diff --git a/.gitignore b/.gitignore old mode 100644 new mode 100755 diff --git a/blog/2022/october/yggdrasil.html b/blog/2022/october/yggdrasil.html new file mode 100755 index 0000000..e3f6d3f --- /dev/null +++ b/blog/2022/october/yggdrasil.html @@ -0,0 +1,85 @@ + + + + + Theoretical design for a female-only internet - Archive - MayVaneDay Studios + + + + + +
+
+

Theoretical design for a female-only internet

+

published: 2022-08-06

+
+
+
+

The instructions and ideas contained in this post could technically be used by any group that seeks to fly under the radar of the mainstream "clearnet". I write "female-only" because I started thinking about this after receiving many DMs from women on Ovarit asking if I could potentially in the future provide technical support for their own personal liberation projects. In case any of those women are reading this right now: I'm sorry I'm so busy! I'm trying to get back into my state's Vocational Rehabilitation Services program and also looking into if I'm eligible for Section 8 rent assistance so I can finally move out of the hellhole I call my parents' house. Plus, you know, living under a (borderline-)abusive household is rather draining on the psyche, and the lack of control over my own life makes me accidentally lash out at others in unproductive-at-best ways. I hope soon I'll get into a living situation that doesn't send me into an "I want to die" spiral every other night so I know what it's like to live without a constant fight-or-flight reflex tight in my chest.

+

A common theme in imageboards and other alt-tech spaces is a feeling that ranges from resentment (at best) to vitriol (at worst) at women as a class for not being as technologically literate as their male counterparts. Never mind that the damn field of study was invented by women in the first place. I like to call the resulting spiral "the techbro cycle of exclusion", which goes as follows:

+
    +
  1. Men mock women for not knowing about the trendy piece of software du jour or not having the will or time to go looking for alternatives to websites they use daily, such as Facebook.
  2. +
  3. Men make tech spaces so misogynistic that the few women who dare to explore beyond "normiedom" go, "Wow, you are all pieces of shit; I don't want to deal with this abuse anymore" and then leave or otherwise withdraw themselves from public view. A chilling effect starts to form where a lack of women in tech makes it harder for other women to gain legitimacy in the space.
  4. +
  5. Because becoming more technologically literate comes with the high cost of exposing oneself to the toxic misogyny inherent to techbro culture, few women attain knowledge of liberatory technologies and potentially start to associate things like "open source" with "I'm going to get a bunch of sexual slurs thrown at me just for existing". The chilling effect builds.
  6. +
  7. Men liberate themselves while watching women attempting to avoid misogyny inadvertently contribute to their own oppression by remaining ignorant of the technologies becoming more and more critical to the operation of their daily lives.
  8. +
+

If that's too verbose for you, read this draft of the above I scrawled down in the park one day:

+

+

To counteract this, I've taken it upon myself to singlehandedly populate the o/STEM board of Ovarit with basic tech tutorials and what I feel are the actually good submissions on Hacker News. ("Good" excluding upwards of 99% of the content there, as Hacker News is basically "the tech startup advertising spam website", but that's a complaint for another day.) I don't feel it's productive to yell at random strangers, "What do you mean, you're not running FreeBSD with full-disk encryption and only FOSS software? Clearly you're using your computer wrong!" like how imageboard users like to sling shit at each other over ideological purity in their computing. I don't think the women of Ovarit are stupid. We just have different priorities and interests and hobbies. I chose tech. They chose something else. As the British like to say, "simple as."

+

So, keeping in mind that not everybody has the same level of technological knowledge of me (an autistic person having a working theory of mind? SHOCKING!!) I set the following constraints when assessing what this "female-only internet" I thought about a few posts ago would look like:

