I would be more happy if my tor node would not be so very obviously visible. My current best idea is, if also the tor protocol is being ssl/tls-based, then it could be put and be multiplexed with ordinary https traffic on tcp port 443. My idea is to have some multiplexer tool which decides about all incoming connections, if it is coming to the tor service or to the ordinary webserver (that is probably simple, for example using SNI), and then proxies, where it has to be. Can it work? What is t...| Recent Questions - Tor Stack Exchange
How do I run an exit node anonymously? By anonymously, I mean that nobody can identify who created or runs the exit node. I know that the IP addresses of exit nodes will be publicly available, so I am assuming that I will have to run the exit node somewhere far away from my location. But I need more clarification on how to exactly do this.| Recent Questions - Tor Stack Exchange
I accidentally resized tor browser. How to change back to default size without restart?| Recent Questions - Tor Stack Exchange
I'm trying to connect to an OpenVPN server through Tor Socks Proxy. When I try to connect to the VPN sometimes I receive this error message "Recv_socks_reply: TCP Port Read Timeout expired" and OpenVPN tries to re-establish the connection. Other times instead the connection to the VPN happens successfully, but as soon as I try to connect to a website the connection falls by giving me "Inactivity timeout (--ping-restart), restarting". Using the same .ovpn and the same torrc on Windows everythi...| Recent Questions - Tor Stack Exchange
Tails 7.0 launches with Debian 13 and GNOME 48, bringing faster startup, updated apps, and improved hardware support, though GNOME 49 already makes it feel a bit behind.| NERDS.xyz
In his recent post, “Privacy needs to be baked into L1”, Frank Braun makes the bold claim: Privacy is the absence of information leakage and that implies it comes from value at rest, no…| @lightcoin
The Onion Router (TOR) has been one of the most secure and reliable methods that people have been using to access the internet since the early 2000s. The| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Poland, currently presiding over the EU Council, proposes a major change to the much-criticised EU chat control proposal to search all private chats for suspicious content, even at the cost of destroying secure end-to-end encryption: Instead of mandating the general monitoring of private chats („det| Patrick Breyer
Do you run Tor on Windows? Do you Google and Torrent on Tor? Here is a list of things you should NOT be doing while using Tor.| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A sort of topic-specific collection of links from about the last year, broadly talking about inclusion in communities, online and off, especially in geek(y) spaces. What kind of discourses and conversations do we want to encourage and have? Nalo Hopkinson’s WisCon 2016 Guest of Honor speech: “There are many people who do good in this […]| Geek Feminism Blog
In a previous article I described how to significantly increase your online privacy with the Tor service. RetroShare is another option for Internet users who are concerned with staying anonymous online. RetroShare is an application that lets you create private, secure network connections (based on 2048-bit RSA-encrypted SSL) with trusted individuals of your choice (a […]| Doug Vitale Tech Blog
Follow us on Twitter @HackRead| Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
Chat control is back on the agenda of EU governments. EU governments are to express their position on the latest proposal on 23 September. EU Ministers of the Interior are to adopt the proposal on 10/11 October. Latest update of 12 September... In June we managed to stop the unprecedented plan by| Patrick Breyer
I love New York. Not in a “sing my way down Broadway” sort of way, but in getting lost down the side street maze sort of way. I love the grit that the ever pressing force of gentrification seems to be pushing out; but more importantly, I feel absolutely anonymous when I am in the […]| Crutches and Spice
VyprVPN for Android, Mac OS X, Apple iOS, and Windows revs up your digital privacy. A virtual private network (VPN) creates a secure network connection over a network you don’t fully trust, such as the Internet. By creating secure tunnels between endpoints, VPNs are a way of disguising (encrypting) your data traffic so that third … … Continue reading →| Doug Vitale Tech Blog
Darwin’s Finches Almost 200 years ago, in 1831, Charles Darwin embarked on his now famous journey aboard the S.S. Beagle. This was the journey on which he visited the Galapágos Islands and fo…| Zander Nethercutt
I just watched the, as ever provocative, presentation of Paul Syverson at HotPETs 2017, on targeting adversaries against Tor. I will just put down here some thoughts on onion routing, threat models, and security engineering loosely related to the talk. Onion routing, as a concept, has committed an original sin, that has since its inception […]| Conspicuous Chatter
Boing Boing just released a classified GCHQ document that was meant to act as the Sept 2011 guide to open research problems in Data Mining. The intended audience, Heilbronn Institute for Mathematical Research (HIMR), is part of the University of Bristol and composed of mathematicians working for half their time on classified problems with GCHQ. First off, […]| Conspicuous Chatter
Inspired from another project called “Anonymous Wikipedia edits from the Norwegian parliament and government offices” I decided to create something similar for the Hellenic Parliament. I downloaded the XML dumps (elwiki-20140702-pages-meta-history.xml.7z) for the elwiki from http://dumps.wikimedia.org/elwiki/20140702/. The compressed file is less than 600Mb but uncompressing it leads to a 73Gb XML which contains the full […] The post Anonymous edits in Hellenic Wikipedia from Hellenic P...| Into.the.Void.
It’s particularly disturbing when products that are supposed to protect you, actually mislead you into a false sense of safety, hence endangering you. Take this bold claim by the otherwise qu…| usability | security | freedom
Bitcoin Black Friday Sale: 10% off all BusKill Hardware Dead Man Switches paid with cryptocurrencies. Expires Dec 03!| BusKill
Welcome to the ninth OnionScan Report. The aim of these reports is to provide an accurate and up-to-date analysis of how anonymity networks are being used in the real world. Over the last year we have produced reports into the state of onion services. In this final report we will| Mascherari Press
Online web tracking seems to have gotten more aggressive overnight as researchers developed a new hardware-level tracking technique that can identify multiple browsers. The technique, which cannot be blocked, changes the entire landscape for online privacy.| Freedom Hacker