I paid for Kagi and have been super happy with it. If you don’t mind paying, I highly recommend it. Not having ads or manipulated results is worth it for me.
You can easily spoof the location on most search engines by using a VPN, but I’d much prefer my search engine solely respond to deliberate input from the user
What kind of phone do you have? Do you use social media? Do you use the same email address everywhere? They don’t know anything you didn’t willingly give out. It’s not a random website, it’s a website that bought you via your browsing practices.
This is most likely something that someone else gave out, not OP. Some old school “friend” signed up for some app and shared their phone contacts, app proceeds to spam those contacts hoping for more sign-ups.
The ol’ True Caller scam! Don’t forget all the people that add email addys to the phones contact list…and then give every app that asks for permissions full roam.
But I’m “paranoid” because 90% of people only get my VoIP number and non important email.
One an occupation or two when I know somebody really sucks I’ll give them a forwarder LOL.
Yes, it is not as decentralised as you have thought. I thought this is a fairly known fact. If you need something truly decentralized, I2P is probably the way.
Traffic is flowing through computers of volunteers, that part is indeed decentralized, but your client needs to find them, and that happens through a centralized service, through a “directory authory” if I’m not mistaken
I2P has a mechsnism for banning routers, permanently or temporarily.
It looks it knows what to block from a local blocklist file and from a “blocklist feed”, but I don’t know what’s the latter right now. I hope you can excuse me on that, I’m also quite new on the topic.
So how does I2P work, I vaguely remember something about it like slowly building a network as you keep your own connection on, and that the architecture makes it much better for torrenting. Is it worth looking into and learning about or is it just slow bad internet?
Well, yeah, about the speed… it’s not fast. And probably never will be fast as plain internet. Just imagine what is happening: each service you connect to is usually 6 hops away, which in the worst case (where each pair of peers is the furthest possible from each other) would require traffic to take 3 rounds between e.g. west asia and the usa. Here’s an other explanation with a diagram: geti2p.net/en/faq#slow
But that’s just the latency, and it can be tuned. If you want to play online games with a group of people over I2P, you could use for instance a 1-hop tunnel, and ask the others too to use a 1-hop tunnel, and now it’s totally different. Of course this hurts your and the other players anonymity, but it could be acceptable, especially if you make it select a router relatively close to you.
Bandwidth is again a different topic, I think that could improve even without sacrificing on the tunnel length, with more (relatively) high bandwidth routers joining the network, but of course your tunnel’s bandwidth will always be limited by the slowest router in the chain. Fortunately there are ways to have a tunnel through more performant routers.
On how does it work: when you start up your router (a software package, through which other programs can use the network), it asks a bunch of preconfigured servers about known I2P peers, through a process called reseeding. Afaik there are currently 12 preconfigured reseed servers, but you can bring your own, or if you know someone with an I2P router who you trust, they can make a reseed file for you which you can import.
After that, your router will talk to the other routers it now knows about, and ask them too about the routers they know.
This means that it’s better (while not necessary) to have a dedicated machine on which a router is always running and online, instead of having it run for the 30 minutes every time you power on your desktop. It doesn’t have to be powerful, it can be a low power consumption SBC (like a raspberri pi or similar), and I think it’s also possible to set up an unused android phone for this purpose with an app, but you probably don’t want it to use your mobile data plan.
On why is it better for torrenting: I don’t remember the details on that.
What I remember is that it’s often said that the protocol was “built for that”.
But there’s also another thing: vandwitdh is naturally less of a scarcity here, compared to Tor. Connecting to the network requires the use of a “router”, which besides giving access to it for you, also automatically contributes to the network with your internet connection’s bandwidth capacity (except if limited by the tech of your ISP, like with CGNAT; it can still contribute some but usually it’s less), and in turn most users will provide a “relay” to the network. On the Tor network, most users are just users, their clients are not participating in routing the traffic of other users, and so they are only consuming the capacity provided by others.
