<ahref="/me/"title="About Amolith"aria-label="Read more about me"class="social-links-entry">
<iclass="fa fa-info-circle"></i>
</a>
{% if site.author.mastodon %}
<arel="me"title="Mastodon, a decentralised social network"href="https://masto.nixnet.xyz/@{{ site.author.mastodon }}"class="social-links-entry"target="_blank">
<arel="me"rel="noreferrer"title="Mastodon, a decentralised social network"aria-label="Visit my Mastodon profile"href="https://masto.nixnet.xyz/@{{ site.author.mastodon }}"class="social-links-entry"target="_blank">
<iclass="fa fa-mastodon"></i>
</a>
{% endif %}
{% if site.author.telegram %}
<ahref="https://t.me/{{ site.author.telegram }}"title="Message me on Telegram"class="social-links-entry"target="_blank">
<ahref="https://t.me/{{ site.author.telegram }}"rel="noreferrer"title="Message me on Telegram"aria-label="Message me on Telegram"class="social-links-entry"target="_blank">
<iclass="fa fa-telegram"></i>
</a>
{% endif %}
{% if site.author.email %}
<ahref="mailto:{{ site.author.email }}"title="Send me a GPG-encrypted email"class="social-links-entry"target="_blank">
<ahref="mailto:{{ site.author.email }}"title="Send me a GPG-encrypted email"aria-label="Send me a GPG-encrypted email"class="social-links-entry"target="_blank">
<divclass="explore-label">Website source available <ahref="https://git.nixnet.xyz/Amolith/NixNet">here</a></div>
<divclass="explore-label">All content is licensed under <ahref="https://creativecommons.org/licenses/by/4.0/" target="_blank">CC-BY 4.0</a></div>
<divclass="explore-label">Website source available on <ahref="https://git.nixnet.xyz/Amolith/NixNet"rel="noreferrer">Gitea</a></div>
<divclass="explore-label">All content is licensed under <ahref="https://creativecommons.org/licenses/by/4.0/"rel="noreferrer"target="_blank">CC-BY 4.0</a></div>
<divclass="explore-label">Website source available on <ahref="https://git.nixnet.xyz/NixNet/nixnet">Gitea</a></div>
<divclass="explore-label">Made with ❤️ and <ahref="https://jekyllrb.com/" target="_blank">Jekyll</a> by <ahref="https://nixnet.xyz/me/"target="_blank">Amolith</a></div>
<divclass="explore-label">All content is licensed under <ahref="https://creativecommons.org/licenses/by/4.0/" target="_blank">CC-BY 4.0</a></div>
<divclass="explore-label">Website source available on <ahref="https://git.nixnet.xyz/NixNet/nixnet"rel="noreferrer">Gitea</a></div>
<divclass="explore-label">Made with ❤️ and <ahref="https://jekyllrb.com/"rel="noreferrer"target="_blank">Jekyll</a> by <ahref="https://nixnet.xyz/me/"target="_blank">Amolith</a></div>
<divclass="explore-label">All content is licensed under <ahref="https://creativecommons.org/licenses/by/4.0/"rel="noreferrer"target="_blank">CC-BY 4.0</a></div>
If you ever forget how to use the tool, just run `curl sky.webionite.com` and you'll be given instructions.


Due to recent events we felt compelled to write an impromptu article on this matter. It's intended for all audiences so it will be kept simple - technical details may be posted later.
@ -72,7 +72,7 @@ This site will look absolutely fine to you; it has https in the URL and, if you
It now receives all the communication you intended to send to the original. This bypasses the checks created to avoid it. You won't receive error messages, your browser won't complain.
All your data is compromised!
All your data is compromised!
## 4. Conclusion
@ -85,7 +85,7 @@ All your data is compromised!
**Do not ever install a 3rd party root certificate!** There are very few exceptions why you would want to do so and none of them are applicable to general end users.
Do not fall for clever marketing that ensures "ad blocking", "military grade security", or something similar. There are methods of using DNS resolvers on their own to enhance your privacy but installing a 3rd party root certificate never makes sense. You are opening yourself up to extreme abuse.
Do not fall for clever marketing that ensures "ad blocking", "military grade security", or something similar. There are methods of using DNS resolvers on their own to enhance your privacy but installing a 3rd party root certificate never makes sense. You are opening yourself up to extreme abuse.
## 5. Seeing It Live
@ -111,8 +111,8 @@ Here is the link: [https-interception.info.tm](http://https-interception.info.tm
## 6. Further Information
If you are interested in more technical details, let us know. If there is enough interest, we might write a more in-depth article but, for now, the important part is sharing the basics so you can make an informed decision and not fall for marketing and straight up fraud. Feel free to suggest other topics that are important to you.
If you are interested in more technical details, let us know. If there is enough interest, we might write a more in-depth article but, for now, the important part is sharing the basics so you can make an informed decision and not fall for marketing and straight up fraud. Feel free to suggest other topics that are important to you.
<br/>
<br/>
<center><p>For more information/feedback/corrections, join <a href="https://t.me/PrivacyToday">Privacy Today</a> on Telegram.</p></center>
<center><p>This post is licensed under <a href="https://creativecommons.org/licenses/by-nc-sa/4.0/">CC BY-NC-SA 4.0</a> and was mirrored with permission.</p></center>
<center><p>For more information/feedback/corrections, join <arel="noreferrer"href="https://t.me/PrivacyToday">Privacy Today</a> on Telegram.</p></center>
<center><p>This post is licensed under <arel="noreferrer"href="https://creativecommons.org/licenses/by-nc-sa/4.0/">CC BY-NC-SA 4.0</a> and was mirrored with permission.</p></center>
@ -16,7 +16,7 @@ If that's all you intend to do, this should be sufficient and there's no need to
# For domains you *don't* own
There are a few things I used that worked in harmony to verify my other accounts. [Keybase](https://keybase.io/) was the most useful for this purpose. It is a proprietary service but I deem the level of proof it facilitates worth compromising for.
The other tool I used was [GPG](https://gnupg.org/). For the sake of keeping it simple, *this* guide will just deal with GPG from within Keybase. I ***really*** recommend actually learning to use GPG on its own; it's wonderful for protecting your privacy and verifying your identity in a multitude of situations. The next post will be on using GPG *outside* of Keybase for this so [stay tuned](nixnet.xyz/feed.xml).
The other tool I used was [GPG](https://gnupg.org/). For the sake of keeping it simple, *this* guide will just deal with GPG from within Keybase. I ***really*** recommend actually learning to use GPG on its own; it's wonderful for protecting your privacy and verifying your identity in a multitude of situations. The next post will be on using GPG *outside* of Keybase for this so [stay tuned](/feed.xml).
## Generating your key
After creating your Keybase account, click "add a PGP key", "I need a public key", then enter the requisite information. You should use whatever name is associated with the account you'll be emailing Archive.org from as well as that address. Wait a bit while it generates the key . . .
subtitle: 'A little bit about NixNet.xyz and some financial information'
description: A little bit about NixNet.xyz and some financial information
@ -14,28 +14,25 @@ permalink: /about/
<center>
<h1>Finance</h1>
</center>
<p>At the moment, all the sites I host are running on <ahref="https://www.netcup.eu/vserver/vps.php" target="_blank">netcup GmbH's 500 G8</a> VPS. I pay <b>$6.10/mo</b> in lump sums of <b>$36.60</b> every six months. The domain <ahref="https://nixnet.xyz" target="_blank">nixnet.xyz</a> is registered with <ahref="http://gandi.net" target="_blank">gandi.net</a> and it renews at <b>$13.63/yr</b>. I use Gandi because they have WHOIS privacy by default, every domain comes with two inboxes and unlimited aliases for both. One is <ahref="mailto:amolith@nixnet.xyz">amolith@nixnet.xyz</a> and the other uses my real name rather than my pseudonym. My plans are to upgrade to the 1000 G8 (on the same page) and add a <ahref="https://www.netcup.eu/vserver/storagespace.php" target="_blank">Tariff A storage server</a>. This would cost $4.07/mo. I've also added the domain, nixnet.xyz to the goal, which is $13/year ($0.27/mo). My goal is $4.34/week <i>exactly</i> so I can upgrade VPSs, add a storage server, and not have anything left over.</p>
<p>At the moment, all the sites I host are running on <ahref="https://www.netcup.eu/vserver/vps.php"rel="noreferrer"target="_blank">netcup GmbH's 500 G8</a> VPS. I pay <b>$6.10/mo</b> in lump sums of <b>$36.60</b> every six months. The domain <ahref="/" rel="noreferrer" target="_blank">nixnet.xyz</a> is registered with <ahref="http://gandi.net" rel="noreferrer" target="_blank">gandi.net</a> and it renews at <b>$13.63/yr</b>. I use Gandi because they have WHOIS privacy by default, every domain comes with two inboxes and unlimited aliases for both. One is <ahref="mailto:amolith@nixnet.xyz">amolith@nixnet.xyz</a> and the other uses my real name rather than my pseudonym. My plans are to upgrade to the 1000 G8 (on the same page) and add a <ahref="https://www.netcup.eu/vserver/storagespace.php" rel="noreferrer" target="_blank">Tariff A storage server</a>. This would cost $4.07/mo. I've also added the domain, nixnet.xyz to the goal, which is $13/year ($0.27/mo). My goal is $4.34/week <i>exactly</i> so I can upgrade VPSs, add a storage server, and not have anything left over.</p>
<p>If you want to donate in crypto currencies, I accept <ahref="https://bitcoin.org/en/" target="_blank">Bitcoin</a> and <ahref="https://litecoin.org/" target="_blank">Litecoin</a> though I do prefer Litecoin because of its speed. If you do crypto on mobile, you can scan the QR codes with your preferred app or tap them to open the appropriate app. The address is also below for other methods.</p>
<p>If you want to donate in crypto currencies, I accept <ahref="https://bitcoin.org/en/"rel="noreferrer"target="_blank">Bitcoin</a> and <ahref="https://litecoin.org/" rel="noreferrer" target="_blank">Litecoin</a> though I do prefer Litecoin because of its speed. If you do crypto on mobile, you can scan the QR codes with your preferred app or tap them to open the appropriate app. The address is also below for other methods.</p>
@ -40,9 +40,10 @@ These are some of my more public accounts; feel free to contact me at any of the
<br/>
<br/>
<hr/>
<br/>
<divclass="content">
<pclass="center">
I also have <ahref="https://briarproject.org/" target="_blank">Briar</a> if we meet IRL and I'm on <ahref="https://wire.com/en/" target="_blank">Wire</a> as <code>@amolith</code>. I can be found on my XMPP server at <code>amolith@nixnet.xyz</code> as well.
I also have <ahref="https://briarproject.org/"rel="noreferrer"target="_blank">Briar</a> if we meet IRL and I'm on <ahref="https://wire.com/en/"rel="noreferrer"target="_blank">Wire</a> as <code>@amolith</code>.
</p>
<pclass="center">
Despite the many ways to contact me, email and XMPP are and always will be my most preferrered methods (as well as the most reliable). If you email me, please be sure to encrypt it with my <atitle="Plaintext GPG key"href="/amolith.txt"type="text/plain"target="_blank">GPG key</a>. If you message me over XMPP, please make sure it's with a client that has OMEMO encryption.
