asteroza + anonymity   180

experimental anonymous comms network that is trying to be traffic analysis immune, particularly near endpoints which are under local adversarial organization control (aka corp networks)
privacy  anonymity  encryption  anonymous  communications  protocol  research  software 
august 2018 by asteroza
Trying to defeat yellow dot tracking patterns embedded in printed documents
printer  yellow  dot  antiforensic  antiforensics  privacy  anonymity  antitracking  research  software  security  tracking  forensics  printing 
july 2018 by asteroza
Wi-Fi Privacy Police - Apps on Google Play
Trying to keep the wifi stack from broadcasting known AP names, as a data leakage point
android  app  software  wifi  AP  accesspoint  name  block  security  privacy  anonymity 
june 2018 by asteroza
Distributed Localization: A Linear Theory - IEEE Journals & Magazine
Using linear approximations seems to work decently to calculate location using a distributed architecture. AKA using cellphones to geolocate each other rather than triangulate strictly from basestations, and using it like a graph node network so your tracking ability can reach like a tentacle into buildings and closed spaces, assuming nobody is feeding fake info...
p2p  5G  geolocation  IoT  decentralized  positioning  location  algorithm  anchorless  dynamic  privacy  security  anonymity  mapping 
may 2018 by asteroza
Zcash - New Empirical Research into Zcash Privacy
TLDR; Popping Zcash into and then right back out of a shielded address still exposes you traffic analysis discovery, you big dummy
Zcash  shielded  address  discovery  traffic  analysis  data  leakage  security  privacy  anonymity 
december 2017 by asteroza
Privacy Pass
So this is the intermediate solution to Cloudflare CAPTCHA's disturbing every connect via Tor. You get 30 tokens for one CAPTCHA, which you burn for subsequent passes through Cloudflare until you run out.
security  privacy  anonymity  CloudFlare  CAPTCHA  tor  chrome  firefox  plugin  addon  extension 
november 2017 by asteroza
REFLECTACLES - Reflective Eyewear - Sunglasses - Glasses
Eyewear with retroreflective tape, reflecting visible/IR light. I suppose one could say this is anti-surveillance/anti-paparazzi gear. But, while they may not get your face, you stick out like a sore thumb on IR CCTV surveillance footage at night.
retroreflector  reflective  eyeglasses  sunglasses  eyewear  privacy  anonymity  antipaparazzi  antisurveillance  security  Delicious 
november 2016 by asteroza
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recog...
Using tweaked glasses which present some fake facial features due to overlay on the thick frame, it might be possible to adversarially fool face recognition systems (potential "I am Sparticus" effect) but the researchers cheated a bit and did the overlay glasses on an existing picture, rather than live humans wearing real defensive glasses.
adversarial  privacy  protection  defense  anonymity  face  recognition  glasses  overlay  attack  exploit  security  research  image  Delicious 
november 2016 by asteroza
BlockWindows/hosts at master · WindowsLies/BlockWindows
Supposedly a windows 10 telemetry block hosts file, but the routing will probably get noticed by the OS. Note W10 telemetry is hard coded, so putting this file on a W10 box does nothing, it must be done by the upstream DNS.
windows  10  telemetry  block  DNS  hosts  file  security  privacy  anonymity  Delicious 
july 2016 by asteroza
Proposal for an alternative to tor, but isn't I2P superior with the given design constraints?
riffle  anonymous  communication  protocol  design  research  anonymity  privacy  VPN  software  algorithm  alternative  tor  Delicious 
july 2016 by asteroza
Silverpush - Unifying people, devices and data
So these guys drop a cookie on a PC browser, to get it to emit ultrasonic tones via speakers (similar tones during ads on TV). If their SDK is in your smartphone, a mic accessible app now knows to assoicate that PC/TV with that smartphone. SDK installed in 18 million smartphones...
privacy  anonymity  attack  ultrasonic  audio  sound  beacon  token  advertising  tracking  security  hacking  OPSEC  Delicious 
november 2015 by asteroza - Whispering Off The Record
IM service that uses forced OTR and has a tor hidden service entrance, with servers that do no logging at all on LUKS FDE rigs. Better than nothing...
free  jabber  XMPP  OTR  chat  IM  messaging  service  secure  security  privacy  anonymity  tor  Delicious 
october 2015 by asteroza
Patent US20150124107 - Associating cameras with users and objects in a social networking system
Facebook trying to patent logging camera artifacts to connect together unattributed photos "for social network purposes". Which means they now posess deanonimization technology given a large enough body of pictures to datamine, since they can now fingerprint the camera, and by extension associate it with certain circles of people or a certain owner.
facebook  patent  image  picture  photo  camera  artifact  deanonimization  attack  datamining  security  privacy  anonymity  Delicious 
september 2015 by asteroza
めがねのまち鯖江が挑戦する『近未来のメガネ』開発に参加しませんか!| FAAVO さばえ
So japan's National Institute of Informatics decided making a set of eyeglasses that disrupt facial recognition algorithms would make a good crowdfunding campaign. I suppose this is marginally more acceptable than facedazzle makeup, but without the IR LED's to blind security cameras, this probably has limits.
japan  crowdfunding  privacy  visor  sunglasses  eyeglasses  facial  recognition  block  defense  countermeasure  anonymity  Delicious 
august 2015 by asteroza
Google has a special URL to force searching in HTTP only, rather than automatically redirecting you to HTTPS. Because HTTPS means no caching behind a proxy, so it's harder to hide from them.
google  search  engine  HTTP  no  redirect  HTTPS  security  privacy  anonymity  Delicious 
march 2015 by asteroza
Home -
Can't say how secure this is, and a likely target for intelligence groups, but hey, better than nothing?
dissident  activist  protestor  secure  email  service  privacy  anonymity  security  cloud  private  Delicious 
february 2015 by asteroza
Tribler - Privacy using our Tor-inspired onion routing
Tries to be secure by using tor, plus a little tit-for-tat network load sharing (use uplink for the network onion routing for other peers). Though that means you might be classed as an exit node of sorts, plus naturally it's slower than clearnet due to the onion routing.
tor  bittorrent  torrent  client  distributed  search  p2p  file  sharing  anonymity  Delicious 
january 2015 by asteroza
Looks like some dude using a cheap chinese mini-router and claiming to be custom hardware, and he got busted for doing so by the reddit lynchmob. Probably safer to use grugq's PORTAL and a generic TP-link router...
hardware  tor  router  network  wifi  wireless  anonymity  privacy  Delicious 
october 2014 by asteroza
Zerocash | Zerocash
So, people are trying to return the anonymity of cash back into bitcoin, which by its nature is a very public currency protocol. Though it sounds like they are doing this via zerocoin based protocols, so effectively there will be value entering and exiting the bitcoin blockchain at some point, but the intermediate transactions in zerocoin/zerocash will become private. Maybe.
bitcoin  privacy  anonymity  protocol  zerocash  zerocoin  cryptocurrency  software  research  Delicious 
may 2014 by asteroza
« earlier      
per page:    204080120160

related tags

0.5  2.0  2ch  2chan  4chan  5G  802.11  accesspoint  account  active  activism  activist  ad  adapter  add  addon  address  adversarial  advertising  advocacy  AirChat  ajavascipt  ajax  alert  algorithm  alternative  amazon  AN.ON  analysis  anarchy  anchorless  android  anon  anonimization  anonym.OS  anonymity  anonymizer  anonymizing  anonymous  anti-OCR  anti-surveillance  antiforensic  antiforensics  antipaparazzi  antiRFID  antisnooping  antispam  antisurveillance  antitracking  AP  API  app  apparel  appliance  architecture  art  artifact  assemblage  astoria  attack  audio  automated  bag  bandaid  beacon  biometrics  bitblinder  bitcoin  bittorrent  block  blocker  blocklist  blog  bluetooth  bonjour  BoxOfProx  bridge  browser  browser-in-browser  BSD  bulb  burner  button  bypass  cage  camera  CamoFlash  camouflage  canary  CAPTCHA  capture  card  cascade  Cashmere  CCTV  censorship  certificate  CGI  cgiproxy  change  chart  chat  check  checker  chrome  circumvention  clearnet  client  clipboard  clock  cloning  closed  clothing  cloud  CloudFlare  clutch  collaboration  combined  commercial  communication  communications  comparison  computer  computing  ComSec  configuration  consumer  content  control  conversion  cookie  cookies  copperhead  counter  countermeasure  countersurveillance  countersurveillant  CPU  creation  crowdfunding  crowdsourcing  cryptoAPI  cryptocurrency  cryptography  customization  CV  CVdazzle  daemon  daemons  darknet  data  datamining  dazzle  deanonimization  debian  decentralized  decryption  deep  defense  Delicious  delivery  demonstrator  dependent  design  desktop  destruct  detection  development  device  devices  DHT  DIFRwear  discovery  disposable  dissent  dissident  distributed  distribution  distro  DLL  DNS  DNSSEC  document  domain  dot  doxing  DPI  Dvach  dynamic  E-ZPass  e2e  EC2  Echo  ecommerce  education  EFF  ElectroBSD  electronics  email  emulation  encrypted  encryption  end2end  engine  environment  ephemeral  essay  estimate  ethernet  evasion  evercookie  evil  exit  exploit  extension  eyeglasses  eyewear  F2F  face  facebook  facial  failure  fake  FakeAP  false  faraday  fashion  file  filesystem  filter  fingerprint  fingerprinting  firefox  firewall  flash  FluidNexus  FOIA  font  forensics  fork  forward  forwarding  framework  free  FreeBSD  freedom  freenet  frontend  fronting  gateway  general  gentoo  geolocation  GIFC  glasses  GNU  google  GPG  graphic  group  guard  guardian  guide  hack  hacking  hard  hardware  header  hidden  high  honeypot  hooking  hosting  hostproof  hosts  howto  HTTP  HTTPS  humor  Hydra  hyperlocal  I2P  iBypass  ID  idendtity  identification  identity  III  IM  image  implementation  info  information  injection  input  inspection  instabird  instant  instantbird  internet  interview  iOS  IoT  IP  iPad  iphone  IPredator  IR  ISO  ISP  ITU  jabber  Janus  JanusVM  JAP  japan  java  javascript  JonDo  JonDonym  journalism  juggalo  keylogger  kit  korea  law  LBS  leak  leakage  LED  legal  Liberté  libpurple  link  links  linux  list  LiveCD  liveCD  liveDVD  lobbying  local  location  logging  login  low  mac  machine  MACshift  mail  makeup  management  mapping  marker  market  marketplace  mDNS  media  message  messaging  messenger  meta  metadata  michigan  microblogging  Mirage  mix  mixmaster  mixminion  mob  mobile  module  monitoring  moo  movie  name  NAT  native  network  networking  nevercookie  news  no  node  noise  NSL  number  obfuscation  observatory  OFFsystem  on  OneSwarm  onion  online  opencv  opensource  Opera  OperaTor  OpSec  OPSEC  opt-out  optout  OS  OSX  OTR  overlay  overview  owner  p2p  package  packaged  packet  Panopticlick  party  PasteBay  pastebin  patent  payment  pentesting  personal  PGP  phantom  phone  photo  php  phpproxy  PHProxy  picture  Pidgen  piracy  pirate  piratebay  pivacy  plaintext  platform  plugin  plus  PoC  politics  pond  portable  positioning  postal  posting  PPTP  prepaid  prevention  printer  printing  privacy  private  Privoxy  programming  proof-of-concept  protection  protest  protestor  protocol  provider  proxy  proxybox  pseudoanonimity  pseudoanonymity  pseudoanonymous  pseudonym  purchase  QuickSilver  RAM  RAMdisk  real  recognition  redirect  redirection  reference  reflective  relakks  relay  remailer  remailing  requestion  research  resilient  resistant  retroreflector  reverse  RFID  ricochet  riffle  rights  router  routing  russia  safari  scan  scanner  scanning  science  scoial  search  secure  SecureIX  security  self  self-destruct  sender  sensor  server  serverless  service  services  setting  setup  ShareMeNot  sharing  shield  shielded  signal  site  skew  skimming  slopsbox  smartphone  SMS  SNS  social  SOCKS  SOCKS4  SOCKS5  Socksify  software  sound  spam  spamtrap  speed  spoofing  spyware  SSL  standard  storage  strongbox  structured  submission  suite  sunglasses  supercookie  support  suppression  SURB  surveillance  suspended  sweden  swedish  sysadmin  tag  tail  Tails  targeting  technology  telemetry  telephone  temperature  temporary  test  tester  testing  text  thepiratebay  throwaway  thunderbird  time  timestamp  tips  token  tools  tor  Tor-ramdisk  TorChat  torpack  torrent  TPB  TPM  tracker  tracking  traffic  transparent  trap  tricks  tripwire  trusted  tunnel  tunneling  tutorial  tweet  twister  twitter  type  typeface  ubercookie  UID  ultrasonic  uncensored  upload  uproxy  URL  USB  utilites  utilities  verification  Vibe  video  virtual  virtualization  vision  visor  VM  vmware  voice  VPN  vuvuzela  wallet  warrant  web  whack-a-mole  whistleblower  whspr  wifi  wiki  windows  wireless  XMPP  XP  Y.2770  Yauba  yellow  Zcash  ZeroBin  zerocash  zerocoin  ZXX 

Copy this bookmark: