interview.txt 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345
  1. -----BEGIN PGP SIGNED MESSAGE-----
  2. Hash: SHA512
  3. VeeChit,
  4. Normally I don't respond to emails that sound like requests for interviews
  5. because they're invariably either an attempt to get me to dox myself or the
  6. person asking the questions doesn't like how blunt and direct I am with my
  7. responses and just calls me a bitch and tells me to kill myself. But today I'm
  8. feeling reckless, so fuck it, I'll take the bait just this once.
  9. > 1. What is the reason for your importance to security and privacy? Is it a
  10. personal interest or a need that must be paid attention to?
  11. I assume by "your importance to security and privacy" you mean to ask why they
  12. are important to *me*, not how *I* am important to *them*. The answer is
  13. straightforward: growing up in a repressive household where writing innocuous
  14. poems online about being gay is worthy of being grounded and socially isolated
  15. from one's support networks and friends for several weeks at a time will turn a
  16. relatively outgoing woman into a paranoid and bitter one. The trauma of not
  17. knowing whether or not sharing my opinions and viewpoints on things will be met
  18. with violence at any given moment is a burden I have carried with me since
  19. adolescence and will likely carry for the rest of my life.
  20. Even though I now live on my own and have far more control over my life than I
  21. did even a year ago, I still have a deep-seated psychological need to protect
  22. myself technologically against random device searches, spyware, and attempts at
  23. stalking through the Internet. I physically cannot bring myself to use any
  24. operating system that doesn't have full-disk encryption either baked into the
  25. operating system (any mainstream Linux distro) or can't be jimmy-rigged to have
  26. FDE (Windows via VeraCrypt), so even though Haiku fascinates me, I can't use it
  27. as anything other than a toy, a curiosity. All of my external USB drives are
  28. encrypted. I store my files in plaintext or free-as-in-freedom file formats
  29. whenever possible to ease the pain of potentially having to jump ship to a
  30. different operating system at a moment's notice. (Since, you know, I might have
  31. to use a different software suite there.) I use terminal programs whenever
  32. possible so I can replicate my Debian setup on every computer I own regardless
  33. of processing power, from my beefy gaming desktop to the ancient 32-bit tower I
  34. inherited from my great-grandmother. If I lose access to one device for some
  35. reason, whether a deliberate confiscation by a "well-meaning" family member or
  36. theft or simply the device dies and doesn't work anymore, I can be up and
  37. running on any other one I own within a few hours.
  38. I am also increasingly paranoid of a potential shutdown or interruption of the
  39. Internet. Living for years in a house with a piss-poor connection that
  40. constantly drops out does that to you, I guess. I keep burned DVDs of the
  41. Debian installer in my personal archives because one DVD will let you set up a
  42. full Debian system with a pretty decent collection of software available for
  43. further installation without needing any Internet at all. As Debian is my Linux
  44. distro of choice, knowing I can bootstrap a new system (or a salvaged one)
  45. without an Internet connection brings me great peace of mind. I also only use
  46. software that can operate entirely without an Internet connection, such as
  47. Hydrus (https://github.com/hydrusnetwork/hydrus). I felt very smug that week in
  48. July when Twitter wouldn't let you see anything without logging in and the
  49. whole Internet was complaining about all the content on the birdsite they
  50. couldn't look at anymore and yet my local collection of funny images was
  51. completely unaffected.
  52. > 2. Considering the number of users of social networks and messengers such as
  53. WhatsApp - Telegram, does it matter if I use Signal or Matrix or PGP email?
  54. WhatsApp isn't used at all where I live. Telegram is only used by nutty
  55. conspiracy theorists. Everyone I know just uses plain SMS. I have more to say,
  56. but I hate repeating myself, so I'll just elaborate more in the next answer.
  57. > 3. Why do people give the least importance to security and privacy? Is it
  58. because of lack of information or not caring about this issue? For example,
  59. most people do not use ad blockers, VPNs, open source software! Or they install
  60. any program on their phones and PCs
  61. You have to understand that most people have more pressing and immediate issues
  62. in their life than the vague-to-them threat of corporate surveillance or vendor
  63. lock-in. If you ask some random person off the street what their top five
  64. concerns are right now, "privacy on the Internet" almost certainly isn't going
  65. to make the list. They're going to say things like "making rent" and "the
  66. rising cost of living" and "going bankrupt from a single medical bill". If
  67. they're the type to glance at the news every so often, they might also say
  68. "climate change" or "nuclear war".
  69. In the disabled community, we have a concept called "spoons". Spoons are like a
  70. measure of mental energy. Usually one gets a limited number of spoons each day
  71. to spend on daily activities like doing one's laundry or feeding oneself or
  72. tidying up the house... You get the point. (Hopefully.) The average person is
  73. using all their spoons on staying alive. If they come home from work exhausted
  74. and only have three spoons, they are going to spend those on making dinner and
  75. showering and maybe some mindless Netflix consumption before collapsing into
  76. bed. They're not going to be learning how to be a sysadmin and setting up a VPS
  77. to self-host things. To them, that is like a second *unpaid* job with little to
  78. no personal benefit. Maybe it would pad their resume out, but if they're not
  79. looking for a tech job, what's the point to them?
  80. Think about the misogynistic stereotype of the "wine mom" who likes to scroll
  81. through Facebook and comment on cringy Minions memes and post unflattering
  82. group photos of her family members taken during holidays. To you and me, she
  83. might be hopelessly caught in the spiderweb of corporate algorithms sucking her
  84. dry for data to feed to advertisers. But to her, she is just socializing with
  85. the people in her life she loves. (Well, whichever ones are on Facebook,
  86. anyway.) In her eyes, she is doing nothing wrong, and people like you and me
  87. are trying to destroy her method of keeping in contact with far-flung family
  88. members and trying to force her to absorb the equivalent of a computer science
  89. degree in order to use a "fedi-what?" whose interfaces aren't nearly as flashy
  90. and whose denizens are nasty and brutish and not as easily shut out as
  91. exclusion from one's Facebook friend list would be.
  92. "Normal" people don't care about privacy and security. They don't care if their
  93. tools are proprietary or spying on them or could go away at a moment's notice
  94. if the company behind them shuts down. They want to play games with their
  95. friends (Windows) and socialize (Discord and every mainstream social media
  96. site) and get help with their homework (Google search). "Normal" people are not
  97. swayed by appeals to ethics or morals when it comes to their technology. The
  98. most that letting them know their iPhone was made with Chinese slave labor will
  99. do is momentarily make them feel bad; they will not stop buying iPhones. If the
  100. privacy community wants to get "normal" people on board, they have to figure
  101. out how to overcome the apathy and make their alternatives more convenient and
  102. less expensive than what the "normal" people are already using.
  103. I wrote a blog post a while back discussing many of these same ideas:
  104. https://mayvaneday.org/blog/2021/september/not-harmful.html
  105. > 4. Do you think having a site and YouTube channel and teaching people can be
  106. useful? Or do people not care?
  107. One of the questions further down in your email implies you want to start a
  108. site (and you haven't already) and you're going around asking people for advice
  109. on how to do that. Listen: you *have* to move beyond caring what other people
  110. think. Trends on the Internet these days are frequently outlived by the common
  111. housefly. If you base your entire online existence on being "useful" to others,
  112. you're going to spend the rest of your life pursuing ghosts with little to no
  113. reward. Chasing the dopamine of online validation is how we ended up with
  114. platforms like TikTok and the lunacy that goes on there. If you're going to put
  115. in the work to make a website, it has to be about something that interests
  116. *you*. The motivation has to come from inside, not outside. You don't know
  117. who's going to look at your site in the future, so you might as well have it
  118. cater to the only guaranteed audience: yourself.
  119. When I'm looking for a tutorial for something online, I always skip the YouTube
  120. section at the top of the search engine results page or just put "-youtube" in
  121. the query. Videos are clunky, bandwidth-intensive, hard to search, and not
  122. easily updated. Don't bother making videos for YouTube unless you're mirroring
  123. them elsewhere, like on a personal PeerTube instance.
  124. > 5. Has the content of your site ever helped someone who thanked you or even
  125. donated?
  126. Literature? Sure, I get plenty of people emailing me out of the blue to praise
  127. my poetry.
  128. Writing about tech? Usually it's people trying to get me to play unpaid tech
  129. support with unparseable grammar or the Lokinet devs harassing me once again
  130. because I said their software sucks. Or it's an email full of misogynistic
  131. slurs for the crime of being a woman on the Internet.
  132. Nobody donates because I have no ways of donating listed on my site. Keeping
  133. everything non-commercial gives me a legal advantage because, if someone tries
  134. to argue copyright infringement or that I've done them some other damage, they
  135. have no evidence that I've seen any monetary profit from the activities in
  136. question. Plus then I don't have to deal with figuring out how to keep myself
  137. pseudonymous from donors while still being able to convert the pretend Internet
  138. money into something I can buy groceries with.
