@kosmoz - eviltoast
  • 0 Posts
  • 25 Comments
Joined 1 year ago
cake
Cake day: August 26th, 2023

help-circle









  • The project received some substantial funding recently, so I think I can see where this fear is coming from. However, I also think that a lot of what you say is not true.

    The project wasn’t started “because chromium and Firefox have bad reputation” and the website doesn’t even mention either of them or privacy at all. It was the browser of serenityOS, a from-scratch OS created many years ago by Andreas Kling to help himself overcome drug addiction. The browser part simply got so much traction that he recently decided top split the projects.

    The project uses the BSD 2-Clause license which is a very common, OSI approved open source license, so I’m not sure what concerns you have in this regard.

    Furthermore, I don’t see where you got the “pay for privacy” claim. While they do not state whether the browser will require a license, I would be very surprised if it did, given the projects history. Lastly, a lot of open source projects post monthly updates online and Andreas has done so four many years now. Calling it “propaganda” seems unnecessary and inflammatory.

    Please do some research before making big claims like this.

    Have a good day, friend!











  • The website works for me and seems legit (looks like a regular uni website…). It reads:

    JAP (called JonDo in the scope of the commercial JonDonym anonymous proxy servers - AN.ON remains free of charge) makes it possible to surf the internet anonymously and unobservably.

    Without Anonymization, every computer in the internet communicates using a traceable Address. That means:

    • the website visited,
    • the internet service provider (ISP),
    • and any eavesdropper on the internet connection

    can determine which websites the user of a specific computer visits. Even the information which the user calls up can be intercepted and seen if encryption is not used. JAP uses a single static address which is shared by many JAP users. That way neither the visited website, nor an eavesdropper can determine which user visited which website. How it works

    Instead of connecting directly to a webserver, users take a detour, connecting with encryption through several intermediaries, so-called Mixes. JAP uses a predetermined sequence for the mixes. Such a sequence of linked mixes is called a Mix Cascade. Users can choose between different mix cascades.

    Since many users use these intermediaries at the same time, the internet connection of any one single user is hidden among the connections of all the other users. No one, not anyone from outside, not any of the other users, not even the provider of the intermediary service can determine which connection belongs to which user. A relationship between a connection and its user could only be determined if all intermediaries worked together to sabotage the anonymization. more…

    The intermediaries (mix providers) are generally provided by independent institutions which officially declare, that they do not keep connection log files or exchange such data with other mix providers. JAP shows the identity and number of organisations in each Mix cascade in detail, and verifies this information by cryptographic means. The users are thus able to selectively choose trustable mix cascades.

    Seems like a fun research project. But not sure how much I would personally trust it.

    Also, no idea about the app but at least the project seems legit.