subtitle: A list of some like-minded people and their websites
description: A list of some like-minded people and their websites
cover: /assets/pages/friends.png
permalink: /friends/
---
<divclass="content">
<h2>People</h2>
<ul>
<li><ahref="https://lushka.al/">Anxhelo Lushka</a> - graphic designer, frontend developer, computer engineering student and heavy open source user/advocate. Has an interesting blog.</li>
<li><ahref="http://lukesmith.xyz/">Luke Smith</a> - makes technology videos on YouTube, is the Luke of <ahref="https://larbs.xyz/">Luke's Auto-Rice Bootstrapping Scripts (LARBS)</a>, and does a podcast called <em>Not Related</em> on "Big-Braned" topics</li>
</ul>
<h2>Organisations</h2>
<ul>
<li><ahref="https://libreho.st/">LibreHo.st</a> - a network of average people who host FLOSS services available for anyone to use</li>
<li><ahref="https://lelux.fi/">Lelux.fi</a> - really cool guy who hosts some services like I do</li>
<li><ahref="https://snopyta.org/">Snopyta.org</a> - Snopyta provides online services based on freedom, privacy and decentralization. Part of LibreHosters.</li>
<li><ahref="https://libredesigners.org/">LibreDesigners.org</a> - a website for learning how to create art, interfaces, websites, etc. with free/libre and open source software (Portuguese-only right now)</li>
<li><ahref="https://cygonetwork.com">CYGONetwork.com</a> - alternative to Facebook. Better features, better community, and enhanced privacy/security</li>
@ -6,13 +6,13 @@ description: A bit about NixNet's admin, Amolith
cover: /assets/pages/me.png
permalink: /me/
---
<p>I am an 18 year old student who lives in the Southern US. This is my last year in high school and I’m planning to graduate with my high school diploma, an Associate’s Degree in Arts, a second in Sciences, and a third in Fine Arts, Music.</p>
<p>I am an 19 year old student who lives in the Southern US. This is my last year in high school and I’m planning to graduate with my high school diploma, an Associate’s Degree in Arts, a second in Sciences, and a third in Fine Arts, Music.</p>
<center><h1>Experience with Linux, abbrv.</h1></center>
<center><h2>Where it all started</h2></center>
<h2>Where it all started</h2>
<p>I got started with GNU/Linux nearly two years ago and it was amazing. The only computer I had at the time was an Acer C710 Chromebook that I got at the beginning of 8th grade. I had this for three years before I grew tired of how limited it was. A friend told me about this thing called Linux and how I should look into seeing if I could get it on my Chromebook. He brought a USB stick to school that he said was “bootable”. I had no idea what this was but I trusted him. We turned off my Chromebook and turned it back on and he tried pressing a bunch of keys. This didn’t do anything. He was really confused and told me I’d have to do my own research on how to install Linux. I did and, eventually, I discovered a few tutorials I could follow. I combined a couple different ones, messed with the motherboard, enabled dev mode, flashed a new BIOS, and got vanilla Ubuntu installed.</p>
<center><h2>Distro hopping</h2></center>
<h2>Distro hopping</h2>
<p>I had a very bad experience with this because the Acer C710 has a 1.1 GHz dual-core processor, 2 GB of RAM, and 16 GB of storage (SSD). I didn’t give up though and started distro hopping, looking for the most lightweight distro I could find. This eventually led me to GalliumOS, a distro built for Chromebooks. It ran well enough but I had heard of this thing called Arch that was supposed to be the ultimate. I knew I couldn’t install vanilla Arch so I went with ArcoLinuxD (ArchMergeD, at the time) and it was a great experience. That’s what’s still on my Chromebook.</p>
<center><h2>“Real” computer</h2></center>
<h2>“Real” computer</h2>
<p>Last March, a friend’s father got me a brand new laptop that actually works. I left Windows on it for three days then wiped it. I went with ArchLabs and loved it . . . until I tried to play some Steam games. Apparently there was a font issue with some of ArchLabs’ s fonts. No one was able to help so I just went for Arch. I installed Xubuntu (I like lightweight distros on powerful machines) on half the drive and worked on Arch for the other half. I tried and failed in two days the first time and succeeded in 15 minutes the next time. It took all the next day to get it set up. I’m actually still on that same installation and haven't had anything break so far.</p>
description: I encourage you to read the whole document. It's not particularly long or difficult to understand.
subtitle: What's being done with your data?
permalink: /privacy/
cover: /assets/posts/privacy.png
---
# Privacy Policy
This will hopefully be the briefest "legal" document you've ever read as well as the most readable. If you need additional information [let me know](/contact) and I'll add it.
## IP Address
Some applications (Gitea, Mastodon, Mumble, XMPP) collect your IP when you register. At the moment, that information is kept indefinitely. However, I'm working on either completely disabling it or setting something up that will periodically delete stored IP addresses. When I do, this document will be updated accordingly.
