link>http://localhost/Sources/googles-surveillance-the-shocking-truth/</link>
      <pubDate>Mon, 01 Jan 0001 06:00:00 -0700</pubDate>
      <guid>http://localhost/Sources/googles-surveillance-the-shocking-truth/</guid>
      <description>Read complete article here [1] Electronic Frontier Foundation Google Says It Doesn’t ‘Sell’ Your Data. Here’s How the Company Shares, Monetizes, and Exploits It.&#xA;By Bennett Cyphers&#xA;https://www.eff.org/deeplinks/2020/03/google-says-it-doesnt-sell-your-data-heres-how-company-shares-monetizes-and&#xA;[2] Pro Publica Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking&#xA;By Julia Angwin&#xA;https://www.propublica.org/article/google-has-quietly-dropped-ban-on-personally-identifiable-web-tracking&#xA;[3] The New York Post and Consumer Watch Dog How Google Is Making More Money Than Ever Off the Sick and Vulnerable&#xA;By John Mac Ghlionn</description>
    </item>
    <item>
      <title>Sources: How Google’s AI is harmful</title>
      <link>http://localhost/Sources/google-ai/</link>
      <pubDate>Mon, 01 Jan 0001 06:00:00 -0700</pubDate>
      <guid>http://localhost/Sources/google-ai/</guid>
      <description>Read complete article here These are the sources for our article on harmful Google AI: [1]&#xA;DigitalTrends&#xA;https://www.digitaltrends.com/mobile/google-photos-ask-gemini-ai-upgrade-io-2024-news/&#xA;[2]&#xA;Google CEO Pledged To Use AI To Counter “Fake News&#xA;https://public.substack.com/p/google-ceo-pledged-to-use-ai-to-counter</description>
    </item>
    <item>
      <title>Sources: Microsoft will give Windows PCs a ‘photographic memory’</title>
      <link>http://localhost/Sources-windows-recall-photographic/</link>
      <pubDate>Mon, 01 Jan 0001 06:00:00 -0700</pubDate>
      <guid>http://localhost/Sources-windows-recall-photographic/</guid>
      <description>Read complete article here Sources [1] How to turn off photographic memory feature in Windows called Recall that Elon Musk likened to a Black Mirror episode&#xA;[2] Microsoft Windows creepy AI move</description>
    </item>
    <item>
      <title>How an Encrypted Hard-drive Works</title>
      <link>http://localhost/how-an-encrypted-hard-drive-works/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/how-an-encrypted-hard-drive-works/</guid>
      <description>Encrypted Hard Drive? Have you ever heard “you should encrypt your hard drive” on a technology video channel? What does that even mean really? Doesn’t the Linux operating system have a user password? Is that encryption or protection?&#xA;Let’s break it down: Remote Attacks User passwords on the operating system, protect you from hackers over the internet. The password provides a safeguard against anyone accessing the operating system or system resources remotely.</description>
    </item>
    <item>
      <title>Obedience is Dangerous</title>
      <link>http://localhost/stanley-milgram/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/stanley-milgram/</guid>
      <description>Ever think, “How could a person do [insert horror]?” Stanley Milgram Stanley Milgram a psychologist at Yale University did an experiment where he tested if participants would obey TAKING ORDERS to electrocute a subject. The subject was in on it, so nobody was hurt. The wires did NOT have real electricity, and it was purely acting and screaming out in “FAKE pain”.&#xA;The purpose of the experiment was to measure if the person would obey authority and follow the commands to administer electric shocks as part of an academic study.</description>
    </item>
    <item>
      <title>PrivacyGuides Loves Spyware</title>
      <link>http://localhost/privacyguides-jonah/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/privacyguides-jonah/</guid>
      <description>PrivacyGuides Malware One of our readers asked how we differ from PrivacyGuides. So I wanted to outline the technology choices for your benefit.&#xA;Jonah Aragon For those of you who are unfamiliar, PrivacyGuides.org is a website run by Jonah Aragon. And although this post will heavily criticize PrivacyGuides, I must stress that I do respect Jonah and the rest of his team. They are doing a huge service by running their guides as a non-profit.</description>
    </item>
    <item>
      <title>Questions? Groups for SimpleX, Session, XMPP</title>
      <link>http://localhost/techgroups/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/techgroups/</guid>
