How To Install I2P+ On A Linux VPS

July 17, 2021
The I2P+ Console post-installation

Read more...

Our YouTube Proxy Is Now Live

July 11, 2021

We love privacy. So much in fact, we’re building a business around it. But did you know that we also sponsor and promote the use of many free and publicly available projects that help protect your online privacy?

It’s no secret that Google, and therefore YouTube, is privacy nightmare. But in this modern age of internet, can you even watch YouTube videos privately, and without feeding information to Google? Can you watch a YouTube video without being fed irrelevant advertisements? Can you access YouTube’s content from anonymity networks such as Tor and I2P? You absolutely can!

We operate a public Invidious Instance in our Luxembourg location. Invidious is an opensource and actively developed and updated privacy front-end for YouTube.

You can view our Invidious install using the following URLs:

The main benefits of using our Invidious instance is that, by default, all videos are proxied through our network so that your requests for YouTube content is made to us, we make the request to YouTube, YouTube feeds it to us and we pass it on to you. Nowhere in this process do you and YouTube ever make a direct connection. (Useful for accessing YouTube on networks where it’s blocked).

Read more...

Linux devices have a unique identifier called machine-id. Here is how to change it.

July 11, 2021

What is a machine-id, and why should you randomize it? From the machine-id man pages, it is defined as:

This ID uniquely identifies the host. It should be considered “confidential”, and must not be exposed in untrusted environments, in particular on the network. If a stable unique identifier that is tied to the machine is needed for some application, the machine ID or any part of it must not be used directly.

https://www.man7.org/linux/man-pages/man5/machine-id.5.html

In an effort to promote privacy, having a unique and unchanging identifier tied to your device seems like the wrong approach. It’s quite possible that poorly coded or even maliciously coded software could fetch this ID from your system. Let’s make sure that even if that does happen, that the value is constantly changing so that your device can not be uniquely identified as your device.

This is an incredibly simple and quick adjustment to your default Linux system. What we’re doing is showing you how to either adjust this value manually by hand, or by running a cronjob to change this value every minute with a new, randomized value.

Lets get started, after the jump.

Read more...

Welcome to our new blog!

July 11, 2021

We’re excited to be switching to the BashBlog platform. After reviewing some of the ‘more modern’ solutions like Jeykll and Hugo we decided to go the route that doesn’t require maintaining a hipster software stack full of bloat and went the lightweight route with BashBlog. This blog is literally just AlmaLinux, Nginx, and the bb.sh script. No php, no compiling, no databases, no Docker… Just a webserver and a bash script that creates html files.


Read more...