I did an image search comparison of "16 year plan Hillary Clinton" and Yandex brought up the flow chart Google had nothing but HRC pics. Do that demo for someone and watch their reaction.
First time I ever tried yandex a few years ago, I searched keyword "QAnon" (couldn't use just the letter Q :)
The first or second result was the actual Q drops at qanon.pub. My jaw hit the floor. Nearly all the results on Page 1 were relative to actual Q, not just media hitpieces by the thousands like on google
Fun Fact:
The first two letters of yandex, written as the famous backward R, mean the first-person pronoun "I". So yandex means "I-index".
Thanks... have never heard if it, but always looking for a search engine that is reminiscent of circa 2005 when you could really do a deep dive on things.
The dumbing down came way sooner than I anticipated...As I peer over at my rare book collection...
Alphabet
Google
Gmail
Youtube
Drive
Android
Play Store
...
ChromeBooks
...
...
Don't worry, i've done it.
It takes a while to break free of the BS. You can start with your search engine.. but if it were me i'd move off of everything.. in 2020. but since you don't have a time car, get to it.
Switching emails takes a LOOOng time though. But it's worth it.
Firstly: Get a new email account somewhere.. like proton mail, tutanota, etc.
Secondly: log into gmail and set up email forward for all new mail to go to your mail to your new email account.
Thirdly: for about 1 year have a signature set up on your new email to advise everyone this is your new email. Reply to the forwarded emails that come into your new inbox from gmail with the new email address. Don't reply to spam, etc.
Over the next year, go through your gmail and forward all important emails to your new email.
Finally, wait a year, and you should be able to close off (or not use) your google email.
That's the 'help me migrate' way
The other way is to just get a new email and never use gmail again, and never forward any mail to let gmail know your new address.
This is akin to what you are used to, and what google was intended to be.
On the other hand, convenience is what is killing "obtaining knowledge and experience". No one NEEDS all things in one place. You can do it yourself, or, secure it yourself in the cloud with different methods.
Technically, there are at least three buckets: your shit, collaboration, everything else. Certain things in each bucket may be a member of another bucket, too. So, make an analysis. Each bucket has it's own thread model. And each bucket requires a different solution and, most importantly: behavior!
Diversity is indeed a strength if you apply it to risk. The below is not exhaustive but just pointers to learn more.
Salient
first off, email is a legacy medium. it is totally open, insecure way of communication. There is really no need for email.
Certain platforms will require you to have an email address. For this: tuta, proton, the likes is ok. But since, many platforms have not implemented secure communication, all emails sent back and forth are open to be read, or betray meta data. However, many platform will allow burner addresses. Just search for temporary email.
For secured comms, there is signal, Element, Ricochet, XMPP, etc. If you need to send a document, make the document, print it, sign it, copy it, send it. And if dealing with .gov: Make Analogue Great Again! and reject emails, digital communications.
Cellphone: you do not need it in reality. What is needed is the mobile data package.
In many places you can get unlimited for 30 bucks or so. In the EU, there is this pesky agreement, that roaming is set to 30Gigs per period free. So you could get a phone-number & data-package for 8 bucks. The fun part is, if they wanted to break the 5G encryption, they can only go to the host-state, and do a request, which is playing one bureaucracy against another.
There are routers and access points available to facilitate connection. If you really want to go exotic, consider Star Link. It is a steep price initially, however, it is a nice piece of access and payable with BITCOIN.
Browser:
This is somewhat of a contentious subject as everyone has their favorite and thinks by having such, being secure. You are not.
First: visit eff.org to learn what can be gleaned form your current setup. Then take appropriate steps to remedy.
What they will not tell you, if you want to look like all other sheep, is that differences in communication style, word usage, geolocation etc, can be used to identify you. In effect, this is just another ploy to homogenize you.
you could employ this trick but just be aware, it takes a different kind of mind to play a role and be consistent. Breaking role is not allowed.
Second: each browser has plusses and minuses. So, you need to go back to your threat model, your buckets and consider which browser is most fit for a particular function.
Search_Engine:
Again, this is a contentious subject. There are engines that strip identifying information from your searches and scrap the logs, and there are those with varying degree of anonymizing and privacy oriented features.
Then there are those which are self hosted, and not self hosted, search engine that are based on google searches and those that are not. This latter group either has their own crawler and indexer and/or use a different crawlers and indexers than google.
Consider your buckets, your thread model and the means by which you go on the internet.
