Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 3
Generated: 04:47:47
You require an email and payment in either on-chain or lightning Bitcoin. The end user has to ensure that their email isn't linked to their identity or IP (a tall order for most) AND they use a properly non-KYC Bitcoin UTXO to pay for the service. Even then you have root access to the server and all its traffic. A VPS will always offer a superior trust model as you can compile the software yourself on your computer, sign it, then deploy it on the VPS. What assurances do you have that you're not running malicious LND software? What assurances do you have that you're not logging LND activity and traffic? What assurances can you make that you're not under gag order by a state intelligence agency and can't disclose that you're giving them data?
2025-12-04 18:48:17 from 1 relay(s) ↑ Parent 1 replies ↓
Login to reply

Replies (3)

All these points were considered in the architecture of our implementation. It is evident you spent <5mins checking out the site. Else you would see the issues highlighted above are accounted for. 1. the Flow Chart that is highlighted in the How It Works section of our Buy page: users are encouraged to set up a Dedicated Device prior to Virtual Private Node purchase. *We envision users to setup device level VPN and use email alias for purchase. 2. This implementation is literally run on a VPS... We never have root access to the server, that information is emailed directly from VPS provider to ripsline user's email provided at checkout. Even so, they cannot access the VPS until root password is changed. We merely provision the VPS for end user, they maintain VPS credentials always. 3. You can check custom installer for malicious LND software as the script is FOSS viewable here: https://github.com/ripsline/Virtual-Private-Node 4. The last two points do not make sense because we never have any information other than user's email and domain name (can use fake domain name which is also highlighted on the site).
2025-12-04 19:26:06 from 1 relay(s) ↑ Parent 2 replies ↓ Reply
Yes I spent less than 5 minutes I spent about 1 minute reviewing your page. So you charge $360 a year to provision a VPS for a client, run your open source script, then give the user SSH credentials for the VPS? Is that correct? If so would the user not be better off avoiding the email and middle man all-together and provision their own VPS and run the script themselves? The users adding an identifier in the email and trusting you not to run a modified script at time of install, is that not correct? What you describe is more private than what I originally surmised, but still leaves deanonymizing attack vectors open or am I wrong?
2025-12-04 20:29:56 from 1 relay(s) ↑ Parent 1 replies ↓ Reply