Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.privacy    |    Discussing privacy, laws, tinfoil hats    |    112,125 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 111,484 of 112,125    |
|    Marion to Marion    |
|    Re: Is there a de-mozzilla'd FIrefox (si    |
|    18 Aug 25 00:22:10    |
      XPost: alt.comp.software.firefox       From: marion@facts.com              On Tue, 12 Aug 2025 20:13:42 -0000 (UTC), Marion wrote :                     > Meanwhile, I've been testing the VPN extensions which passed the initial       > tests, where my fungible test-rating system puts them in this order:       > browsec       > 1clickvpn       > 1vpn       > vpnly       > xvpn       > securefreeedgevpn       > setupvpn       >       > Bearing in mind these all failed the most basic initial VPN tests.       > hotspotshieldvpn       > itopvpn       > protonvpn       > urbanvpn       > hidemevpn       > hiddenbatvpn       > tunnelbearvpn       > windscribevpn              UPDATE:              I ditched the VPN extensions in order to test a SOCKS5 proxy tunnel.        browsec ==> the best, but it slows down drastically in a week        1clickvpn ==> seems to slow down drastically in just days        1vpn ==> seems to slow down drastically in just days        vpnly ==> seems to slow down drastically in just days        xvpn ==> seems to slow down drastically in just days        securefreeedgevpn ==> seems to slow down drastically in just days        setupvpn ==> seems to slow down drastically in just days        hoxx ==> seems to slow down drastically in just days               hotspotshieldvpn ==> fails the initial VPN extension test conditions        itopvpn ==> fails the initial VPN extension test conditions        protonvpn ==> fails the initial VPN extension test conditions        urbanvpn ==> fails the initial VPN extension test conditions        hidemevpn ==> fails the initial VPN extension test conditions        hiddenbatvpn ==> fails the initial VPN extension test conditions        tunnelbearvpn ==> fails the initial VPN extension test conditions        windscribevpnv ==> fails the initial VPN extension test conditions              Bad news. Very bad news. All the VPN extensions slow down tremendously, it       seems, within a few days of using them. So I tried something else that is       free, login free and hopefully, much faster than VPN extensions are.        a. Psiphon (Socks5 proxy)        b. Freecap (Socks5 redirector)        c. Any browser (with a score of privacy extensions)              A. Psiphon is not a traditional VPN but rather a circumvention tool that       uses a mix of VPN, SSH, and HTTP proxy technologies to bypass censorship.              B. Freecap (or Proxifier) is used to route app traffic (such as that of a       browser) through a SOCKS5 proxy to achieve selective traffic tunneling.              C. Any Browser + Privacy Extensions for fingerprinting and tracking       protection.              I also uninstalled NoScript as it was a royal pita to manage.       I also removed the non-privacy extension disablehtml5autoplay.              Here's what I'm currently testing (where IP obfuscation & speed are key).        Psiphon + Freecap + Any privacy browser + privacy extensions              https://psiphon.ca/        Name: psiphon3.exe        Size: 10402576 bytes (10158 KiB)        SHA256: DB1BAF76F0333F4743919A86F35037559F9E7DA7DF14982DFC16FB8DC0BE6BE2              https://freecap.apponic.com/download/        Name: freecap_setup_eng.exe        Size: 1644848 bytes (1606 KiB)        SHA256: C3D4929AB5A5867A6BE9914FF94DEFEFED6762748EDB1E351C86EBC5A02D46EC              Here are the current set of privacy extensions (many for fingerprinting):        bhchdcejhohfmigjafbampogmaanbfkg : User-Agent Switcher and Manager        cjpalhdlnbpafiamejdnhcphjbkeiagm : uBlock Origin        fhcgjolkccmbidfldomjliifgaodjagh : Cookie AutoDelete        fhkphphbadjkepgfljndicmgdlndmoke : Font Fingerprint Defender        fjkmabmdepjfammlpliljpnbhleegehm : WebRTC Control        gjldcdngmdknpinoemndlidpcabkggco : Extension Manager        hhnhplojcganfmfimkeboiipphklcbih : Location Guard (V3)        hnkcfpcejkafcihlgbojoidoihckciin : Referer Control        jaoafjdoijdconemdmodhbfpianehlon : Skip Redirect        jjbikklopibeimjelkohlldbjcdnofei : StayInTab        lckanjgmijmafbedllaakclkaicjfmnk : ClearURLs        ldpochfccmkkmhdbclfhpagapcfdljkj : Decentraleyes        njdfdhgcmkocbgbhcioffdbicglldapd : LocalCDN        njkmjblmcfiobddjgebnoeldkjcplfjb : Trace - Online Tracking Protection        nomnklagbgmgghhjidfhnoelnjfndfpd : Canvas Blocker - Fingerprint Protect        pkehgijcmpdhfbdbbnkijodmdjhbjlgp : Privacy Badger        pmcpffnpjncfplinfnjebjoonbncnjfl : CthulhuJs (Anti-Fingerprint)              And this is what I'm currently testing in the DIY browser where SPEED       (and IP obfuscation) turn out to be the hardest things to get this way.              How to add Socks5 to your Windows 10 browser sessions:       1. Start Psiphon & make a note of the SocksV5 port in the log output       2. Start Freecap & add the Socks5 port for your browser into the settings       3. Add your web browser into the Freecap settings       4. In Freecap, add desired command-line performance flags for the       application:        --disable-background-timer-throttling        --disable-backgrounding-occluded-windows        --disable-renderer-backgrounding              Voila!              This setup routes only selected web browser traffic via FreeCap through       Psiphon, offering selective IP obfuscation & hopefully maintaining speed.              If this works, we can ditch the problematic VPN extensions, all of which       seem to either fail the initial tests or severely slow down in just days.              I just started testing it, but I post this so that others who actually       know what they're doing can add value to how they do Socks5 tunneling!              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca