asteroza + anonymity   201

Unknown Fund is Going to Invest and Donate $100 Million for the Development of Ideas of Anonymity — Unknown Fund
Similar to the Pineapple Fund, sorta anonymous investing, should be legal with private companies accepting the bitcoin directly (no KYC) as long as they don't solicit the investment...
anonymous  technology  investment  bitcoin  fund  finance  startup  anonymity  privacy  security  research 
3 days ago by asteroza
Mudi: 4G LTE Privacy Router for Road Warriors by GL.iNet — Kickstarter
GL.iNet's new portable mobile router, effectively loaded up with Grugq's PORTAL privacy system.
kickstart  GL.iNet  portable  mobile  router  wifi  accesspoint  wireguard  tor  PORTAL  security  privacy  anonymity 
5 days ago by asteroza
Loki - Trade and communicate with absolute freedom.
Some sort of hybrid overlay network, taking some of the mixnet properties of Tor, some of the mixnet and UDP protocol underpinnings of I2P, and using a blockchain token system in the mixnet to try to hold down bad actors trying to take majority routing control (a key weakness of Tor) via both proof of work and proof of stake/service (for hidden services called SNapps).
anonymity  privacy  security  mixnet  overlay  network  cryptography  encryption  blockchain  token 
12 days ago by asteroza
GL.iNet on Twitter: "👍👍👍… "
Looks like GL.iNEt's Brume (GL-MV1000) is the basis for the new version of the Grugq's PORTAL secure mobile router gateway device, featuring one button tor mode activation, wireguard, and OpenVPN.
GL.iNet  Brume  GL-MV1000  4G  LTE  mobile  router  wifi  accesspoint  PORTAL  tor  wireguard  openVPN  security  privacy  anonymity 
13 days ago by asteroza
hashmatter/p3lib: privacy preserving primitives and protocols (p3) for routing and messaging in P2P networks
some sort of overlay privacy extension to stick on top of a P2P layer, but to be honest that usually doesn't end well...
P2P  network  privacy  anonymity  security 
25 days ago by asteroza
Home - MySudo
virtual email address aliases and burner phone numbers
privacy  anonymity  security  burner  virtual  phone  number  email  address  alias  service 
12 weeks ago by asteroza
Windows Host File - Pastebin.com
Anti-microsoft hosts file. Note that this may cripple some windows features you actually use as well, like say SmartScreen/URS
windows  hosts  file  privacy  anonymity  block  security 
july 2019 by asteroza
Juggalo Makeup Blocks Facial Recognition Technology | Consequence of Sound
Juggalos evade light contrast based facial detection, but they're still boned by depth sensing cameras like FaceID. Better than CVdazzle?
Juggalo  Juggalette  face  makeup  antisurveillance  recongition  defense  camouflage  privacy  anonymity  CVdazzle 
july 2019 by asteroza
Mozilla Research Call: Tune up Tor for Integration and Scale | Tor Blog
Interest talk of trying to mainline Tor into Firefox proper, which would vastly increase Tor usership. Which will have interesting consequences (bandwidth pressure on exit nodes, more traffic to hide in AKA herd immunity, etc.) both good and bad. Though if they did, why not also mix in some I2P and IPFS while their at it?
Mozilla  Firefox  Tor  integration  privacy  anonymity  security  scale 
may 2019 by asteroza
e · GitLab
Appears to be an attempt to do AOSP while removing google tracking hooks
AOSP  android  OS  alternative  privacy  anonymity 
february 2019 by asteroza
PriFi
experimental anonymous comms network that is trying to be traffic analysis immune, particularly near endpoints which are under local adversarial organization control (aka corp networks)
privacy  anonymity  encryption  anonymous  communications  protocol  research  software 
august 2018 by asteroza
dfd-tud/deda
Trying to defeat yellow dot tracking patterns embedded in printed documents
printer  yellow  dot  antiforensic  antiforensics  privacy  anonymity  antitracking  research  software  security  tracking  forensics  printing 
july 2018 by asteroza
Wi-Fi Privacy Police - Apps on Google Play
Trying to keep the wifi stack from broadcasting known AP names, as a data leakage point
android  app  software  wifi  AP  accesspoint  name  block  security  privacy  anonymity 
june 2018 by asteroza
Distributed Localization: A Linear Theory - IEEE Journals & Magazine
Using linear approximations seems to work decently to calculate location using a distributed architecture. AKA using cellphones to geolocate each other rather than triangulate strictly from basestations, and using it like a graph node network so your tracking ability can reach like a tentacle into buildings and closed spaces, assuming nobody is feeding fake info...
p2p  5G  geolocation  IoT  decentralized  positioning  location  algorithm  anchorless  dynamic  privacy  security  anonymity  mapping 
may 2018 by asteroza
Zcash - New Empirical Research into Zcash Privacy
TLDR; Popping Zcash into and then right back out of a shielded address still exposes you traffic analysis discovery, you big dummy
Zcash  shielded  address  discovery  traffic  analysis  data  leakage  security  privacy  anonymity 
december 2017 by asteroza
Privacy Pass
So this is the intermediate solution to Cloudflare CAPTCHA's disturbing every connect via Tor. You get 30 tokens for one CAPTCHA, which you burn for subsequent passes through Cloudflare until you run out.
security  privacy  anonymity  CloudFlare  CAPTCHA  tor  chrome  firefox  plugin  addon  extension 
november 2017 by asteroza
REFLECTACLES - Reflective Eyewear - Sunglasses - Glasses
Eyewear with retroreflective tape, reflecting visible/IR light. I suppose one could say this is anti-surveillance/anti-paparazzi gear. But, while they may not get your face, you stick out like a sore thumb on IR CCTV surveillance footage at night.
retroreflector  reflective  eyeglasses  sunglasses  eyewear  privacy  anonymity  antipaparazzi  antisurveillance  security  Delicious 
november 2016 by asteroza
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recog...
Using tweaked glasses which present some fake facial features due to overlay on the thick frame, it might be possible to adversarially fool face recognition systems (potential "I am Sparticus" effect) but the researchers cheated a bit and did the overlay glasses on an existing picture, rather than live humans wearing real defensive glasses.
adversarial  privacy  protection  defense  anonymity  face  recognition  glasses  overlay  attack  exploit  security  research  image  Delicious 
november 2016 by asteroza
BlockWindows/hosts at master · WindowsLies/BlockWindows
Supposedly a windows 10 telemetry block hosts file, but the 0.0.0.0 routing will probably get noticed by the OS. Note W10 telemetry is hard coded, so putting this file on a W10 box does nothing, it must be done by the upstream DNS.
windows  10  telemetry  block  DNS  hosts  file  security  privacy  anonymity  Delicious 
july 2016 by asteroza
riffle.pdf
Proposal for an alternative to tor, but isn't I2P superior with the given design constraints?
riffle  anonymous  communication  protocol  design  research  anonymity  privacy  VPN  software  algorithm  alternative  tor  Delicious 
july 2016 by asteroza
Silverpush - Unifying people, devices and data
So these guys drop a cookie on a PC browser, to get it to emit ultrasonic tones via speakers (similar tones during ads on TV). If their SDK is in your smartphone, a mic accessible app now knows to assoicate that PC/TV with that smartphone. SDK installed in 18 million smartphones...
privacy  anonymity  attack  ultrasonic  audio  sound  beacon  token  advertising  tracking  security  hacking  OPSEC  Delicious 
november 2015 by asteroza
OTR.im - Whispering Off The Record
IM service that uses forced OTR and has a tor hidden service entrance, with servers that do no logging at all on LUKS FDE rigs. Better than nothing...
free  jabber  XMPP  OTR  chat  IM  messaging  service  secure  security  privacy  anonymity  tor  Delicious 
october 2015 by asteroza
Patent US20150124107 - Associating cameras with users and objects in a social networking system
Facebook trying to patent logging camera artifacts to connect together unattributed photos "for social network purposes". Which means they now posess deanonimization technology given a large enough body of pictures to datamine, since they can now fingerprint the camera, and by extension associate it with certain circles of people or a certain owner.
facebook  patent  image  picture  photo  camera  artifact  deanonimization  attack  datamining  security  privacy  anonymity  Delicious 
september 2015 by asteroza
めがねのまち鯖江が挑戦する『近未来のメガネ』開発に参加しませんか!| FAAVO さばえ
So japan's National Institute of Informatics decided making a set of eyeglasses that disrupt facial recognition algorithms would make a good crowdfunding campaign. I suppose this is marginally more acceptable than facedazzle makeup, but without the IR LED's to blind security cameras, this probably has limits.
japan  crowdfunding  privacy  visor  sunglasses  eyeglasses  facial  recognition  block  defense  countermeasure  anonymity  Delicious 
august 2015 by asteroza
« earlier      
per page:    204080120160

related tags

0.5  2.0  2ch  2chan  4chan  4G  5G  802.11  accesspoint  account  active  activism  activist  ad  adapter  add  addon  address  adversarial  advertising  advocacy  AirChat  ajavascipt  ajax  alert  algorithm  alias  alternative  amazon  AN.ON  analysis  anarchy  anchorless  android  anon  anonimization  anonym.OS  anonymity  anonymizer  anonymizing  anonymous  anti-face-detection  anti-OCR  anti-surveillance  antiforensic  antiforensics  antipaparazzi  antiRFID  antisnooping  antispam  antisurveillance  antitracking  AOSP  AP  API  app  apparel  appliance  architecture  art  artifact  assemblage  astoria  attack  audio  automated  backhaul  bag  bandaid  beacon  biometrics  bitblinder  bitcoin  bittorrent  block  blockchain  blocker  blocklist  blog  bluetooth  bonjour  BoxOfProx  bridge  browser  browser-in-browser  Brume  BSD  bulb  burner  button  bypass  C&C  cage  camera  CamoFlash  camouflage  canary  CAPTCHA  capture  card  cascade  Cashmere  CCTV  censorship  certificate  CGI  cgiproxy  change  charity  chart  chat  check  checker  chrome  circumvention  clearnet  client  clipboard  clock  cloning  closed  clothing  cloud  CloudFlare  clutch  coat  collaboration  combined  commercial  communication  communications  comparison  computer  computing  ComSec  configuration  consumer  content  control  conversion  cookie  cookies  copperhead  counter  countermeasure  countersurveillance  countersurveillant  CPU  creation  crowdfunding  crowdsourcing  cryptoAPI  cryptocurrency  cryptography  customization  CV  CVdazzle  daemon  daemons  darknet  data  datamining  dazzle  deaddrop  deanonimization  debian  decentralized  decryption  deep  defense  Delicious  delivery  demonstrator  dependent  design  desktop  destruct  detection  development  device  devices  DHT  DIFRwear  directory  discovery  disposable  dissent  dissident  distributed  distribution  distro  DLL  DNS  DNSSEC  document  domain  dot  doxing  DPI  Dvach  dynamic  E-ZPass  e2e  EC2  Echo  ecommerce  education  EFF  ElectroBSD  electronics  email  emulation  encrypted  encryption  end2end  engine  environment  ephemeral  espionage  essay  estimate  ethernet  evasion  evercookie  evil  exit  exploit  extension  eyeglasses  eyewear  F2F  face  facebook  facial  failure  fake  FakeAP  false  faraday  fashion  file  filesystem  filter  finance  fingerprint  fingerprinting  firefox  firewall  flash  FluidNexus  FOIA  font  forensics  fork  forward  forwarding  framework  free  FreeBSD  freedom  freenet  frontend  fronting  fund  gateway  general  gentoo  geolocation  GIFC  GL-MV1000  GL.iNet  glasses  GNU  google  GPG  graphic  group  guard  guardian  guide  hack  hacking  hard  hardware  hardwareware  header  hidden  high  honeypot  hooking  hosting  hostproof  hosts  howto  HTTP  HTTPS  humor  Hydra  hyperlocal  I2P  iBypass  ID  idendtity  identification  identity  III  IM  image  implementation  info  information  injection  input  inspection  instabird  instant  instantbird  integration  internet  interview  investment  iOS  IoT  IP  iPad  iphone  IPredator  IR  ISO  ISP  ITU  jabber  Janus  JanusVM  JAP  japan  java  javascript  JonDo  JonDonym  journalism  Juggalette  juggalo  keylogger  kickstart  kickstarter  kit  korea  law  LBS  leak  leakage  LED  legal  Liberté  libpurple  link  links  linux  list  LiveCD  liveCD  liveDVD  lobbying  local  location  logging  login  low  LTE  mac  machine  MACshift  mail  makeup  malware  management  mapping  marker  market  marketplace  mDNS  media  message  messaging  messenger  meta  metadata  michigan  microblogging  Mirage  mix  mixmaster  mixminion  mixnet  mob  mobile  module  monitoring  moo  movie  Mozilla  name  NAT  native  network  networking  nevercookie  news  no  node  noise  NSL  number  obfuscation  observatory  offline  OFFsystem  on  OneSwarm  onion  online  opencv  opensource  openVPN  Opera  OperaTor  OPSEC  OpSec  opt-out  optout  OS  OSX  OTR  overlay  overview  owner  p2p  package  packaged  packet  Panopticlick  party  PasteBay  pastebin  patent  payment  pentesting  personal  PGP  phantom  phone  photo  php  phpproxy  PHProxy  picture  Pidgen  piracy  pirate  piratebay  pivacy  plaintext  platform  plugin  plus  PoC  politics  pond  portable  PORTAL  positioning  postal  posting  PPTP  prepaid  prevention  printer  printing  privacy  private  Privoxy  programming  proof-of-concept  protection  protest  protestor  protocol  provider  proxy  proxybox  pseudoanonimity  pseudoanonymity  pseudoanonymous  pseudonym  public  purchase  QuickSilver  RAM  RAMdisk  real  recognition  recongition  redirect  redirection  reference  reflective  relakks  relay  remailer  remailing  requestion  research  resilient  resistant  retroreflector  reverse  review  RFID  ricochet  ricochet.im  riffle  rights  router  routing  russia  safari  satellite  scale  scan  scanner  scanning  science  scoial  search  secure  SecureIX  security  self  self-destruct  sender  sensor  server  serverless  service  services  setting  setup  ShareMeNot  sharing  shield  shielded  signal  signaling  site  skew  skimming  slopsbox  smartphone  SMS  SNS  social  SOCKS  SOCKS4  SOCKS5  Socksify  software  sound  spam  spamtrap  speed  spoofing  spyware  SSL  standard  startup  storage  strongbox  structured  submission  suite  sunglasses  supercookie  support  suppression  SURB  surveillance  suspended  sweden  swedish  sysadmin  tag  tail  Tails  targeting  technology  telemetry  telephone  temperature  temporary  test  tester  testing  text  thepiratebay  throwaway  thunderbird  time  timestamp  tips  token  tools  tor  Tor-ramdisk  TorChat  torpack  torrent  TPB  TPM  tracker  tracking  traffic  transparent  trap  tricks  tripwire  trusted  tunnel  tunneling  tutorial  tweet  twister  twitter  type  typeface  ubercookie  UID  ultrasonic  uncensored  upload  uproxy  URL  USB  utilites  utilities  verification  Vibe  video  virtual  virtualization  vision  visor  VM  vmware  voice  VPN  vuvuzela  wallet  warrant  web  whack-a-mole  whistleblower  whspr  wifi  wiki  windows  wireguard  wireless  XMPP  XP  Y.2770  Yauba  yellow  Zcash  ZeroBin  zerocash  zerocoin  ZXX 

Copy this bookmark:



description:


tags: