@ -37,19 +37,14 @@ If you have a rooted phone, [AdAway](https://adaway.org/) is 100% the way to go.
### Non-rooted phones
If you **don't** have a rooted phone, try [Nebulo](https://smokescreen.app/). If you use F-Droid (which I also highly recommend), the repo is at `fdroid.frostnerd.com`. The source code for the app can be found on their [GitLab](https://git.frostnerd.com/PublicAndroidApps/smokescreen) instance as well. Nebulo is an app that lets you use DNS-over-TLS and DNS-over-HTTPS on Android. To actually block ads with it, there are a few steps you have to go through first. If you use F-Droid (recommended), follow that guide. If you stick to Google Play, follow that guide.
#### F-Droid
In F-Droid, go to Settings > My Apps > Repositories then click the `+` button. Type `fdroid.frostnerd.com` in the box then `ADD`. Wait for your repos to update then search for `Nebulo` and install!
#### Google Play
Google doesn't like apps that block ads (being an advertising company and all). As such, the Play Store version doesn't have blocklists included by default; you'll have to add them manually. I have my own hosts file at [/hosts.txt](/hosts.txt) that anyone can use. All you have to do is open the app, open the <iclass="fa fa-bars"></i> menu in the top right, tap the <iclass="fa fa-plus"></i> icon. For the name, type something like NixNet lists; it really doesn't matter what you use so long as you recognise it. In the URL entry field, type `https://nixnet.xyz/hosts.txt`. Tap the add button, then the <iclass="fa fa-refresh"></i> icon, go back to the homescreen, tap the <iclass="fa fa-server"></i> icon, and pick which server you want to use (I recommend [mine](/dns/) or [UncensoredDNS](https://blog.uncensoreddns.org/)). Finally, tap start! You shouldn't see ads in any apps now!
Open the app, open the <iclass="fa fa-bars"></i> menu in the top right, tap DNS Rules, enable AdAway, CoinBlockerList, and Energized Basic, tap the <iclass="fa fa-refresh"></i> icon, then toggle DNS Rules in the top right. Go back to the homescreen, tap the <iclass="fa fa-server"></i> icon, pick which server you want to use (I recommend [mine](/dns/) or [UncensoredDNS](https://blog.uncensoreddns.org/)). Finally, tap start! You shouldn't see ads in any apps now!
#### F-Droid
In F-Droid, go to Settings > My Apps > Repositories then click the `+` button. Paste the URL below into the box then tap `ADD`. Wait for your repos to update then search for `Nebulo`, install, then follow the instructions for [Google Play](#google-play)!
You *can* just use `fdroid.frostnerd.com` but I recommend using the link with the fingerprint for additional security:
There's actually a simpler way to add hosts and it works in both the F-Droid and Google Play versions. The section below details that.
#### Google Play
Google doesn't like apps that block ads (being an advertising company and all). As such, the Play Store version doesn't have blocklists included by default; you'll have to add them manually. I have my own hosts file at [/hosts.txt](/hosts.txt) that you can use. All you have to do is follow everything in the second paragraph of the F-Droid section except you'll tap the <iclass="fa fa-plus"></i> icon instead of enabling the host sources. For the name, type something like NixNet lists. In the URL entry field, type `https://nixnet.xyz/hosts.txt`. Tap the add button, tap the <iclass="fa fa-refresh"></i> icon, then follow the rest of the F-Droid section.
## iOS
As I mentioned above, [Better](https://better.fyi) is what I would use if I was on iOS or macOS. I've heard good things about it from people and I think Aral is a trustworthy guy.
@ -16,7 +16,7 @@ Another useful term to know is [Anycast](https://en.wikipedia.org/wiki/Anycast).
DoT stands for [DNS-over-TLS](https://en.wikipedia.org/wiki/DNS_over_TLS). It's a protocol that wraps DNS queries and responses in the [TLS](https://en.wikipedia.org/wiki/Transport_Layer_Security) protocol. By default, most systems use plaintext DNS and this is very insecure. Plaintext is . . . plaintext; anyone can snoop on your connection and see what websites you're visiting. If you're using DNS-over-TLS, the only parties that know where you're going is you and the DNS server itself. This article focuses on that because it's more secure and private. DNS-over-HTTPS ([DoH](https://en.wikipedia.org/wiki/DNS_over_HTTPS)) is another option but far fewer clients support it, it's more difficult to set up, and there are far fewer DoH providers.
# Setup
Linux, Windows, and Android are all fairly simple to set up. I don't have any Apple products so I the information there likely won't be complete or particularly good. I still recommend reading it, however.
Linux and Android are all fairly simple to set up but I couldn't find anything for Windows other than DNS-over-HTTPS (DoH). I couldn't find anything at all for iOS but there are instructions for macOS.
## Linux
[Unbound](https://wiki.archlinux.org/index.php/Unbound) is what I use for DNS on all of my systems. It's wonderfully easy to use and works very well. Once you've used it for a while and have built up a cache, it's much faster than third-party resolvers.
This sets `127.0.0.1` as your nameserver and locks the file by adding the *immutable* flag (`chattr +i`). To remove the flag and make it editable again, run `chattr -i /etc/resolv.conf`.
## Windows
I know the title is for DNS-over-TLS but, from what I've found, DoT on Windows is **incredibly** difficult and I can't find much on it. This tell you how to change your plaintext DNS configuration.
I know the title is for DNS-over-TLS but, from what I've found, DoT on Windows is **incredibly** difficult and I can't find much on it. This tell you how to change your plaintext DNS configuration so you can at least use a private resolver.
1. Open the **Control Panel**
2. Click **Network and Internet**
3. Click **Network and Sharing Center**
@ -88,6 +88,8 @@ I know the title is for DNS-over-TLS but, from what I've found, DoT on Windows i
10. Click **OK**
11. As with all things Windows, **reboot** to finish applying the changes.
**EDIT:** It was pointed out that you can use DoH on Windows using something like [Simple DNSCrypt](https://simplednscrypt.org/). After installing and getting it set up, it looks like you would just go to the **Resolvers** tab, disable **Automatic Mode**, then add whatever custom resolvers you want. I don't offer DoH *yet* but there are some providers listed on a friend's [wiki](https://wiki.lelux.fi/dns/resolvers/).
## macOS
I got this tutorial from [phiffer.org](https://phiffer.org/writing/dns-over-tls-on-macos/). I don't have anything from Apple so I can't test it but a friend of mine did and said it works.
@ -95,7 +97,7 @@ I got this tutorial from [phiffer.org](https://phiffer.org/writing/dns-over-tls-
2. Use your favourite text editor to modify `/usr/local/etc/kresd/config` and add this to the very end of the file: `{% raw %}policy.add(policy.all(policy.TLS_FORWARD({{'198.251.90.114', hostname='uncensored.any.dns.nixnet.xyz'}}))){% endraw %}`
3. Restart `kresd` with `sudo brew services restart knot-resolver`
4. At this point, you should check what DNS server you're currently using to make sure it actually changes. You can do that with `kdig nixnet.xyz`
5. Go to Apple **Menu** > **System Preferences** > **Advanced** > **DNS** then add `127.0.0.1`
5. Go to **Apple Menu** > **System Preferences** > **Advanced** > **DNS** then add `127.0.0.1`
6. Test again with `kdig nixnet.xyz`. This time, one of the last couple IP addresses you see should show up something like `127.0.0.1@53(UDP)`.
That's it!
@ -104,4 +106,4 @@ That's it!
Note that DoT is only available on Android Pie and up. For other versions, try [Nebulo](https://smokescreen.app). I go over the process of installing and using it in my last [post](/blog/blocking-ads-on-mobile-and-desktop/#non-rooted-phones). Once you've gone through that, you're pretty much good to. If you want to add additional servers tap the <iclass="fa fa-server"></i> server icon, then the plus at the bottom, and add whatever IP addresses or hostnames you'd like. Mine is included by default as **NixNet Uncensored** so all you have to do is select it.
# iOS
As far as I've been able to find, you can't. I'm sorry ¯\\\_(ツ)\_/¯
As far as I've been able to find, you can't set custom DNS server on iOS, much less DoT or DoH. I'm sorry ¯\\\_(ツ)\_/¯
subtitle: Increasing the size of LVM partitions encrypted with LUKS
description: Mostly copy/paste tutorial on increasing the size of LVM partitions that have been encrypted with LUKS
cover: /assets/posts/disk.png
date: 2019-08-21 20:09 -0400
---
My server has been sporadically down for the past couple of weeks as I attempted to take advantage of my increased storage. The server has 160 GB but I was only able to use 40 of those because the partitions were too small. I just figured it out and thought I'd write about it 😉
# Forward
There are ways you can do this entirely in CLI but I found a GUI easier. I don't say that often but it holds true in this case. Partitioning always scares me because of the *huge* potential for data loss. Using [GParted](https://gparted.org/) as I do here was risky because graphical tools can fail as well but I had already tried with `fdisk` and `parted` and I must have done something wrong because it didn't work. This method will work for both servers as well as desktops/laptops. The only requirement for servers is that you know the encryption key and the only requirement for PCs is a flash drive or something you can boot from. For images, I used GParted's [live image](https://gparted.org/livecd.php). Before partitioning, I *always* recommend taking backups or snapshots so, even if something goes wrong, you're not permanently screwed and you can revert back to the previous setup.
# Resizing partitions
The process here is rather simple. Just open GParted (it should open right on boot) and drag the right side of the **logical** partition to fill all unallocated space. After, increase the size of the `[Encrypted]` partition to take up the remaining space in the logical volume.
# Resizing everything else
First thing is to open the encrypted volume so you can make changes to it. Do that with:
```
cryptsetup luksOpen /dev/sdX5 cryptdisk
```
Of course, replace sdX5 with your encrypted partition. You can also use whatever name you want in place of `cryptdisk`; that's just what I like. Next, you're going to resize the physical volume with:
```
pvresize /dev/mapper/cryptdisk
```
Run `pvdisplay -m` and take a look at the output. Somewhere, you should see something like this:
```
Logical volume /dev/xXxXxXxX/root
```
`xXxXxXxX` will be your logical volume group. `root` might not be what you want to extend though; there could be something that says `home` as well. If that's the case, you probably want to increase the size of that instead. My server shows `swap_1` and `root` and I certainly don't need 124 GB of swap. Take note of which path you'll be using for the next command. You're going to resize the logical volume to fill the remaining space.
```
lvextend +100%FREE /dev/xXxXxXxX/root
```
The last step is checking the encrypted volume itself if needed then extending it. If `resize2fs` prompts you to run `e2fsck` then do it and I recommend optimising everything it asks about.
```
resize2fs -p /dev/xXxXxXxX/root
```
After that, simply reboot and run `df -h` to see if it worked!
<p><b>NixNet.xyz</b> is a network of websites and services hosted by the pseudonymous <b>Amolith</b> (me). The main reason I'm hosting these sites is because I like to be in control of my own data where feasible. The easiest way to accomplish this is to host the services I use. I make them public and and maintain them simply because I want to. The Linux and FLOSS community has completely changed my life and I feel like this is a small way I can do my part and give back.</p>
<p>At the moment, all the sites I host are running on <ahref="https://www.netcup.eu/vserver/vps.php"rel="noreferrer"target="_blank">netcup GmbH's 500 G8</a> VPS. I pay <b>$6.10/mo</b> in lump sums of <b>$36.60</b> every six months. The domain <ahref="/"rel="noreferrer"target="_blank">nixnet.xyz</a> is registered with <ahref="http://gandi.net"rel="noreferrer"target="_blank">gandi.net</a> and it renews at <b>$13.63/yr</b>. I use Gandi because they have WHOIS privacy by default, every domain comes with two inboxes and unlimited aliases for both. One is <ahref="mailto:amolith@nixnet.xyz">amolith@nixnet.xyz</a> and the other uses my real name rather than my pseudonym. My plans are to upgrade to the 1000 G8 (on the same page) and add a <ahref="https://www.netcup.eu/vserver/storagespace.php"rel="noreferrer"target="_blank">Tariff A storage server</a>. This would cost $4.07/mo. I've also added the domain, nixnet.xyz to the goal, which is $13/year ($0.27/mo). My goal is $4.34/week <i>exactly</i> so I can upgrade VPSs, add a storage server, and not have anything left over.</p>
<p>This all changed recently. Gathering the requisite information will take a bit but this page will be updated shortly.</p>
<p>If you want to donate in crypto currencies, I accept <ahref="https://getmonero.org/"rel="noreferrer"target="_blank">Monero</a> and <ahref="https://bitcoin.org/en/"rel="noreferrer"target="_blank">Bitcoin</a> though I do prefer Monero because of its privacy-by-default features. If you do crypto on mobile, you can scan the QR codes with your preferred app or tap them to open the appropriate app. The address is also below for other methods.</p>
</div>
<divclass="flex-wrapper">
<divclass="flex-cards">
<divclass="crypto-card">
<h1><atitle="Monero"href="monero:44rQhN2PwB52RZnKbez5XGXweMdDvphMhZE8CRBhrtSq1nciTxGzZEReEmkhH19EnbKk4k884PrbVd4LaT1ZMqSHCpTUEcH"><imgsrc="/assets/xmr.png"alt="Monero QR code"></img></a></h1>
<h1><atitle="Bitcoin"href="bitcoin:1Q3o8Wtji2QS566BExdcPGMk76NjJgHrcz"><imgsrc="/assets/btc.png"alt="Bitcoin QR code"></img></a></h1>
<h2>Bitcoin</h2>
<p>1Q3o8Wtji2QS566BExdcPGMk76NjJgHrcz</p>
</div>
</div>
<divclass="flex-wrapper">
<divclass="flex-cards">
<divclass="crypto-card">
<h1><atitle="Monero"href="monero:44rQhN2PwB52RZnKbez5XGXweMdDvphMhZE8CRBhrtSq1nciTxGzZEReEmkhH19EnbKk4k884PrbVd4LaT1ZMqSHCpTUEcH"><imgsrc="/assets/xmr.png"alt="Monero QR code"></img></a></h1>
