1
0
Fork 0

New post: Theoretical design for a female-only internet

pages
Lethe Beltane 2 years ago
parent 913bbe1c05
commit c1b1a73dd4
Signed by: lethe
GPG Key ID: 21A3DA3DE29CB63C

@ -0,0 +1,85 @@
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>Theoretical design for a female-only internet - Archive - MayVaneDay Studios</title>
<link href="../../../style.css" rel="stylesheet" type="text/css" media="all">
<meta name="author" content="Vane Vander">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
</head>
<body class="mayvaneday">
<article>
<div class="box">
<h1>Theoretical design for a female-only internet</h1>
<p>published: 2022-08-06</p>
</div>
<hr>
<div class="box">
<p>The instructions and ideas contained in this post could technically be used by any group that seeks to fly under the radar of the mainstream "clearnet". I write "female-only" because I started thinking about this after receiving many DMs from women on Ovarit asking if I could potentially in the future provide technical support for their own personal liberation projects. In case any of those women are reading this right now: I'm sorry I'm so busy! I'm trying to get back into my state's Vocational Rehabilitation Services program and also looking into if I'm eligible for Section 8 rent assistance so I can finally move out of the hellhole I call my parents' house. Plus, you know, living under a (borderline-)abusive household is rather draining on the psyche, and the lack of control over my own life makes me accidentally lash out at others in unproductive-at-best ways. I hope soon I'll get into a living situation that doesn't send me into an "I want to die" spiral every other night so I know what it's like to live without a constant fight-or-flight reflex tight in my chest.</p>
<p>A common theme in imageboards and other alt-tech spaces is a feeling that ranges from resentment (at best) to vitriol (at worst) at women as a class for not being as technologically literate as their male counterparts. Never mind that the damn field of study was <a href="https://web.archive.org/web/20221006024237/https://en.wikipedia.org/wiki/Ada_Lovelace">invented by women in the first place</a>. I like to call the resulting spiral "the techbro cycle of exclusion", which goes as follows:</p>
<ol>
<li>Men mock women for not knowing about the trendy piece of software <em>du jour</em> or not having the will or time to go looking for alternatives to websites they use daily, such as Facebook.</li>
<li>Men make tech spaces so misogynistic that the few women who dare to explore beyond "normiedom" go, "Wow, you are all pieces of shit; I don't want to deal with this abuse anymore" and then leave or otherwise withdraw themselves from public view. A chilling effect starts to form where a lack of women in tech makes it harder for other women to gain legitimacy in the space.</li>
<li>Because becoming more technologically literate comes with the high cost of exposing oneself to the toxic misogyny inherent to techbro culture, few women attain knowledge of liberatory technologies and potentially start to associate things like "open source" with "I'm going to get a bunch of sexual slurs thrown at me just for existing". The chilling effect builds.</li>
<li>Men liberate themselves while watching women attempting to avoid misogyny inadvertently contribute to their own oppression by remaining ignorant of the technologies becoming more and more critical to the operation of their daily lives.</li>
</ol>
<p>If that's too verbose for you, read this draft of the above I scrawled down in the park one day:</p>
<p><img src="../../../img/TechbroCycle.png" class="big" /></p>
<p>To counteract this, I've taken it upon myself to singlehandedly populate the <code>o/STEM</code> board of Ovarit with basic tech tutorials and what I feel are the actually good submissions on Hacker News. ("Good" excluding upwards of 99% of the content there, as Hacker News is basically "the tech startup advertising spam website", but that's a complaint for another day.) I don't feel it's productive to yell at random strangers, "What do you mean, you're not running FreeBSD with full-disk encryption and only FOSS software? <em>Clearly</em> you're using your computer wrong!" like how imageboard users like to sling shit at each other over ideological purity in their computing. I don't think the women of Ovarit are stupid. We just have different priorities and interests and hobbies. I chose tech. They chose something else. As the British like to say, "simple as."</p>
<p>So, keeping in mind that not everybody has the same level of technological knowledge of me (an autistic person having a <a href="https://web.archive.org/web/20221006030338/https://dana.org/article/developing-a-theory-of-mind/">working theory of mind</a>? <em>SHOCKING!!</em>) I set the following constraints when assessing what this "female-only internet" I thought about <a href="../august/separatism-redux.html">a few posts ago</a> would look like:</p>
<ol>
<li>The software <em>must</em> already exist, because although I can write a mean Bash script and my knowledge of Python is passable, I don't trust myself to write anything that could potentially be the difference between life and death for someone.</li>
<li>The software <em>must</em> be available for Windows, and Android if possible, because it's not fair of me to expect the theoretical users of this network to learn how to use Linux or ditch their phones to be stuck at a computer for all communications or learn how to compile a program from source.</li>
<li>The software <em>must not</em> be more complicated than "run installer and maybe edit a config file and then follow simple directions". While I have an <a href="https://archive.ph/PqTGG" title="Associate of Applied Science, often derogatively referred to as 'a two-year degree'">AAS</a> in Network Systems Administration (yes, I graduated!) and can tolerate software that's a little messy, too much mess and the theoretical users will give up and go back to the clearnet. <strong>So something like <a href="https://web.archive.org/web/20221006030835/http://deavmi.assigned.network/blog/crxn/">CRXN</a> is out.</strong> Also, to a technologically illiterate person, asking them to manually configure network interfaces and set up system daemons (programs that run in the background) looks a little shady, like I'm a scammer priming them to get infected with malware and become part of my botnet.</li>
<li>The software <em>must</em> be peer-to-peer to avoid, if not completely eliminate, reliance on male-run or otherwise hostile infrastructure. I don't want to spend my life building something that collapses in a single day because I fell victim to the <a href="https://web.archive.org/web/20221004011626/https://en.wikipedia.org/wiki/Bus_factor">bus factor</a>. I also want to sidestep the issue of convincing a bunch of what are essentially strangers to put their entire operations at the mercy of one person (me) who is also to them effectively a stranger. If I die or "turn coats" (never willingly, although an adversary threatening enough could always coerce an admin of <em>anything</em> into revealing info) the network should be able to just collectively cease peering with me, cutting me out of the network, and continue on as usual. <strong>So Tor is out.</strong></li>
<li>The software <em>must</em> allow each individual user to choose who they peer with in case of schisms in the group. If peering is handled automatically from an external source, the theoretical user risks being connected to a peer outside of the female-only network without their knowledge and accidentally allowing hostile entities to access resources within. <strong>So I2P, Lokinet, and ZeroNet are out.</strong></li>
<li>The software <em>must not</em> store data on the user's disk that the user did not explicitly ask for. <strong>So Freenet is out</strong> because it both requires massive amounts of disk space (upwards of twenty gigabytes for decent operation) and bandwidth and also because of a problem normies affectionately misreport as "Freenet stores CSAM on your device". Freenet does <em>not</em> store CSAM on your device; it caches <em>encrypted</em> pieces of data that your peers request from elsewhere as they flow through the network, thus allowing frequently-requested content to live longer and be faster to access. <a href="https://web.archive.org/web/20221006034113/https://news.ycombinator.com/item?id=19496825">If you run your Freenet node in "opennet" mode, and your network connection is decent, you're going to connect to random strangers.</a> Some of those may be pedos. Some of those may be law enforcement. Because all data on Freenet is stored and transmitted encrypted, and the only way to decrypt it is to explicitly request it via its URI (whether that be a CHK or an SSK or something else) and then gather enough blocks of it from peers to decrypt it, unless you <em>explicitly</em> tell Freenet to retrieve something nasty and store it unencrypted outside your Freenet datastore, it's essentially just garbage data.</li>
</ol>
<p>At this point, our winner is <a href="https://web.archive.org/web/20221004132132/https://yggdrasil-network.github.io/">Yggdrasil</a>, a peer-to-peer overlay network and the spiritual successor to <code>cjdns</code>. The developers describe the project as follows:</p>
<blockquote>Yggdrasil is an overlay network implementation of a new routing scheme for mesh networks. It is designed to be a future-proof decentralised alternative to the structured routing protocols commonly used today on the Internet and other networks.</blockquote>
<p>It <a href="https://web.archive.org/web/20221006035646/https://yggdrasil-network.github.io/installation.html">supports Android and iOS</a>, so our mobile friends aren't left out; the Windows installation <a href="https://web.archive.org/web/20221006035819/https://yggdrasil-network.github.io/installation-windows.html">isn't nightmare levels of difficulty</a>, and by default without manual configuration it only connects to other devices within the same local-area network. Tor has its absurdly long <code>.onion</code> addresses and requires you to configure your programs to use it as a proxy, but Yggdrasil operates via a virtual network adapter and so its addresses present themselves to programs like any other IPv6 address. (To be technical for a moment, Yggdrasil addresses come from the <code>0200::/7</code> IPv6 range, which has been <a href="https://web.archive.org/web/20220911142100/https://www.iana.org/assignments/ipv6-address-space/ipv6-address-space.xhtml">deprecated since 2004</a> and doesn't route to anything on the clearnet. So you don't have to worry about routing conflicts.)</p>
<p>I'll take pieces from my own Yggdrasil configuration files to illustrate the following points.</p>
<p>As just mentioned, Yggdrasil only connects to peers explicitly defined in its configuration file. So, after a fresh install, the peers section looks like this:</p>
<p><code>Peers: []</code></p>
<p>To add peers outside your network, you'd make your peer section look something like this:</p>
<pre>
Peers:
[
tls://01.scv.usa.ygg.yt:443
tls://lax.yuetau.net:6643
tls://tasty.chowder.land:9001
tls://supergay.network:9001
tls://lancis.iscute.moe:49274
tls://mayvaneday.org:1414
]
</pre>
<p>All these peers are taken from the <a href="https://web.archive.org/web/20221006040725/https://github.com/yggdrasil-network/public-peers/blob/master/north-america/united-states.md">public peer list</a> that the Yggdrasil developers maintain. <strong>We won't use these in our theoretical female-only network.</strong> The peers listed above are only for the global Yggdrasil testnet currently in operation. In our theoretical network, we would only add peers of other members of the network.</p>
<p>Because my server has a public IP address (both v4 and v6), to allow others to peer to me I have the <code>Listen</code> section set to the following:</p>
<pre>
Listen:
[
"tls://[::]:1414"
]
</pre>
<p>"But most of us are behind NAT!" ...Yggdrasil doesn't care. You can have a publically-routable IP; you can be behind one NAT, you can be behind seventeen NATs. If your IP isn't publically routable, or you're otherwise paranoid about maybe <em>possibly</em> having your IP in someone's logs, you can <a href="https://web.archive.org/web/20221006040325/https://github.com/yggdrasil-network/public-peers/blob/master/other/i2p.md">peer with others over I2P</a> or Tor, assuming you have I2P or Tor already installed and properly configured on your device.</p>
<p>By default, Yggdrasil nodes that have <code>Listen</code> configured will allow anyone to connect to them. In our scenario, we only want peers we know and trust to connect to us, so we find the section that says <code>AllowedPublicKeys</code> and make it look like the following:</p>
<pre>
AllowedPublicKeys:
[
9bddf88af964729f2c9ef56b8b6f74d510fc2ede7261f52a293d90916b29f256
d2960e6b547c9c6fe62127e93c8963b0844af3c07178185692c56fefc5259dc9
]
</pre>
<p>For a mutual connection, both parties give each other their public keys. They repeat this for every person they want to connect to. (As long as you keep your config file backed up somewhere safe, you don't have to worry about your keys suddenly changing and losing all your peerings.) Yggdrasil will automatically send traffic between nodes through the most efficient route possible. If two nodes want to communicate but aren't directly connected for some reason, Yggdrasil will send the traffic through whatever nodes are intermediary on the shortest path known. All traffic between nodes is encrypted, even if using an otherwise-plaintext protocol like plain HTTP, so there is no need to worry about a man-in-the-middle attack so long as you make sure you <strong>DON'T SHARE YOUR PRIVATE KEYS WITH ANYONE</strong>.</p>
<p>With the configuration file edited in the ways described above, the network would only consist of those peers that had opted in. (Verification that prospective users fit the purposes of the network would be up to someone else, as I don't think I'd be fit to be doing lots of voice or video calls with strangers.)</p>
<p>Yggdrasil by itself is just a overlay network. Even though the routing is peer-to-peer, actual services still follow the client-server model. <a href="https://web.archive.org/web/20221006042505/https://yggdrasil-network.github.io/services.html">The global Yggdrasil testnet has many services operating on it already</a>, including websites, IRC chatrooms, wikis, and even BitTorrent trackers. In our theoretical female-only network, the admins would run some of these themselves on their own servers as entry points, and users would be free to run whatever else they wanted on their own nodes, made available to the rest of this theoretical network. (There can be issues when trying to host multiple websites on port 80 from the same Yggdrasil-generated IPv6 address, but that's beyond the scope of this post.) I mean, I sure <em>hope</em> they would run things... I'd be pretty bored if my website was the only one I could visit on there. The HTML doesn't even have to be pretty. Users who don't have computers / devices they can leave running 24/7 can hop on a <a href="https://web.archive.org/web/20221006044011/https://docs.joinplu.me/installation/with/prebuilt/">hosted blogging service run by another user</a> (likely an admin, although anyone in the network is free to run whatever) and publish their writings there.</p>
<p>Imagine what the users will feel free to share amongst themselves without the stress of the surveillance endemic to the clearnet...</p>
<p>What bounties will spring from this new Second Realm?</p>
</div>
<hr>
<div class="box">
<p align=right>CC BY-NC-SA 4.0 &copy; Vane Vander</p>
</div>
</article>
</body>
</html>

