asteroza + tor   101

The CIA Sets Up Shop on Tor, the Anonymous Internet | WIRED
ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion

IT'S A TRAP!
humor  CIA  tor  hidden  service  onion 
21 days ago by asteroza
Mozilla Research Call: Tune up Tor for Integration and Scale | Tor Blog
Interest talk of trying to mainline Tor into Firefox proper, which would vastly increase Tor usership. Which will have interesting consequences (bandwidth pressure on exit nodes, more traffic to hide in AKA herd immunity, etc.) both good and bad. Though if they did, why not also mix in some I2P and IPFS while their at it?
Mozilla  Firefox  Tor  integration  privacy  anonymity  security  scale 
5 weeks ago by asteroza
Brass Horn Comms Onion3g
Tor embedded in a SIM card? So I guess using a private APN to funnel tor traffic to their tor relay network gateways/bridges?
Tor  union  routing  SIM  data  card  hardware  electronics  devices  security  privacy  3G 
october 2018 by asteroza
Introducing DNS Resolver for Tor
Hrm, interesting, but that then could tie two circuits together for correlation...
cloudflare  Tor  DNS  endpoint  hidden  service  internet  infrastructure  server 
june 2018 by asteroza
Privacy Pass – Add-ons for Firefox
Cloudflare's CAPTCHA bypass solution, using blinded tokens. Basically, you do one captcha, and you are afforded a certain number of accesses based on that token, so Cloudflare harasses VPN/tor users less.
firefox  plugin  addon  extension  cloudflare  CAPTCHA  bypass  crytographic  blind  blinded  token  security  VPN  tor  access  block  browser  privacy 
february 2018 by asteroza
Privacy Pass
So this is the intermediate solution to Cloudflare CAPTCHA's disturbing every connect via Tor. You get 30 tokens for one CAPTCHA, which you burn for subsequent passes through Cloudflare until you run out.
security  privacy  anonymity  CloudFlare  CAPTCHA  tor  chrome  firefox  plugin  addon  extension 
november 2017 by asteroza
meejah.ca
Using tor would essentially hide the endpoint from clearnet public access, while potentially being able to penetrate firewalls. IoT safe remote access, or botnet C&C usage comes to mind. Interesting proof-of-concept though.
tor  WAMP  websocket  pubsub  remote  encrypted  P2P  RPC  networking  security  encryption 
november 2017 by asteroza
Tor at the Heart: Tahoe-LAFS | The Tor Blog
Now over tor hidden services you can run a distributed encrypted storage service, such that storage nodes can run unaware of their contents, and the nodes are marginally harder to destroy due to onion routing. So FreeNet is back, in a way, with many of the same performance penalties? I bet the journalists/whistleblowers/pedos will be delighted...
tor  Tahoe  LAFS  Tahoe-LAFS  distributed  onion  hidden  service  storage  grid  Delicious 
december 2016 by asteroza
DetecTor.io
Using tor as a second circuit to check for MitM SSL/TLS attacks. Not entirely out-of-band, but close enough?
SSL  TLS  security  rogue  CA  certificate  inspection  tor  checker  tester  MitM  Delicious 
october 2016 by asteroza
riffle.pdf
Proposal for an alternative to tor, but isn't I2P superior with the given design constraints?
riffle  anonymous  communication  protocol  design  research  anonymity  privacy  VPN  software  algorithm  alternative  tor  Delicious 
july 2016 by asteroza
The Tor exit node of mailbox.org | Hints for Tor Users
Apparently even more tor exit nodes have become actively hostile with XMPP MitM, so these guys built a hidden service endpoint for your XMPP needs...
tor  MitM  XMPP  hidden  service  exit  node  endpoint  security  Delicious 
june 2016 by asteroza
The Pirate Bay
PirateBay's onion link it seems
ThePirateBay  tor  onion  file  sharing  bittorrent  Delicious 
may 2016 by asteroza
OnionCat | An Anonymous VPN-Adapter
IPv6 overlay VPN between two tor hidden service endpoints, so it sorta lets you do UDP over tor, at least to the other VPN endpoint. What happens after is up to the endpoint though.
tor  VPN  software  hidden  service  endpoint  IPv6  overlay  UDP  Delicious 
march 2016 by asteroza
OTR.im - Whispering Off The Record
IM service that uses forced OTR and has a tor hidden service entrance, with servers that do no logging at all on LUKS FDE rigs. Better than nothing...
free  jabber  XMPP  OTR  chat  IM  messaging  service  secure  security  privacy  anonymity  tor  Delicious 
october 2015 by asteroza
Special-Use Domain Names
.onion is now officially off limits for clearnet
RFC  special  use  DNS  name  onion  tor  Delicious 
september 2015 by asteroza
Tribler - Privacy using our Tor-inspired onion routing
Tries to be secure by using tor, plus a little tit-for-tat network load sharing (use uplink for the network onion routing for other peers). Though that means you might be classed as an exit node of sorts, plus naturally it's slower than clearnet due to the onion routing.
tor  bittorrent  torrent  client  distributed  search  p2p  file  sharing  anonymity  Delicious 
january 2015 by asteroza
anonabox
Looks like some dude using a cheap chinese mini-router and claiming to be custom hardware, and he got busted for doing so by the reddit lynchmob. Probably safer to use grugq's PORTAL and a generic TP-link router...
hardware  tor  router  network  wifi  wireless  anonymity  privacy  Delicious 
october 2014 by asteroza
grugq/portal
Alternate TP-Link portable network router firmware to enforce security/privacy, and to have an airtight TOR entrance gateway.
opensource  software  security  OpenWRT  wifi  wireless  network  router  firmware  OS  research  TOR  VPN  endpoint  portal  TP-link  Delicious 
august 2014 by asteroza
Pond - Pond
Interesting tor based async messaging server/protocol, sorta the encrypted equivalent of email without leaking too much metadata.
software  email  communication  encryption  forward  asynchronous  secure  messaging  security  tor  privacy  Delicious 
august 2013 by asteroza
[1207.7139] Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
Interesting research into the financial success of Silk Road, an online marketplace for illegal drugs using the BitCoin cryptocurrency. The high satisfaction rate may be an early adopter effect, where most users are rational actors who don't cheat much. The need for Tor and BitCoin does tend to put users into a higher intelligence rank than their standard junkie counterparts.
SilkRoad  illegal  drug  marketplace  Tor  BitCoin  financial  business  success  economics  research  Delicious 
august 2012 by asteroza
Tor Cloud
I dunno, it is cheap and rapidly increases the potential number of nodes, but you start to create observation choke points and single points of failure. it's one thing to be running tor on real hardware in a colo somewhere, it's quite another to be running tor in virtualized instances in a cloud computing cluster owned by a corporation that regularly assists law enforcement without a court order, which would allow memory peeping. The only defense against this is that these seem to be bridge/relay nodes and not exit nodes normally, but that doesn't solve the network monitoring issue.
amazon  EC2  tor  guard  exit  bridge  relay  node  setup  guide  howto  tutorial  reference  cloud  computing  security  privacy  anonymity  Delicious 
november 2011 by asteroza
Covert Browser
The humorous part is you have to buy this at the iTunes store on an Apple product, which feels like the antithesis of privacy and anonymity...
iPhone  iPad  tor  secure  web  browser  security  privacy  anonymity  app  software  Delicious 
november 2011 by asteroza
Force10 adds rack-topping Gigabit switch • The Register
Interesting large buffer gigabit switch, to better deal with bursty VM situations. Uses cheaper 1Gbps connections too, since 10Gbps still isn't cheap. As long as you are bursty, and don't have raw IO that exceeds 1Gbps, it's an attractive idea.
ToR  rack  top  network  switch  hardware  electronics  devices  high  performance  buffer  1Gbps  gigabit  virtualization  surge  bandwidth  Delicious 
june 2010 by asteroza
« earlier      
per page:    204080120160

related tags

1Gbps  2.0  3G  abuse  access  activism  adapter  add  addon  address  algorithm  alternative  amazon  AN.ON  android  anonimization  anonymity  anonymizer  anonymizing  anonymous  API  app  appliance  architecture  AS50066  astoria  async  asynchronous  authentication  automated  background  balancer  bandwidth  banner  bidirectional  bitblinder  BitCoin  bitmessage  bittorrent  blackmail  blind  blinded  block  blog  bridge  browser  buffer  bug  business  bypass  CA  CAPTCHA  card  Cashmere  certificate  change  charity  chat  checker  chrome  CIA  clearnet  client  clock  closed  cloud  cloudflare  colo  combined  communication  communications  compression  computer  computing  concept  configuration  control  copperhead  CPU  cryptoAPI  cryptography  crytographic  daemons  dark  darknet  darkweb  data  date  debian  decentralized  deep  Delicious  delivery  deployment  design  detection  development  devices  distributed  distribution  distro  DNS  document  domain  drug  duckduckgo  EC2  economics  electronics  email  encrypted  encryption  endpoint  engine  ethernet  europe  EV  exit  extension  file  financial  firefox  firewall  firmware  fork  forward  forwarding  framework  free  freedom  fronting  gateway  gigabit  GlobalLeaks  GNU  GPG  grid  guard  guide  gzip  hacking  hacktivismo  hactivist  hardening  hardware  hidden  hideen  high  hosting  howto  HTTP  humor  Hydra  I2P  identity  illegal  IM  IMAP4  implementation  infrastructure  inline  inspection  instabird  instant  instantbird  integration  international  internet  iOS  iPad  iPhone  IPSEC  IPv6  ISP  jabber  Janus  JanusPA  JanusVM  JAP  java  JonDonym  JonDos  L2TP  LAFS  law  layer  leak  leakage  legal  libpurple  linux  liveCD  liveDVD  load  lobbying  local  locator  mac  mapping  marketplace  message  messaging  metadata  mGuard  MitM  mixmaster  mobile  Mozilla  MTA  mutual  name  NAT  native  netowrk  network  networking  news  node  noisebridge  obfuscation  on  onion  opensource  openVPN  OpenWRT  Opera  OperaTor  opnion  OPSEC  orbot  ORG-STN4-RIPE  OS  OSINT  OSX  OTR  overlay  OzymanDNS  p2p  package  pentesting  performance  persistence  personal  PGP  phantom  Pidgen  plugin  politics  pond  POP3  port  portable  portal  portalable  privacy  private  Privoxy  process  programming  protection  protocol  proxy  pseudoanonimity  pseudoanonymity  publisher  publishing  pubsub  rack  RAM  RAMdisk  RaspberryPi  recon  reference  relay  remote  repeater  research  resilient  RFC  ricochet  ricochet.im  riffle  rogue  router  routing  RPC  scale  scanner  scanning  scatterchat  science  scraping  search  secure  security  serious  server  service  services  setup  shadowsocks  sharing  SilkRoad  SIM  site  skew  smartphone  SMTP  social  software  special  speed  SSH  SSL  statistics  status  STN  storage  streisand  strongbox  success  suite  support  surge  sweden  switch  Tahoe  Tahoe-LAFS  Tails  tap  technology  temperature  tester  ThePirateBay  thunderbird  time  timestamp  timezone  tips  TLS  token  toogle  tools  top  tor  Tor-ramdisk  tor2web  TorChat  torpack  torpark  torrent  TP-link  tracker  traffic  transparent  tricks  tubes  tunnel  tunneled  tunneling  tutorial  UDP  union  upload  USB  use  utilities  Virgil  virtualization  visualization  VM  vmware  VPN  WAMP  web  webmail  websocket  whack-a-mole  whistleblower  wifi  windows  wireless  XMPP 

Copy this bookmark:



description:


tags: