GL.iNet on Twitter: "👍👍👍… "
4 weeks ago by asteroza
Looks like GL.iNEt's Brume (GL-MV1000) is the basis for the new version of the Grugq's PORTAL secure mobile router gateway device, featuring one button tor mode activation, wireguard, and OpenVPN.
GL.iNet
Brume
GL-MV1000
4G
LTE
mobile
router
wifi
accesspoint
PORTAL
tor
wireguard
openVPN
security
privacy
anonymity
4 weeks ago by asteroza
Snowflake
september 2019 by asteroza
Sounds like disposable relays using webRTC/websockets to tunnel through?
tor
snowflake
proxy
relay
networking
webRTC
september 2019 by asteroza
Mozilla Research Call: Tune up Tor for Integration and Scale | Tor Blog
may 2019 by asteroza
Interest talk of trying to mainline Tor into Firefox proper, which would vastly increase Tor usership. Which will have interesting consequences (bandwidth pressure on exit nodes, more traffic to hide in AKA herd immunity, etc.) both good and bad. Though if they did, why not also mix in some I2P and IPFS while their at it?
Mozilla
Firefox
Tor
integration
privacy
anonymity
security
scale
may 2019 by asteroza
Brass Horn Comms Onion3g
october 2018 by asteroza
Tor embedded in a SIM card? So I guess using a private APN to funnel tor traffic to their tor relay network gateways/bridges?
Tor
union
routing
SIM
data
card
hardware
electronics
devices
security
privacy
3G
october 2018 by asteroza
Introducing the Cloudflare Onion Service
september 2018 by asteroza
So, no more CAPTCHA's?
CloudFlare
tor
onion
gateway
september 2018 by asteroza
Introducing DNS Resolver for Tor
june 2018 by asteroza
Hrm, interesting, but that then could tie two circuits together for correlation...
cloudflare
Tor
DNS
endpoint
hidden
service
internet
infrastructure
server
june 2018 by asteroza
benjojo/six-onions: Like Tor2Web, but not just HTTP ( using IPv6 )
april 2018 by asteroza
Can't catch me, I'm behind 6 IP versions...
IPv6
mapping
tor
proxy
alternative
tor2web
hidden
service
networking
software
onion
DNS
april 2018 by asteroza
Privacy Pass – Add-ons for Firefox
february 2018 by asteroza
Cloudflare's CAPTCHA bypass solution, using blinded tokens. Basically, you do one captcha, and you are afforded a certain number of accesses based on that token, so Cloudflare harasses VPN/tor users less.
firefox
plugin
addon
extension
cloudflare
CAPTCHA
bypass
crytographic
blind
blinded
token
security
VPN
tor
access
block
browser
privacy
february 2018 by asteroza
Privacy Pass
november 2017 by asteroza
So this is the intermediate solution to Cloudflare CAPTCHA's disturbing every connect via Tor. You get 30 tokens for one CAPTCHA, which you burn for subsequent passes through Cloudflare until you run out.
security
privacy
anonymity
CloudFlare
CAPTCHA
tor
chrome
firefox
plugin
addon
extension
november 2017 by asteroza
Onion Investigator
november 2017 by asteroza
Like Shodan for hidden services
tor
onion
banner
scraping
recon
OSINT
security
hacking
pentesting
november 2017 by asteroza
meejah.ca
november 2017 by asteroza
Using tor would essentially hide the endpoint from clearnet public access, while potentially being able to penetrate firewalls. IoT safe remote access, or botnet C&C usage comes to mind. Interesting proof-of-concept though.
tor
WAMP
websocket
pubsub
remote
encrypted
P2P
RPC
networking
security
encryption
november 2017 by asteroza
Tor at the Heart: Tahoe-LAFS | The Tor Blog
december 2016 by asteroza
Now over tor hidden services you can run a distributed encrypted storage service, such that storage nodes can run unaware of their contents, and the nodes are marginally harder to destroy due to onion routing. So FreeNet is back, in a way, with many of the same performance penalties? I bet the journalists/whistleblowers/pedos will be delighted...
tor
Tahoe
LAFS
Tahoe-LAFS
distributed
onion
hidden
service
storage
grid
Delicious
december 2016 by asteroza
DetecTor.io
october 2016 by asteroza
Using tor as a second circuit to check for MitM SSL/TLS attacks. Not entirely out-of-band, but close enough?
SSL
TLS
security
rogue
CA
certificate
inspection
tor
checker
tester
MitM
Delicious
october 2016 by asteroza
The Pirate Bay
may 2016 by asteroza
PirateBay's onion link it seems
ThePirateBay
tor
onion
file
sharing
bittorrent
Delicious
may 2016 by asteroza
GitHub - jlund/streisand: Streisand sets up a new server running L2TP/IPsec, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run
opensource personal VPN server software IPSEC tor L2TP automated deployment repeater exit node SSH SSL setup tools utilities shadowsocks streisand Delicious
march 2016 by asteroza
opensource personal VPN server software IPSEC tor L2TP automated deployment repeater exit node SSH SSL setup tools utilities shadowsocks streisand Delicious
march 2016 by asteroza
OnionCat | An Anonymous VPN-Adapter
march 2016 by asteroza
IPv6 overlay VPN between two tor hidden service endpoints, so it sorta lets you do UDP over tor, at least to the other VPN endpoint. What happens after is up to the endpoint though.
tor
VPN
software
hidden
service
endpoint
IPv6
overlay
UDP
Delicious
march 2016 by asteroza
Tor Messenger Beta: Chat over Tor, Easily | The Tor Blog
october 2015 by asteroza
er, javascript+libpurple, this will not end well...
tor
IM
chat
instant
messaging
client
software
instantbird
libpurple
privacy
anonymity
pseudoanonimity
security
Delicious
october 2015 by asteroza
OTR.im - Whispering Off The Record
october 2015 by asteroza
IM service that uses forced OTR and has a tor hidden service entrance, with servers that do no logging at all on LUKS FDE rigs. Better than nothing...
free
jabber
XMPP
OTR
chat
IM
messaging
service
secure
security
privacy
anonymity
tor
Delicious
october 2015 by asteroza
Bynum Law Office Tor Exit Node
may 2015 by asteroza
These lawyers have brass balls...
humor
legal
protection
tor
exit
node
Delicious
may 2015 by asteroza
Tribler - Privacy using our Tor-inspired onion routing
january 2015 by asteroza
Tries to be secure by using tor, plus a little tit-for-tat network load sharing (use uplink for the network onion routing for other peers). Though that means you might be classed as an exit node of sorts, plus naturally it's slower than clearnet due to the onion routing.
tor
bittorrent
torrent
client
distributed
search
p2p
file
sharing
anonymity
Delicious
january 2015 by asteroza
anonabox
october 2014 by asteroza
Looks like some dude using a cheap chinese mini-router and claiming to be custom hardware, and he got busted for doing so by the reddit lynchmob. Probably safer to use grugq's PORTAL and a generic TP-link router...
hardware
tor
router
network
wifi
wireless
anonymity
privacy
Delicious
october 2014 by asteroza
Pond - Pond
august 2013 by asteroza
Interesting tor based async messaging server/protocol, sorta the encrypted equivalent of email without leaking too much metadata.
software
email
communication
encryption
forward
asynchronous
secure
messaging
security
tor
privacy
Delicious
august 2013 by asteroza
[1207.7139] Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
august 2012 by asteroza
Interesting research into the financial success of Silk Road, an online marketplace for illegal drugs using the BitCoin cryptocurrency. The high satisfaction rate may be an early adopter effect, where most users are rational actors who don't cheat much. The need for Tor and BitCoin does tend to put users into a higher intelligence rank than their standard junkie counterparts.
SilkRoad
illegal
drug
marketplace
Tor
BitCoin
financial
business
success
economics
research
Delicious
august 2012 by asteroza
related tags
1Gbps ⊕ 2.0 ⊕ 3G ⊕ 4G ⊕ abuse ⊕ access ⊕ accesspoint ⊕ activism ⊕ adapter ⊕ add ⊕ addon ⊕ address ⊕ algorithm ⊕ alternative ⊕ amazon ⊕ AN.ON ⊕ android ⊕ anonimization ⊕ anonymity ⊕ anonymizer ⊕ anonymizing ⊕ anonymous ⊕ API ⊕ app ⊕ appliance ⊕ architecture ⊕ AS50066 ⊕ astoria ⊕ async ⊕ asynchronous ⊕ authentication ⊕ automated ⊕ background ⊕ balancer ⊕ bandwidth ⊕ banner ⊕ BBC ⊕ bidirectional ⊕ bitblinder ⊕ BitCoin ⊕ bitmessage ⊕ bittorrent ⊕ blackmail ⊕ blind ⊕ blinded ⊕ block ⊕ blog ⊕ bridge ⊕ browser ⊕ Brume ⊕ buffer ⊕ bug ⊕ business ⊕ bypass ⊕ CA ⊕ CAPTCHA ⊕ card ⊕ Cashmere ⊕ certificate ⊕ change ⊕ charity ⊕ chat ⊕ checker ⊕ chrome ⊕ CIA ⊕ clearnet ⊕ client ⊕ clock ⊕ closed ⊕ cloud ⊕ cloudflare ⊕ colo ⊕ combined ⊕ communication ⊕ communications ⊕ compression ⊕ computer ⊕ computing ⊕ concept ⊕ configuration ⊕ control ⊕ copperhead ⊕ CPU ⊕ cryptoAPI ⊕ cryptography ⊕ crytographic ⊕ daemons ⊕ dark ⊕ darknet ⊕ darkweb ⊕ data ⊕ date ⊕ debian ⊕ decentralized ⊕ deep ⊕ Delicious ⊕ delivery ⊕ deployment ⊕ design ⊕ detection ⊕ development ⊕ devices ⊕ directory ⊕ distributed ⊕ distribution ⊕ distro ⊕ DNS ⊕ document ⊕ domain ⊕ drug ⊕ duckduckgo ⊕ EC2 ⊕ economics ⊕ electronics ⊕ email ⊕ encrypted ⊕ encryption ⊕ endpoint ⊕ engine ⊕ ethernet ⊕ europe ⊕ EV ⊕ exit ⊕ extension ⊕ file ⊕ financial ⊕ firefox ⊕ firewall ⊕ firmware ⊕ fork ⊕ forward ⊕ forwarding ⊕ framework ⊕ free ⊕ freedom ⊕ fronting ⊕ gateway ⊕ gigabit ⊕ GL-MV1000 ⊕ GL.iNet ⊕ GlobalLeaks ⊕ GNU ⊕ GPG ⊕ grid ⊕ guard ⊕ guide ⊕ gzip ⊕ hacking ⊕ hacktivismo ⊕ hactivist ⊕ hardening ⊕ hardware ⊕ hidden ⊕ hideen ⊕ high ⊕ hosting ⊕ howto ⊕ HTTP ⊕ humor ⊕ Hydra ⊕ I2P ⊕ identity ⊕ illegal ⊕ IM ⊕ IMAP4 ⊕ implementation ⊕ infrastructure ⊕ inline ⊕ inspection ⊕ instabird ⊕ instant ⊕ instantbird ⊕ integration ⊕ international ⊕ internet ⊕ iOS ⊕ iPad ⊕ iPhone ⊕ ipsec ⊕ IPv6 ⊕ ISP ⊕ jabber ⊕ Janus ⊕ JanusPA ⊕ JanusVM ⊕ JAP ⊕ java ⊕ JonDonym ⊕ JonDos ⊕ kickstart ⊕ L2TP ⊕ LAFS ⊕ law ⊕ layer ⊕ leak ⊕ leakage ⊕ legal ⊕ libpurple ⊕ linux ⊕ liveCD ⊕ liveDVD ⊕ load ⊕ lobbying ⊕ local ⊕ localhost ⊕ locator ⊕ LTE ⊕ mac ⊕ mapping ⊕ marketplace ⊕ message ⊕ messaging ⊕ metadata ⊕ mGuard ⊕ MitM ⊕ mixmaster ⊕ mobile ⊕ Mozilla ⊕ MTA ⊕ mutual ⊕ name ⊕ NAT ⊕ native ⊕ netowrk ⊕ network ⊕ networking ⊕ news ⊕ node ⊕ noisebridge ⊕ obfuscation ⊕ on ⊕ onion ⊕ opensource ⊕ openvpn ⊕ OpenWRT ⊕ Opera ⊕ OperaTor ⊕ opnion ⊕ OPSEC ⊕ orbot ⊕ ORG-STN4-RIPE ⊕ OS ⊕ OSINT ⊕ OSX ⊕ OTR ⊕ overlay ⊕ OzymanDNS ⊕ p2p ⊕ package ⊕ pentesting ⊕ performance ⊕ persistence ⊕ personal ⊕ PGP ⊕ phantom ⊕ Pidgen ⊕ plugin ⊕ politics ⊕ pond ⊕ POP3 ⊕ port ⊕ portable ⊕ portal ⊕ portalable ⊕ privacy ⊕ private ⊕ Privoxy ⊕ process ⊕ programming ⊕ protection ⊕ protocol ⊕ proxy ⊕ pseudoanonimity ⊕ pseudoanonymity ⊕ publisher ⊕ publishing ⊕ pubsub ⊕ rack ⊕ RAM ⊕ RAMdisk ⊕ RaspberryPi ⊕ recon ⊕ reference ⊕ relay ⊕ remote ⊕ repeater ⊕ research ⊕ resilient ⊕ RFC ⊕ ricochet ⊕ ricochet.im ⊕ riffle ⊕ rogue ⊕ router ⊕ routing ⊕ RPC ⊕ scale ⊕ scanner ⊕ scanning ⊕ scatterchat ⊕ science ⊕ scraping ⊕ search ⊕ secure ⊕ security ⊕ serious ⊕ server ⊕ service ⊕ services ⊕ setup ⊕ shadowsocks ⊕ sharing ⊕ SilkRoad ⊕ SIM ⊕ site ⊕ skew ⊕ smartphone ⊕ SMTP ⊕ snowflake ⊕ social ⊕ software ⊕ special ⊕ speed ⊕ SSH ⊕ SSL ⊕ statistics ⊕ status ⊕ STN ⊕ storage ⊕ streisand ⊕ strongbox ⊕ success ⊕ suite ⊕ support ⊕ surge ⊕ sweden ⊕ switch ⊕ Tahoe ⊕ Tahoe-LAFS ⊕ Tails ⊕ tap ⊕ technology ⊕ temperature ⊕ tester ⊕ ThePirateBay ⊕ thunderbird ⊕ time ⊕ timestamp ⊕ timezone ⊕ tips ⊕ TLS ⊕ token ⊕ toogle ⊕ tools ⊕ top ⊕ tor ⊖ Tor-ramdisk ⊕ tor2web ⊕ TorChat ⊕ torpack ⊕ torpark ⊕ torrent ⊕ TP-link ⊕ tracker ⊕ traffic ⊕ transparent ⊕ tricks ⊕ tubes ⊕ tunnel ⊕ tunneled ⊕ tunneling ⊕ tutorial ⊕ UDP ⊕ union ⊕ upload ⊕ USB ⊕ use ⊕ utilities ⊕ Virgil ⊕ virtualization ⊕ visualization ⊕ VM ⊕ vmware ⊕ VPN ⊕ WAMP ⊕ web ⊕ webmail ⊕ webRTC ⊕ websocket ⊕ whack-a-mole ⊕ whistleblower ⊕ wifi ⊕ windows ⊕ wireguard ⊕ wireless ⊕ XMPP ⊕Copy this bookmark: