If you watch nothing else, watch the introduction, where I use pretty pictures to overview and clear some misconceptions about stuff that I've been recording lately in my channel: VPNs, Proxies, Tor, SSH tunnels...
402 Payment Required
402@402PaymentReq.github.io
npub1dlfe...cdx0
PGP - 6641 979A C054 5BB0 9083
🇺🇸 Linux lessons. https://youtu.be/UIty3Nkyk_Q
🇪🇸 Clases de Linux. https://youtu.be/2MBWJdxbAug
gm to my three FBI agents


This is how you behave, if at the very least you expect to be taken seriously as a content creator and respected as an educator.


Next video will be about setting up your own private proxies around the world, and having fun routing the traffic through them AND the Tor Network.


Help people who reside in jurisdictions that censor the internet to access the Tor Network...
👉 by running a Snowflake Proxy !
coming up... ❄️Snowflake Tor Bridge Setup


One of the most satisfying things I've been doing lately is helping people who reside in shithole countries that ban access to Tor Guard nodes (China, Russia, Iran...) by running a 24/7 snowflake bridge. It's a joy to just watch the traffic.


I have a little black book of a few websites that I've never been able to access without doxing my IP. No VPN, no self-hosted Wireguard, no TLS tunneling to obfuscate Wireguard...
I'm happy to report that SHADOWSOCKS did it.
Anon, you should look into this!
⚡️ NEW VIDEO ⚡️
A fast tunnel proxy that will hide your location, and will make your web traffic look like regular HTTPS.
Super easy to setup !!!
New video ... Shadowsocks !


⚡️⚡️⚡️ NEW VIDEO ⚡️⚡️⚡️
🚨 Servers and networks (public and private) are increasingly blocking more VPNs.
🌎 Make your Wireguard traffic look like regular http over TLS.
🖕 Become ungovernable
I've been noticing that even MORE sites are restricting traffic from known VPN providers, plus ALL Wireguard traffic.
FIX :
Tunneling Wireguard via Websockets using 'wstunnel' will make your traffic look like standard http-over-TLS, while hiding your UDP Wireguard packets.

GitHub
GitHub - erebe/wstunnel: Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available
Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available - GitHub - erebe/wstunnel: Tunnel all your traffi...
⚡️NEW VIDEO⚡️
Disabling the Intel-ME in a Thinkpad x230
thread below 👇
/1
NEXT VIDEO ...


CHEAPEST BITCOIN OFFLINE SIGNING DEVICE
1. 15yo netbook (64b, 2Gb RAM) - 25€
2. Remove HD + Wifi
3. Wreck Eth port
4. Flash Linux Tails on USB drive
🚨 The only way out for any device that enters the red square is its physical destruction.
🚨 Devices interact ONLY with each other.
* Linux Tails won't run in a 32bit machine. Also, if you want to avoid a world of pain, don't even try the minimum 1GB RAM requirement (2GB module is about 10$ new)


No one is going to prison for your 5$/mo VPN, 10$ VPS nor your 150$ hardware wallet. If you're not technical enough to keep up with unethical shit that "trusted" third parties might be doing, you'll get rekt.
What CTemplar did last year is VERY rare.
https://www.reddit.com/r/ctemplar/comments/uy19y8/ctemplar_closure_final_letter/
If you're using Bisq on the latest Tails 5.13 release, you need to change the Tor Control Port from 9051 to 951.
In the "run-tails" script:
--torControlPort 951



Saul Alinski on shitcoiners, spooks, BRC-20, spam and emasculated bitcoiners.


