101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

489
active users

#dnscrypt

0 posts0 participants0 posts today
StormyCloud Inc<p>Hapy Juneteenth, folks.<br>Today we celebrate emancipation and reflect on how freedom extends into our digital lives.<br>✍️Digital liberation matters too.<br>Follow Us to find out more.<br><a href="https://mastodon.social/tags/juneteenth2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>juneteenth2025</span></a> <a href="https://mastodon.social/tags/OnlineSafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlineSafety</span></a> <a href="https://mastodon.social/tags/DigitalFreedom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalFreedom</span></a> <a href="https://mastodon.social/tags/DNSCrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSCrypt</span></a></p>
MECC WarriorDNS Linux Server stuff
DecaTec<p>Heute Update auf <a href="https://mastodon.social/tags/Pihole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pihole</span></a> 6 durchgeführt. Lief bis auf ein paar Kleinigkeiten recht problemlos:<br>- Auf einer Instanz wurde das Passwort zurückgesetzt<br>- Eine Instanz hat beim Update den Upstream-DNS "vergessen" (<a href="https://mastodon.social/tags/dnscrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnscrypt</span></a>-proxy)<br>- Nach jedem Neustart die Meldung "Failed to adjust time during NTP sync...". Liegt aber daran, dass beide Instanzen auf einem unprivilegierten <a href="https://mastodon.social/tags/LXC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LXC</span></a>/#Proxmox laufen. Container nun auf privilegiert umgestellt, Problem weg</p><p>Mal sehen, was die kommenden Tage noch so auffällt.</p>
Doppel Draconius<p>This Weekend's Project:</p><p>Dual Raspberry Pi 3s running DNSCrypt-proxy and DNSmasq serving DNS to my home network.</p><p>Normal DNS is unencrypted and I don't really trust my ISP's DNS. So I put some old Pi 3s back in service as DNSCrypt servers.</p><p>They pull DNS Data from Quad9 (with malware blocking) in encrypted form, and every device on my network gets their DNS served from these two devices.</p><p>What a nice project.</p><p>(Also I chose not to do Pi-Hole, since blocking ads are done on a device-level for me. Blanket blocking many servers seems to cause unpredictable behaviour.)</p><p><a href="https://dragonchat.org/tags/raspberrypi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>raspberrypi</span></a> <a href="https://dragonchat.org/tags/dnscrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnscrypt</span></a> <a href="https://dragonchat.org/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://dragonchat.org/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a></p>
Matt<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@aikensource" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>aikensource</span></a></span> <span class="h-card" translate="no"><a href="https://noc.social/@cloudflare" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cloudflare</span></a></span> I use <a href="https://matts.network/tags/dnscrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnscrypt</span></a> and dnscrypt-proxy and enable relays, it can take a little while to start when it checks latency but once it's running i've never had any issues. I also front with <a href="https://matts.network/tags/unbound" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unbound</span></a> to forward specific domains to local nameservers</p>
Jeff Moss<p>So there is this one domain that has like 42 TXT records, and each record is large, so many that it is breaking the <a href="https://defcon.social/tags/DNSCrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSCrypt</span></a> tool.</p>
Juno<p>Also noticed that <a href="https://mastodon.bsd.cafe/tags/DNSCrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSCrypt</span></a> provides a large amount of binary distributions for <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/DragonFlyBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DragonFlyBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/Solaris" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Solaris</span></a>, among several other OSs, plus many architecture-specific binaries. That is really nice! Next thing will be deploying it on the beastie server.</p>
JM Horner<p>Yeah, you heard me. I am testing out a new server for <a href="https://dnscrypt.ca/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dnscrypt.ca/</span><span class="invisible"></span></a> and it is ready for users to test. No-logs DNS service returns!<br><a href="https://eattherich.club/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> <a href="https://eattherich.club/tags/DNSCrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSCrypt</span></a> <a href="https://eattherich.club/tags/DoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoT</span></a> <a href="https://eattherich.club/tags/DoH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoH</span></a> <a href="https://eattherich.club/tags/digitalprivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalprivacy</span></a></p>
Lauchmelder<p><span class="h-card"><a href="https://social.tchncs.de/@kuketzblog" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>kuketzblog</span></a></span> Danke für den schönen Beitrag. Zur Diskussion möchte ich <a href="https://social.tchncs.de/tags/dnscrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnscrypt</span></a>-proxy mit anonymisierten DNS Anfragen anstatt Unbound bringen. Diese Anleitung von @DecaTec beschreibt das vorgehen: <a href="https://decatec.de/home-server/anonyme-dns-kommunikation-mit-pi-hole-und-dnscrypt-proxy/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">decatec.de/home-server/anonyme</span><span class="invisible">-dns-kommunikation-mit-pi-hole-und-dnscrypt-proxy/</span></a><br>Zum einen sind die DNS Anfragen verschlüsselt, schneller und durch das Relay ist der Datenschutz sichergestellt. Welche Argumente sprechen also gegen dnscrypt bzw. wo liegt die Vorteil für Unbound?</p>
Lauchmelder<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@kuketzblog" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>kuketzblog</span></a></span> Danke für den schönen Beitrag. Zur Diskussion möchte ich <a href="https://social.tchncs.de/tags/dnscrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnscrypt</span></a>-proxy mit anonymisierten DNS Anfragen anstatt Unbound bringen, wie in dieser Anleitung von <span class="h-card" translate="no"><a href="https://mastodon.social/@DecaTec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>DecaTec</span></a></span> : <a href="https://decatec.de/home-server/anonyme-dns-kommunikation-mit-pi-hole-und-dnscrypt-proxy/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">decatec.de/home-server/anonyme</span><span class="invisible">-dns-kommunikation-mit-pi-hole-und-dnscrypt-proxy/</span></a><br>Zum einen sind die DNS Anfragen verschlüsselt, schneller und durch das Relay ist der Datenschutz sichergestellt. Welche Argumente sprechen also gegen dnscrypt bzw. wo liegt die Vorteil für Unbound?</p>
FOSS Android :verified_twtr:<p>InviZible Pro<br>Android application for Internet privacy and security</p><p>InviZible Pro combines the strengths of Tor, DNSCrypt, and Purple I2P to provide a comprehensive solution for online privacy, security, and anonymity. You can use them all together or activate only one or two at once.</p><p>Download &amp; Guide: <a href="https://github.com/Gedsh/InviZible/wiki" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Gedsh/InviZible/wik</span><span class="invisible">i</span></a></p><p><a href="https://mstdn.social/tags/foss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>foss</span></a> <a href="https://mstdn.social/tags/android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a> <a href="https://mstdn.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mstdn.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mstdn.social/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> <a href="https://mstdn.social/tags/dnscrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnscrypt</span></a> <a href="https://mstdn.social/tags/i2p" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>i2p</span></a> <a href="https://mstdn.social/tags/purplei2p" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purplei2p</span></a> <a href="https://mstdn.social/tags/inviziblepro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>inviziblepro</span></a> <a href="https://mstdn.social/tags/root" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>root</span></a> <a href="https://mstdn.social/tags/adblockers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adblockers</span></a> <a href="https://mstdn.social/tags/oss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oss</span></a> <a href="https://mstdn.social/tags/FLOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FLOSS</span></a></p>
Ilya-S-Zharskiy<p><a href="https://habrastorage.org/r/w1560/getpro/habr/upload_files/415/6f6/08c/4156f608c01de8e22eccf9bc1a0cb2bb.png" rel="nofollow noopener" target="_blank">habrastorage.org</a><br> <br> Обход блокировок: настройка сервера XRay для Shadowsocks-2022 и VLESS с XTLS-Vision, Websockets и фейковым веб-сайтом<br> <br> _habr.com/ru/articles/728836/ <a class="hashtag" href="https://juick.com/tag/dns2socks" rel="nofollow noopener" target="_blank">#dns2socks</a> <a class="hashtag" href="https://juick.com/tag/%D1%87%D0%B5%D0%B1%D1%83%D1%80%D0%BD%D0%B5%D1%82" rel="nofollow noopener" target="_blank">#чебурнет</a> <a class="hashtag" href="https://juick.com/tag/adguard" rel="nofollow noopener" target="_blank">#adguard</a> <a class="hashtag" href="https://juick.com/tag/Shadowsocks" rel="nofollow noopener" target="_blank">#Shadowsocks</a> <a class="hashtag" href="https://juick.com/tag/DNSCryptProxy2" rel="nofollow noopener" target="_blank">#DNSCryptProxy2</a> <a class="hashtag" href="https://juick.com/tag/%D1%80%D0%BE%D1%81%D0%BA%D0%BE%D0%BC%D0%BF%D0%BE%D0%B7%D0%BE%D1%80" rel="nofollow noopener" target="_blank">#роскомпозор</a> <a class="hashtag" href="https://juick.com/tag/ODoH" rel="nofollow noopener" target="_blank">#ODoH</a> <a class="hashtag" href="https://juick.com/tag/%D0%BE%D0%B1%D1%85%D0%BE%D0%B4_%D0%B1%D0%BB%D0%BE%D0%BA%D0%B8%D1%80%D0%BE%D0%B2%D0%BE%D0%BA" rel="nofollow noopener" target="_blank">#обход_блокировок</a> <a class="hashtag" href="https://juick.com/tag/docker" rel="nofollow noopener" target="_blank">#docker</a> <a class="hashtag" href="https://juick.com/tag/DNS-proxy" rel="nofollow noopener" target="_blank">#DNS-proxy</a> <a class="hashtag" href="https://juick.com/tag/DNSSEC" rel="nofollow noopener" target="_blank">#DNSSEC</a> <a class="hashtag" href="https://juick.com/tag/doh" rel="nofollow noopener" target="_blank">#doh</a> <a class="hashtag" href="https://juick.com/tag/unbound" rel="nofollow noopener" target="_blank">#unbound</a> <a class="hashtag" href="https://juick.com/tag/DoQ" rel="nofollow noopener" target="_blank">#DoQ</a> <a class="hashtag" href="https://juick.com/tag/privacy" rel="nofollow noopener" target="_blank">#privacy</a> <a class="hashtag" href="https://juick.com/tag/antiZapret" rel="nofollow noopener" target="_blank">#antiZapret</a> <a class="hashtag" href="https://juick.com/tag/DNS" rel="nofollow noopener" target="_blank">#DNS</a> <a class="hashtag" href="https://juick.com/tag/dnsleaktest" rel="nofollow noopener" target="_blank">#dnsleaktest</a> <a class="hashtag" href="https://juick.com/tag/%D0%A2%D0%A1%D0%9F%D0%A3" rel="nofollow noopener" target="_blank">#ТСПУ</a> <a class="hashtag" href="https://juick.com/tag/wireguard" rel="nofollow noopener" target="_blank">#wireguard</a> <a class="hashtag" href="https://juick.com/tag/%D1%81%D1%83%D0%B2%D0%B5%D1%80%D0%B5%D0%BD%D0%BD%D1%8B%D0%B9_%D1%80%D1%83%D0%BD%D0%B5%D1%82" rel="nofollow noopener" target="_blank">#суверенный_рунет</a> <a class="hashtag" href="https://juick.com/tag/DNSCrypt" rel="nofollow noopener" target="_blank">#DNSCrypt</a> <a class="hashtag" href="https://juick.com/tag/%D0%B1%D0%BB%D0%BE%D0%BA%D0%B8%D1%80%D0%BE%D0%B2%D0%BA%D0%B0_VPN" rel="nofollow noopener" target="_blank">#блокировка_VPN</a> <a class="hashtag" href="https://juick.com/tag/%D1%81%D1%83%D0%B2%D0%B5%D0%BD%D0%B8%D1%80%D0%BD%D1%8B%D0%B9_%D0%B8%D0%BD%D1%82%D0%B5%D1%80%D0%BD%D0%B5%D1%82" rel="nofollow noopener" target="_blank">#сувенирный_интернет</a> <a class="hashtag" href="https://juick.com/tag/%D0%90%D0%A1%D0%91%D0%98" rel="nofollow noopener" target="_blank">#АСБИ</a> <a class="hashtag" href="https://juick.com/tag/DNS-over-HTTPS" rel="nofollow noopener" target="_blank">#DNS-over-HTTPS</a></p>

Android application for on-line privacy and security.

InviZible Pro. (Open source)
New version 5.9.0

Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

- InviZible Pro does not support ipv6 at this time.

Features:
* No root required
* Hides location and IP
* Unblocks the restricted web content
* Prevents tracking
* Allows access to hidden networks
* ARP spoofing detection
* Built-in firewall
* Tethering supported
* No analytics
* No advertisements
* Open source
* Material design theme

Premium feature:
* Automatic Updates – Use the latest versions of InviZible Pro, and its modules such as DNSCrypt , Tor, and Purple I2P.
* Absence of reminder about the need to support the project.
* Priority technical advice.
* Material design night theme

What's New
* Updated DNSCrypt to version 2.1.2.
* Added http3 option to DNSCrypt settings (DoH3, HTTP over QUIC).
* Updated Tor to version 4.7.10.
* Updated Tor snowflake bridge to version 2.3.0.
* Tor restarts if the internet connection is lost.
* Fixed requesting Tor bridges via the app interface.
* Updated Purple I2P to version 2.43.0.
* Added SSU2 option to Purple I2P settings.
* Added Italian translation.
* Fixes and optimizations.

Please visit the project’s page:
https://invizible.net/en

Download from Google Play:
https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

F-droid:
https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

Take a look at source code:
https://github.com/Gedsh/InviZible

#android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro @ua@soc.ua-fediland.de @rf@mastodon.ml

InviZibleInviZible – MainInviZible – Main

Android application for on-line privacy and security.

InviZible Pro. (Open source)
New version 5.6.0

Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

- InviZible Pro does not support ipv6 at this time.

Features:
* No root required
* Hides location and IP
* Unblocks the restricted web content
* Prevents tracking
* Allows access to hidden networks
* ARP spoofing detection
* Built-in firewall
* Tethering supported
* No analytics
* No advertisements
* Open source
* Material design theme

Premium feature:
* Automatic Updates – Use the latest versions of InviZible Pro, and its modules such as DNSCrypt , Tor, and Purple I2P.
* Absence of reminder about the need to support the project.
* Priority technical advice.
* Material design night theme

What's New
* Updated Tor to version 4.6.10 (onion v2 services are no longer supported).
* Updated Tor snowflake bridge to version 2.0.1.
* Updated Tor geoip and default bridges.
* Updated Purple I2P to version 2.40.0.
* Fixed visiting onion websites with DNSCrypt force_tcp enabled.
* Pausing InviZible instead of completely shutting down when using another VPN.
* Improved the Arp Spoofing attack detector.
* Optimized battery usage.
* Improved firewall.

Please visit the project’s page:
https://invizible.net/en

Download from Google Play:
https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

F-droid:
https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

Take a look at source code:
https://github.com/Gedsh/InviZible

#android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro @rf@mastodon.ml @ua@mastodon.ml

InviZibleInviZible – MainInviZible – Main