Each time you enter an address of a website, a request is sent to a so called telephone book of the internet, called DNS. This stands for: domain name server. As you will probably know: greatawakening.win is the name, and it has an IP-address.
DIY:
If you want to know, try this: open the command line (Windows = search: CMD, Linux: ALT + CTRL + T:
Ok, so now you are going by the name of XO Vasilly, and you hear your Captain Ramus say:
verify range to target, one ping only.
commands:
ping -n 1 -a greatawakening.win (win: bping -n 1 greatawakening.win)
You may substitute greatawakening.win for any websitename you know.
Since some years, there is the opportunity to have this information sent with https enabled. This means that the contents of your request is encrypted but not the meta data. The browser may have a setting to activate this, or is packed with it.
Since each website has an ip-address, there is the option to gather this information, (see ping-command) and put it into a hosts-file.
DIY:
Create a file with wordpad, or on linux CLI: touch hosts
when open, simply enter the following according to this format:
#IP-address DOMAIN-NAME
172.67.132.58 greatawakening.win
You could for instance resolve facebook, google, and other baddies to your localhost, or 127.0.0.1. This hosts-file will then act as its own DNS. Another option is to self host a DNS.
There are quite a number of DNS options available. Each DNS will influence the search results and name resolution.
VPN
A Virtual Private Network means that between you and an exit node the information sent is encrypted, so a virtual tunnel. What happens inside the tunnel is seen but not comprehended by potential watchers, like your Internet Service Provider.
However, your purpose to restrict the access to your information is defeated when your VPN provider keeps extensive logs of your activity. Hence,you would want to use a NO LOG POLICY VPN. MULLVAD is such a provider.
A new phenomenon is SPN, Safing.io approaches it from 2 angles: no logs and for every app you get a different IP to the outside world.
This is very nice and all, but just like with VPN, payment processors systems are now trained to watch for it and raise a red flag. It may mean that a mandated KYC process fails, or, you may be locked out of your account due to "suspicious activity" and not probable cause.
Tor acts as a VPN in that it does show an exit IP-address as your IP address. The more exit points there are, the better. However, tor is notoriously slow. To mess around with it, you can try: Tor Browser.
The same goes for Lokinet what goes for Tor, though faster. However, Lokinet does not have many exits, and once security systems are aware of it, they may raise a red flag of "suspicious activity".
Lokinet offers a connection app, and then you need to decide how to proceed from there. However, it offers a better experience when it comes to secure cloud interaction.
Of course, you could intersperse your connections to websites with proxies. An nice example is the following:
DIY:
go to: swisscows.com, search for anything you want, and then look to the right side of your results. Click on preview.
another option: Goto: metager.de, search for anything you want, then look below each result to the right, there you will find a button: open anonymously.
Effectively, this is what a proxy is.
However, you could program your internet connection such that is uses proxies to request the pages you want, and then serve it to your browser. With this, you get what you pay for, and, pay peanuts, get monkeys ....
Password_Manager:
this is added: Many browsers allow you to store passwords for websites. How convenient! However, it is more secure to use KeepassXC, as you browser can be easily compromised. Keepass is an encrypted database and allows you to:
access a website from keepass
copy a username to the website login and is erased from memory after 10 seconds or whatever you set.
copy your passphrase to the website login and is erased from memory after 10 seconds.
allows you to apply passphrases that are quite unusual, and can be set to any strength you need.
As long as you remember 1 thing: Change passwords on regular basis. Data-breaches have shown billions of usernames and passwords to be available for brute force attacks. On top, there are dictionaries available for brute force attacks. Why? People are basically lazy and stupid, and use the same stuff all over.
clicking links:
One of the ways in which pishing is performed is by providing a link that looks like what you are used to. A famous example: exampIe.
Spot the difference.
DIY
Copy a link into wordpad or txt-writer and set font to newcourier and the difference becomes easy to spot.
That is why you evade using browser supported password managers.
Consider this as a pointer, as there really is no reason to bother yourself with the burden of arranging everything yourself, lest you have a personal IT interest.
If you download and use an email client like Thunderbird, you can set it up to retrieve all your emails stored in Gmail down to your hard drive. Then, when you delete them from your gmail account, you still have a record etc, which is another aspect that may make transition easier.
google has been acting weird to me, some times it wont even give me results. also fuck adin ross, fuck that jew who spreads degeneracy like a plague. I don't want this fag representing MAGA.
As with everything, the best option for security is going to be self-hosted with your own domain name, but that’s obviously not something most people are going to want to bother with, and has its own issues.
Radical ownership is the way, but in the absence of that just do reasonable research in line with potential risks of the choices available and pick what looks best.
Duck duck go is no good,I assume Yandex is now the best?
Yandex, Brave and Freespoke are good.
Yandex seems better than Brave for more difficult searches, but it often leads to Russian versions of sties, so I prefer Brave for my primary use.
I've heard yandex as well
I have found Freespoke to be very good for searches related to political stuff.
metacrawler
I did an image search comparison of "16 year plan Hillary Clinton" and Yandex brought up the flow chart Google had nothing but HRC pics. Do that demo for someone and watch their reaction.
First time I ever tried yandex a few years ago, I searched keyword "QAnon" (couldn't use just the letter Q :)
The first or second result was the actual Q drops at qanon.pub. My jaw hit the floor. Nearly all the results on Page 1 were relative to actual Q, not just media hitpieces by the thousands like on google
Fun Fact:
The first two letters of yandex, written as the famous backward R, mean the first-person pronoun "I". So yandex means "I-index".
I use Brave and Freespoke or
I've took to learning Russian myself. Duolingo is free and fun.
Thanks.
Brave won't let you view the real stuff. Just some token conspiracy theories.
Yeah I thought Brave was compromised. And this is coming from someone who's used Brave for years, and is currently using it now over Chrome.
"Duck duck go is no good,I assume"
Why?
https://greatawakening.win/p/16ZDqXNGMB/i-stopped-using-duckduckgo-one-y/c/
Thank you RitcherBelmont, for actually answering my question.
You're most welcome!
Google bought them
I believe Google owns duck duck go.
Fuck fuck no that's why
I read that it’s owned by bill gates
Brave + yandex or smart page
Brave browser blocks a ton of ads
Here is a controversial search:
Yandex shows cdrkernchner.wordpress.com at the top.
DuckDuckGo shows kerchner.com, which is new to me.
Google shows Quora and some unrelated stuff at the top. kerchner.com and cdrkerchner.wordpress.com are near the bottom of page 1.
Interesting.
Yandex is the best I think
Pick your poison...list of search -engines....
https://stolenhistory.net/threads/alternative-search-engines-video-sites-to-google-youtube.3771/
Thanks. I have been looking for this information for a while. This is great.
This is a great resource. Thank you, fren! I'm passing the link around to people I know too!
I realised the internet 'wasn't the same anymore' around a decade ago, when every site started pushing 'log in with' Google, FB, Amazon etc.
Try Brave....?
I like brave but didn't the owner do some cucked shit? Or was that duck duck?
I think that may have been Duck. Didn't hear anything about Brave going woke.
Brave does occasionally push NWO shit like CBDC credit cards on its home screen backdrops.
I've switched to Luxxel quite a while back now. It works for me.
Thanks... have never heard if it, but always looking for a search engine that is reminiscent of circa 2005 when you could really do a deep dive on things.
The dumbing down came way sooner than I anticipated...As I peer over at my rare book collection...
They also constantly push wokeness, in the doodles and at the company.
2 years ago https://youtu.be/KdXPMYGiPgE?t=85
Use Result Hunter. It is run by conservatives!
OK, give me a 5-minute training on how to "get off Google".
https://stolenhistory.net/threads/alternative-search-engines-video-sites-to-google-youtube.3771/
You have to break free of:
Don't worry, i've done it.
It takes a while to break free of the BS. You can start with your search engine.. but if it were me i'd move off of everything.. in 2020. but since you don't have a time car, get to it.
Yep.
Switching emails takes a LOOOng time though. But it's worth it.
Firstly: Get a new email account somewhere.. like proton mail, tutanota, etc.
Secondly: log into gmail and set up email forward for all new mail to go to your mail to your new email account.
Thirdly: for about 1 year have a signature set up on your new email to advise everyone this is your new email. Reply to the forwarded emails that come into your new inbox from gmail with the new email address. Don't reply to spam, etc.
Over the next year, go through your gmail and forward all important emails to your new email.
Finally, wait a year, and you should be able to close off (or not use) your google email.
That's the 'help me migrate' way
The other way is to just get a new email and never use gmail again, and never forward any mail to let gmail know your new address.
You could try e/ project.
This is akin to what you are used to, and what google was intended to be.
On the other hand, convenience is what is killing "obtaining knowledge and experience". No one NEEDS all things in one place. You can do it yourself, or, secure it yourself in the cloud with different methods.
