. on Nostr: nostr isn't private but throwaway key pairs can be useful. Like most things on the ...
nostr isn't private but throwaway key pairs can be useful. Like most things on the internet your ip is leaked if not using vpn or tor/orbot. If using a smartphone, the phone is most likely linked to an individual who bought it, pings cell towers, had telemetry and all that bullshit. If a source wants to be private they have to do a lot of work ahead of time and then burn it all.
Buy an unlocked pixel with cash, buy a used laptop and flash it with linux, use tor browser, buy vpn with lightning, go to a coffee shop away from your house and flash phone with graphene, only turn it on and off at the shop, put it in airplane mode. Don't connect it to home wifi and use simplex for comms.
talking in person on a hike in the forest sounds like proper opsec these days
Published at
2024-07-19 17:52:20Event JSON
{
"id": "4a6a6feae67a2595ec2fa8c0ab337698d36029be8ef22a243325b7281702361d",
"pubkey": "edb470271297ac5a61f277f3cd14de54c67eb5ccd20ef0d9df29be18685bb004",
"created_at": 1721411540,
"kind": 1,
"tags": [
[
"e",
"cdfe8400949d53bcd125d1ad580fd52b2c7be5e553efe39bd6c9f9d3844a1bef",
"",
"root"
],
[
"p",
"500ccc532c301711d88aa6d30b11dc477e6a32770853f8ab1c2be389b824e3f8"
]
],
"content": "nostr isn't private but throwaway key pairs can be useful. Like most things on the internet your ip is leaked if not using vpn or tor/orbot. If using a smartphone, the phone is most likely linked to an individual who bought it, pings cell towers, had telemetry and all that bullshit. If a source wants to be private they have to do a lot of work ahead of time and then burn it all. \n\nBuy an unlocked pixel with cash, buy a used laptop and flash it with linux, use tor browser, buy vpn with lightning, go to a coffee shop away from your house and flash phone with graphene, only turn it on and off at the shop, put it in airplane mode. Don't connect it to home wifi and use simplex for comms.\n\ntalking in person on a hike in the forest sounds like proper opsec these days",
"sig": "75453ea97e95a3e9b4a9c28913f73898b781d280afb0b10ef4956ba6725d01f0fcc3b4f671772734402142c17a0298ea4230270db2a2d4039b1566bea84920c7"
}