      <description>Tech Resources! Here’s a list of the active Session, SimpleX, and XMPP Public Groups where you can ask questions on tech.&#xA;Session Simplified Privacy Official Group https://session.simplifiedprivacy.is/simplified?public_key=ed33150048005a9237708314785af91f5dfe0d9eafd8a66df6e9977cc9619431&#xA;Privacy http://sog.caliban.org/privacy?public_key=118df8c6c471ac0468c7c77e1cdc12f24a139ee8a07c6e3bf4e7855640dad821&#xA;QubesOS http://sogs.cosmicnation.co/qubesos?public_key=c7940d53c81ac95430fd6d4af4a51630a0231218716366110d9fdb3fe5d78966&#xA;Modern Survival http://sog.caliban.org/modernsurvival?public_key=118df8c6c471ac0468c7c77e1cdc12f24a139ee8a07c6e3bf4e7855640dad821&#xA;GrapheneOS http://sogs.cosmicnation.co/grapheneos?public_key=c7940d53c81ac95430fd6d4af4a51630a0231218716366110d9fdb3fe5d78966&#xA;Linux http://sog.caliban.org/linux?public_key=118df8c6c471ac0468c7c77e1cdc12f24a139ee8a07c6e3bf4e7855640dad821&#xA;System &amp;amp; Network Security http://sog.caliban.org/security?public_key=118df8c6c471ac0468c7c77e1cdc12f24a139ee8a07c6e3bf4e7855640dad821&#xA;Tech http://116.203.217.101/tech?public_key=2054fa3271f27ec9e55492c85d022f9582cb4aa2f457e4b885147fb913b9c131&#xA;SimpleX Simplified Privacy Official Group: https://simplex.chat/contact#/?v=1-4&amp;amp;smp=smp%3A%2F%2FenEkec4hlR3UtKx2NMpOUK_K4ZuDxjWBO1d9Y4YXVaA%3D%40smp14.simplex.im%2Fz2BKiaUdB6O7KwOBy4IXGNnz3oWyNss7%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAENfGMNmw6fjxMjNt5GQaj5VYOxeOmVZiDkd3NROiqCU%253D%26srv%3Daspkyu2sopsnizbyfabtsicikr2s4r3ti35jogbcekhm3fsoeyjvgrid.onion&amp;amp;data=%7B%22type%22%3A%22group%22%2C%22groupLinkId%22%3A%222qsQUeR1KhcP3tJuztWwvw%3D%3D%22%7D&#xA;Privacy, Security, Anonymity. https://simplex.chat/contact#/?v=1-4&amp;amp;smp=smp%3A%2F%2FPQUV2eL0t7OStZOoAsPEV2QYWt4-xilbakvGUGOItUo%3D%40smp6.simplex.im%2F3EDHk8oiLEW-IxrKACWNCv9YVO7JiLyy%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAGRUp7ar8_M58-dPjBqno1IiWrvKVZ6TEuBWF71f-WWM%253D%26srv%3Dbylepyau3ty4czmn77q4fglvperknl4bi2eb2fdy2bh4jxtf32kf73yd.onion&amp;amp;data=%7B%22type%22%3A%22group%22%2C%22groupLinkId%22%3A%22E_qexehgVUGlPv2f3neZPQ%3D%3D%22%7D&#xA;Monero XMR https://simplex.chat/contact#/?v=1-4&amp;amp;smp=smp%3A%2F%2Fh–vW7ZSkXPeOUpfxlFGgauQmXNFOzGoizak7Ult7cw%3D%40smp15.simplex.im%2FEmRhJbsEq3sHw2_i7mA92BY545Y5RvNd%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAp94qy7ZhPEgIBpymfG8-aPHDC9EJ4nSvMLXjCWxMx3Q%253D%26srv%3Doauu4bgijybyhczbnxtlggo6hiubahmeutaqineuyy23aojpih3dajad.onion&amp;amp;data=%7B%22type%22%3A%22group%22%2C%22groupLinkId%22%3A%22-_hQq6m3Xk-cdQIiwmSDHw%3D%3D%22%7D&#xA;Bitcoin &amp;amp; Lightning Network https://simplex.chat/contact#/?v=1-4&amp;amp;smp=smp%3A%2F%2Fu2dS9sG8nMNURyZwqASV4yROM28Er0luVTx5X1CsMrU%3D%40smp4.simplex.im%2F6dNk57UTVN7EF6r1O9LaOyI9Opx7Az9s%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEASuPrFrvyC44b-tgZpEu5dfDhN2HX1kKLOzIoR8UrBzY%253D%26srv%3Do5vmywmrnaxalvz6wi3zicyftgio6psuvyniis6gco6bp6ekl4cqj4id.onion&amp;amp;data=%7B%22type%22%3A%22group%22%2C%22groupLinkId%22%3A%22GvuLoG20itjrTh8rVzR8Ig%3D%3D%22%7D&#xA;privacy security anonymity group of Switzerland https://simplex.chat/contact#/?v=1-4&amp;amp;smp=smp%3A%2F%2FPQUV2eL0t7OStZOoAsPEV2QYWt4-xilbakvGUGOItUo%3D%40smp6.simplex.im%2FFHiv5_94tP8wxeva32KO7c0sCPa_ojcx%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEA3IWe4TzZs7Y306h07xE1B-_T6pv70OBqWKpvdrP3vQ4%253D%26srv%3Dbylepyau3ty4czmn77q4fglvperknl4bi2eb2fdy2bh4jxtf32kf73yd.onion&amp;amp;data=%7B%22type%22%3A%22group%22%2C%22groupLinkId%22%3A%22Gx96MuO6PFtVeL9zWJ0zFA%3D%3D%22%7D</description>
    </item>
    <item>
      <title>Sources: 2023 CypherPunk New Years Wrap-up</title>
      <link>http://localhost/sourrces/cypherpunk2023/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/sourrces/cypherpunk2023/</guid>
      <description>Read complete article here These sources are in the same order as the article, which means the numbers going down.&#xA;[17] Gizmodo Encrypted Email Service Tuta Denies It’s a ‘Honeypot’ for Five Eyes Intelligence&#xA;https://gizmodo.com/tuta-email-denies-connection-to-intelligence-services-1851022465&#xA;[16] TechCrunch Microsoft reveals how hackers stole its email signing key… kind of&#xA;https://techcrunch.com/2023/09/08/microsoft-hacker-china-government-storm-0558/&#xA;New York Times Chinese Hackers Breached Government Email Accounts, Microsoft Says&#xA;https://www.nytimes.com/2023/07/11/us/politics/china-hack-us-government-microsoft.html&#xA;or&#xA;Tor Onion&#xA;https://www.nytimesn7cgmftshazwhfgzm37qxb44r64ytbb2dj3x62d2lljsciiyd.onion/2023/07/11/us/politics/china-hack-us-government-microsoft.html&#xA;[15] Simplified Privacy Self-reporting. Original source</description>
    </item>
    <item>
      <title>Sources: 4 Reasons Monero Won’t Die like Tornado Cash</title>
      <link>http://localhost/Sources/monero-vs-tornado-cash/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/monero-vs-tornado-cash/</guid>
      <description>Read complete article here These are the sources for the article comparing Monero to Tornado Cash.&#xA;[1] Cash Fusion Bitcoin Cash&#xA;https://cashfusion.org/&#xA;[2a] Monero Talk Cuban Warrior&#xA;https://www.monerotalk.live/cuban-warrior-update-on-monero-mesh-network-price-report-news-more-epi-146&#xA;[2b] Basic Swap Dex https://basicswapdex.com/&#xA;[3] Artic Mine https://invidious.flokinet.to/watch?v=DV9YqdMJl-8&#xA;www.youtube.com/watch?v=DV9YqdMJl-8&#xA;[5] Confessions of an Economic Hit Man John Perkins&#xA;2004&#xA;[6] Scott Horton Show https://scotthorton.org/interviews/2-6-22-branko-marcetic-on-the-nazi-insurgency-in-ukraine/&#xA;[7] Shadow Stats John Williams&#xA;https://www.shadowstats.com/alternate_data/inflation-charts&#xA;[8] Peter Schiff Crash Proof 2.0: How to Profit From the Economic Collapse</description>
    </item>
    <item>
      <title>Sources: 6 Fast &amp; Hard-Hitting Reasons Fiat Money is Corrupt…</title>
      <link>http://localhost/Sources/6-fast-and-hard/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/6-fast-and-hard/</guid>
      <description>Read complete article here These are the sources for our article on fiat money being corrupt.&#xA;[1] Global Research Hillary Emails Reveal NATO Killed Gaddafi to Stop Libyan Creation of Gold-Backed Currency&#xA;By Sheep Media&#xA;Global Research, November 04, 2018&#xA;Sheep Media 13 June 2017&#xA;https://www.globalresearch.ca/hillary-emails-reveal-nato-killed-gaddafi-to-stop-libyan-creation-of-gold-backed-currency/5594742&#xA;[2] John Perkins The New Confessions of an Economic Hitman&#xA;[3a] Edward Griffin Creature on Jekyll Island&#xA;Second look at the Federal Reserve</description>
    </item>
    <item>
      <title>Sources: 9 Dangers of Google’s Power</title>
      <link>http://localhost/Sources/googledangers/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/googledangers/</guid>
      <description>Read complete article here These are the sources for our article on the dangers of Google.&#xA;[1a] Reclaim the Net&#xA;Dr. James Todaro accuses Google of censorship for removing his article on hydroxychloroquine&#xA;https://reclaimthenet.org/dr-james-todaro-censorship&#xA;[1b] Karel Donk&#xA;Censorship by Google Drive and Google Docs&#xA;https://blog.kareldonk.com/censorship-by-google-drive-and-google-docs/&#xA;[2] Wikileaks&#xA;Google is not what it seems&#xA;Julian Assange&#xA;https://wikileaks.org/google-is-not-what-it-seems/&#xA;[3a] Creepy Google AI targeted father, falsely accused him of child sex crimes following private conversation between him and doctor about son’s groin problems</description>
    </item>
    <item>
      <title>Sources: After this court ruling, EU Chat Control is dead</title>
      <link>http://localhost/Sources/court-rules-against-eu-chat-control/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/court-rules-against-eu-chat-control/</guid>
      <description>Read complete article here [1] The Register Echr Backdoor Encryption&#xA;https://www.theregister.com/2024/02/15/echr_backdoor_encryption/&#xA;[2] Silicon Republic EU Court Human Rights ends to end encryption backdoors Telegram https://www.siliconrepublic.com/enterprise/european-court-human-rights-end-to-end-encryption-backdoors-telegram&#xA;[3] Field Fisher End to, End to End Encryption, Not so Soon&#xA;https://www.fieldfisher.com/en/insights/an-end-to-end-to-end-encryption-not-so-soon&#xA;[4] NewsWeek Has Zelensky Canceled Ukraine’s Elections? Here’s What Happened&#xA;https://www.newsweek.com/has-zelensky-canceled-ukraine-elections-what-happened-1842001&#xA;[5] CircleID A Look Into Tor Nodes’ Locations and ISPs with IP Intelligence&#xA;https://circleid.com/posts/20201129-a-look-into-tor-nodes-locations-and-isps-with-ip-intelligence/&#xA;[6] Brair Project Funding https://briarproject.org/about/ &amp;amp;</description>
    </item>
    <item>
      <title>Sources: Browser Fingerprints Lead to Price Discrimination</title>
      <link>http://localhost/Sources/browser-fingerprints-lead-to-price-discrimination/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/browser-fingerprints-lead-to-price-discrimination/</guid>
      <description>Read complete article here Sources These are the sources for our earlier article on Browser Fingerprints Enabling Price Discrimination.&#xA;[1a] Kare 11 The Target app price switch: What you need to know&#xA;Author: Chris Hrapsky&#xA;Published: 1/27/2019, Updated: February 6, 2019&#xA;https://www.kare11.com/article/money/consumer/the-target-app-price-switch-what-you-need-to-know/89-9ef4106a-895d-4522-8a00-c15cff0a0514&#xA;[1b] Money Talks News How Target Snooped on Shoppers, Changed Prices Based on Location&#xA;Bob Sullivan&#xA;February 16, 2019&#xA;https://www.moneytalksnews.com/how-target-snooped-on-shoppers-changed-prices-based-on-location/&#xA;“For instance, Target’s app price for a particular Samsung 55-inch Smart TV was $499.</description>
    </item>
    <item>
      <title>Sources: Cryptpad vs NextCloud: the anti-Google.</title>
      <link>http://localhost/Sources/cryptpad-vs-nextcloud/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/cryptpad-vs-nextcloud/</guid>
      <description>Read complete article here Sources for Cryptpad &amp;amp; NextCloud [1a] Wired.com (This first article is very dated but relevant as it shows financial flows into contact tracing and the CIA working with Google to do relationship mapping)&#xA;Exclusive: Google, CIA Invest in ‘Future’ of Web Monitoring&#xA;By: Noah Shachtman&#xA;https://www.wired.com/2010/07/exclusive-google-cia&#xA;[1b] Rob Braxman Cybersecurity Researcher: Rob Braxman&#xA;(Video) Your Internet Identity: How you are tracked by Google and Facebook</description>
    </item>
    <item>
      <title>Sources: Deleted Nudes Permanently Leak on Apple?!</title>
      <link>http://localhost/Sources-apple-leaks-forever/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources-apple-leaks-forever/</guid>
      <description>Read complete article here Source: https://www.theverge.com/2024/5/15/24157284/apple-iphone-ios-17-5-update-deleted-photos-voicemails</description>
    </item>
    <item>
      <title>Sources: Facebook is Corrupt Evil Spyware</title>
      <link>http://localhost/Sources/facebooks-corrupt-off-platform-surveillance/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/facebooks-corrupt-off-platform-surveillance/</guid>
      <description>Read complete article here [1] How We Built a Meta Pixel Inspector By Surya Mattu, Angie Waller, Simon Fondrie-Teitler, and Micha Gorelick https://themarkup.org/show-your-work/2022/04/28/how-we-built-a-meta-pixel-inspector&#xA;[2] Applied for Student Aid Online? Facebook Saw You The FAFSA form included code that sent personal information back to Facebook By Surya Mattu and Colin Lecher April 28, 2022 https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you&#xA;https://themarkup.org/pixel-hunt/2022/11/22/tax-filing-websites-have-been-sending-users-financial-information-to-facebook&#xA;[3] The Guardian Facebook accused of conducting mass surveillance through its apps Carole Cadwalladr and Emma Graham-Harrison https://www.</description>
    </item>
    <item>
      <title>Sources: Google Censors Freedom</title>
      <link>http://localhost/Sources/google-censors-freedom/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/google-censors-freedom/</guid>
      <description>Read complete article here Sources: [1] Wikileaks Google is not what it seems&#xA;Julian Assange&#xA;https://wikileaks.org/google-is-not-what-it-seems/&#xA;[2] The Wikileaks Files By Julian Assange &amp;amp; Others&#xA;A December 13, 2006, cable “Influencing the SARG [Syrian government] in the End of 2006” by William Roebuck, who at the time was in charge’d’affaires at US embassy in Damascus, suggests this idea. The Wikileaks book added the emphasis (they used italics, I used bold/underline), but the exact quote is unaltered, as follows:</description>
    </item>
    <item>
      <title>Sources: Hack on France’s government database! Will it stop VPN restrictions?</title>
      <link>http://localhost/Sources/france-hack-vpn-restrictions/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/france-hack-vpn-restrictions/</guid>
      <description>Read complete article here These are the sources for our article discussing heavy restrictions on VPNs in France, as they were hacked:&#xA;[1] https://www.bleepingcomputer.com/news/security/french-unemployment-agency-data-breach-impacts-43-million-people/&#xA;[2] https://www.euronews.com/next/2024/02/08/data-of-33-million-people-in-france-stolen-in-its-largest-ever-cyberattack-this-is-what-we&#xA;[3] https://www.upguard.com/blog/biggest-data-breaches-france&#xA;[4a] Techradar&#xA;France VPNs might be banned amid SREN Bill’s new “unreasonable amendments”&#xA;https://www.techradar.com/pro/vpn/france-vpns-might-be-banned-amid-sren-bills-new-unreasonable-amendments&#xA;[4b] https://www.legifrance.gouv.fr/dossierlegislatif/JORFDOLE000047533100/&#xA;[4c] https://www.assemblee-nationale.fr/dyn/16/amendements/1674/AN/915</description>
    </item>
    <item>
      <title>Sources: How Streaming Services train you for Obedience</title>
      <link>http://localhost/Sources/stream/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/stream/</guid>
      <description>Read complete article here Sources for Streaming These are the sources for our article on how streaming trains you for obedience.&#xA;[1] Propaganda 1928&#xA;By Edward Bernays&#xA;Exact quote:&#xA;“He asserts that the emotional response inherently present in propaganda limits the audience’s choices by creating a binary mentality, which can result in quicker, more enthused responses.”&#xA;[2] MoneroTalk The CCS Wallet Hack: Exposing and Improving Monero’s Weaknesses w/ Francisco “ArticMine” Cabañas and Justin Ehrenhofer | EPI #288</description>
    </item>
    <item>
      <title>Sources: How you can be deanonymized through Tor</title>
      <link>http://localhost/Sources/how-you-can-be-deanonymized-through-tor/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/how-you-can-be-deanonymized-through-tor/</guid>
      <description>Read complete article here These are the sources for our article on being deanonymized through Tor.&#xA;Sources Below: [1] Tech Times FBI Drops Child Pornography Case To Avoid Disclosing Tor Vulnerability&#xA;Alexandra Burlacu&#xA;07 March 2017&#xA;https://www.techtimes.com/articles/200592/20170307/fbi-drops-child-pornography-case-to-avoid-disclosing-tor-vulnerability.htm&#xA;[2] RestorePrivacy Is Tor Trustworthy and Safe?&#xA;Sven Taylor&#xA;December 14, 2021&#xA;https://restoreprivacy.com/tor/&#xA;[3] Black Hat anti-Tor talk smashed by lawyers’ wrecking ball&#xA;Darren Pauli&#xA;22 Jul 2014&#xA;https://www.theregister.com/2014/07/22/legal_wrecking_balls_break_budget_tor_popping_talk/&#xA;JavaScript Attacks [4a] Hacker News Tails OS Users Advised Not to Use Tor Browser Until Critical Firefox Bugs are Patched</description>
    </item>
    <item>
      <title>Sources: Layer 2 Internet? Peer-to-peer WiFi &amp; LoRaWAN</title>
      <link>http://localhost/Sources/layer2wifi/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/layer2wifi/</guid>
      <description>Read complete article here Resources&#xA;Where can you learn more about Decentralized infrastructure? Check out this site listing projects, https://depinhub.io/&#xA;Reticulum is a LoRaWAN network with self-sovereign identity. https://reticulum.network/&#xA;As one of the MANY examples of LoRaWAN messengers. Here’s TheNico14’s github: https://github.com/TheNico14/LoRaMessenger&#xA;And open source LoRaWAN software:&#xA;https://www.thethingsnetwork.org/</description>
    </item>
    <item>
      <title>Sources: Leaked Lies at Google</title>
      <link>http://localhost/sources/leaked-google-lies/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/sources/leaked-google-lies/</guid>
      <description>Read complete article here [1] Google Algo Leak&#xA;[2] Internal Google Search Documents&#xA;[3] Mental Outlaw on Google leak - Google Has Been Lying About Their Search Results&#xA;[4] Leaked Google Docs Show Click Data&amp;rsquo;s Role in Search Rankings</description>
    </item>
    <item>
      <title>Sources: PrivacyGuides Loves Spyware</title>
      <link>http://localhost/Sources/privacyguides-jonah/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/privacyguides-jonah/</guid>
      <description>Read complete article here These are the references from our article on Privacy Guides. [1] Skiff https://blog.privacyguides.org/2024/02/11/this-week-in-privacy-8/&#xA;[2] Nostr Quote https://discuss.privacyguides.net/t/nostr-decentrilized-alternitive-to-twitter-edward-snowden/12069</description>
    </item>
    <item>
      <title>Sources: Public Backlash Forces Extension on US Surveillance Decision</title>
      <link>http://localhost/Sources/decision/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/decision/</guid>
      <description>Read complete article here Sources: [1] Yahoo News FBI Made ‘Inappropriate Use’ of Foreign Surveillance Program To Spy on Americans&#xA;https://news.yahoo.com/fbi-made-inappropriate-foreign-surveillance-202028510.html&#xA;[2] Reason Magazine FBI misused foreign surveillance&#xA;[3] Liza Goitein, Public Twitter/X https://nitter.net/LizaGoitein/status/1734249943932563505#m&#xA;[4] Prospect Mike Johnson NDAA Surveillance Reform&#xA;https://prospect.org/civil-rights/2023-12-12-mike-johnson-ndaa-surveillance-reform/</description>
    </item>
    <item>
      <title>Sources: Spain has banned Telegram. Defending Session</title>
      <link>http://localhost/Sources/spain-has-banned-telegram-defending-session/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/spain-has-banned-telegram-defending-session/</guid>
      <description>Read complete article here Sources [1] Reuters https://www.reuters.com/world/europe/high-court-orders-temporary-suspension-telegrams-services-spain-2024-03-23/&#xA;[2] SimpleX Open admission of funding from Village Global, which is owned by Microsoft, https://simplex.chat/blog/20230422-simplex-chat-vision-funding-v5-videos-files-passcode.html&#xA;[3] Pitchbook Further on pitchbook, they list the Village Global investment,&#xA;https://pitchbook.com/profiles/company/528431-50#signals&#xA;When asked about it, the lead dev Evgeny Poberezkin said yes it’s true, microsoft:&#xA;SimpleX Chat Ltd Corporate Office&#xA;20-22, Wenlock Road&#xA;London N1 7GU&#xA;England, United Kingdom</description>
    </item>
    <item>
      <title>Sources: The NSA made SELinux.. can you trust it?</title>
      <link>http://localhost/Sources/selinux/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/selinux/</guid>
      <description>Read complete article here 404 not found</description>
    </item>
    <item>
      <title>Sources: The Tyranny of KYC</title>
      <link>http://localhost/Sources/kyc-tyranny/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/kyc-tyranny/</guid>
      <description>Sources These are the sources for our article on the tyranny of KYC.&#xA;[1a] NewsOne How The CIA Helped Create Osama Bin Laden&#xA;https://newsone.com/1205745/cia-osama-bin-laden-al-qaeda/&#xA;[2b] Lumen Learning The United States and the Mujahideen&#xA;https://courses.lumenlearning.com/suny-hccc-worldhistory2/chapter/the-united-states-and-the-mujahideen/&#xA;[2a] Scott Horton Show 10/31/19 Dan Cohen on America’s Treasonous Support for Revolution in Syria&#xA;https://scotthorton.org/interviews/10-31-19-dan-cohen-on-americas-treasonous-support-for-revolution-in-syria/&#xA;[2b] Scott Horton Stress Blog&#xA;https://scotthorton.org/stress/the-american-al-qaeda-war-for-syria/&#xA;&amp;amp;&#xA;https://soundcloud.com/libertydotme/the-scott-horton-show-gareth-porter-on-how-obamas-cia-backed-al-qaeda-in-syria&#xA;[2c] Scott Horton Against Intervention and Regime Change: A Debate with Bill Kristol</description>
    </item>
    <item>
      <title>Sources: Ubuntu Bitcoin Snap Hack, yet CEO is still clueless</title>
      <link>http://localhost/Sources/ubuntu-crypto-snap-scam/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/ubuntu-crypto-snap-scam/</guid>
      <description>Read complete article here Not found</description>
    </item>
    <item>
      <title>Sources: Unproven Proprietary Software Jails Bitcoin User</title>
      <link>http://localhost/Sources/unproven-proprietary-chainalysis-software-jails-bitcoin-user/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/unproven-proprietary-chainalysis-software-jails-bitcoin-user/</guid>
      <description>Read complete article here These are the sources for the Unproven Chainalysis conviction software article.&#xA;[1] NLW The Breakdown Binance Executives Still Being Held Hostage in Nigeria 2024-03-14 https://www.podbean.com/podcast-detail/5bakh-79e4c/The-Breakdown-Podcast&#xA;[2] CoinDesk Chainalysis Courts US government https://www.coindesk.com/policy/2022/07/27/chainalysis-courts-us-government-with-new-solutions-subsidiary/&#xA;[3] TFTC.io Case against Roman, revolving door 1348 https://www.tftc.io/issue-1348/&#xA;[4] Coindesk Bitcoin Mixer Laundering conviction https://www.coindesk.com/consensus-magazine/2024/03/13/how-a-bitcoin-mixer-laundering-conviction-might-be-appealed/</description>