Technically, there are at least three buckets: your shit, collaboration, everything else. Certain things in each bucket may be a member of another bucket, too. So, make an analysis. Each bucket has it's own thread model. And each bucket requires a different solution and, most importantly: behavior!
Diversity is indeed a strength if you apply it to risk. The below is not exhaustive but just pointers to learn more.
Salient
first off, email is a legacy medium. it is totally open, insecure way of communication. There is really no need for email.
Certain platforms will require you to have an email address. For this: tuta, proton, the likes is ok. But since, many platforms have not implemented secure communication, all emails sent back and forth are open to be read, or betray meta data. However, many platform will allow burner addresses. Just search for temporary email.
For secured comms, there is signal, Element, Ricochet, XMPP, etc. If you need to send a document, make the document, print it, sign it, copy it, send it. And if dealing with .gov: Make Analogue Great Again! and reject emails, digital communications.
Cellphone: you do not need it in reality. What is needed is the mobile data package. In many places you can get unlimited for 30 bucks or so. In the EU, there is this pesky agreement, that roaming is set to 30Gigs per period free. So you could get a phone-number & data-package for 8 bucks. The fun part is, if they wanted to break the 5G encryption, they can only go to the host-state, and do a request, which is playing one bureaucracy against another.
There are routers and access points available to facilitate connection. If you really want to go exotic, consider Star Link. It is a steep price initially, however, it is a nice piece of access and payable with BITCOIN.
Browser:
This is somewhat of a contentious subject as everyone has their favorite and thinks by having such, being secure. You are not.
First: visit eff.org to learn what can be gleaned form your current setup. Then take appropriate steps to remedy.
What they will not tell you, if you want to look like all other sheep, is that differences in communication style, word usage, geolocation etc, can be used to identify you. In effect, this is just another ploy to homogenize you.
you could employ this trick but just be aware, it takes a different kind of mind to play a role and be consistent. Breaking role is not allowed.
Second: each browser has plusses and minuses. So, you need to go back to your threat model, your buckets and consider which browser is most fit for a particular function.
Search_Engine:
Again, this is a contentious subject. There are engines that strip identifying information from your searches and scrap the logs, and there are those with varying degree of anonymizing and privacy oriented features.
Then there are those which are self hosted, and not self hosted, search engine that are based on google searches and those that are not. This latter group either has their own crawler and indexer and/or use a different crawlers and indexers than google.
Consider your buckets, your thread model and the means by which you go on the internet.
I refer to this post: https://greatawakening.win/p/17txVtwVmK/x/c/4ZDsC8shpYe
Online Security:
DNS:
Each time you enter an address of a website, a request is sent to a so called telephone book of the internet, called DNS. This stands for: domain name server. As you will probably know: greatawakening.win is the name, and it has an IP-address.
DIY:
If you want to know, try this: open the command line (Windows = search: CMD, Linux: ALT + CTRL + T:
Ok, so now you are going by the name of XO Vasilly, and you hear your Captain Ramus say:
You may substitute greatawakening.win for any websitename you know.
Since some years, there is the opportunity to have this information sent with https enabled. This means that the contents of your request is encrypted but not the meta data. The browser may have a setting to activate this, or is packed with it.
Since each website has an ip-address, there is the option to gather this information, (see ping-command) and put it into a hosts-file.
DIY:
Create a file with wordpad, or on linux CLI: touch hosts when open, simply enter the following according to this format: #IP-address DOMAIN-NAME 172.67.132.58 greatawakening.win
You could for instance resolve facebook, google, and other baddies to your localhost, or 127.0.0.1. This hosts-file will then act as its own DNS. Another option is to self host a DNS.
There are quite a number of DNS options available. Each DNS will influence the search results and name resolution.
VPN
A Virtual Private Network means that between you and an exit node the information sent is encrypted, so a virtual tunnel. What happens inside the tunnel is seen but not comprehended by potential watchers, like your Internet Service Provider.
However, your purpose to restrict the access to your information is defeated when your VPN provider keeps extensive logs of your activity. Hence,you would want to use a NO LOG POLICY VPN. MULLVAD is such a provider.
A new phenomenon is SPN, Safing.io approaches it from 2 angles: no logs and for every app you get a different IP to the outside world.
This is very nice and all, but just like with VPN, payment processors systems are now trained to watch for it and raise a red flag. It may mean that a mandated KYC process fails, or, you may be locked out of your account due to "suspicious activity" and not probable cause.
Tor acts as a VPN in that it does show an exit IP-address as your IP address. The more exit points there are, the better. However, tor is notoriously slow. To mess around with it, you can try: Tor Browser.
The same goes for Lokinet what goes for Tor, though faster. However, Lokinet does not have many exits, and once security systems are aware of it, they may raise a red flag of "suspicious activity".
Lokinet offers a connection app, and then you need to decide how to proceed from there. However, it offers a better experience when it comes to secure cloud interaction.
Of course, you could intersperse your connections to websites with proxies. An nice example is the following:
DIY:
go to: swisscows.com, search for anything you want, and then look to the right side of your results. Click on preview.
another option: Goto: metager.de, search for anything you want, then look below each result to the right, there you will find a button: open anonymously.
Effectively, this is what a proxy is.
However, you could program your internet connection such that is uses proxies to request the pages you want, and then serve it to your browser. With this, you get what you pay for, and, pay peanuts, get monkeys ....
Password_Manager:
this is added: Many browsers allow you to store passwords for websites. How convenient! However, it is more secure to use KeepassXC, as you browser can be easily compromised. Keepass is an encrypted database and allows you to:
As long as you remember 1 thing: Change passwords on regular basis. Data-breaches have shown billions of usernames and passwords to be available for brute force attacks. On top, there are dictionaries available for brute force attacks. Why? People are basically lazy and stupid, and use the same stuff all over.
clicking links:
One of the ways in which pishing is performed is by providing a link that looks like what you are used to. A famous example: exampIe.
Spot the difference.
DIY
Copy a link into wordpad or txt-writer and set font to newcourier and the difference becomes easy to spot.
That is why you evade using browser supported password managers.
Consider this as a pointer, as there really is no reason to bother yourself with the burden of arranging everything yourself, lest you have a personal IT interest.
https://hacker10.com/internet-anonymity/lelantos-a-secure-anonymous-email-provider-through-tor/
Kudos on getting rid of Google!
If you download and use an email client like Thunderbird, you can set it up to retrieve all your emails stored in Gmail down to your hard drive. Then, when you delete them from your gmail account, you still have a record etc, which is another aspect that may make transition easier.
Search Thunderbird, POP/IMAP, etc.
I get good results on web crawler.
Giburu is good- has a "censored" tab in its results that shows sites that you wouldn't be able to find through the big engines.
Other than that, Yandex and Freespoke are probably your best bet. I use Startpage on occasion as well.
Ungoogled Chromium is a decent browser as well, but you'll have to do some beginner-unfriendly setup to install extensions and a search engine.
I have no Goog accounts, but am stuck with Apple until a usable Linux phone is available.
I don't think that ungoogled chromium is safe as chromium is ungoogled anyway. It glows a lot to me because of its name.
Have you tried a lineage phone?
So how do you download apps other than the play store? F-droid has very little selection.
You can download the .apk file for most apps directly from the developer site.
There's also https://apkpure.com and https://www.apkmirror.com.
Thank you
Elon Musk enters the chat.
I wish he would fren. We need an good alternative to Apple and Android.
Yandex and Startpage here. Brave when Firefox has probs.
I love Yandex and Brave. Gonna check out Freespoke now.
google has been acting weird to me, some times it wont even give me results. also fuck adin ross, fuck that jew who spreads degeneracy like a plague. I don't want this fag representing MAGA.
Quortal seems interesting, totally distributed system. Runs without central nodes.
Who do frens rec for email?
Proton Mail
Except that was created by CERN engineers…
Still better than Google, probably.
As with everything, the best option for security is going to be self-hosted with your own domain name, but that’s obviously not something most people are going to want to bother with, and has its own issues.
Radical ownership is the way, but in the absence of that just do reasonable research in line with potential risks of the choices available and pick what looks best.
And the encyption only works when both emal addresses used are both on Proton
I use Brave
I think Opera is a safe alternative browser. It has a free VPN setting.
I don't trust search engines at face value, but they are a valuable resource if you know how to search.
Youtube, Google, anything related to Alphabet gets my spidey senses tingling.
hmmmmm if the market crashes hard enough maybe Musk can buy it out.
hey, a man can dream
Does Brave work with Mac?
Yes. I have it on MacBook, iPad, iPhone
For any non-Americans wondering, the slang word "whacked" in the context of being shot means "killed".
in saying "I got whacked," Trump is exaggerating a bit for effect.
I admit I have used Google as an absolute last resort when all other search engines have failed me.
But that's it.
F you and ur DamN Boomer comment. Hug a gd nut!