Forwarded from BlackBox (Security) Archiv
8Chan Refugees Blow Their Anonymity
An unofficial new version of the hate-filled forum isnβt as anonymous as its users might hope.
Refugees from the anonymous 8chan forum are flooding into a new censorship-resistant home on the dark web, and inadvertently giving up their anonymity along the way.
A reincarnated version of the hate-filled forum, now linked to three mass shootings, appeared Monday when the original 8chan lost its hosting service. The new site, called 08chan (with a leading zero), has no affiliation with the original and itβs not entirely clear who set it up, but 8chanβs diaspora have been flooding in as word of the site spreads through right-wing social media.
The distinguishing feature of the new site is that it lives on ZeroNet, a peer-to-peer network designed by information activists to allow for uncensorable websites immune from government or corporate intervention. Instead of relying on a central server, a ZeroNet site is hosted in bits and pieces by everyone browsing it, making it virtually impossible to shut down.
βHard as they try, they will never stop us,β enthused one poster to the white supremacist β/pol/β board on 08chan. βWe are smarter and more innovative.β
βThe old 8chan site may be ashes, but this is the phoenix egg buried beneath,β another wrote.
Thereβs just one catch. Peer-to-peer networks expose a userβs internet address to anyone who cares to look. Thatβs how copyright lawyers catch people trading movies, music and software, and itβs how police and FBI agents arrest pedophiles trading child porn online.
ZeroNet works the same way, a fact thatβs been much-discussed on the new site. For that reason, ZeroNet integrates tightly with Tor, an anonymity system that places layers of cut-out addresses between a user and the websites they visit. But only 41 percent of 08chanβs usersβ are using Tor, based on our analysis of the peer-to-peer traffic at the site.
Users on 08chan have been complaining that the site is buggy and slow over Tor, and the siteβs own administrator initially encouraged anons to just connect directly. βFeel free to post without Tor,β he wrote in a welcome message. βEven as the admin I have no power to identify anyone.β
ππΌ Read more:
https://www.thedailybeast.com/8chan-users-migrating-to-zeronet-are-accidentally-revealing-their-locations
ππΌ Read as well:
https://habd.as/post/securely-access-08chan-zeronet/
#8chan #08chan #ZeroNet #anonymity
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
An unofficial new version of the hate-filled forum isnβt as anonymous as its users might hope.
Refugees from the anonymous 8chan forum are flooding into a new censorship-resistant home on the dark web, and inadvertently giving up their anonymity along the way.
A reincarnated version of the hate-filled forum, now linked to three mass shootings, appeared Monday when the original 8chan lost its hosting service. The new site, called 08chan (with a leading zero), has no affiliation with the original and itβs not entirely clear who set it up, but 8chanβs diaspora have been flooding in as word of the site spreads through right-wing social media.
The distinguishing feature of the new site is that it lives on ZeroNet, a peer-to-peer network designed by information activists to allow for uncensorable websites immune from government or corporate intervention. Instead of relying on a central server, a ZeroNet site is hosted in bits and pieces by everyone browsing it, making it virtually impossible to shut down.
βHard as they try, they will never stop us,β enthused one poster to the white supremacist β/pol/β board on 08chan. βWe are smarter and more innovative.β
βThe old 8chan site may be ashes, but this is the phoenix egg buried beneath,β another wrote.
Thereβs just one catch. Peer-to-peer networks expose a userβs internet address to anyone who cares to look. Thatβs how copyright lawyers catch people trading movies, music and software, and itβs how police and FBI agents arrest pedophiles trading child porn online.
ZeroNet works the same way, a fact thatβs been much-discussed on the new site. For that reason, ZeroNet integrates tightly with Tor, an anonymity system that places layers of cut-out addresses between a user and the websites they visit. But only 41 percent of 08chanβs usersβ are using Tor, based on our analysis of the peer-to-peer traffic at the site.
Users on 08chan have been complaining that the site is buggy and slow over Tor, and the siteβs own administrator initially encouraged anons to just connect directly. βFeel free to post without Tor,β he wrote in a welcome message. βEven as the admin I have no power to identify anyone.β
ππΌ Read more:
https://www.thedailybeast.com/8chan-users-migrating-to-zeronet-are-accidentally-revealing-their-locations
ππΌ Read as well:
https://habd.as/post/securely-access-08chan-zeronet/
#8chan #08chan #ZeroNet #anonymity
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
What the World can learn from Hongkong - From Unanimity to Anonymity
The people of Hong Kong have been using unique tactics, novel uses of technology, and a constantly adapting toolset in their fight to maintain their distinctiveness from China since early June. Numerous anonymous interviews with protesters from front liners to middle class supporters and left wing activists reveal a movement that has been unfairly simplified in international reporting.
β οΈ This Talk was translated into multiple languages. The files available for download contain all languages as separate audio-tracks. Most desktop video players allow you to choose between them. Please look for "audio tracks" in your desktop video player.
https://media.ccc.de/v/36c3-10933-what_the_world_can_learn_from_hongkong
#video #CCC #36c3 #Hongkong #Anonymity
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
The people of Hong Kong have been using unique tactics, novel uses of technology, and a constantly adapting toolset in their fight to maintain their distinctiveness from China since early June. Numerous anonymous interviews with protesters from front liners to middle class supporters and left wing activists reveal a movement that has been unfairly simplified in international reporting.
β οΈ This Talk was translated into multiple languages. The files available for download contain all languages as separate audio-tracks. Most desktop video players allow you to choose between them. Please look for "audio tracks" in your desktop video player.
https://media.ccc.de/v/36c3-10933-what_the_world_can_learn_from_hongkong
#video #CCC #36c3 #Hongkong #Anonymity
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
Forwarded from BlackBox (Security) Archiv
Obscurix: Linux Live System for privacy, security and anonymity
#Obscurix is a new open source #Live operating system based on #Arch #Linux. Obscurix attaches great importance to your #privacy, #security and #anonymity on the net. The live operating system routes all your traffic quite securely through the #Tor# network and also supports many other networks like #I2P and #Freenet.
Privacy, Security and Anonymity
To get it straight up front: Obscurix does not want to be a Linux operating system for pentesters. Even if you mainly want to play games on your computer, you better find something else. Obscurix is simply a secure and easy to use live operating system. In addition, the developers have done a lot to make it resistant against various forms of tracking and #surveillance. As a user you don't have to configure much, which makes it easy to get started.
One of the big differences between this and other Linux operating systems is the special focus on privacy, security and anonymity. Therefore Obscurix is not an operating system that you should install on your hard disk. As a pure live operating system it runs only in the memory of your computer. During shutdown the #OS automatically deletes all digital "traces" that third parties could otherwise evaluate later.
Continue on:
https://tarnkappe.info/obscurix-linux-live-system-fuer-privatsphaere-sicherheit-und-anonymitaet/
ππΌ Obscurix:
https://obscurix.github.io/
ππΌ ObscurixOS TG support group:
https://t.me/Obscurix_OS
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
#Obscurix is a new open source #Live operating system based on #Arch #Linux. Obscurix attaches great importance to your #privacy, #security and #anonymity on the net. The live operating system routes all your traffic quite securely through the #Tor# network and also supports many other networks like #I2P and #Freenet.
Privacy, Security and Anonymity
To get it straight up front: Obscurix does not want to be a Linux operating system for pentesters. Even if you mainly want to play games on your computer, you better find something else. Obscurix is simply a secure and easy to use live operating system. In addition, the developers have done a lot to make it resistant against various forms of tracking and #surveillance. As a user you don't have to configure much, which makes it easy to get started.
One of the big differences between this and other Linux operating systems is the special focus on privacy, security and anonymity. Therefore Obscurix is not an operating system that you should install on your hard disk. As a pure live operating system it runs only in the memory of your computer. During shutdown the #OS automatically deletes all digital "traces" that third parties could otherwise evaluate later.
Continue on:
https://tarnkappe.info/obscurix-linux-live-system-fuer-privatsphaere-sicherheit-und-anonymitaet/
ππΌ Obscurix:
https://obscurix.github.io/
ππΌ ObscurixOS TG support group:
https://t.me/Obscurix_OS
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
Forwarded from BlackBox (Security) Archiv
Tools for encryption and anonymity - Germany and Europe need to step up to their responsibility
Much of the funding of projects for the technical implementation of digital freedoms is threatened by the Trump Government. It is now time for Germany and Europe to step into the breach and provide adequate and sustainable funding for the development ecosystem. A commentary.
The continuing erosion of the political and legal protection of civil liberties has led to a situation where freedom of information and communication and the right to privacy and anonymity become increasingly dependent on technology. Digital self-defence has many facets: anonymisation tools such as Tor, end-to-end encryption such as WireGuard or Signal, securing website access with LetsEncrypt or the tools for reproducible builds, which ensure that the software you install has actually been created from source code that someone has checked for security holes. This ecosystem of software and infrastructure has grown exponentially since the Snowden revelations.
Many of these projects have one thing in common: Their development is funded by the US government, often with money from the Open Technology Fund (OTF). Some projects like Tor also receive money from the US State Department and other US government agencies. But why would the US government fund technology development that makes life difficult for the NSA intelligence agency?
π‘
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1
ππΌ Read more:
https://netzpolitik.org/2020/germany-and-europe-need-to-step-up-to-their-responsibility/
ππΌ Read more π©πͺ:
https://netzpolitik.org/2020/jetzt-sind-deutschland-und-europa-in-der-verantwortung/
#germany #eu #usa #NSA #OTF #encryption #anonymity
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
Much of the funding of projects for the technical implementation of digital freedoms is threatened by the Trump Government. It is now time for Germany and Europe to step into the breach and provide adequate and sustainable funding for the development ecosystem. A commentary.
The continuing erosion of the political and legal protection of civil liberties has led to a situation where freedom of information and communication and the right to privacy and anonymity become increasingly dependent on technology. Digital self-defence has many facets: anonymisation tools such as Tor, end-to-end encryption such as WireGuard or Signal, securing website access with LetsEncrypt or the tools for reproducible builds, which ensure that the software you install has actually been created from source code that someone has checked for security holes. This ecosystem of software and infrastructure has grown exponentially since the Snowden revelations.
Many of these projects have one thing in common: Their development is funded by the US government, often with money from the Open Technology Fund (OTF). Some projects like Tor also receive money from the US State Department and other US government agencies. But why would the US government fund technology development that makes life difficult for the NSA intelligence agency?
π‘
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1
ππΌ Read more:
https://netzpolitik.org/2020/germany-and-europe-need-to-step-up-to-their-responsibility/
ππΌ Read more π©πͺ:
https://netzpolitik.org/2020/jetzt-sind-deutschland-und-europa-in-der-verantwortung/
#germany #eu #usa #NSA #OTF #encryption #anonymity
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
the Guardian
NSA files decoded: Edward Snowden's surveillance revelations explained
In the last five months, the NSA's surveillance practices have been revealed to be a massive international operation, staggering in scope. But how do all of the NSA's programmes fit together β and what does it mean for you?
Forwarded from BlackBox (Security) Archiv
PimEyes - A Polish company just abolishes our anonymity
Research by netzpolitik.org shows the potential for abuse of PimEyes, a free search engine for 900 million faces. All of whom have photos on the Internet could already be part of their database.
Dylan smiles into the camera, arm in arm with the other guests of a queer boat party. Behind them, glasses glisten on the shelves of a bar. Eight years ago a party photographer uploaded this snapshot on the internet. Dylan had already forgotten it - until today. Because with a reverse search engine for faces, everyone can find this old party photo of Dylan. All they have to do is upload his profile picture from the Xing career network, free of charge and without registration. But Dylan wants to keep his private and professional life separate: During the day he works as a banker in Frankfurt am Main.
The name of the search engine is PimEyes. It analyses masses of faces on the Internet for individual characteristics and stores the biometric data. When Dylan tests the search engine with his profile picture, it compares it with the database and delivers similar faces as a result, shows a preview picture and the domain where the picture was found. Dylan was recognized even though, unlike today, he did not even have a beard then.
