

Yes, it claims to proxy the traffic, but then you have to connect to the fedibuzz relay server.
It sounded from the post that there was an attempt to directly connect to a Mastodon server through the relay connection, which won’t work.
Just a techie guy running feddit.online to allow people to communicate, make friends and acquaintances. Odd coming from a happy introvert, right? (https://jerry.hear-me.blog/about)
I also own these publicly available applications:
Mastodon: https://hear-me.social/
Alternative Mastodon UI: https://phanpy.hear-me.social/
Peertube: https://my-sunshine.video/
Friendica: https://my-place.social/
Matrix: https://element.secure-channel.net/
XMPP/Jabber: https://between-us.online/
Bluesky PDS: https://blue-ocean.social/ (jerry.blue-ocean.social)
Mobilizon (Facebook Events Alt): https://my-group.events/
and more…


Yes, it claims to proxy the traffic, but then you have to connect to the fedibuzz relay server.
It sounded from the post that there was an attempt to directly connect to a Mastodon server through the relay connection, which won’t work.


A relay, as in the Mastodon relay feature? As in Administration->Relays? If so, does mastodonapp.uk have an active relay? It can’t be used to connect to just any Mastodon server. It has to connect to a special relay server.
Not sure whether this is helpful.


I’m now displaying it on feddit.online. And it’s staying.


Proton Mail, Tuta mail, runbox.com, to name three.


And as you’d expect, with their hospital closing, they remain loyal to Trump, refusing to believe that the funding cuts had anything to do with the closure. That everyone is just picking on Trump and using him as a convenient excuse.
It’s a cult.


Thanks! I’ve tried editing it.


You have to trust someone. There’s no way around this. But trusting some app written by some unknown person that has nobody overseeing it is probably the worst place to put your trust.
So, decide. You either trust some unknown app developer, your ISP, or a VPN provider. You must choose one. Which one do you choose? Choosing none means you are off the Internet.
I have more trust in Proton VPN, Mullvad VPN, Mozilla VPN, and some other reputable VPN providers than I do in my ISP, some cheap VPN run by unknown people, or some app making crazy claims. I strongly doubt that a reputable VPN provider is doing any tracking of user traffic. But I bet MockTraffic is telling someone all the websites you’re visiting.
I think if you are worried about your traffic being tracked, you are safest with a reputable VPN provider.


I see so much wrong in these claims.
**The App sounds fishy, actually. ** Many apps come out claiming to provide some unique security, and they eventually turn rogue and start stealing information. This one sounds ripe to go rogue, especially since it can’t make it into the standard store. I expect to read about MockTraffic someday being caught stealing information.
I wouldn’t go near it.


Depends on the application for me. For Mastodon, I want to allow 12K character posts, more than 4 poll question choices, and custom themes. Can’t do it with Docker containers. For Peertube, Mobilizon, and Peertube, I use Docker containers.


The headline is nuts. There’s no hidden universe on the ocean floor. I’ll fix the headline:
“Scientists Found Evidence of Distant Cosmic Events Using a Detector on the Ocean Floor”


Yes, well stated. This is why I usually skip reading people’s comments. The vast majority see everything through their own agendas and just echo words they hear.


It’s worse than you think. An IMSI catcher is not even needed to find out what phones are in an area:
Section 3.4.1: Presence Testing in LTE
https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks
Passive Presence Testing
The simplest way to do presence testing in LTE doesn’t actually require someone to have what we usually consider a CSS (e.g. a device that pretends to be a legitimate cell tower). Instead, all that’s required is simple radio equipment to scan the LTE frequencies, e.g. an antenna, an SDR (Software Defined Radio), and a laptop. Passive presence testing gets its name because the attacker doesn’t actually need to do anything other than scan for readily available signals (Shaik et al, 2017).
RRC paging messages are usually addressed to a TMSI, but sometimes IMSI and IMEI are also used. By monitoring these unencrypted paging channels, anyone can record the IMSIs and TMSIs the network believes is in a given area . In the next section, we’ll see how an attacker can correlate a TMSI to a specific target phone, as right now collecting TMSIs simply means recording pseudonyms.
There are descriptions in the article of other ways to find phones without using an IMSI Catcher or fake tower.


Wow! Well done!!


I see good points in this comment, even if the analogy of their being like hashtags might be a little off.
gup.pe groups have a 1-word description. Most of them I’ve been unable to assign a topic to because I didn’t know what the word means or it has ambiguous meanings. Most have no posts. So they land in the “unknown” topic.
I always wondered what I would do if someone started posting porn or hate to them. It would be a nightmare. I’d just have to block the group, I suppose.
Frankly, instead of someone creating a gup.pe-like group, I think they ought to create a community in PieFed, MBIN, or Lemmy. gup.pe was an early experiment when there wasn’t a threadiverse.


Edward Snowden claims the NSA knows how to do it.


It doesn’t mean they are wrong. Anyway, here:
“Based on documents leaked by Edward Snowden, the National Security Agency (NSA) had already developed a technique in 2004 to locate cell phones even when they were turned off, called “The Find”, mostly used to locate terrorist suspects [36]. This was accomplished through the use of IMSI catchers, which could wirelessly send a command to the phone’s baseband chip to fake any shutdown and stay on [37]. The phone could then be instructed to keep just the microphone on, in order to eavesdrop on conversations, or periodically send location pings. The only hint that the phone was still on was if it continued to feel warm even though it had been shut off, suggesting that the baseband processor was still running. IMSI catchers used by London’s Metropolitan Police are also reportedly able to shut down targeted phones remotely [38].”


Seems to depend on what you read: https://godarkbags.com/blogs/news/imsi-catchers-the-hidden-threat-to-your-mobile-privacy-and-how-to-stop-them
Quote:
Can I Be Tracked With My Phone Off?
Yes, even when your phone is turned off, it’s not entirely inactive. The radio system, controlled by a separate subsystem called Baseband, can still transmit signals. This design allows for features like remote device tracking but also means that simply turning off your phone doesn’t protect you from IMSI catchers. Using a Faraday bag completely isolates your device from any external signals, providing robust protection.
The most effective defense against these threats is to block the signals that IMSI catchers rely on. This is where Faraday bags come into play. These specially designed bags create a barrier that prevents radio waves from reaching your device, effectively neutralizing IMSI catchers and other surveillance tools.


They can triangulate from the 8 readings that they did and know my location. They also know it’s T-Mobile and they can subpoena T-Mobile and Google to get the information (the IMSI code will identify the dealer) to identify who bought the phone and what phone account pays for the service.
How long has the site been down, as far as you know?