    </item>
    <item>
      <title>Sources: Why is Telegram horrible</title>
      <link>http://localhost/Sources/why-is-telegram-horrible/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/why-is-telegram-horrible/</guid>
      <description>Read complete article here [1a] Kicksecure Mobile Phone Security https://www.kicksecure.com/wiki/Mobile_Phone_Security&#xA;[2a] madaidans insecurities Whonix Dev https://madaidans-insecurities.github.io/messengers.html [2b] https://eprint.iacr.org/2015/1177.pdf&#xA;Luke Smith Don’t Use Telegram. Don’t Use Telegram. Don’t Use Telegram. Don’t Use Telegram. Don’t Use Telegram. https://invidious.jing.rocks/watch?v=qBTsUVrCDAQ&#xA;[3a] Mental Outlaw Telegram Hands Over User Data to German Police https://invidious.jing.rocks/watch?v=t7HZrpJ4OyQ&#xA;[3b] Mental Outlaw Telegram Review https://invidious.jing.rocks/watch?v=pZEH04nJ_hE&#xA;[3c] Android Central Telegram reportedly gives user data to German authorities https://www.androidcentral.com/apps-software/telegram-reportedly-gives-user-data-to-german-authorities</description>
    </item>
    <item>
      <title>Sources: Why Privacy? Depends on Who’s Asking…</title>
      <link>http://localhost/Sources/why-privacy/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/why-privacy/</guid>
      <description>Read complete article here These are the sources for our article on Why Privacy [1] The Intercept How the LAPD and Palantir Use Data to Justify Racist Policing&#xA;Mara Hvistendahl&#xA;[2] Vice News Leaked Location Data Shows Another Muslim Prayer App Tracking Users&#xA;https://www.vice.com/en/article/xgz4n3/muslim-app-location-data-salaat-first&#xA;&amp;amp;&#xA;https://www.theguardian.com/us-news/2020/dec/03/aclu-seeks-release-records-data-us-collected-via-muslim-app-used-millions&#xA;[3a] NPR A Legacy Of Torture Is Preventing Trials At Guantánamo&#xA;Guantánamo Bay&#xA;https://www.npr.org/2019/11/14/778944195/a-legacy-of-torture-is-preventing-trials-at-guant-namo&#xA;[3b] All Things American How a Judge’s Ruling on Torture Imperils a Guantánamo Prosecution Strategy</description>
    </item>
    <item>
      <title>Sources: Why you need to be on Nostr</title>
      <link>http://localhost/Sources/why-you-need-nostr/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/why-you-need-nostr/</guid>
      <description>Read complete article here [1a] Search Metrics https://blog.searchmetrics.com/us/google-core-update/&#xA;[1b] LinkedIn https://www.linkedin.com/pulse/changes-google-made-2016-affect-seo-nathan-kalaher&#xA;[2a] BuzzSumo Facebook Engagement Falls By Steve Rayson https://buzzsumo.com/blog/facebook-engagement-brands-publishers-falls-20-2017/&#xA;[2b] NPR Does Facebook Really Work? People Question Effectiveness Of Ads Jasmine Garsd. https://www.npr.org/2018/09/12/647040758/advertising-on-facebook-is-it-worth-it&#xA;[3] Gotcha SEO Is Google Biased? We Analyzed 50 Key Politically-Driven Topics to Find Out (Updated for 2022) By Nathan Gotch November 5, 2022 https://www.gotchseo.com/google-biased/&#xA;[4a] https://garyvaynerchuk.com/what-is-underpriced-attention/&#xA;[4b] https://adage.com/article/internet-week-new-york/gary-vaynerchuk-straight-internet-week/298689&#xA;[5] Edward Snowden’s Nostr Page https://primal.net/p/npub1sn0wdenkukak0d9dfczzeacvhkrgz92ak56egt7vdgzn8pv2wfqqhrjdv9</description>
    </item>
    <item>
      <title>Sources:Apple’s “Pro-Privacy Stance” is Propaganda</title>
      <link>http://localhost/Sources/apples-privacy-is-propaganda/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/apples-privacy-is-propaganda/</guid>
      <description>Read complete article here Here are the sources for our article on Apple’s Privacy. You can follow along in another tab.&#xA;[1] The Hated One Apple Is Terrible for Your Privacy https://odysee.com/@everythingFOSS:3/Apple-Is-Terrible-for-Your-Privacy:6&#xA;[2] The Hated One Apple Is Not Your Friend – The Facebook Feud https://odysee.com/@everythingFOSS:3/Apple-Is-Not-Your-Friend—The-Facebook-Feud:a&#xA;[3] Rob Braxman Apple Client-Side Scanning Ruins Phone Security For Everyone https://odysee.com/@RobBraxmanTech:6/clientsidescan:8&#xA;[4] Rob Braxman iPhones. The Most Advanced Surveillance Device Ever Made https://odysee.</description>
    </item>
    <item>
      <title>Sources:Big Tech Abuses Medical Privacy</title>
      <link>http://localhost/Sources/big-tech-abuses-medical-privacy/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/Sources/big-tech-abuses-medical-privacy/</guid>
      <description>Read complete article here Sources [1] Electronic Frontier Foundation Medical Privacy&#xA;https://www.eff.org/issues/medical-privacy&#xA;[2] PrivacyRights.org Consumer Guides: Your Medical Privacy Rights&#xA;https://privacyrights.org/consumer-guides/employment-and-your-medical-privacy-california-medical-privacy-series&#xA;[3] Facebook discloses that it shared user data with dozens of other tech firms by Ellen Tannam&#xA;https://www.siliconrepublic.com/business/facebook-user-data-sharing&#xA;[4a] The Verge Hospital websites are sending medical information to Facebook / Experts say it might be a HIPAA violation&#xA;By Nicole Wetsman&#xA;Jun 16, 2022&#xA;https://www.theverge.com/2022/6/16/23170886/hospital-websites-meta-pixel-tracker-facebook-hipaa&#xA;[4b] TheMarkup.com Facebook Is Receiving Sensitive Medical Information from Hospital Websites</description>
    </item>
    <item>
      <title>Sources:Big Tech Abuses Medical Privacy</title>
      <link>http://localhost/sources/big-tech-abuses-medical-privacy/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/sources/big-tech-abuses-medical-privacy/</guid>
      <description>Read complete article here Sources [1] Electronic Frontier Foundation Medical Privacy&#xA;https://www.eff.org/issues/medical-privacy&#xA;[2] PrivacyRights.org Consumer Guides: Your Medical Privacy Rights&#xA;https://privacyrights.org/consumer-guides/employment-and-your-medical-privacy-california-medical-privacy-series&#xA;[3] Facebook discloses that it shared user data with dozens of other tech firms by Ellen Tannam&#xA;https://www.siliconrepublic.com/business/facebook-user-data-sharing&#xA;[4a] The Verge Hospital websites are sending medical information to Facebook / Experts say it might be a HIPAA violation&#xA;By Nicole Wetsman&#xA;Jun 16, 2022&#xA;https://www.theverge.com/2022/6/16/23170886/hospital-websites-meta-pixel-tracker-facebook-hipaa&#xA;[4b] TheMarkup.com Facebook Is Receiving Sensitive Medical Information from Hospital Websites</description>
    </item>
    <item>
      <title>Types of Virtual Machines: What’s right for you?</title>
      <link>http://localhost/types-of-virtual-machines-whats-right-for-you/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/types-of-virtual-machines-whats-right-for-you/</guid>
      <description>Types In our previous articles we discussed what browser fingerprinting is and how Big Tech firms maliciously use it to gather data on you and sell it. But you can defy them and avoid fingerprinting by using virtual machines.&#xA;The two most popular open source VM options are Oracle’s Virtual Machine and KVM Virt Manager (also going by QEMU). We’re now going to go over the differences between them and which one you should be using under different scenarios.</description>
    </item>
    <item>
      <title>Veracrypt for beginners</title>
      <link>http://localhost/veracrypt-for-beginners/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/veracrypt-for-beginners/</guid>
      <description>Veracrypt Basics Veracrypt is a program used to create virtual encrypted drives. In our earlier article, we discussed full disc encryption, which is when the hard-drive itself is encrypted. But the term “disc encryption” refers to either whole physical drives or a virtual machine’s entire virtual drive. What Veracrypt lets you do is create a small virtual partition within an operating system that’s encrypted…&#xA;In other words, full disc encryption does everything on the computer’s drive, whereas with Veracrypt, you can encrypt just a group of files.</description>
    </item>
    <item>
      <title>Whonix 101: The Best Way to Use Tor</title>
      <link>http://localhost/whonix-101-the-best-way-to-use-tor/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://localhost/whonix-101-the-best-way-to-use-tor/</guid>
      <description>Whonix Tor Browser is one way to use Tor. Another way is through the operating system Whonix in a virtual machine. There are 4 main security advantages of doing this. These are:&#xA;a) All Traffic is forced through Tor&#xA;b) Malware is contained in a virtual machine, preventing it from infecting the host&#xA;c) All of the traffic is routed through a 2nd virtual machine gateway if malware escapes the first virtual machine</description>
    </item>
  </channel>
</rss>