Our research shows: PimEyes is a wholesale attack on anonymity and possibly illegal. A snapshot may be enough to identify a stranger using PimEyes. The search engine does not directly provide the name of a person you are looking for. But if it finds matching faces, in many cases the displayed websites can be used to find out name, profession and much more.
π ππΌ π¬π§ PimEyes - A Polish company just abolishes our anonymity
https://netzpolitik.org/2020/pimeyes-face-search-company-is-abolishing-our-anonymity/
π ππΌ π©πͺ: https://netzpolitik.org/2020/gesichter-suchmaschine-pimeyes-schafft-anonymitaet-ab/
π ππΌ π¬π§ https://www.bbc.com/news/technology-53007510
π ππΌ π¬π§ https://petapixel.com/2020/06/11/this-creepy-face-search-engine-scours-the-web-for-photos-of-anyone/
π ππΌ π©πͺ Automated face recognition -
Enforce our data protection rights at last!
https://netzpolitik.org/2020/automatisierte-gesichtserkennung-setzt-unsere-datenschutzrechte-endlich-auch-durch/
#PimEyes #facialrecognition #searchengine #privacy #anonymity #ourdata #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Research by netzpolitik.org shows the potential for abuse of PimEyes, a free search engine for 900 million faces. All of whom have photos on the Internet could already be part of their database.
Dylan smiles into the camera, arm in arm with the other guests of a queer boat party. Behind them, glasses glisten on the shelves of a bar. Eight years ago a party photographer uploaded this snapshot on the internet. Dylan had already forgotten it - until today. Because with a reverse search engine for faces, everyone can find this old party photo of Dylan. All they have to do is upload his profile picture from the Xing career network, free of charge and without registration. But Dylan wants to keep his private and professional life separate: During the day he works as a banker in Frankfurt am Main.
The name of the search engine is PimEyes. It analyses masses of faces on the Internet for individual characteristics and stores the biometric data. When Dylan tests the search engine with his profile picture, it compares it with the database and delivers similar faces as a result, shows a preview picture and the domain where the picture was found. Dylan was recognized even though, unlike today, he did not even have a beard then.
Our research shows: PimEyes is a wholesale attack on anonymity and possibly illegal. A snapshot may be enough to identify a stranger using PimEyes. The search engine does not directly provide the name of a person you are looking for. But if it finds matching faces, in many cases the displayed websites can be used to find out name, profession and much more.
π ππΌ π¬π§ PimEyes - A Polish company just abolishes our anonymity
https://netzpolitik.org/2020/pimeyes-face-search-company-is-abolishing-our-anonymity/
π ππΌ π©πͺ: https://netzpolitik.org/2020/gesichter-suchmaschine-pimeyes-schafft-anonymitaet-ab/
π ππΌ π¬π§ https://www.bbc.com/news/technology-53007510
π ππΌ π¬π§ https://petapixel.com/2020/06/11/this-creepy-face-search-engine-scours-the-web-for-photos-of-anyone/
π ππΌ π©πͺ Automated face recognition -
Enforce our data protection rights at last!
https://netzpolitik.org/2020/automatisierte-gesichtserkennung-setzt-unsere-datenschutzrechte-endlich-auch-durch/
#PimEyes #facialrecognition #searchengine #privacy #anonymity #ourdata #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
netzpolitik.org
PimEyes: A Polish company is abolishing our anonymity
An investigation by netzpolitik.org shows the potential for abuse of PimEyes, a free search engine for 900 million faces. Whoeverβs photos have been published on the Internet could already be part of their database.
Forwarded from BlackBox (Security) Archiv
This media is not supported in your browser
VIEW IN TELEGRAM
Nipe - An engine to make Tor Network your default gateway
Summary
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It is used by a wide variety of people, companies and organizations, both for lawful activities and for other illicit purposes. Tor has been largely used by intelligence agencies, hacking groups, criminal activities and even ordinary users who care about their privacy in the digital world.
Nipe is an engine, developed in Perl, that aims on making the Tor network your default network gateway. Nipe can route the traffic from your machine to the Internet through Tor network, so you can surf the Internet having a more formidable stance on privacy and anonymity in cyberspace.
π ππΌ Download and install:
https://github.com/htrgouvea/nipe#download-and-install
#nipe #tor #routing #privacy #anonymity #tool
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Summary
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It is used by a wide variety of people, companies and organizations, both for lawful activities and for other illicit purposes. Tor has been largely used by intelligence agencies, hacking groups, criminal activities and even ordinary users who care about their privacy in the digital world.
Nipe is an engine, developed in Perl, that aims on making the Tor network your default network gateway. Nipe can route the traffic from your machine to the Internet through Tor network, so you can surf the Internet having a more formidable stance on privacy and anonymity in cyberspace.
π ππΌ Download and install:
https://github.com/htrgouvea/nipe#download-and-install
#nipe #tor #routing #privacy #anonymity #tool
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Media is too big
VIEW IN TELEGRAM
Welcome to Go Incognito, your guide to security, privacy & anonymity in our world. From digital protection, to physical safety, Go Incognito will cover all you need to advance through your privacy journey.
Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.
https://techlore.tech/goincognito.html
Watch it on:
https://tube.privacytools.io/accounts/techlore/video-channels
https://techlore.tech/assets/GoIncognito.torrent
https://www.youtube.com/watch?v=Y19RFmOxfVM
Text and link sources:
https://github.com/techlore-official/go-incognito
π‘ @techloreofficial
π₯ @techloregroup
#guide #goincognito #privacy #anonymity #security #techlore
Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.
https://techlore.tech/goincognito.html
Watch it on:
https://tube.privacytools.io/accounts/techlore/video-channels
https://techlore.tech/assets/GoIncognito.torrent
https://www.youtube.com/watch?v=Y19RFmOxfVM
Text and link sources:
https://github.com/techlore-official/go-incognito
π‘ @techloreofficial
π₯ @techloregroup
#guide #goincognito #privacy #anonymity #security #techlore
The Hitchhikerβs Guide to Online Anonymity
π‘ TLDR: This is an open-source non-profit detailed and maintained guide on online anonymity (in addition to Privacy/Security). I've been writing/updating it for the past months. It covers Windows/Linux/MacOS/Whonix/TAILS/Qubes OS and more. It's written with hope for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed/censored anywhere!
The whole guide is backed up by many external references (over 500 external references, many of them academic) and is not sponsored by any commercial entity.
The guide is presented in a "book format" (Online ,or PDF with Light and Dark themes) and is quite a long read with over 180 pages of information (not counting the many 500+ external references). But there are ways you can read some parts and not others depending on your interest (and this is also explained in the introduction).
* Project Website: https://anonymousplanet.org
* Mirror: https://mirror.anonymousplanet.org
* Mirror: https://anonymousplanet.github.io/thgtoa/guide.html
* Tor Mirror: http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion
π‘ Online Guide:
* Online Version (Dark Theme): https://anonymousplanet.org/guide.html
* Online Version Mirror (Dark Theme): https://mirror.anonymousplanet.org/guide.html
* Online Version Tor Mirror (Dark Theme): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.html
π‘ PDFs:
* PDF (Light Theme): https://anonymousplanet.org/guide.pdf
* PDF (Light Theme Mirror): https://mirror.anonymousplanet.org/guide.pdf
* PDF (Light Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.pdf
* PDF (Dark Theme): https://anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Mirror): https://mirror.anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide-dark.pdf
π‘ Changelog:
* https://anonymousplanet.org/CHANGELOG.html
* https://mirror.anonymousplanet.org/CHANGELOG.html
* http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/CHANGELOG.html
π‘ Archives:
* Archive.org: https://web.archive.org/web/https://anonymousplanet.org/guide.html
* Archive.today: https://archive.fo/anonymousplanet.org/guide.html
* Archive.today over Tor: http://archivecaslytosk.onion/anonymousplanet.org/guide.html
* Cryptpad.fr: https://cryptpad.fr/drive/#/2/drive/view/Ughm9CjQJCwB8BIppdtvj5zy4PyE-8Gxn11x9zaqJLI/
Feel free to share and contribute through the repository at https://github.com/AnonymousPlanet/thgtoa
ππΌ Follow me on:
* Mastodon: https://mastodon.online/@anonypla
Any constructive opinion/idea/criticism is welcome if you spot any issue. Many changes have been done based based on suggestions from redditors. Don't be too harsh tho. Remember it's still a "work in progress" draft.
π‘ @NoGoolag π‘ @Libreware
#guide #anonymity #privacy #anonymousplanet
π‘ TLDR: This is an open-source non-profit detailed and maintained guide on online anonymity (in addition to Privacy/Security). I've been writing/updating it for the past months. It covers Windows/Linux/MacOS/Whonix/TAILS/Qubes OS and more. It's written with hope for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed/censored anywhere!
The whole guide is backed up by many external references (over 500 external references, many of them academic) and is not sponsored by any commercial entity.
The guide is presented in a "book format" (Online ,or PDF with Light and Dark themes) and is quite a long read with over 180 pages of information (not counting the many 500+ external references). But there are ways you can read some parts and not others depending on your interest (and this is also explained in the introduction).
* Project Website: https://anonymousplanet.org
* Mirror: https://mirror.anonymousplanet.org
* Mirror: https://anonymousplanet.github.io/thgtoa/guide.html
* Tor Mirror: http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion
π‘ Online Guide:
* Online Version (Dark Theme): https://anonymousplanet.org/guide.html
* Online Version Mirror (Dark Theme): https://mirror.anonymousplanet.org/guide.html
* Online Version Tor Mirror (Dark Theme): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.html
π‘ PDFs:
* PDF (Light Theme): https://anonymousplanet.org/guide.pdf
* PDF (Light Theme Mirror): https://mirror.anonymousplanet.org/guide.pdf
* PDF (Light Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.pdf
* PDF (Dark Theme): https://anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Mirror): https://mirror.anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide-dark.pdf
π‘ Changelog:
* https://anonymousplanet.org/CHANGELOG.html
* https://mirror.anonymousplanet.org/CHANGELOG.html
* http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/CHANGELOG.html
π‘ Archives:
* Archive.org: https://web.archive.org/web/https://anonymousplanet.org/guide.html
* Archive.today: https://archive.fo/anonymousplanet.org/guide.html
* Archive.today over Tor: http://archivecaslytosk.onion/anonymousplanet.org/guide.html
* Cryptpad.fr: https://cryptpad.fr/drive/#/2/drive/view/Ughm9CjQJCwB8BIppdtvj5zy4PyE-8Gxn11x9zaqJLI/
Feel free to share and contribute through the repository at https://github.com/AnonymousPlanet/thgtoa
ππΌ Follow me on:
* Mastodon: https://mastodon.online/@anonypla
Any constructive opinion/idea/criticism is welcome if you spot any issue. Many changes have been done based based on suggestions from redditors. Don't be too harsh tho. Remember it's still a "work in progress" draft.
π‘ @NoGoolag π‘ @Libreware
#guide #anonymity #privacy #anonymousplanet
Forwarded from 0β’Bytesβ’1
Welcome to my Alice tea party! π«π
I decided to write a series of short posts about secure operating systems π₯π§
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.Spoiler alert: no, it's not.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?π§©
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix π
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that β you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems β everything works out of the box.
But what's wrong with VirtualBox?πͺ€
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computerπ« . Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? βοΈ
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects itπ
I hope you found this useful.β€οΈβ¨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf β here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations β about the shortcomings of Whonix and Tor.
JOSH Article β analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
I decided to write a series of short posts about secure operating systems π₯
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?π§©
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix π
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that β you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems β everything works out of the box.
But what's wrong with VirtualBox?πͺ€
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computerπ« . Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? βοΈ
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it
I hope you found this useful.β€οΈβ¨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf β here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations β about the shortcomings of Whonix and Tor.
JOSH Article β analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Whonix
Whonix Documentation
A Crash Course in Anonymity and Security on the Internet.
Forwarded from 0β’Bytesβ’1
Enjoy your tea, my Alices in Wonderland! π
Many people have heard of onion routing in Tor and have a rough idea of how it works. However, fewer people know about garlic routing.
That's why I decided to write a short note about what it is and how it works in I2Pπ₯
How is a message sent? βοΈ
In I2P, your message travels through a tunnelβa chain of randomly picked computers (nodes) on the network. Each node only knows where to send the data next, not the message content, thanks to garlic encryptionπ§.
Your message is first encrypted for the recipient using end-to-end encryption. Asymmetric encryptionπ uses a public key to encrypt and a private key to decrypt.
How are encryption layers created?π
Now the process of wrapping the message in layers begins.
Imagine that you have a tunnel with three nodes: A, B, C.
The encrypted message (already protected for the recipient) must be passed through these nodes so that each one knows only the next step. To do this, I2P creates encryption layers one for each node.
Each layer is additional encryption with instructions for a specific node, such as βforward to node Bβ or βsend to recipient.β
It works like this: you encrypt the message with the public key of node C, adding the instruction βforward to node B.β You encrypt this packet again with the public key of node B with the instruction βforward to node A.β Then the entire packet is encrypted with the public key of node A with the instruction βsend to recipient.β
When you send the packet, it goes to node A. Node A opens its layer with its secret key, sees the instruction βforward to node Bβ and forwards the data. The data remains encrypted for other nodes. Node B opens its layer, sees the instruction βforward to node Cβ and forwards it. Node C opens the last layer, sees that it needs to be sent to the recipient, and does so.
Each node only knows its own step and does not see the content of the message, its sender, or its recipient.
Why is encryption called garlic?π§
Now, let's talk about βgarlicβ encryption in detail. In I2P, your message is packed with others into one encrypted packetπ, called garlic. This packet may include your message, othersβ messages, and network data like tunnel commandsβοΈ
All these messages are encrypted together, and each layer of encryption (for nodes A, B, C) covers the entire large packet, not each message individually.
When node A opens its layer, it sees the instruction for the entire packet, such as βforward to node B,β and sends it on. It does not know how many messages are inside, whose they are, or where they are going. Node B does the same, opening its layer and forwarding the packet to node C. Node C, opening the last layer, can send the entire packet or parts of it (depending on the instruction) to the recipients, but it does not know how many messages are inside and to whom they are addressed. This makes it impossible to determine whose message is where, even when observing the network.
Each message in the packet is protected by individual encryption for its recipientπ so that no one but the intended person can open it.
The messages inside the packet are not explicitly separated they are sort of stuck together into one continuous encrypted piece of data. I2P can also add βgarbageβ dataπ fake messages that masquerade as real ones but mean nothing.
In addition, I2P mixesβ»οΈ your packet with other data on the network and can add random delays during transmission. This makes it difficult to analyze traffic. Tunnels change every 10 minutes, and the nodes in them are selected again, so it is impossible to track the path.
How does garlic encryption differ onion encryption?π§
In onion encryption, each message is encrypted separately and transmitted through its own chain of nodes. Garlic encryption not only wraps your message in layers of encryption, but also combines it with other messages and fake data into a single encrypted packet.
#i2p #cryptography #garlic_encryption #anonymity #tor
Many people have heard of onion routing in Tor and have a rough idea of how it works. However, fewer people know about garlic routing.
That's why I decided to write a short note about what it is and how it works in I2Pπ₯
How is a message sent? βοΈ
In I2P, your message travels through a tunnelβa chain of randomly picked computers (nodes) on the network. Each node only knows where to send the data next, not the message content, thanks to garlic encryptionπ§.
Your message is first encrypted for the recipient using end-to-end encryption. Asymmetric encryptionπ uses a public key to encrypt and a private key to decrypt.
How are encryption layers created?π
Now the process of wrapping the message in layers begins.
Imagine that you have a tunnel with three nodes: A, B, C.
The encrypted message (already protected for the recipient) must be passed through these nodes so that each one knows only the next step. To do this, I2P creates encryption layers one for each node.
Each layer is additional encryption with instructions for a specific node, such as βforward to node Bβ or βsend to recipient.β
It works like this: you encrypt the message with the public key of node C, adding the instruction βforward to node B.β You encrypt this packet again with the public key of node B with the instruction βforward to node A.β Then the entire packet is encrypted with the public key of node A with the instruction βsend to recipient.β
When you send the packet, it goes to node A. Node A opens its layer with its secret key, sees the instruction βforward to node Bβ and forwards the data. The data remains encrypted for other nodes. Node B opens its layer, sees the instruction βforward to node Cβ and forwards it. Node C opens the last layer, sees that it needs to be sent to the recipient, and does so.
Each node only knows its own step and does not see the content of the message, its sender, or its recipient.
Why is encryption called garlic?π§
Now, let's talk about βgarlicβ encryption in detail. In I2P, your message is packed with others into one encrypted packetπ, called garlic. This packet may include your message, othersβ messages, and network data like tunnel commandsβοΈ
All these messages are encrypted together, and each layer of encryption (for nodes A, B, C) covers the entire large packet, not each message individually.
When node A opens its layer, it sees the instruction for the entire packet, such as βforward to node B,β and sends it on. It does not know how many messages are inside, whose they are, or where they are going. Node B does the same, opening its layer and forwarding the packet to node C. Node C, opening the last layer, can send the entire packet or parts of it (depending on the instruction) to the recipients, but it does not know how many messages are inside and to whom they are addressed. This makes it impossible to determine whose message is where, even when observing the network.
Each message in the packet is protected by individual encryption for its recipientπ so that no one but the intended person can open it.
The messages inside the packet are not explicitly separated they are sort of stuck together into one continuous encrypted piece of data. I2P can also add βgarbageβ dataπ fake messages that masquerade as real ones but mean nothing.
In addition, I2P mixesβ»οΈ your packet with other data on the network and can add random delays during transmission. This makes it difficult to analyze traffic. Tunnels change every 10 minutes, and the nodes in them are selected again, so it is impossible to track the path.
How does garlic encryption differ onion encryption?π§
In onion encryption, each message is encrypted separately and transmitted through its own chain of nodes. Garlic encryption not only wraps your message in layers of encryption, but also combines it with other messages and fake data into a single encrypted packet.
#i2p #cryptography #garlic_encryption #anonymity #tor
Please open Telegram to view this post
VIEW IN TELEGRAM
0β’Bytesβ’1
monero_en.pdf
Hello, my Mad Hatter friends! π©
Let me ask you a question: have you ever wondered how Monero's security works and whether it is as reliable as they say?πͺ
In my new article, I figured this out and also explained how to further protect yourself so that your transactions remain invisible even to the most curious eyes.π‘
I describe in detail how Monero works, how resistant it is to attacks, and what measures will help you maintain your anonymity. π
The article covers attacks ranging from Black Marble Flooding to Eclipse Attacks, and I also share practical tips on how to run your own node and configure Tor to increase your privacy.
I hope you will find it interesting to delve into this topic. π§© At the end of the article, there are links to additional materials so that you can explore this topic in more depth if you wish. βοΈ
Enjoy your tea! βοΈπ©·
English version:
#Monero #XMR #cryptography #privacy #blockchain #ring_signatures #stealth_addresses #RingCT #Tor #I2P #crypto_wallet #security #anonymity #decentralization #Kovri #FCMP #crypto_protection
Let me ask you a question: have you ever wondered how Monero's security works and whether it is as reliable as they say?πͺ
In my new article, I figured this out and also explained how to further protect yourself so that your transactions remain invisible even to the most curious eyes.π‘
I describe in detail how Monero works, how resistant it is to attacks, and what measures will help you maintain your anonymity. π
The article covers attacks ranging from Black Marble Flooding to Eclipse Attacks, and I also share practical tips on how to run your own node and configure Tor to increase your privacy.
I hope you will find it interesting to delve into this topic. π§© At the end of the article, there are links to additional materials so that you can explore this topic in more depth if you wish. βοΈ
Enjoy your tea! βοΈπ©·
English version:
#Monero #XMR #cryptography #privacy #blockchain #ring_signatures #stealth_addresses #RingCT #Tor #I2P #crypto_wallet #security #anonymity #decentralization #Kovri #FCMP #crypto_protection