If you don't want me to have that information to begin with, just use [Tor Browser](https://www.torproject.org/).
## Email Address
When you register for a service using an email address, that is obviously collected. You can control whether it's a real one or not. Even though I can see them for services like Gitea and Mastodon, I don't care and won't send you unsolicited mail.
**Note:** whatever address you use for git is visible in commits.
## Browser Fingerprint
Your web browser communicates uniquely identifying information to all websites it visits by allowing the site to know details about your operating system, browser information, plugins installed, fonts installed, screen resolution, and [much more](https://panopticlick.eff.org/). I don't care about that either and, if some services do collect that for their own use (I'm 99% sure none of them do), I'm not going to look at it ¯\\_(ツ)\_/¯
## Usage and storage of collected information
**For most services:** Whatever data is collected is stored on one server in Germany and won't be shared with any third parties whatsoever.
**For Nextcloud:** Whatever data is collected is stored on one server in my living room and won't be shared with any third parties either. User's files are encrypted at rest so no one can hack into my server and steal them. I do have the encryption key so I *could* decrypt and view your files. I'm not going to bother with that though because I don't have any interest in looking at your personal stuff. That's your business and I won't invade your privacy.
# Exceptions
I do live in the US; one server is here and the other is in Germany. If, for whatever reason, I'm compelled by law enforcement to give up your email, IP address, or any other information, I will. *I don't want to*. As such, I do whatever I can to make sure *I don't have that information*. If I don't have it, I can't share it.
# Recommendations
To mitigate invasions of privacy like this, use a throwaway email address for registration, such as one from [cock.li](https://cock.li/), or [ProtonMail](https://protonmail.com/), provide a [fake name](https://fakena.me/fake-name/), and use the service from behind [Tor](https://www.torproject.org/) or a VPN. Rather than a VPN, however, I *strongly* recommend using Tor across all devices. They have an [Android version](https://www.torproject.org/download/#android) now and there's another browser for iOS that they recommend called [Onion Browser](https://apps.apple.com/us/app/onion-browser/id519296448). I don't use iOS so I can't say whether or not it's any good, just that the Tor Project recommends it below the Android section.
window.addEventListener("load",function(){vare=document.getElementById("register");e&&e.addEventListener("click",function(){navigator.registerProtocolHandler("openpgp4fpr","https://metacode.biz/openpgp/resolve/%s","Search for key on the keyserver")});varr=document.getElementById("search");r&&r.addEventListener("submit",function(t){t.preventDefault(),t.disabled=!0;varo=t.target.querySelector("ul");o.textContent="Checking OpenPGP key using Web Key Directory...";vare=t.target.querySelector("input").value;fetch("./wkd-checker",{method:"POST",body:JSON.stringify({email:e})}).then(function(e){returne.json()}).then(function(e){varr=[];r.push({category:"info",value:"Key address",url:e.key.url}),200!==e.key.code?r.push({category:"error",value:"Key not found"}):(r.push({category:"ok",value:"Key file found"}),e.key.response.startsWith("9")?r.push({category:"ok",value:"Key format correct"}):r.push({category:"error",value:"Key format error: key should be in binary form, not ASCII-armored"}),e.key.cors?(r.push({category:"ok",value:"Key is accessible from all sites"}),e["fake-key"].cors?r.push({category:"ok",value:"Not found keys also generate CORS headers"}):r.push({category:"warn",value:"Not found keys do not have CORS headers"})):r.push({category:"warn",value:"Key is not accessible, add 'Access-Control-Allow-Origin: *' header"})),200!==e.policy.code?r.push({category:"error",value:"Policy not found. Policy file can be empty",url:e.policy.url}):r.push({category:"ok",value:"Policy file found"}),o.innerHTML="",r.map(function(e){varr=document.createElement("LI");if(r.textContent=e.value,r.className=e.category,e.url){vart=document.createElement("A");t.href=e.url,t.textContent=e.url,t.target="_blank",t.setAttribute("rel","nofollow noopener"),r.textContent+=": ",r.appendChild(t)}returnr}).forEach(o.appendChild.bind(o)),console.log(r),t.disabled=!1})})});