+
    +
  1. The software must already exist, because although I can write a mean Bash script and my knowledge of Python is passable, I don't trust myself to write anything that could potentially be the difference between life and death for someone.
  2. +
  3. The software must be available for Windows, and Android if possible, because it's not fair of me to expect the theoretical users of this network to learn how to use Linux or ditch their phones to be stuck at a computer for all communications or learn how to compile a program from source.
  4. +
  5. The software must not be more complicated than "run installer and maybe edit a config file and then follow simple directions". While I have an AAS in Network Systems Administration (yes, I graduated!) and can tolerate software that's a little messy, too much mess and the theoretical users will give up and go back to the clearnet. So something like CRXN is out. Also, to a technologically illiterate person, asking them to manually configure network interfaces and set up system daemons (programs that run in the background) looks a little shady, like I'm a scammer priming them to get infected with malware and become part of my botnet.
  6. +
  7. The software must be peer-to-peer to avoid, if not completely eliminate, reliance on male-run or otherwise hostile infrastructure. I don't want to spend my life building something that collapses in a single day because I fell victim to the bus factor. I also want to sidestep the issue of convincing a bunch of what are essentially strangers to put their entire operations at the mercy of one person (me) who is also to them effectively a stranger. If I die or "turn coats" (never willingly, although an adversary threatening enough could always coerce an admin of anything into revealing info) the network should be able to just collectively cease peering with me, cutting me out of the network, and continue on as usual. So Tor is out.
  8. +
  9. The software must allow each individual user to choose who they peer with in case of schisms in the group. If peering is handled automatically from an external source, the theoretical user risks being connected to a peer outside of the female-only network without their knowledge and accidentally allowing hostile entities to access resources within. So I2P, Lokinet, and ZeroNet are out.
  10. +
  11. The software must not store data on the user's disk that the user did not explicitly ask for. So Freenet is out because it both requires massive amounts of disk space (upwards of twenty gigabytes for decent operation) and bandwidth and also because of a problem normies affectionately misreport as "Freenet stores CSAM on your device". Freenet does not store CSAM on your device; it caches encrypted pieces of data that your peers request from elsewhere as they flow through the network, thus allowing frequently-requested content to live longer and be faster to access. If you run your Freenet node in "opennet" mode, and your network connection is decent, you're going to connect to random strangers. Some of those may be pedos. Some of those may be law enforcement. Because all data on Freenet is stored and transmitted encrypted, and the only way to decrypt it is to explicitly request it via its URI (whether that be a CHK or an SSK or something else) and then gather enough blocks of it from peers to decrypt it, unless you explicitly tell Freenet to retrieve something nasty and store it unencrypted outside your Freenet datastore, it's essentially just garbage data.
  12. +
+

At this point, our winner is Yggdrasil, a peer-to-peer overlay network and the spiritual successor to cjdns. The developers describe the project as follows:

+
Yggdrasil is an overlay network implementation of a new routing scheme for mesh networks. It is designed to be a future-proof decentralised alternative to the structured routing protocols commonly used today on the Internet and other networks.
+

It supports Android and iOS, so our mobile friends aren't left out; the Windows installation isn't nightmare levels of difficulty, and by default without manual configuration it only connects to other devices within the same local-area network. Tor has its absurdly long .onion addresses and requires you to configure your programs to use it as a proxy, but Yggdrasil operates via a virtual network adapter and so its addresses present themselves to programs like any other IPv6 address. (To be technical for a moment, Yggdrasil addresses come from the 0200::/7 IPv6 range, which has been deprecated since 2004 and doesn't route to anything on the clearnet. So you don't have to worry about routing conflicts.)

+

I'll take pieces from my own Yggdrasil configuration files to illustrate the following points.

+

As just mentioned, Yggdrasil only connects to peers explicitly defined in its configuration file. So, after a fresh install, the peers section looks like this:

+

Peers: []

+

To add peers outside your network, you'd make your peer section look something like this:

+
+Peers:
+	[
+	tls://01.scv.usa.ygg.yt:443
+	tls://lax.yuetau.net:6643
+	tls://tasty.chowder.land:9001
+	tls://supergay.network:9001
+	tls://lancis.iscute.moe:49274
+	tls://mayvaneday.org:1414
+]
+				
+

All these peers are taken from the public peer list that the Yggdrasil developers maintain. We won't use these in our theoretical female-only network. The peers listed above are only for the global Yggdrasil testnet currently in operation. In our theoretical network, we would only add peers of other members of the network.

+

Because my server has a public IP address (both v4 and v6), to allow others to peer to me I have the Listen section set to the following:

+
+Listen:
+[
+	"tls://[::]:1414"
+]
+				
+

"But most of us are behind NAT!" ...Yggdrasil doesn't care. You can have a publically-routable IP; you can be behind one NAT, you can be behind seventeen NATs. If your IP isn't publically routable, or you're otherwise paranoid about maybe possibly having your IP in someone's logs, you can peer with others over I2P or Tor, assuming you have I2P or Tor already installed and properly configured on your device.

+

By default, Yggdrasil nodes that have Listen configured will allow anyone to connect to them. In our scenario, we only want peers we know and trust to connect to us, so we find the section that says AllowedPublicKeys and make it look like the following:

+
+AllowedPublicKeys:
+[
+	9bddf88af964729f2c9ef56b8b6f74d510fc2ede7261f52a293d90916b29f256
+	d2960e6b547c9c6fe62127e93c8963b0844af3c07178185692c56fefc5259dc9
+]
+				
+

For a mutual connection, both parties give each other their public keys. They repeat this for every person they want to connect to. (As long as you keep your config file backed up somewhere safe, you don't have to worry about your keys suddenly changing and losing all your peerings.) Yggdrasil will automatically send traffic between nodes through the most efficient route possible. If two nodes want to communicate but aren't directly connected for some reason, Yggdrasil will send the traffic through whatever nodes are intermediary on the shortest path known. All traffic between nodes is encrypted, even if using an otherwise-plaintext protocol like plain HTTP, so there is no need to worry about a man-in-the-middle attack so long as you make sure you DON'T SHARE YOUR PRIVATE KEYS WITH ANYONE.

+

With the configuration file edited in the ways described above, the network would only consist of those peers that had opted in. (Verification that prospective users fit the purposes of the network would be up to someone else, as I don't think I'd be fit to be doing lots of voice or video calls with strangers.)

+

Yggdrasil by itself is just a overlay network. Even though the routing is peer-to-peer, actual services still follow the client-server model. The global Yggdrasil testnet has many services operating on it already, including websites, IRC chatrooms, wikis, and even BitTorrent trackers. In our theoretical female-only network, the admins would run some of these themselves on their own servers as entry points, and users would be free to run whatever else they wanted on their own nodes, made available to the rest of this theoretical network. (There can be issues when trying to host multiple websites on port 80 from the same Yggdrasil-generated IPv6 address, but that's beyond the scope of this post.) I mean, I sure hope they would run things... I'd be pretty bored if my website was the only one I could visit on there. The HTML doesn't even have to be pretty. Users who don't have computers / devices they can leave running 24/7 can hop on a hosted blogging service run by another user (likely an admin, although anyone in the network is free to run whatever) and publish their writings there.

+

Imagine what the users will feel free to share amongst themselves without the stress of the surveillance endemic to the clearnet...

+

What bounties will spring from this new Second Realm?

+
+
+
+

CC BY-NC-SA 4.0 © Vane Vander

+
+
+ + diff --git a/blog/2022/september/browsers.html b/blog/2022/september/browsers.html old mode 100644 new mode 100755 diff --git a/blog/2022/september/gamutto.html b/blog/2022/september/gamutto.html index 90ce765..49eb51f 100755 --- a/blog/2022/september/gamutto.html +++ b/blog/2022/september/gamutto.html @@ -62,7 +62,7 @@ if ((pet === true) || (ws === true) || (search === true)) {

The damn thing is far longer than this, and you can look at it if you want. What the script does is check the current URL of the page it is running on. If it detects that it contains any of the listed strings, it forcibly redirects the user to a different site. The only way to disable this is by turning off JavaScript in the browser... but considering the average clientele of Tor2web proxies, with that level of effort required you might as well just boot up Tor Browser proper.

While I have no intention of taking down my website, wasp nest of Kiwi Farms struck with a bat or not, sometimes I wonder what I would do if I ever had to. How does the signal keep going but stay under the radar?