d="m 131.23333,33.866667 c 0,58.547529 -35.965868,91.187323 -58.615524,100.623153 a 12.7,12.7 0 0 1 -9.76921,0 C 34.526802,122.69073 4.2333333,86.383019 4.2333333,33.866667 A 12.7,12.7 0 0 1 12.04886,22.143508 l 50.8,-21.16666633 a 12.7,12.7 0 0 1 9.769211,0 L 123.41807,22.143508 a 12.7,12.7 0 0 1 7.81526,11.723159 z m -63.499997,84.220313 0.01746,0.009 C 92.551515,105.74285 113.39063,76.739485 114.26904,36.676012 L 67.733333,17.286023 Z"
d="m 102.62029,259.20233 v 7.74843 c 0,2.1397 -1.73452,3.87422 -3.874217,3.87422 h -38.74216 c -2.139697,0 -3.874216,-1.73452 -3.874216,-3.87422 v -7.74843 c 0,-2.1397 1.734519,-3.87422 3.874216,-3.87422 h 38.74216 c 2.139697,0 3.874217,1.73452 3.874217,3.87422 z m -3.874217,-6.45703 a 6.4212713,6.4212713 0 0 1 2.484097,0.4976 l -7.790968,-11.6865 a 3.8744583,3.8744583 0 0 0 -3.223586,-1.72515 H 68.534372 a 3.8742161,3.8742161 0 0 0 -3.223509,1.72515 l -7.791049,11.68649 a 6.4212713,6.4212713 0 0 1 2.484099,-0.49759 z m -3.874214,7.74843 c -1.426438,0 -2.58281,1.15637 -2.58281,2.58282 0,1.42643 1.156372,2.58281 2.58281,2.58281 1.426437,0 2.582809,-1.15637 2.582809,-2.58281 0,-1.42644 -1.156372,-2.58282 -2.582809,-2.58282 z m -7.748435,0 c -1.426435,0 -2.582809,1.15637 -2.582809,2.58282 0,1.42643 1.156374,2.58281 2.582809,2.58281 1.42644,0 2.582811,-1.15637 2.582811,-2.58281 0,-1.42644 -1.156371,-2.58282 -2.582811,-2.58282 z"
d="m 131.23333,33.866667 c 0,58.547529 -35.965868,91.187323 -58.615524,100.623153 a 12.7,12.7 0 0 1 -9.76921,0 C 34.526802,122.69073 4.2333333,86.383019 4.2333333,33.866667 A 12.7,12.7 0 0 1 12.04886,22.143508 l 50.8,-21.16666633 a 12.7,12.7 0 0 1 9.769211,0 L 123.41807,22.143508 a 12.7,12.7 0 0 1 7.81526,11.723159 z m -63.499997,84.220313 0.01746,0.009 C 92.551515,105.74285 113.39063,76.739485 114.26904,36.676012 L 67.733333,17.286023 Z"
id="path26851" />
</symbol>
<symbol
id="child">
<title
id="child-title">Child</title>
<path
style="stroke-width:0.26458332"
inkscape:connector-curvature="0"
d="M 31.75,19.05 C 31.75,8.5288437 40.278844,0 50.8,0 61.321156,0 69.85,8.5288437 69.85,19.05 69.85,29.570892 61.321156,38.1 50.8,38.1 40.278844,38.1 31.75,29.570892 31.75,19.05 Z m 67.37006,0.363273 c -3.306233,-3.306498 -8.66722,-3.306498 -11.973454,0 L 64.226281,42.333333 H 37.373454 l -22.92006,-22.92006 c -3.306234,-3.306498 -8.6672211,-3.306498 -11.9734544,0 -3.30649793,3.306498 -3.30649793,8.667221 0,11.973719 L 27.516667,56.423454 V 127 c 0,4.67598 3.790685,8.46667 8.466666,8.46667 h 4.233334 c 4.675981,0 8.466666,-3.79069 8.466666,-8.46667 V 97.366667 h 4.233334 V 127 c 0,4.67598 3.790685,8.46667 8.466666,8.46667 h 4.233334 c 4.675981,0 8.466666,-3.79069 8.466666,-8.46667 V 56.423454 L 99.12006,31.386727 c 3.3065,-3.306498 3.3065,-8.666956 0,-11.973454 z"
id="path22180" />
</symbol>
<symbol
id="users">
<title
id="users-title">Users</title>
<path
style="stroke-width:0.26458332"
inkscape:connector-curvature="0"
d="m 58.208333,43.391667 c 0,-14.612673 11.845925,-26.458334 26.458334,-26.458334 14.612408,0 26.458333,11.845661 26.458333,26.458334 C 111.125,58.00434 99.279075,69.85 84.666667,69.85 70.054258,69.85 58.208333,58.00434 58.208333,43.391667 Z M 12.7,55.033333 c 0,-11.690085 9.476581,-21.166666 21.166667,-21.166666 11.690085,0 21.166666,9.476581 21.166666,21.166666 C 55.033333,66.723419 45.556752,76.2 33.866667,76.2 22.176581,76.2 12.7,66.723419 12.7,55.033333 Z m 101.6,0 c 0,-11.690085 9.47658,-21.166666 21.16667,-21.166666 11.69008,0 21.16666,9.476581 21.16666,21.166666 C 156.63333,66.723419 147.15675,76.2 135.46667,76.2 123.77658,76.2 114.3,66.723419 114.3,55.033333 Z m -5.82083,20.108334 C 118.70796,75.141667 127,83.433708 127,93.6625 v 18.52083 c 0,3.50706 -2.84295,6.35 -6.35,6.35 H 48.683333 c -3.507052,0 -6.35,-2.84294 -6.35,-6.35 V 93.6625 c 0,-10.228792 8.292042,-18.520833 18.520834,-18.520833 h 4.722283 c 11.737975,7.060935 26.439812,7.062523 38.1807,0 h 4.72202 M 33.866667,93.6625 c 0,-3.168385 0.550598,-6.2103 1.558131,-9.037108 -5.802313,0.3048 -11.673946,-1.090348 -16.83041,-4.192059 H 14.816667 C 6.6336333,80.433333 0,87.066967 0,95.25 v 8.46667 c 0,3.50705 2.8429479,6.35 6.35,6.35 H 33.866667 Z M 154.51667,80.433333 h -3.77772 c -5.15806,3.102769 -11.02943,4.496859 -16.83041,4.192059 a 26.866321,26.866321 0 0 1 1.55813,9.037108 v 16.40417 h 27.51666 c 3.50706,0 6.35,-2.84295 6.35,-6.35 V 95.25 c 0,-8.183033 -6.63363,-14.816667 -14.81666,-14.816667 z"
id="path23540" />
</symbol>
<symbol
id="shield-alt-5">
<title
id="shield-alt-title-0">Alternate Shield</title>
<path
id="path26851-4"
d="m 131.23333,33.866667 c 0,58.547529 -35.965868,91.187323 -58.615524,100.623153 a 12.7,12.7 0 0 1 -9.76921,0 C 34.526802,122.69073 4.2333333,86.383019 4.2333333,33.866667 A 12.7,12.7 0 0 1 12.04886,22.143508 l 50.8,-21.16666633 a 12.7,12.7 0 0 1 9.769211,0 L 123.41807,22.143508 a 12.7,12.7 0 0 1 7.81526,11.723159 z m -63.499997,84.220313 0.01746,0.009 C 92.551515,105.74285 113.39063,76.739485 114.26904,36.676012 L 67.733333,17.286023 Z"
d="m 100.80856,235.23853 c -5.693248,-4.85173 -14.160399,-3.97905 -19.386138,1.41292 l -2.046661,2.109 -2.046661,-2.109 c -5.215354,-5.39197 -13.692896,-6.26465 -19.386145,-1.41292 -6.524386,5.56858 -6.867226,15.56294 -1.028528,21.59903 l 20.102998,20.75751 c 1.298643,1.3402 3.407639,1.3402 4.706281,0 L 101.8267,256.83756 c 5.84909,-6.03609 5.50625,-16.03045 -1.01814,-21.59903 z"
@ -6,10 +6,17 @@ subtitle: Uncensored public DNS servers
permalink: /dns/
cover: /assets/pages/dns.png
---
***NOTE:*** Adblock with [Pi-Hole](https://pi-hole.net/) is Coming Soon™
# Preamble
Before going through and setting every device to use my DNS servers, I recommend you read sections 1 - 2 of a [previous post](/blog/dns-and-root-certificates-what-you-need-to-know/#1-what-is-dns-and-why-does-it-concern-you) so you actually understand what's happening and what you're doing. DNS is set up on the same servers as my [Tor exits](/tor-nodes/) so, if you're in a country that actively blocks Tor, you could run into issues unless you use the Anycast IP/hostname.