Also, afaik torrenting on Tor always needs to make use of an exit node to access the tracker and all the peers, while on I2P it all happens inside the network, without placing a huge load on outproxies (exit nodes in I2P terms)
It may seem that I2P has a bunch of downsides, and it may discourage you from using it, but let me tell you how I think about it.
I don’t use it for everything, just as I don’t use the Tor network on a daily basis, but when I need it it’s there, it makes me easier to search on a few private matters, and it runs in the background so I’m basically effortlessly helping the other users, when not counting the initial setup and the electricity costs of course (the former was not much, and the latter does not depend on this in my case)
Very interesting, and thank you for the write up! Might be worth looking and preconfigured reseeds if I was to dabble in it, but generally I just don’t have use for powerful anonymity tools currently. Always rad to hear about the tech though!
I tried Kagi and canceled after a week. It’s a reformat of DuckDuckGo, a better format for sure, and lack of sponsored links, yet it adds AI too. In the end, it’s the same old curated unhelpful results that leave millions of high value boutique and indie sources of information out. Also, it’s Orion browser is bad.
Basically ask yourself that knowing all the good writers, content creators went to Substack, yet hardly any search engine gives results from there, why?
There isn’t going to be a search engine without some type of ai or content agitation tool. Key word search is not enough to make one of these work. Search engines need to sort through millions of web pages, and try to give you the best match for what your looking for via smart algorithms. With Google these algorithms are designed to sell you products and get the most clicks out of you. Kagis profit incentive is to curate good links for your search results. Indie results will always be low on the ranks thats why they are indie. As they get more popular so so their search results. You don’t want your search engine feeding you only new and up and coming shit. You want the most relevant search results. Sometimes it’s going to take some digging to find what your looking for. UNLESS you want to give up mountains of your data to and hope that the company uses it to serve your interest instead of feed you sponsored bullshit.
this is the primacy for social security and we are going to cancel your social security if you do not click this link and fill in the information for which is required.
This reminds me of the anonymous confession thing that made it’s rounds on Facebook several years back. My cousin would post links to his every day with messages like, “Let’s see what you’ve got” or “Give me your worst” attached to it. I suspect he was desperately fishing for compliments, or hoping for anonymous love confessions from the girls he was flirting with, as he would also post scrambled love letters on his wall that he must have figured these girls had time to sit down and eagerly unscramble (ie; I VELO UYO YLSHAE RMOE NTHA HTE UNS VELOS TEH ONOM). I always made sure to anonymously let him know what a stupid, annoying fuck he was being.
They seem to recommend AirVPN pretty heavily. This comment points out some potential issues with that recommendation.
I just posted a thread on that sub inquiring about it, because I haven’t really seen it addressed by that sub yet. I guess we’ll see what the response is.
I think between daiqo and the users at privacyguides the concerns you mention are well accounted for. To me, this from daiqo stood out as why AirVPN ends up being an easy choice for a lot of users.
“Additionally, there are not that many alternatives left. Mullvad is obviously the gold standard and IVPN follows, but both don’t have port-forwarding anymore. OVPN got acquired by Pango. Proton is a good alternative but not so viable for macOS users. There are a bunch of others but you’ll always need to compromise much more than with AirVPN.”
One of my admin friends said it’s not really made with desktop users in mind but more for people who need to set up (lots of) computers / servers quite often (= admins). If you’re not planning on distro hopping or reinstalling your system all the time it doesn’t really do anything for you that any other distro plus a good backup strategy already does. Plus you can use the Nix package manager without installing NixOS on the distro you’re on right now, if you wanna check it out.
We need to use some tool. If the government doesn’t have your private key, they can’t decrypt your messages. I don’t care how that is implemented, but companies like Signal will either fight to the death or bow out
Google your name. There are a bunch of websites that will list your known addresses, affiliates(family or people you have lived with), phone numbers, social media, etc.
That data is collected through various means and then are sold to interested parties.
Google will monitor your deets in their search results and let you pull them, though I’m not sure how useful that is to most of the peeps in a privacy community.
privacy
Active
This magazine is from a federated server and may be incomplete. Browse more on the original instance.