mastodon.gamedev.place is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server focused on game development and related topics.

Server stats:

5.1K
active users

#anonymity

4 posts4 participants0 posts today

I have been thinking for a while about the issue of anonymity in Web3 (and, more in general, anonymous transactions). The growing realization of the damage caused by decentralized financial technologies is nagging my cypherpunk self, who has been at war for a lifetime against invasive tracking, manipulative marketing, and surveillance capitalism. I collected my thoughts here: gagliardoni.net/#20250427_priv

Spoiler alert: I'm not endorsing backdoors, but I think some middleground solution must be found.

gagliardoni.netTommaso Gagliardoni's Homepage

Many people have heard of Tor in the media, but despite its long history of protecting the free internet, most consider it a niche tool and have never ventured to try it themselves.

In reality, Tor is easy to use for anyone. It helps not only journalists and activists, but anybody who seeks greater privacy online or access to information regardless of location.

What is Tor exactly? How can Tor help you? And why is it such an important tool? Staff writer @Em0nM4stodon explains in the latest Privacy Guides article: privacyguides.org/articles/202

www.privacyguides.org · In Praise of Tor: Why You Should Support and Use Tor
More from Em :official_verified:

🛡️ Signal vs. Session: Which One Truly Protects You in a Security-Obsessed World?

「 Session is a bit more underground. It’s built for people who want to go a step further — no phone number, no central servers, no metadata. It’s decentralized and routes your messages through an anonymous network. In short: it’s made for anonymity 」

medium.com/@biytelum/signal-vs

Medium · Signal vs. Session: Which One Truly Protects You in a Security-Obsessed World?By BiyteLüm

Random MAC address for anonymity

Ever feel like your phone is snitching on you? That’s because it probably is — at least, its MAC address is. In this deep-dive post, we explore how your devices quietly broadcast your identity through Wi-Fi and Bluetooth, and how you can fight back by randomizing your MAC address. From Linux laptops to iPhones and Androids, we break down how t

schulz.dk/2025/02/27/random-ma

We all know services that require authentication can correlate your activity on that service with your account. This becomes particularly dangerous when that account is linked with payment information that could potentially link back to your real identity.

It doesn't have to be this way though: The Privacy Pass protocol presents a path forward for "blind" authentication, if more services adopt it. Our team member @fria walks us through how it works:

privacyguides.org/articles/202

www.privacyguides.org · Privacy Pass: The New Protocol for Private Authentication
More from Privacy Guides

Tor Project & Lebanon Public #Library #NH – exit down?
blog.torproject.org/tor-exit-n

sjpl.org/privacy – toolkit builder, #Anonymity and #Tracking

Libary Box
jasongriffey.net
makezine.com/projects
Library 2035 (Sandra Hirsh)
Standards (MIT 2025)

#Anonymity ( #ALA #OIF )
pg. 44 #tor
pg. 56 .onion
libraryfreedom.org - Tor Poster
pg. 58 #TAILS as a service
choose privacy everyday .org (captured domain – ‘gambling’ ops)

blog.torproject.orgTor Exit Nodes in Libraries - Pilot (phase one) | Tor ProjectHello Tor Community! We first introduced you to the Library Freedom Project back in February...