SimplifiedPrivacy.com's avatar
SimplifiedPrivacy.com
npub14slk...t5d6
Give me Liberty, or Give me Death. HydraVeil is our Revolutionary New Linux app that allows you to create different isolated profiles, to resist AI Browser Fingerprinting from Cloudflare & Big Tech. Another feature of HydraVeil is routing your traffic though your choice of WireGuard or a Tor->Socks5 proxy (to evade Tor blocks), and to fool CDN packet speed tracing with different IPs for each profile. Additionally, we provide VPN service for Android, iPhone, Windows, Mac, and Routers. Tune in to our Podcast to combat Big Tech surveillance. Help me, help you. Hashtags: #Cypherpunk, Open source, #Linux, DeGoogled Phones, self-hosted services, #Monero, #Security, and more!
Xiaomi's new smart door lock can disguise your voice. Xiaomi has launched a new smart door lock in China that includes an intercom voice changer, letting you disguise your identity while speaking with someone at the door. image This is closed source, so not that great. But it's still a cool idea.. they should add it to phones. Source:
The woke media attacks Trump so much about total bullshit, that people learn to ignore any real criticism as well. And that's where the real danger is
New Podcast: Monero 101: Where to get it image Not only will this podcast entertain and educate you, but you'll also learn about the Paradox of Monero. What if I told you that by making restrictions, it actually cripples the ability to regulate it by under their own legal systems? Web: RSS:
image VoIP: Hides from the phone company the LOCATION of the texter, but NOT the content. VPN: Hides from the VoIP provider your home IP, but NOT the SMS content Hotspots (& Faraday bags): Hide from the celltower giving you service, where you go when it's bagged. If you only use the hotspot outside the faraday bag, when you're outside your home, And only use SMS with VoIP and a VPN, then you're as anonymous as SMS can be. But even better, is reduce/stop using SMS.
US Immigration searched a French Scientist's phone, and found criticism of Donald Trump. So they rejected him from entry at the airport/border, and labeled his private messages terrorism! Why are they even searching people's phones at the border? Your legal entry should be based on a passport, and NOT on your social media or private messages! Sources:
The only purpose in political talk, is to get you to take action I'm NOT just saying "yo download my cool new app". I am saying: The entire structure of our society is corrupt. From people's wealth being tracked, to surveillance of their intimate conversations with their family. And the dark history of how this came to be, unfolds in this podcast linked below. The goal here is to not just entertain you, with this wild story of how the intelligence agencies literally did terrorism on US Congress members to get the Patriot Act passed... But to get action: transitioning to Linux, to Degoogled phones, to cryptocurrency, as the path forward. And then our team's fingerprint app can build upon this solid foundation. In this critical context, you absolutely should check out this 10-minute podcast on the history of KYC laws: Web: RSS:
Subverted History! The Shocking Story of KYC Surveillance image What if I told you that the history of how KYC laws came to the US, was even more corrupt than the laws themselves? In this short but sweet 10-minute podcast, Shadow Rebel breaks down the dark history of physically threatening Congress members to convince them to pass this... and worse: Web: RSS: Arweave (optional) Germany: https://shadow.arweave.auduge.com/ New York: https://shadow.exodusdiablo.xyz/ China:
It’s extremely difficult for the average person to get the technical knowledge required for privacy, censorship resistance, and independence from Big Tech. We are here to make your life easy. Switching to Linux: How VoIP works: What are the best VoIP burner SMS providers? How Monero Works (animated) https://video.simplifiedprivacy.com/how-xmr-works/ How GrapheneOS Works (animated) https://video.simplifiedprivacy.com/why-grapheneos-is-more-secure/ Is Email private? What data can be gotten? What are some great VPS anon-crypto hosts? Why is LinkedIn evil? Why is Google Totalitarian? The difference between a company, and an organization, is promoting our mission. This means using all of the tools available.
I personally don't trust hardware wallets. Especially if it's closed source. If you got a large enough amount of cryptocurrency to justify a hardware wallet, then I'd: a) Split it up into a hot wallet for daily stuff, and a large cold wallet with the rest b) Cold wallet could be KeePass inside VeraCrypt Drives, with a fake password for a hidden drive c) With an epic amount of cryptocurrency, (this is not the vast majority of the readers), using a virtual machine, with the crypto wallets on the host, and the purchases inside the VM. d) With a medium amount of cryptocurrency, our fingerprint app also gives you the added benefit of GUI isolation for Linux Distros like Mint, which don't have it for x11 displays. In other words, the web browser isn't seeing your keepass and wallets.