Encrypt all the things!

Posted on
Page
of 138
  • I guess the problem with iFad is you lose some of the ability to ditch a lot of the tracking or run custom stuff that mocks other software.

  • Yup.

    It's a case of whether you are trackable, anonymous and because of rare behaviour you stick out. Or trackable, somewhat identifiable, but blended into the crowd so much that you are indistinguishable.

  • If you were doing something dodgy you'd take it to random internet cafes or wifi spots and hijack their connections. I guess it depends on what you're doing.

    For me, I just don't like the idea of coughing up all this valuable advertising data for nothing. I'm also opposed to the NSA, GCHQ, etc. tapping so want to make it harder for them to get nothing useful off me. Increase the noise-signal ratio I guess.

  • Chromium on Xubuntu 13.10, of course it's unique :-(

  • Weird, tried panopticlick with cookies enabled in Firefox and got 1 in 695k, then when I turned cookies off it became unique, I thought it would be the other way around

  • This is a Firefox addons that makes your browser appear to be the same as everyone elses - same agent, same addons, same font, same cookies, same OS etc...

    Also available for Chromium, Safari, Opera.

    Link to addon

  • I would've put the link in 'This'. It's more subtle. #betterspythanyou

  • hi there,

    i thought about further anonymising my internet usage a lot lately and once through the content of this very thread, decided to upgrade (rather actually establish) an actual anonymisation layer in my network services.

    the onionPi seems perfect for it. few things are unclear though and due to my limited understanding wasn't able to figure it out yet.

    can (and should) i run the onionPi over my opneVPN conncetion?

    if so, can i incorporate the openVPN conncetion handling into one onionPi as a (simple?) configuration jobby?

    could this one so configured onionPi handle a usb to ethernet adapter in addition to wifi to allow my hardwired desktop to participate? you mentioned performance concerns and i don't know much about SBC's and their limitations.

    or would i be advised to actually run two Pi's, one for openVPN the next one for Tor
    or if it can handle Tor and openVPN in one but not wifi and ethernet,
    one Pi for wifi and the other for ethernet?

    do i make any sense?

    thanks for clearifying

  • I'd run the VPN through tor, rather than accessing tor via the vpn, which would just move your tor visibility to the other end. That end being in a data centre is probably a good thing in terms of blending in with more noise, but by routing that connection through tor, it's harder to see where that VPN endpoint is by sniffing the part between you and tor.

  • Gibberbot updated, now known as ChatSecure:

    https://guardianproject.info/apps/chatsecure/

  • http://bit-player.org/2013/the-keys-to-the-keydom

    "64,081 compromised keys for TLS hosts"

    "Most of them are found in embedded networked devices, such as routers and firewalls."

    "it would be a colossal fluke to see even one duplicated RSA prime, and finding 64,000 of them is clear evidence that those primes are not being chosen uniformly at random"

    "cryptographic keys are being generated immediately after a machine is booted, when it just can’t scrape together enough entropy to make a passable pseudorandom number"

  • Fundamental flaw of cryptography on embedded devices: If the device encrypts, then it is likely to have a copy of the private key. And if it encrypts and might not be connected to the internet and should still operate, then it is guaranteed to have a copy of the private key.

    The stuff above deals with devices that may not be internet connected at the moment they choose their keys, and thus... are vulnerable.

  • Yeah, 64,000 of them, all up in your networks.

  • Oh, and...
    https://www.eff.org/https-everywhere

    I can't believe they haven't added a nice and easy rule-management interface to the default/webstore version of HTTPS Everywhere...

    [code]




    [/code]

  • Can anyone recoomend a good vpn that doesnt massively "throttle" download speeds?
    I was very happy with blackvpn thinking it was only slowing down my internet connection by a small percentage (to about 3meg)

    I've recently moved and get a nice 32 meg download speed but have discovered that when connected to blackvpn its that flat 3 meg, so experience based recommendations welcomed please!

  • I'm using Mullvad without any significant loss. Have a shared 100mbit line and at nighttime I get almost full bandwidth, even through the vpn. Used Relakks before, also without significant loss. I'm in Copenhagen, though..

  • Thanks for that, I'm looking for a UK server...

  • ivpn.net

  • Post a reply
    • Bold
    • Italics
    • Link
    • Image
    • List
    • Quote
    • code
    • Preview
About

Encrypt all the things!

Posted by Avatar for Velocio @Velocio

Actions