-

Gemini is one option. In the three years or so since Project Gemini's conception, a quick search shows that seemingly only one person has ever made acknowledgement of my gemsite beyond a simple "here's a mirror of the all known servers list on the Project Gemini homepage". Which is hilarious, because one would think the average Gemini user would be falling over themselves to make silly little replies crying over how I think gender is harmful! Every day brings pleasant surprises, I guess. Blocking unwanted visitors on Gemini is nigh-impossible, though, since there isn't an equivalent of the Referer header. (At least, last I checked. I sincerely doubt Solderpunk would have allowed that in the spec.) While HTTP-to-Gemini proxies exist, the clearnet ones can be killed by using iptables to black-hole any requests coming from the proxy's IP, and I have yet to see a proxy that can handle darknet gemsites.

+

Gemini is one option. In the three years or so since Project Gemini's conception, a quick search shows that seemingly only one person has ever made acknowledgement of my gemsite beyond a simple "here's a mirror of the all known servers list on the Project Gemini homepage". Which is hilarious, because one would think the average Gemini user would be falling over themselves to make silly little replies crying over how I think gender is harmful! Every day brings pleasant surprises, I guess. Blocking unwanted visitors on Gemini is nigh-impossible, though, since there isn't an equivalent of the Referer header. (At least, last I checked. I sincerely doubt Solderpunk would have allowed that in the spec.) While Gemini-to-HTTP proxies exist, the clearnet ones can be killed by using iptables to black-hole any requests coming from the proxy's IP, and I have yet to see a proxy that can handle darknet gemsites.

Gopher would be an option, but pygopherd is no longer in the Debian repositories since the purge of Python 2.x, and I have yet to find another server that both supports darknets and doesn't immediately crash on my server. And Freenet and IPFS, while usable, have piss-poor content discovery, if at all... and "never able to be found unless you already know where it is" isn't an acceptable outcome in my eyes. I may as well cease to exist, a living death.

I want to be found. I want some woman, somewhere, to know that she is not alone in her struggles. And as I have engineered Sablade to have an impenetrable cosmic skin no deity can pierce and will spend the rest of my soul's existence defending it once I am there fully, I am willing to take on the burden of beating back the bad actors to ensure this woman, these women, continue to have a place where no man can harm them. If this is "looking for a safe space", then so be it - but ask yourself why you, the hypothetical person who thinks I am too "sensitive" for this world, are so repulsive that you can only thrive in filth and misery.

diff --git a/img/TechbroCycle.png b/img/TechbroCycle.png new file mode 100755 index 0000000..0844c89 Binary files /dev/null and b/img/TechbroCycle.png differ diff --git a/index.html b/index.html index 79aae8a..82f689e 100755 --- a/index.html +++ b/index.html @@ -44,20 +44,13 @@

Announcement Box


-
-

The "Kiwi Farms Is Dying" Resource List

- -
-

[Blog] diff --git a/list.gmi b/list.gmi index 6611bca..d061b33 100755 --- a/list.gmi +++ b/list.gmi @@ -5,3 +5,31 @@ => https://wiby.me Wiby => https://millionshort.com Million Short => https://search.marginalia.nu Marginalia +=> https://www.seekport.com Seekport +=> https://teclis.com Teclis + +## Obscure site discovery + +=> https://theforest.link The Forest + +## AI image generation + +=> https://huggingface.co/spaces/stabilityai/stable-diffusion Stable Diffusion Demo +=> https://stabilityai.us.auth0.com/u/login?state=hKFo2SBqWXBRQ25mblJrSGFuZzNIM1l2VGJxNk1SeERKUEdMWqFur3VuaXZlcnNhbC1sb2dpbqN0aWTZIHJvN2huZFA1QWJDOUhfMmNaTHJoQmtNT2xvWUw1bVlyo2NpZNkgS3ZZWkpLU2htVW9PalhwY2xRbEtZVXh1Y0FWZXNsSE4 StabilityAI +=> https://www.drawanything.app Draw Anything + +## IP anon check + +=> https://www.whatismyip.com What Is My IP? +=> https://myip.wtf WTF is my IP?!?!?!?? +=> https://check.torproject.org Am I using Tor? + +## Piracy + +=> https://fitgirl-repacks.site FitGirl Repacks +=> https://piratebayproxy.info List of Pirate Bay proxies +=> https://gog-games.com GOG Games +=> https://hshop.erista.me hShop for 3DS +=> https://archive.org/details/psxgames Console Living Room: Playstation +=> https://nxbrew.com NXBrew +=> https://nsw2u.in nsw2u