@gravitas I'd disrecommend manual @torproject / #Tor.configuration unless you know EXACTLY what you do.

  • #TorBrowser does way more than merely proxy Traffic through Tor, but also prevent #InformationLeakage and block tracking code.
    • You do run the risk of subverting your anonymization efforts to a degree that way!

So I do disrecommend doing this, and instead use if not #TorBrowser, then at least @Waterfox / #Waterfox with #SponsorBlock and #uBlockOrigin if not #NoScript in incognito mode...

I’m not actually sure if this works but If anyone else wants to try it out and give me feedback feel free.

#Adblock #Tor

Using Tor to Avoid Ads on YouTube

Configure Tor to use only exit nodes from countries with few or no YouTube ads.

WARNING: Do not try this unless you understand the implications it has for your system wide tor setup. TorBrowser does way more than merely proxy Traffic through Tor, but also prevent #InformationLeakage and block tracking code. This is not a substitute for using the TorBrowser and does not improve your anonymity.

Tor Configuration

Edit /etc/tor/torrc:

ExitNodes {AL},{MD},{GE},{AM}{VN} StrictNodes 1

Then restart Tor:

sudo systemctl restart tor

FoxyProxy Setup

1. Add a new proxy:

FieldValueHost127.0.0.1Port9050TypeSOCKS5

2. Set proxy mode to: Proxy by Patterns

3. Add URL patterns and assign them to the proxy above:

PatternPurpose*youtube.com/*Main site*youtu.be/*Short links*ytimg.com/*Thumbnails and assets*googlevideo.com/*Video stream data

ytimg.com and googlevideo.com are required – without them thumbnails and video playback will fail through the proxy.

Notes

  • StrictNodes 1 forces Tor to only use the listed countries – it will stall rather than fall back
  • Ukraine and Romania will handle most traffic; Albania has decent exit node coverage
  • If buffering is bad, try capping YouTube quality at 480p
You Have Been LaTeXpOsEd: A Systematic Analysis of Information Leakage in Preprint Archives Using Large Language Models

The widespread use of preprint repositories such as arXiv has accelerated the communication of scientific results but also introduced overlooked security risks. Beyond PDFs, these platforms provide unrestricted access to original source materials, including LaTeX sources, auxiliary code, figures, and embedded comments. In the absence of sanitization, submissions may disclose sensitive information that adversaries can harvest using open-source intelligence. In this work, we present the first large-scale security audit of preprint archives, analyzing more than 1.2 TB of source data from 100,000 arXiv submissions. We introduce LaTeXpOsEd, a four-stage framework that integrates pattern matching, logical filtering, traditional harvesting techniques, and large language models (LLMs) to uncover hidden disclosures within non-referenced files and LaTeX comments. To evaluate LLMs' secret-detection capabilities, we introduce LLMSec-DB, a benchmark on which we tested 25 state-of-the-art models. Our analysis uncovered thousands of PII leaks, GPS-tagged EXIF files, publicly available Google Drive and Dropbox folders, editable private SharePoint links, exposed GitHub and Google credentials, and cloud API keys. We also uncovered confidential author communications, internal disagreements, and conference submission credentials, exposing information that poses serious reputational risks to both researchers and institutions. We urge the research community and repository operators to take immediate action to close these hidden security gaps. To support open science, we release all scripts and methods from this study but withhold sensitive findings that could be misused, in line with ethical principles. The source code and related material are available at the project website https://github.com/LaTeXpOsEd

arXiv.org