ComputerFreedom.org is a website that fully respects internet freedom and privacy.
5. Using a Raspberry Pi 3 as a VPN/Torrent/Minimalist-Workstation
I will be explaining how I use a Raspberry Pi 3 Model B as a VPN workstation and why it is enough for my needs.
To preface, this article assumes basic knowledge of using a linux operating system:
For starters, if you're comfortable with the terminal, it will be a perfectly smooth experience in anything you need to do via cli. One of the main reasons I love the Raspberry Pi is because you can keep it running 24/7 without using anywhere near the amount of power you would normally need to power a server, let alone a desktop computer. And if it breaks, I can buy a new one for $35 and just pop a new SD card in and it will work the exact same way. Those reasons alone are enough for me to give slack to any slow performance, although it DOES perform. The main programs I use are Deluge as a torrent client, Qupzilla as a browser, and AirVPN as my VPN provider of choice. Deluge is a lightweight but elusive torrent client that is in most linux distributions' repositories. Qupzilla is yet another fork of firefox that has great performance. It takes the lag out of scrolling on slow hardware. AirVPN is a well known and well supported VPN provider whose jurisdiction falls under Italy (info thanks to privacytools.io). They use OpenVPN, have over 150 servers, and are relatively affordable. They have a wide range of support on various platforms, including ARM (obviously). The client itself it small and clean, as well as lightweight. This allows me to feel safe downloading torrents as well as doing light browsing.
4. How to create a VPN server by SigaVPN
This article will show you how to create a no-log VPN. This will provide you security, privacy and bypass some firewalls.What you will need:
- A dedicated server or a VPS
- Ubuntu 14.04/16.04
- An internet connection
We'll be using a server from pulseservers.comNow to set up the installer:
- 1. SSH into your VPS/Dedicated server. If you are on Windows, use a program called PUTTY.
- 2. Run the command sudo su. This will give you superuser permissions
- 3. Run wget https://raw.githubusercontent.com/Angristan/OpenVPN-install/master/openvpn-install.sh. This will download the OpenVPN installer you need.
- 4. Run chmod +x openvpn-install.sh This elevates the file's permissions.
- 5. Run ./openvpn-install.sh to start the installation.
- 1. If the IP matches your VPS's IP, then press enter.
- 2. Change the port to 443. 443 is the HTTPS/SSL port and will bypass some firewalls.
- 3. Change the protocol to TCP. THis helps bypass some firewalls.
- 4. Change the DNS to 2 for speed and 4 for privacy.
- 5. Leave it at 1, if you're paranoid change it to 3
- 6. Leave it at 2, if you are paranoid change it to 3.
- 7. Change it to 3.
- 8. Keep it how it is.
You're almost done. It may take a couple minutes to install.
Run apt-get update && apt-get install nginx -y && mv ~/client.ovpn /var/www/html/client.ovpn
Run nano /etc/openvpn/server.conf
This is the OpenVPN configuration file. At the bottom, change 'verb 3' to 'verb 0', and change 'status openvpn.log' to 'status /dev/null'. Add 'log-append /dev/null' to the end. These modifications make sure there are no OpenVPN logs on your server.
You're done! Download the OpenVPN file from a web browser at [your server's IP]/client.ovpn. To use it, download the OpenVPN client and import the file into it.Brought to you by https://sigavpn.com.
3. The Culture of Mass Surveillance
The issue now is not only taking steps to prevent this mass surveillance, but convincing people that they should. With the introduction of devices such as Google home, Amazon Echo, and other similar devices, it is more or less a centralized hub in your house collecting masses of information. I believe it is in the approach. They advertise convenience and we take it. We need to draw the line with how convenient all of this new technology is vs how much privacy we are giving up.
For some reason, people don't seem to value their privacy on the web as they do in the rest of their lives. There seems to be a trend of acceptance associated with it. That's the worst part. People know. But just how much do they know? People are aware that their browsing habits are tracked, but think of it as everything you do on your computer or mobile phone is widely available to the providing companies (information is periodically sent back to them). "So what if they see me browsing the internet, they have nothing against me". Can you be sure that you have never sent anyone a message/call/picture you wouldn't want someone else to see? Or even performed a google search for something you might not want to be public knowledge? Can you live with knowing that at some point in your life, some company or someone has the potential to manipulate you because of the wide availability of our information on the web? Even if you could put all of that aside, think of the people you care about that don't know better and how vulnerable their information could be. It's as if the internet is such a vastly different place than the real world, that people believe their lives are completely disassociated with internet they have nothing to worry about... when in reality, our lives are being more and more attached with the internet everyday.
2. Why you should value your privacy by Secretum
Whats up guys and gals, my name is Secretum and I'm here to be your guide for all things privacy, security, and anonymity. Let's get into why you need these things in this online world. You may be asking yourself “I have nothing to hide, why do I need privacy?” Well, ill put it this way, when you're making love to a significant other in your bedroom, do you close the curtains so that your pervy neighbor won’t look into your window? well, imagine if Marvin the pervy neighbor has billions of dollars of funding and has the power of the US government just to look into your window, I’m going to tell you how to close the curtains. First of all, I'm going to ask you a question. I need you to learn whats called a threat model, a threat model is how much security, anonymity, privacy etc you need, for my purposes I will shorten those 3 words to SAP. An example of a threat model is a homeless person doesn’t need a mansion with bulletproof doors and armed guards whereas the president will, There’s no sense in using software that involves you having a Ph.D. in PHP and python just to find the button to open it. Who are you trying to hide from, are you a journalist who reports on foreign dictators, or are you a guy with 2 kids who looks at cat pictures on Instagram, I’m going to tell you the basic things you need for privacy and will go into the advanced later for those who want or need to know.
- Step 1: What is your operating system, If your answer is Windows 10 or Mac-OS then your operating system itself is not private and despite what tools will tell you, its impossible to get rid of telemetry “spying” in these OS, Its acceptable to use them however if your circumstances won't allow you to install Linux
- Step 2: Install firefox or Icecat, Firefox is more private and actually faster that chrome, chrome by default collects information and its impossible to turn off, even chromium reports to google servers, firefox, however, is more private and doesn't give away your information after you uncheck telemetry “spying”, In a later guide I’ll tell you how to harden firefox and GNU Icecat is a firefox fork “version made by people other than mozilla” thats completely FOSS (FreeAndOpenSourceSoftware) Use FOSS as much as possible, to find alternatives to your software that are foss use https://alternativeto.net/ and where it says license, click on it and select open source “we are in no way sponsored or affiliated with alternativeto, they’re just awesome!”
- Step 3: Ask yourself what do you use the most, whether it be reddit, facebook, Instagram etc, Check the settings for everything you use and look for privacy settings, turn off everything that would be bad for privacy, I would advise against social media as its horrific for privacy but I’m not your mother, I’m just a privacy activist on the internet.
1. Why the TOR Project is important (torproject.org)
I want this website to be a space where internet users from all over the world can share their thoughts about anything on the internet. The main theme for me is that freedom and anonymity should be prevalent on the internet. The repeal of Net Neutrality in the USA is a terrible start for what is to come. The horrors of mass surveillance are all too real. While most people are being collected on all levels (the first level by using Windows or MacOS on their computers), but it has even got to the point of internet browsers constantly collecting information (especially regarding location) in ways you wouldn't imagine. Scraping colour, screen resolution, anything it can use to collect information, and ultimately selling it. Our mobile phones are the worst of them all but no one can seem to put them down (that is worth another post). Taking steps forward on the computer side of things can start with using a distribution of GNU/Linux as your operating system. The operating system itself is a lot more secure and is compatible with a wide range of every day programs (email clients, internet browsers, photo editing software). It is a good step forward, although you also need to be careful of the Software you run. The TOR Project provides a browser download for the TOR Browser, designed around anonymity. Here is a brief description off the torproject.org website.
"Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Journalists use Tor to communicate more safely with whistleblowers and dissidents." - torproject.orgThere are many different uses for the TOR Browser, and for some reason people tend to relate TOR with criminals and have this media shaped opinion around the dark web because of the Silk Road. The percentage of users who are using the TOR browser for malicious intent is around 1%.
COMING SOON: RSS feed
This website was launched on December 19th, 2017. I believe that everyone who uses the internet should have the ability to do so freely and not have to worry about companies collecting information and tracking the user without their knowledge. A lot of my inspiration comes from Richard Stallman, the Free Software Foundation, and the TOR project. While I definitely don't share all of the views of RMS, I believe he truly wants what is best for the internet, and I don't like the way it is going.