@ -62,7 +62,7 @@ if ((pet === true) || (ws === true) || (search === true)) {
</pre>
<p>The damn thing is far longer than this, and you can <a href="../../../checktor.js">look at it if you want</a>. What the script does is check the current URL of the page it is running on. If it detects that it contains any of the listed strings, it forcibly redirects the user to a different site. The only way to disable this is by turning off JavaScript in the browser... but considering the average clientele of Tor2web proxies, with that level of effort required you might as well just boot up Tor Browser proper.</p>
<p>While I have no intention of taking down my website, <a href="https://web.archive.org/web/20220904130735/https://blog.cloudflare.com/kiwifarms-blocked/">wasp nest of Kiwi Farms struck with a bat or not</a>, sometimes I wonder what I would do if I ever had to. How does the signal keep going but stay under the radar?</p>
<p>Gemini is one option. In the three years or so since Project Gemini's conception, a quick search shows that seemingly only <a href="https://archive.ph/https://proxy.vulpes.one/gemini/senkals.one/~autunido/homogeneco.gmi">one person</a> has ever made acknowledgement of my <a href="gemini://mayvaneday.org">gemsite</a> beyond a simple "here's a mirror of the all known servers list on the Project Gemini homepage". Which is hilarious, because one would think the average Gemini user would be falling over themselves to make silly little replies crying over how <a href="../january/sappho.html">I think gender is harmful</a>! Every day brings pleasant surprises, I guess. Blocking unwanted visitors on Gemini is nigh-impossible, though, since there <em>isn't</em> an equivalent of the <code>Referer</code> header. (At least, last I checked. I sincerely doubt Solderpunk would have allowed that in the spec.) While HTTP-to-Gemini proxies exist, the clearnet ones can be killed by using <code>iptables</code> to black-hole any requests coming from the proxy's IP, and I have yet to see a proxy that can handle darknet gemsites.</p>
<p>Gemini is one option. In the three years or so since Project Gemini's conception, a quick search shows that seemingly only <a href="https://archive.ph/https://proxy.vulpes.one/gemini/senkals.one/~autunido/homogeneco.gmi">one person</a> has ever made acknowledgement of my <a href="gemini://mayvaneday.org">gemsite</a> beyond a simple "here's a mirror of the all known servers list on the Project Gemini homepage". Which is hilarious, because one would think the average Gemini user would be falling over themselves to make silly little replies crying over how <a href="../january/sappho.html">I think gender is harmful</a>! Every day brings pleasant surprises, I guess. Blocking unwanted visitors on Gemini is nigh-impossible, though, since there <em>isn't</em> an equivalent of the <code>Referer</code> header. (At least, last I checked. I sincerely doubt Solderpunk would have allowed that in the spec.) While Gemini-to-HTTP proxies exist, the clearnet ones can be killed by using <code>iptables</code> to black-hole any requests coming from the proxy's IP, and I have yet to see a proxy that can handle darknet gemsites.</p>
<p>Gopher <em>would</em> be an option, but <code>pygopherd</code> is no longer in the Debian repositories since the purge of Python 2.x, and I have yet to find another server that both supports darknets and doesn't immediately crash on my server. And Freenet and IPFS, while usable, have piss-poor content discovery, if at all... and "never able to be found unless you already know where it is" isn't an acceptable outcome in my eyes. I may as well cease to exist, a living death.</p>
<p>I <em>want</em> to be found. <strong>I want some woman, somewhere, to know that she is not alone in her struggles.</strong> And as I have engineered Sablade to have an impenetrable cosmic skin no deity can pierce and will spend the rest of my soul's existence <a href="https://archive.ph/35OOF">defending it</a> <!-- https://nitter.letsdecentralize.org/gamutto10/status/1519291896790720512 --> once I am there fully, I am willing to take on the burden of beating back the bad actors to ensure this woman, these women, continue to have a place where no man can harm them. If this is "looking for a safe space", then so be it - but ask yourself why you, the hypothetical person who thinks I am too "sensitive" for this world, are so repulsive that you can only thrive in filth and misery.</p>
</div>

Binary file not shown.

After

Width:  |  Height:  |  Size: 278 KiB

@ -44,20 +44,13 @@
<div class="box">
<h3>Announcement Box</h3>
<ul>
<li>2022-10-03: It's been four years since the first Rebirth Day, Ghost. I lived. You failed to kill me.</li>
<li>2022-09-23: Hey! Have a Github account? Want some free clout? Make a pull request on <a href="https://github.com/jdm-contrib/jdm/blob/master/_data/sites.json">this file</a> with the contents of <a href="https://letsdecentralize.org/JustDeleteMeDrafts.json">this other file</a>. I'll put more stuff in there as time progresses.</li>
<li>2022-09-13: Do you think maybe Nintendo paid Zippo to lie? Or was it the Kallisti Society Terrorists? Damn, maybe I should have skipped the Direct like last time and maybe something good would have happened. Would be just my luck.</li>
<li>2022-09-10: Got stung by a bee for the first time in my life today... success?</li>
</ul>
</div>
<hr>
<div class="box">
<h3>The "Kiwi Farms Is Dying" Resource List</h3>
<ul>
<li>You can still access KF on the clearnet through <a href="https://uquusqsaaad66cvub4473csdu4uu7ahxou3zqc35fpw5d4ificedzyqd.onion.ly/threads/matthew-prince-lied.128900/page-83#post-12912555">onion.ly</a>. <strong>Don't use this to log in because you're being MITMed.</strong></li>
<li>I have started an <a href="https://archivebox.letsdecentralize.org">archive of Ovarit posts</a> in case that site gets targeted next.</li>
<li>Don't forget you can run your own <a href="https://letsdecentralize.org/setup.html#tor">Tor hidden service</a> to host content without censorship, no forum admin required.</li>
</ul>
</div>
<hr>
<div class="box">
<p class="center">
<a href="./blog/index.html">[Blog]</a>

@ -5,3 +5,31 @@
=> https://wiby.me Wiby
=> https://millionshort.com Million Short
=> https://search.marginalia.nu Marginalia
=> https://www.seekport.com Seekport
=> https://teclis.com Teclis
## Obscure site discovery
=> https://theforest.link The Forest
## AI image generation
=> https://huggingface.co/spaces/stabilityai/stable-diffusion Stable Diffusion Demo
=> https://stabilityai.us.auth0.com/u/login?state=hKFo2SBqWXBRQ25mblJrSGFuZzNIM1l2VGJxNk1SeERKUEdMWqFur3VuaXZlcnNhbC1sb2dpbqN0aWTZIHJvN2huZFA1QWJDOUhfMmNaTHJoQmtNT2xvWUw1bVlyo2NpZNkgS3ZZWkpLU2htVW9PalhwY2xRbEtZVXh1Y0FWZXNsSE4 StabilityAI
=> https://www.drawanything.app Draw Anything
## IP anon check
=> https://www.whatismyip.com What Is My IP?
=> https://myip.wtf WTF is my IP?!?!?!??
=> https://check.torproject.org Am I using Tor?
## Piracy
=> https://fitgirl-repacks.site FitGirl Repacks
=> https://piratebayproxy.info List of Pirate Bay proxies
=> https://gog-games.com GOG Games
=> https://hshop.erista.me hShop for 3DS
=> https://archive.org/details/psxgames Console Living Room: Playstation
=> https://nxbrew.com NXBrew
=> https://nsw2u.in nsw2u

Loading…
Cancel
Save