• My Password Is 1234@lemmy.world
    link
    fedilink
    arrow-up
    56
    ·
    edit-2
    1 year ago

    My privacy hardening tips are:

    • Avoid 5-eyes, 9-eyes and 14-eyes countries[1].
    • Don’t use CloudFlare or any CDN/AntiDDOS services because they decrypt all traffic that goes to and from your server[2]^. You don’t know what they do with it.
    • DNS queries sent by the server should be encrypted[3] so that the ISP/data center cannot see them.
    • If you want a VPS: try getting KVM instead of LXC one. It’s so easy to automate processes scanning on the fly[4]
    • Potato_in_my_anus@lemmy.ml
      link
      fedilink
      arrow-up
      17
      arrow-down
      1
      ·
      1 year ago

      Yep, my money goes to Switzerland. This message was brought to you by Proton.

      Jokes aside, I do really have been using Proton Mail and VPN for quite some time.

      • Nsh@lemmy.ca
        link
        fedilink
        arrow-up
        10
        ·
        1 year ago

        Yes, proton is pretty awesome for privacy and security. And it’s also because the Swiss laws has made it possible.

    • sasquash471@feddit.de
      link
      fedilink
      arrow-up
      13
      ·
      1 year ago

      Switzerland might still be a good choice, but the government also made some questionable laws which weakens piracy in the recent years.

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    14
    ·
    edit-2
    1 year ago

    To really be censorship resistant you have to follow the example of the pirate streaming services. Have servers in multiple places. Multiple domain names. Be resilient to any instance going down.

    Any capability the server has to violate user privacy a government has. So ensure you have as few capabilities as possible to violate privacy. If your users are very vulnerable make sure that you don’t have the data to expose them ever.

    You can consider hosting in a “safe country” That’s just the beginning. You could make your service available on tor via hidden service address. That way even if users don’t have good operational security themselves you try to protect them from leaking their activity to whoever their vulnerable to

    • My Password Is 1234@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      edit-2
      1 year ago

      If your users are very vulnerable make sure that you don’t have the data to expose them ever.

      aka disable any logs or delete them automatically, periodically.

    • railsdev@programming.dev
      link
      fedilink
      arrow-up
      5
      arrow-down
      1
      ·
      1 year ago

      Just wanted to chime in by mentioning i2p. In some ways it’s much better depending on your requirements. For me Java was a dealbreaker but these days i2pd exists.

  • /home/pineapplelover@lemm.ee
    link
    fedilink
    arrow-up
    15
    arrow-down
    4
    ·
    edit-2
    1 year ago

    Switzerland, Iceland, Finland, Spain, Egypt,Sweden, and some 3rd world countries that don’t really give a shit (though they might give a shit if your country makes them give a shit)

  • Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 year ago

    Honestly self host with physical security. As long as your house isn’t raided your fine.

    You could also setup a vps gateway that routes traffic over wireguard into a isolated environment at home. This should be better for privacy.