with javascript and cookies turned off
My threat model isn’t the tightest
If that's not tight, I hardly know what is. The modern web is all but unusable without JS.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
much thanks to @gary_host_laptop for the logo design :)
with javascript and cookies turned off
My threat model isn’t the tightest
If that's not tight, I hardly know what is. The modern web is all but unusable without JS.
What I meant by my threat model not being the tightest was that if I want to read something on a site that requires javascript and cookies then I will just turn them back on temporarily rather than not read what I want just because of possible tracking.
I agree with your point about the web being almost unusable in parts without JavaScript. However, I find that a lot of sites have a lot of javascript-heavy pages at the front but simpler pages behind where you get to things you actually want to look at. Usually a site's RSS feeds let you get directly to the simpler pages without using JavaScript.
He may as well go without images, too, and use Lynx Browser, haha. I can't even figure out how to install that one!
# Debian
sudo apt install lynx
# Fedora
sudo dnf install lynx
# arch, BTW
sudo pacman -Sy lynx
I am, unfortunately, on Windows, mostly because of my inability to find adequate Linux replacements for key features in AutoHotkey and IrfanView. Believe me, I've been looking and trying to learn...
I've found XnView to be a good IrfanView replacement. (Granted it's not QUITE as good; same as how there isn't anything quite as good as Notepad++)
As for Lynx on Windows, looks like it's available through Scoop! https://bjansen.github.io/scoop-apps/main/lynx/
Out of curiosity, what can N++ do that VSCodium can't? That's what I've been using and it's been mostly fantastic.
Wow, thanks for sharing Scoop; I had no idea of this software, and dang, that is one huge games bucket... I'm gonna have to crawl through this sometime. I'll check out XnView as well! I think I knew of that one earlier, but never actually looked into it and then forgot...
Update: Unfortunately, XnView can't do anything like the interior cropping that I'm hoping to do. There is a "Suggestions" subforum in their forum, but I can't even register; despite disabling uBlock Origin, I get met with the nonsensical error The solution you provided was incorrect
as I see no CAPTCHA test, so I'm unable to pitch this as a suggestion. Alas...
Haha, thanks to you, I discovered that graphical ADOM is free (I thought it was paid). And MegaGlest is an unexpectedly awesome RTS!
Does anyone have any suggestions for a more private setup browser-wise? Tracking blocking at DNS level will continue and I’m on debian-based linux.
My worries sound similar to yours but my approach is a bit different.
But I also consider this a lost cause. Sadly.
So, instead, I do as much things as I can offline. Reading, writing, watching stuff, listening to stuff, communicating with people.
your setup looks good to me
It seems like an interesting setup. I don't really have too much to say other than nitpicks.
Why not use Mullvad browser for both scenarios. Mullvad with security level safest should block all JS. You could create a 2nd profile for safest only mode.
Using Linux .desktop launcher scripts, you could:
-P
)Related to your choice of host OS, I personally avoid Debian for desktop because it is slow to adapt (cus its Debian). I know it isnt directly applicable to situation since your main concern seems to be anti-fingerprinting, but a secure base is important. I'd like to know your reason for picking it. I don't dislike Debian and I still use it for different things (mostly VMs and some dev work).
What host os do you use?
I recommend Fedora or openSUSE Tumbleweed.
Tor browser. Obviously you can't bank with it, but, it's really fine for general browsing. You get some blocking but it's often just a matter of switching exit nodes a few times.
Thanks. Is Tor browser as effective if not used over tor? My tracking blocking is via a VPN that I trust and want to continue using so I wasn't thinking of using tor. I think I read somewhere that using VPN over tor or tor over VPN somehow became less private (I'm not technical so this might not be right - maybe someone could explain it). I was going to use Mullvad as I believe it has many of the same qualities as Tor browser but is more focused on use with a VPN rather than Tor.
Tor browser inherently uses tor, as the other comment says, Mulvad offers tor browser sans tor as Mulvad browser. As per the "do you tor over VPN" issue I think we need to first cover some networking concepts...
So your internet works via protocols, UDP provides a basic connection where you can send unordered messages, TCP works on top of UDP to provide linear order. Things like old video chat and bittorrent work over UDP because you don't care about order, you just want the data as you get it, so the video freezes or glitches, but you get the most recent frame of the video. Things like programs and webpages aren't YOLO about data integrity, so they use TCP which enforces order, so you don't get frames from 1 minute later in your Netflix video out of sync. VPNs provide UDP, which is lower level than TCP, which tor provides, so you can tor over VPN but you cannot VPN over tor.
If you use Mulvad browser from your VPN, you will look like everyone using Mulvad browser from your VPN exit point, which may well just be you, it's fairly esoteric. If you use tor browser, you will appear to be exiting from a tor exit node along with hundreds if not thousands of other tor browser users.
[edit: just realized I forgot to actually address the is it worse to tor over vpn question. There is no privacy impact per you and the site, the question is state surveillance. Mentaloutlaw on Odysee says the feds will extra look at things if you tor from a VPN, but I really don't buy that's how anything works, I think most non-Germany state actors would look at ISP-level tor use to lock you up and not deal with the headache of subpoenaing a VPN provider to find out one rando is using tor]
You got most things right about UDP and TCP. They both work in the transport layer of the OSI model. They are also completely different protocols, related yes but independent.
UDP is "simpler" as it basically throws data packages in to the network and hope they reach their destination. TCP on the other hand has checks in place that verifies that a data package has actually reached its destination.
Mullvad browser is the TOR browser without the TOR network
Tor inside a VPN is fine. Some argue it will make you stand out in comparison with other users of your VPN but that's only a problem if they retain data, and if they do you really wish you'd have used tor...
It depends on your threat model. Using tor via a know vpn endpoint does make you stand out and can be used to profile your traffic. One of the main points of tor is that all users look exactly the same.
If you have e.g. one user out of a 100 using a vpn endpoint instead of some residential ip address that user immediately becomes a much more interesting target. There is information floating around in the web that state actors have control over several entry and exit nodes.
Have you tried LibreWolf ?