  139. > 6. Why are you not a member of any social media such as Twitter - Instagram -
  140. Mastodon?
  141. Because they all invariably hate women. Every single damn social media site has
  142. a culture where women and their opinions are only welcome if they're peddling
  143. pornography or parroting the party line of the patriarchy. No dissent is
  144. allowed. Even just the simple statement of "I'm a woman" is enough to get waves
  145. of harassment, sexual or otherwise, sent one's way, and the platforms rarely do
  146. anything about it because of the sheer volume of the abuse and "muh freeze
  147. peach". (Have you ever read the book *Haters* by Bailey Poland? You really
  148. should.) Even on a supposedly pro-woman platform like Ovarit, the misogyny
  149. hounds me: I mainly stayed in the circles about technology, and people
  150. frequently accused me of secretly being biologically male because I... knew
  151. more about tech than the average poster. VeeChit, does that sentiment make any
  152. sense to you? "Women are naturally incompetent at technology, so anyone who's a
  153. woman and likes computers is secretly a man"? Because it doesn't make a single
  154. damn shred of sense to me. Especially when coming from a group of
  155. self-proclaimed feminists.
  156. > In your opinion, what is the difference between someone who is not a member
  157. of these networks and someone who uses these social networks?
  158. A person who uses social media is just a person. A person who *doesn't* use
  159. social media is still just a person. If you want me to be like those alt-tech
  160. sites with Pepe frogs or Lain in the header who write thousands of words about
  161. how they're morally superior for not using social media, you're going to leave
  162. this email sorely disappointed.
  163. The effect that a social media network has on you heavily depends on the social
  164. circles you interact with inside that network. There's a world of difference
  165. between the handful of Japanese fan artists that live in my RSS feed reader and
  166. your average "RATIOOOOOO" poster who still consumes "offensive" memes better
  167. left in 2016 and thinks unsolicited references to porn are the pinnacle of
  168. comedy. But both groups are on Twitter. I've had respectful interactions with
  169. people on Instagram the brief period I was on there, and I've had hate
  170. campaigns against me on the fediverse. Sure, Twitter has an algorithm that
  171. optimizes for making its users spend as much time as possible in the app, and
  172. most fediverse servers don't. But clowns will be clowns no matter what circus
  173. they're in.
  174. In the same vein, I've met antisocial creeps who don't use social media but
  175. will still probably end up in a jail cell for hate crimes one day, and I've met
  176. perfectly well-adjusted individuals who like to scroll through their Facebook
  177. feed during their lunch break at work. Holding the reductive opinion of "social
  178. media users bad, non-users good" is unproductive and will just serve to make
  179. you feel isolated and resentful.
  180. > 7. What is the main advantage of being anonymous on the Internet?
  181. People can't hate-crime you if they don't know what slurs to use. Then again,
  182. if you never see any visible minorities on the Internet, if you never see any
  183. opinions that go outside the zeitgeist of the average "straight white
  184. middle-class American male"... it starts to feel like, if you don't fit the
  185. profile of that aforementioned average Internet user, there's no real place for
  186. you on the Internet. Either you have to pretend to be a member of a demographic
  187. who hates your guts - a sheep wearing wolf's skin to avoid being eaten - or you
  188. forgo your anonymity and risk being sexually harassed or having deepfakes made
  189. of you in pornographic situations or doxxed and have violence inflicted on you
  190. in real life.
  191. But you specifically mentioned *advantage*, not *harm*. Assuming you're
  192. *actually* anonymous and not the kiddie's idea of anonymity - "I opened an
  193. incognito window so my daddy can't see my browsing history" - companies can't
  194. advertise to you as easily because their data's all muddled up. If you have a
  195. shared Whoogle (Google frontend) instance accessible over Tor and one person's
  196. searching for programming tips and one's looking up video game walkthroughs and
  197. one's doing price comparison on beauty products and one's doing research on an
  198. ancient historical event, what pre-defined slot, what archetype, is Google
  199. supposed to file any of them under? To Google, it looks like one singular
  200. discombobulated person. I might be in the United States, but the Whoogle
  201. instance might be in Brazil or some obscure European country. Have you ever
  202. tried to turn on a VPN and then rawdog a YouTube video? I get weird ads for
  203. products in Japan. I can't understand a single word of what's going on. The
  204. advertising fails.
  205. > 8. According to your experience, what is the best and most secure VPN
  206. available that you recommend?
  207. All VPNs are scams. Use Tor for the actually sensitive shit. There's nothing
  208. worth watching on streaming platforms, but if you disagree, I leech off of
  209. Riseup VPN for torrenting and I've yet to find a site that blocks me.
  210. > 9. I am planning to start a site with Hugo, but I have no experience on the
  211. server side to set up the web server and security matters... Can you help or
  212. introduce a reference that you approve?
  213. All CMSes are bloat. If you're running a hobbyist site and you feel like you
  214. need seventeen build pipelines just to output some static HTML and CSS, you
  215. seriously need to rethink the structure of your site. I've handwritten every
  216. single page of my site since I switched off of WordPress, and I've never had a
  217. problem.
  218. > What web server do you recommend for clearnet and onion?
  219. There is only one good web server in existence, and it's Caddy. Forget about
  220. copy-pasting incomprehensible configuration files to make nginx happy. Here's a
  221. perfectly functional Caddy site in only 5 lines of config:
  222. mayvaneday.org {
  223. root * /var/www/mayvaneday/
  224. file_server
  225. encode gzip
  226. }
  227. With that, I get automatic TLS renewal, file compression, and HTTP-to-HTTPS
  228. redirection. No weird redirect blocks like with nginx.
  229. Tor sites work the same. You just have to put "http://" in front of the
  230. hostname so Caddy doesn't try to get a TLS certificate.
  231. http://myonionhere.onion {
  232. root * /var/www/mysite/
  233. file_server
  234. encode gzip
  235. }
  236. > 10. From which site should I buy a VPS - Domain, is it safe and accepts
  237. Crypto?
  238. The only way you're going to be "safe" when publishing is if you use Hyphanet
  239. (formerly Freenet) for the whole thing. Otherwise you run the risk of at least
  240. one component of your setup failing: your VPS provider kicks you off on a whim,
  241. your domain provider revokes your domain, you self-host at home and the power
  242. or Internet goes out, you mess up your DNS records and your domain points to
  243. the wrong server...
  244. If you stil insist on setting up a clearnet site, and your site is static HTML
  245. and CSS, you're better off using something like Codeberg Pages
  246. (https://codeberg.page) and then pointing a domain to it. My current domain
  247. registrar is Namesilo. I *think* they accept crypto, but I don't know for sure,
  248. and I don't really give a shit either way since I think all crypto is a scam.
  249. (https://www.stephendiehl.com/blog/crypto-is-a-scam.html)
  250. > 11. What do you think is the main advantage of using Ublock origin, Linux and
  251. free software?
  252. It throws a wrench in the corporate advertising machine. I believe advertising
  253. is cognitive terrorism: companies are trying every trick in the book to force
  254. you to spend time and energy thinking about them and their products. Even if
  255. your sentiment on a product or the ad promoting it is bad, it's still worming
  256. its way somewhere into your brain. I can remember advertising jingles and theme
  257. songs from almost twenty years ago when I was still a toddler, *long* after the
  258. original marketing dollars were spent. Corporations want to live in your head
  259. rent-free. Why else would they make such annoying commercials on TV and
  260. streaming services? Why else would over two hundred *billion* dollars be spent
  261. every year (just counting the USA!) to compete for your finite time, attention,
  262. and neuron space? (https://www.statista.com/topics/979/advertising-in-the-us/)
  263. I'm at the point where I'm going to start committing acts of property damage.
  264. Have you ever seen those photos of European countries where billboards are
  265. banned along the highways? The gigantic swaths of pristine land unmarred by
  266. corporate signage? It feels like I'm on an alien planet.
  267. This is another benefit of having an offline-first setup. Advertisers can't
  268. track me if my data's not going anywhere. They can't burrow their way into my
  269. system like the ads in Windows 10's start menu if my system has no way into it.
  270. > 12. In your opinion, which operating system do you recommend for security
  271. work? Whonix - Tails - Qubes OS
  272. "Security", or "secure"? If I was going to test the security of something, I'd
  273. use Kali instead. Qubes is for when you don't trust your software. Tails is for
  274. when you don't trust your network. Whonix is for when you don't trust your
  275. ability to set up a secure environment and you just need a "good enough"
  276. solution.
  277. VeeChit, please tell me where you got this email address from and how you found
  278. my site because, judging from the fact you addressed me as "Vanevander" without
  279. the space and not as my actual name (Vane Vander), this smells a lot like a
  280. mass email you fired off to multiple webmasters without reading any part of my
  281. site first.
  282. - - vclv
  283. -----BEGIN PGP SIGNATURE-----
  284. iQFOBAEBCgA4FiEEq2j4OrvQF4SeDEtjVj/VgT2D7rUFAmTT+A8aHHZhbmV2YW5k
  285. ZXJAbWF5dmFuZWRheS5hcnQACgkQVj/VgT2D7rXnEgf9GQ8At0mbcp3f6N1FAMno
  286. w+XDyF8eQQ0IHVnw542RN4Fx6aIp10b/hj2WTgSw2OHFfeljLvwk+NTadb6vR2R6
  287. zgPjZHHusMZFBJWWaegf+SwDzeirmAtiVThru6yTnR22Cibn04qO2X949wo9UL3S
  288. tdzWhIwMYiFe32sYuUFxxlQJRKEHjkshHed29YoyJ3lDU3M+nt7hVoeAaby/bzhV
  289. 9QtCjfcmf2l+AeXoymQylGv5pIRARy9m/ZsOQiTJEz2CC551R9sOvCWaQJiIHKhZ
  290. 1N4nFoLepaWyFwSSy8hJlvyDAUe9+heyJs1tXeA1UTXuYCZnaJaLnvk7YhRXJxOe
  291. uw==
  292. =vdGk
  293. -----END PGP SIGNATURE-----