• Suddenly unable to log into your ZooVille account? This might be the reason why: CLICK HERE!

Online Security

VPN is good, PrivacyGuides has solid recommendations.

I also wouldn't recommend cross contaminating anything IRL with ZV stuff, but that's been already covered I think. Like I wouldn't use my same VPN to log into my Facebook, or for anything other than ZV

I think that approach is called compartmentalizing.
 
So, after reading some of this. I wondering if it's safe for me. I have a private google account on my phone and I'm using that as my domain for accessing this site (as well as all my other private affairs). Should I download a specific VPN or something for using this site?
 
So my ISP (at least I believe) has blocked several sites (this one including) and I was wondering if a VPN will allow me to bypass the block.
I'm on my phones ISP currently but I want to access this site on my PC.
Also if it does work feel free to suggest good VPNs
Also let me know if this discussion is in the wrong place or against any rules I've missed.
 
So my ISP (at least I believe) has blocked several sites (this one including) and I was wondering if a VPN will allow me to bypass the block.
Yes it would, but from the perspective of safety, it is not much better than your ISP.
You pay your ISP for internet. They do keep logs and comply with authorities if asked.
You pay your VPN for internet and they claim they do not keep logs and they do not claim they do not comply with authorities.
By the way you have absolutely no way of verifying any log keeping claims by a VPN provider.
Use TOR.
 
Last edited:
GENERAL POSTING

1. Do not use an identifiable avatar. This includes faces, tattoos, fursuits (especially if they are not yours)

2. Review every picture, every video you post multiple times. Look for identifiable things; houses, barns, unique saddles, collars with or without tags, pictures, furniture, mail, packages, collectibles, mirrors or anything can reflect your face or body, absolutely anything that can be used as identification.

3. If you have a unique pet, be very, very careful. If you have posted normal pictures anywhere, like facebook, twitter, ect., do not post him here or anywhere zoo themed. Even if you delete the social media pics, it's too late. ( Familiarize yourself with Reverse Image Search, what it is, and how it can be used against you )

4. Be careful with the information you post. Anyone with enough patience can piece together little things through pictures, descriptions, email addresses, anything to pinpoint who you are.

5. Use an email that is not attached to anything. Do not use real name, and do not setup a password recovery phone number or alternate email. Make yourself an absolute stand alone free email account and do not use it for anything else but zoo. Not even furry or fursuit related sites or accounts.




ONLINE SECURITY

1. Public IP addresses can be used to track your general location. We Recommend a VPN service like Nord VPN to mask your IP. ALWAYS USE VPN!

2. Use Strong Passwords on your ZooVille Account.

3. Whatsapp and Discord are NOT recommended services for private off-site chat. They have been known to be leaked and report info on users.

4. Telegram and Signal are considered safe in of themselves, however always used a VPN when logging onto telegram and also be wary of phishing for your IP address with external HTML links. This has been used before to catch users NOT using VPN on telegram or Signal.

5. Public telegram links to group chats are allowed here on zooville if you own a group (see site rules), however be aware that bestiality is illegal in many countries. Law enforcement can phish users out into private chats is a common way to trace and doxx your identity. TRUST and RESPONSIBILITY is on your hands for whomever private chats you join.
Telegram not really safe anymore. It was but not nowadays, even with VPN. Maybe with burner + VPN, but not that safe anymore imo.
 
how do y'all feel about session (ik about posting data or contact info info) as a platform for discussion and understanding of different perspectives?
 
What do savvy people think is the safest VPN?
Mullvad + paying for it in XMR

how do y'all feel about session (ik about posting data or contact info info) as a platform for discussion and understanding of different perspectives?
I prefer forums for discussion but Session is good for 1 on 1 chats or small groups of people. Just know if youre sending files on mobile it doesnt auto strip EXIF data from attachments.

4. Telegram and Signal are considered safe in of themselves, however always used a VPN when logging onto telegram and also be wary of phishing for your IP address with external HTML links. This has been used before to catch users NOT using VPN on telegram or Signal.
I would change this and add Session or SimpleX as messengers. Both do not require a phone number to use are generally pretty intuitive to get setup and both have desktop and mobile applications. I prefer to use SimpleX since my user ID cant be tracked across different groups like in Session. But, most people should be fine with Session as long as they use common sense.
 
Mullvad + paying for it in XMR


I prefer forums for discussion but Session is good for 1 on 1 chats or small groups of people. Just know if youre sending files on mobile it doesnt auto strip EXIF data from attachments.


I would change this and add Session or SimpleX as messengers. Both do not require a phone number to use are generally pretty intuitive to get setup and both have desktop and mobile applications. I prefer to use SimpleX since my user ID cant be tracked across different groups like in Session. But, most people should be fine with Session as long as they use common sense.
I e been using both for a while. Simplex as main and "testing" session
 
GENERAL POSTING

1. Do not use an identifiable avatar. This includes faces, tattoos, fursuits (especially if they are not yours)

2. Review every picture, every video you post multiple times. Look for identifiable things; houses, barns, unique saddles, collars with or without tags, pictures, furniture, mail, packages, collectibles, mirrors or anything can reflect your face or body, absolutely anything that can be used as identification.

3. If you have a unique pet, be very, very careful. If you have posted normal pictures anywhere, like facebook, twitter, ect., do not post him here or anywhere zoo themed. Even if you delete the social media pics, it's too late. ( Familiarize yourself with Reverse Image Search, what it is, and how it can be used against you )

4. Be careful with the information you post. Anyone with enough patience can piece together little things through pictures, descriptions, email addresses, anything to pinpoint who you are.

5. Use an email that is not attached to anything. Do not use real name, and do not setup a password recovery phone number or alternate email. Make yourself an absolute stand alone free email account and do not use it for anything else but zoo. Not even furry or fursuit related sites or accounts.




ONLINE SECURITY

1. Public IP addresses can be used to track your general location. We Recommend a VPN service like Nord VPN to mask your IP. ALWAYS USE VPN!

2. Use Strong Passwords on your ZooVille Account.

3. Whatsapp and Discord are NOT recommended services for private off-site chat. They have been known to be leaked and report info on users.

4. Telegram and Signal are considered safe in of themselves, however always used a VPN when logging onto telegram and also be wary of phishing for your IP address with external HTML links. This has been used before to catch users NOT using VPN on telegram or Signal.

5. Public telegram links to group chats are allowed here on zooville if you own a group (see site rules), however be aware that bestiality is illegal in many countries. Law enforcement can phish users out into private chats is a common way to trace and doxx your identity. TRUST and RESPONSIBILITY is on your hands for whomever private chats you join.
It's actually good to read back through this periodically
 
Just device a filter, that acts as bot encrypted images, if only you know the cypher you cannot have anyone crack it, mostly because a person is not likely to go around following random zoophiles, it's just paranoid imo
 
I know that this has most likely already been covered in one of the responses above, but I'll preface it again. Please, if you are serious about keeping yourself safe online do not opt for a VPN. There are plenty more solutions out there that provide better efficiency when it comes to keeping your online activity anonymous and in-turn, you safer.

Thank you.
 
I know that this has most likely already been covered in one of the responses above, but I'll preface it again. Please, if you are serious about keeping yourself safe online do not opt for a VPN. There are plenty more solutions out there that provide better efficiency when it comes to keeping your online activity anonymous and in-turn, you safer.

Thank you.
It does not matter what you use, if you are doing it on your phone, you are screwed anyway. :D For a multitude of reasons.
And for good measure pair it with face unlock. :D
 
Tor Browser is the safest available method. It is built on Firefox ESR and highly customized to protect you in ways a standard browser can't. But web browsers all have flaws, so it's still possible to find and exploit those flaws to escape the browser to the host operating system and reveal who you are. The way to mitigate that possibility is to increase the security level in Tor Browser from 'Standard' to 'Safer' or 'Safest' and try to put up with websites being kind of messed up. It varies from site to site.

If you're really concerned about that kind of intrusion, you have to run Tor Browser in a disposable environment like TAILS or Qubes-whonix. TAILS is easy, Qubes is hard. Try TAILS sometime if you haven't, it's pretty nice.

It's more nuanced than that. Combining Tor with a VPN hurts performance, offers little to no extra protection, and is only useful in rare circumstances. There are two combinations. The "X" marks a connection that is outside the Tor network and not protected by Tor:


(You) <---> (VPN) <---> (Tor) <-x-> (Website)

In this case, the VPN provider is not able to read your Tor traffic. Your connection to Tor is highly resistant to man-in-the-middle attacks. This is one of Tor's most important features because it enables you to use internet connections you don't trust.

Maybe do this if your local network is blocking Tor traffic but not VPN connections, and only after trying to connect to Tor directly with an unpublished Tor Bridge first.

Maybe do this if you're unable to turn off WebRTC without breaking a website you want to use. Certain functions in WebRTC can leak your real IP, so in that case a VPN could offer a little bit of protection. This only applies other browsers you are connecting to Tor by proxy, which you should never do unless absolutely forced, and to Tor Browsers on iOS which all have to use Apple's Safari browser underneath.


(You) <---> (Tor) <-x-> (VPN) <-x-> (Website)

In this case, the VPN provider is able to read your Tor traffic, because it has already left the Tor network. However, the VPN will only see that it is traffic coming from a Tor exit node, and the VPN will know who you are because you subscribed to them. Some VPNs like Mullvad allow anonymous signup and payment. The content of your traffic could reveal enough personal information for others to deanonymize you.

Doing this is a bad idea and the need for it is very rare. Basically it's a way to hide the fact you're using Tor from a website that blanket blocks connections from Tor exit nodes, since exit nodes are well known. However you lose some anonymity because your traffic is more unique and interesting. To an outside observer, you are no longer a Tor user with traffic coming from a Tor exit node like all the others, you're a VPN user with regular traffic on one side and Tor traffic on the other. That's not great.

In either case you are creating nested TCP connections, which can be very finicky and slow.

?
This is the right way to go!

A little note on DEVICE SECURITY:

Even if you properly use TOR to obscure your internet traffic, you gain very little if you use a device that's reporting your activity to the big tech. This includes all things Apple, anything Microsoft, Google's Android. Either phones or desktops.

There's a simple solution - set up yourself a dedicated Linux laptop, use it only for the stuff that's supposed to be hidden. It's safe, it's simple, it's not as scary as you think. I recommend TAILS, a nice Linux distro with properly set up TOR.

Bonus points if you use a machine which does not have the Intel's Management Engine, which is a known backdoor. This requires some more effort however as pretty darn much every relatively new machine has it.

Oh, and do encrypt all your drives. Linux does this out-of-the-box with no special effort.
This is great to know thanks
 
Back
Top