Skip to content

Commit

Permalink
Remove I2P and Freenet (#1756)
Browse files Browse the repository at this point in the history
  • Loading branch information
jonaharagon committed Sep 13, 2022
1 parent 16cb2da commit 9d14330
Show file tree
Hide file tree
Showing 22 changed files with 173 additions and 252 deletions.
2 changes: 1 addition & 1 deletion docs/advanced/signal-configuration-hardening.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -244,7 +244,7 @@ To supplement the database encryption feature, Molly securely wipes your device'

While Molly is running, your data is kept in RAM. When any app closes, its data remains in RAM until another app takes the same physical memory pages. That can take seconds or days, depending on many factors. To prevent anyone from dumping the RAM to disk and extracting your data after Molly is locked, the app overrides all free RAM memory with random data when you lock the database.

There is also the ability to configure a SOCKS proxy in Molly to route its traffic through the proxy or Tor (via [Orbot](../self-contained-networks.md#orbot)). When enabled, all traffic is routed through the proxy and there are no known IP or DNS leaks. When using this feature, [call relaying](#call-relaying) will always be enabled, regardless of the setting.
There is also the ability to configure a SOCKS proxy in Molly to route its traffic through the proxy or [Tor via Orbot](../tor.md#orbot). When enabled, all traffic is routed through the proxy and there are no known IP or DNS leaks. When using this feature, [call relaying](#call-relaying) will always be enabled, regardless of the setting.

Signal adds everyone who you have communicated with to its database. Molly allows you to delete those contacts and stop sharing your profile with them.

Expand Down
4 changes: 2 additions & 2 deletions docs/android.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw
DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices.

[:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary }
[:simple-torproject:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title=Onion }
[:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Onion Service" }
[:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" }
Expand Down Expand Up @@ -174,7 +174,7 @@ Auditor performs attestation and intrusion detection by:

No personally identifiable information is submitted to the attestation service. We recommend that you sign up with an anonymous account and enable remote attestation for continuous monitoring.

If your [threat model](basics/threat-modeling.md) requires privacy, you could consider using [Orbot](self-contained-networks.md#orbot) or a VPN to hide your IP address from the attestation service.
If your [threat model](basics/threat-modeling.md) requires privacy, you could consider using [Orbot](tor.md#orbot) or a VPN to hide your IP address from the attestation service.
To make sure that your hardware and operating system is genuine, [perform local attestation](https://grapheneos.org/install/web#verifying-installation) immediately after the device has been installed and prior to any internet connection.

### Secure Camera
Expand Down
1 change: 0 additions & 1 deletion docs/assets/img/self-contained-networks/freenet.svg

This file was deleted.

2 changes: 0 additions & 2 deletions docs/assets/img/self-contained-networks/i2p-dark.svg

This file was deleted.

2 changes: 0 additions & 2 deletions docs/assets/img/self-contained-networks/i2p.svg

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,7 @@ Though Tor does provide strong privacy guarantees, one must be aware that Tor is

If you wish to use Tor for browsing the web, we only recommend the **official** Tor Browser—it is designed to prevent fingerprinting.

- [Browsers: Tor Browser :material-arrow-right-drop-circle:](../desktop-browsers.md#tor-browser)
- [Tor Browser :material-arrow-right-drop-circle:](../tor.md#tor-browser)

## Additional Resources

Expand Down
11 changes: 5 additions & 6 deletions docs/basics/vpn-overview.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,18 +50,17 @@ Thus, this feature should be viewed as a convenient way to access the Tor Networ
A VPN may still be useful to you in a variety of scenarios, such as:

1. Hiding your traffic from **only** your Internet Service Provider.
2. Hiding your downloads (such as torrents) from your ISP and anti-piracy organizations.
3. Hiding your IP from third-party websites and services, preventing IP based tracking.
1. Hiding your downloads (such as torrents) from your ISP and anti-piracy organizations.
1. Hiding your IP from third-party websites and services, preventing IP based tracking.

For use cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're *trusting* the provider. In pretty much any other scenario you should be using a secure**-by-design** tool such as Tor.

## Sources and Further Reading

1. [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert
2. [The self-contained networks](../self-contained-networks.md) recommended by Privacy Guides are able to replace a VPN that allows access to services on local area network
3. [Tor Network Overview](tor-overview.md) by blacklight447
4. [IVPN Privacy Guides](https://www.ivpn.net/privacy-guides)
5. ["Do I need a VPN?"](https://www.doineedavpn.com), a tool developed by IVPN to challenge aggressive VPN marketing by helping individuals decide if a VPN is right for them.
1. [Tor Network Overview](tor-overview.md) by blacklight447
1. [IVPN Privacy Guides](https://www.ivpn.net/privacy-guides)
1. ["Do I need a VPN?"](https://www.doineedavpn.com), a tool developed by IVPN to challenge aggressive VPN marketing by helping individuals decide if a VPN is right for them.

## Related VPN Information

Expand Down
2 changes: 1 addition & 1 deletion docs/calendar-contacts.en.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: "Calendar and Contact Sync"
icon: material/calendar
icon: material/calendar-account
---
Calendars and contacts contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them.

Expand Down

0 comments on commit 9d14330

Please sign in to comment.