Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 24
Generated: 19:53:44
Today, after a long discussion about best OpSec practices I thought it will be nice to share with the Nostr community, and read what others have to say about it, There are many here in #Nostr that are #privacy advocates and believe they know enough, they use what they believe is a secure OpSec: 1. No corporate social networks, that includes LinkedIn or not sufficient decentralized ones (whatever that means for them). 2. No Messenger Chat app that requires a mobile phone number. 3. Linux of course; so they say; although the majority keep using iOS or Microsoft as their default OS... (I am guessing of course, but I am quite positive it is a good guess ... ). 4. A Pixel 7 or higher rooted with the right OS. 5. A VPN, one of the few that do not log (so they say) and you can pay cash or LN BTC or XMR. Most do this wrong BTW... 6. The right Private DNS, never a corporate one... 7. A private email address, so most will use Proton or Tuta... Odd how there are only few options with no KYC, if it is a niche, the fact that there are no more options is suspect, two companies only... they become a honeypot. 8. They use FOSS as much as possible for all their work and location apps. 9. GPS OFF as a norm. OpSec matters here, most people do this wrong. 10. A nonKYC eSIM with only data, few providers, silentlink being one of the favorites. 11. A powerful router with firewall and Pihole or adguard, plus built in support for VPN (most do this wrong) 12. Self hosted cloud, no commercial cloud never (most don't do this, they rely on the usual privacy oriented, the ones very well known, there are about 3...) Are you paying attention? 13. Their own BTC Node 14. A privacy oriented browser, there are not that many, Mullvad Browser, hardened with extension Firefox (requires work), hardened with extensions Brave. Most use the same extensions, for they are the recommend ones, Have you wondered why they are not built in already in the browsers? 14 Tor Browser for research, specially those that are devs or white hats... (no black or grey hats here, right...) 16. Keeping all your software and OS for all devices up to date, which is recurrent workload, failing to do that could lead to exploits and exposure to cybercrime. And more, but this is a simple summary. Now the best part: All of the above, makes you, in a way, a target, for your digital footprint is of a minority, easy to identify, you are decently informed and therefore you follow the same rules and use the same tools as the rest of a small tribe, a very distinct one, not that hard to identify with the right tools that constantly analyze metadata. Is there a better way? In my opinion, yes. 1. If you keep your current OpSec, study and do it right, most do it wrong and generally due to lack of discipline and endurance of the annoyance of cyber security, which is very inconvenient, end up being not only known targets but vulnerable high end targets. 2. To be part of the large noise made by the clueless normies is the optimal play but that is an OpSec very few will have the discipline, time and knowledge to do correctly. Won't discuss the know how here. Hire a #cybersecurity expert if you want this and don't know how is done. What are your thoughts? #asknostr
2025-09-08 16:41:06 from 1 relay(s) 9 replies ↓
Login to reply

Replies (24)

I think the whole using privacy stuff makes you stand out more is the wrong atitude they just have uphill people try to tell bottom people that because they don't want them to hide. They want everyone in their systems & use this tactic to try to slow down the progression of people choosing alternatives. Because if nobody is on theirs they will have to change which is what they don't want to do. How do you fight change? Encourage change is bad just like how duracell discourages lithium ion to keep AA & AAA batteries alive. If more people use it then there will be a clear divide & the more people use it standing out becomes blending in. But what we don't know is the measure of extent they can see. So far all I could say is hey I know you use linux & I know your on something not mozilla firefox or chrome. Other then that all the other apps are subjective to tos & pp.
2025-09-08 16:47:21 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
Good take, you reminded me of Edward Snowden when he lectured us on why he runs his own TOR exit node and runs his own traffic through it, mixing his data with the noise of hundreds if not thousands of people, making his metadata ... noise... IMO, the ideal OpSec is a two tear protocol, and I agree, very inconvenient, but easier than the usual most use.
2025-09-08 17:21:13 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
I will suggest a minimal digital corporate footprint, that should suffice to keep you invisible to most cyber criminals except of those working for your government, they have all the corporate footprint about every citizen, and that includes what you think is your personal data coming from those "free" services and social networks most use.
2025-09-08 17:42:06 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
Compartmentalize different usages to different communication devices / computers. You can mitigate standing out from having a small digital footprint by putting up a front digital persona or generating noise from your devices.
2025-09-08 18:49:24 from 1 relay(s) ↑ Parent 2 replies ↓ Reply