For simplicity's sake, I recommend using the [Anycast](https://en.wikipedia.org/wiki/Anycast) hostname as your primary, the location normally nearest to you as secondary, and a different provider for your tertiary DNS. With Anycast, you'll automatically use the server geographically nearest (the one with the lowest latency) and it will be secured with TLS. For more technical information on Anycast, click the link above. The second Anycast IP address is for plaintext DNS (**not recommended**); everything else is DNS-over-TLS. If you don't know what those are, the next section explains a bit more.
"description":"Nextcloud is your personal cloud. You have files, contacts, calendar, video calls, chat, notes, notecards, a gallery, and even polls. The best thing is that it's open source and private!",
"button_text":"Register!",
"link":"/nextcloud",
"tor":"#"
},
{
"name":"Searx",
"description":"searX is a meta search engine that aggregates results from more than 70 different search engines. Users are neither tracked nor profiled. searX can also be used over Tor for increased anonymity.",
"description":"Taiga is an open source project management platform for developers, designers, and project managers who want a beautiful tool that makes work truly enjoyable.",
"button_text":"Manage!",
"link":"https://taiga.nixnet.xyz",
"tor":"#"
},
{
"name":"CodiMD",
"description":"CodiMD is an application that allows users to collaborate in real time on markdown documents and presentations. Perfect for quick and easy slideshows and documentation.",
"description":"Invidious is an open source alternative frontend to YouTube without the tracking and ads. You can subscribe to people, watch livestreams, and import/export subscriptions between instances!",
"description":"Plume is an open source and federated blogging platform that can be interacted with and followed from any social network powered by ActivityPub including Mastodon and others!",
@ -30,14 +30,22 @@ Your web browser communicates uniquely identifying information to all websites i
## DNS services
In short:
* Haproxy TCP/HTTP logs are disabled. No IP addresses are collected.
* Unbound query logs are enabled (log level verbosity: 1).
* Unbound debug logs are enabled (verbosity: 1).
* Query amounts coming specifically from the DNS-over-TLS server aren't counted.
* Website/DNS-over-HTTPS gateway's nginx logs are disabled.
* Website/DNS-over-HTTPS gateway's NGINX logs are disabled.
To elaborate on Unbound's verbosity, if you have it installed, you can run `man unbound.conf`, search `verbosity` and read it yourself. More human-readably . . .
* Level 3 shows the admin what **queries** are going through Unbound
* Level 4 gives lower-level **algorithm** information
* Level 5 logs **client** information
There's no warranty, no uptime assurance, etc. so I recommend using multiple [resolvers](https://wiki.lelux.fi/dns/resolvers); that also improves privacy because the DNS queries are spread across multiple providers
# Exceptions
I do live in the US; one server is here and the other is in Germany. If, for whatever reason, I'm compelled by law enforcement to give up your email, IP address, or any other information, I will. *I don't want to*. As such, I do whatever I can to make sure *I don't have that information*. If I don't have it, I can't share it.
I do live in the US; I have two servers here, one in Germany, and another in Luxmebourg. If, for whatever reason, I'm compelled by law enforcement to give up your email, IP address, or any other information, I will. *I don't want to*. As such, I do whatever I can to make sure *I don't have that information*. If I don't have it, I can't share it.
# Recommendations
To mitigate invasions of privacy like this, use a throwaway email address for registration, such as one from [anonbox](https://anonbox.net/) if you want a temporary address or [cock.li](https://cock.li/) for something a bit more permanent, provide a [fake name](https://fakena.me/fake-name/), and use the service from behind [Tor](https://www.torproject.org/) or a VPN. Rather than a VPN, however, I *strongly* recommend using Tor across all devices. They have an [Android version](https://www.torproject.org/download/#android) now and there's another browser for iOS that they recommend called [Onion Browser](https://apps.apple.com/us/app/onion-browser/id519296448). I don't use iOS so I can't say whether or not it's any good, just that the Tor Project recommends it below the Android section.