I saw a few VPN extensions on Mozilla’s addon store but they require full access and is closed source . Foxy proxy seems open source and doesn’t seem to be collecting any data for themselves and I’m hopping that combined with https sites only give the proxies which sites im visiting even if they wanted to sell me out CORRECT ME IF I’M WRONG THO . and i don’t trust my isp much so it doesn’t matter to me if they are selling that only but those vpn extensions will have acess to everything on every site . so yea feel free to correct me on anything and reccomend any .

edit : I don’t want recommendations for vpn or any other way like changing dns etc . I just want to change the location on only firefox for android to get past some censorship and geo blocking . if you have any other way to achieve that or better extension than froxy proxy feel free to recommend .

edit : is there anyway to configure proxies on android firefox without using an extension ? i have access to about:config as i use fennec from fdroid .

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      edit-2
      10 days ago

      I stand by what I said. If you examine who supports those organizations, they are getting a benefit.

      The US Navy supports tor more than anybody else. Not to mention all of the government-run exit notes. Now you’re the product here, is the product watching your data? Or is the product providing noise for their clandestine operations? Tor is a great thing, 100%, but it is being supported by people who get a benefit from it.

      I’m sure you can find a counter example, but the point is it’s about incentives. If the incentives aren’t aligned you can’t trust it. Not for mission critical objectives

      • Em Adespoton@lemmy.ca
        link
        fedilink
        arrow-up
        3
        ·
        10 days ago

        Tor is indeed about providing cover. US Military and US and German covert operations use it, and hide in the noise. But in those situations, it’s a win/win, as they provide funding and everyone gets to have a somewhat secure channel.

        I’d argue though that in any case where you don’t control the exit node, you have no expectation of real privacy. So it becomes a question of how much you’re willing to trade.

      • bad_news@lemmy.billiam.net
        link
        fedilink
        arrow-up
        2
        ·
        10 days ago

        Arguably, Germany having the ability if they really wanted to, to timing attack you to deanonymize (at great cost) and potentially burning a mal-state * https cert to read contents, is a VASTLY different risk profile to a proprietary VPN actively hoovering in everything it can to put in ad profiles (which are also used by state actors)

      • cleverusername24@lemm.eeOP
        link
        fedilink
        English
        arrow-up
        2
        ·
        10 days ago

        what about the riseup and proton example he mentioned ? services like bitwarden etc are free but i don’t see the users getting exploited in any way .

        • merde alors@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          edit-2
          10 days ago

          riseUp is slow. free vpn of Proton, depending on traffic and your exit, is a lot faster. Proton proved themselves to be trustable.

          you can always upgrade to their paid service to have more options and servers, if you like. You can download your configurations to use your choice of addOn, app, software

          mullVpn also is considerable, if you’re going to pay (i don’t use it but I’ve heard/read only + views

          i use tor and orbot regularly. There, sadly, are too many sites that block them by default :/

    • RyeMan@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      10 days ago

      Word of caution, If you are actually staying within the Onion network then sure Tor is a great option… The problem is most users just use the exit nodes to reach the clear web. This is a convenient feature of Tor but it’s also the least secure use case. There are a very limited numbers of exit nodes so they are often overused and the majority of them are maintained by government controlled entities since it takes a certain level of legal protection to operate an exit node.