Recent Posts

Pages: 1 [2] 3 4 ... 10
11
MUTE Support / Re: List of MUTE web caches
« Last post by ale5000 on June 07, 2016, 10:28:58 AM »
12
Unsorted / Ricochet: Anonymous instant messaging for real privacy
« Last post by crypton on November 10, 2015, 11:18:27 AM »
Quote
Ricochet is a different approach to instant messaging that doesn’t trust anyone in protecting your privacy.

Eliminate metadata. Nobody knows who you are, who you talk to, or what you say.
Stay anonymous. Share what you want, without sharing your identity and location.
Nobody in the middle. There are no servers to monitor, censor, or hack.
Safe by default. Security isn’t secure until it’s automatic and easy to use.

How it works
Ricochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with your contacts without revealing your location or IP address.
Instead of a username, you get a unique address that looks like ricochet:rs7ce36jsj24ogfw.
Other Ricochet users can use this address to send a contact request - asking to be added to your contacts list.
You can see when your contacts are online, and send them messages (and soon, files!). Your list of contacts is only known to your computer - never exposed to servers or network traffic monitoring.
Everything is encrypted end-to-end, so only the intended recipient can decrypt it, and anonymized, so nobody knows where it’s going and where it came from.
For more information, you can read about Tor and learn more about Ricochet’s design.

https://ricochet.im/
https://github.com/ricochet-im/ricochet
13
Antox is an Android 2.3+ client for Tox created by Mark Winter. It aims to bring the full multimedia support Tox offers to your device, although it's still currently in heavy development. Antox is currently available for alpha testing on Google Play and F-Droid.

source:
https://github.com/subliun/Antox
14
Unsorted / The Blockchain Magic: Φ Free Anonymous Internet
« Last post by crypton on November 09, 2015, 11:17:18 AM »
Quote
Φ--Free Anonymous Internet, upgrades internet by providing ultimate freedom and anonymity

Ultimate Freedom

Can NEVER be deleted, locked, modified or censored
Accessible from anywhere

Ultimate Anonymity
No real world personal data needed
Footprint untraceable

Next generation Internet infrastructure
Full compatibility to existing internet system
Plenty of general purpose APIs enabling quick and powerful Apps development
Open source to ensure safety and upgradability

Core Innovations :


Φ Account

The Φ account system is based on asymmetric cryptography, specifically, ECDSA technology

Each user can create a unique Φ account by himself/herself. A Φ account is a privatekey – namekey (publickey) pair. Namekey represents the Φ account, and digital signatures signed by private key proves the control of the Φ account and triggers digital operations

A Φ account is fully owned and controlled by the user only. No website, organization, or government is able to access your Φ accounts

The absence of any link between Φ account and real world personal information ensures ultimate anonymity

Φ account is free. The zero cost to create, possess, use and abandon as many Φ accounts as needed ensures ultimate freedom

Φ accounts are compatible with all kinds of digital system and are extremely easy to implement. "One account for any app" will become true in the near future


Φ Network

Φ network system is based on P2P technology, aka decentralized network

Φ network has no centers. Every node in the Φ network is equal. Users can communicate point-to-point, or broadcast and relay Φ information

Because of the cascade spreading of Φ information in the Φ network, there's no way to block, censor or modify Φ information

Also because of the cascade-spreading of Φ information in the Φ network, it's extremely difficult to track the origin of Φ information. Ultimate anonymity is ensured meanwhile

Any digital device can join the Φ network by following the basic Φ network protocol. Many kinds of apps can run on Φ network, even without a server


Φ Database

The Φ database system is based on blockchain technology

There's always only one valid version of Φ database in the whole network, while many node/digital devices keep a full copy of it

No Φ information can be deleted, because every node in the Φ network has a full copy of the Φ database

Φ information following Φ database rules will go into Φ database after confirmed by Φ miners. The Φ database rules strictly require digital signature from the sender of the Φ information, so that no one else can modify the Φ information, i.e. the Φ information will be stored in the Φ database as what it is forever. Because of the decentrality of miners, there’s no way to block any valid Φ information going into Φ database

Because everybody has exactly the same copy of Φ database, there're no ways to know what data a user has browsed. Ultimate anonymity is ensured

The Φ database is open for any kind of digital information, including not only text, image, video, but also programs, settings, operation commands, etc


Φ Currency

The Φ currency system is based on Bitcoin technology

The Φ currency is published and distributed independently on Φ system. It has no relationship with traditional currencies, so it's independent from any traditional banking and financial system

Any Φ account can receive and send Φ currency. Naturally, the Φ currency system inherits the freedom and anonymity of Φ account

A unique advantage of Φ currency system is that, the currency transaction is processed together with information and operation commands on the Φ system. It is unimaginably easy for merchants or app developers to integrate currency functions into their programs

http://www.f-a-i.net/html/index.html
https://www.deepdotweb.com/2015/10/08/the-blockchain-magicfree-anonymous-internet/
http://sourceforge.net/projects/fai03a6/?source=directory

http://www.f-a-i.net/download/FAI_win_2.0.3_block33473.zip
http://www.f-a-i.net/download/fai_v1.0.0_src.zip
15
Boardcafe / Re: Windows 10 und Datenschutz
« Last post by Nightwalker_z on September 29, 2015, 03:51:02 PM »
UUUps... Urlaubsbedingt voll übersehen.
Konnte keine Unterschiede feststellen. Beim booten vielleicht aber da stoppe ich auch nicht die Zeit :)

Mein Router läuft zuverlässig und die Uptime ist normalerweise super.

Code: [Select]
$ uptime
 18:49:14 up 82 days,  8:31,  1 user,  load average: 0.00, 0.01, 0.05
Die 82 Tage waren wegen einem Software update (den ich bald mal wieder tun sollte fällt mir gerade so ein) :)

Was musste ich schon TPLink und Fritzboxen rebooten weil die irgendwo im Nirvana waren.
Das Ding musste ich einmal (zugegeben ein bisschen zeitaufwändig) einrichten aber das ist jetzt wirklich ein Selbstläufer
16
Privacy apps for mobile devices / Re: Briar: Secure messaging, anywhere
« Last post by Nightwalker_z on September 29, 2015, 03:47:48 PM »
"Noch" nicht :D
Ist ja leider noch in einer closed Beta
17
Unsorted (deutsch) / GoldBug - Secure E-Mail Client & Instant Messenger
« Last post by Markus on September 21, 2015, 08:03:21 PM »
Quote
Communicate securely with Instant Forward Perfect Secrecy (IPFS): Symmetric end-to-end encryption with one click renewed. Instantly.
Message-Format-Example:
RSA-SSL (AES (ElGamal (Message))).

    Echo-Accounts create a wonderful web of trust.
    Echo Protocol:
        Adaptive Echo (AE).
        Half Echo.
        Full Echo.
    Chat-Server Software included.

    Virtual E-Mail Institutions without data retention.

Homepage: http://goldbug.sourceforge.net/index.html
18
Privacy apps for mobile devices / Re: Briar: Secure messaging, anywhere
« Last post by Markus on September 12, 2015, 12:45:44 AM »
Klingt nicht uninteressant. Hat das schon mal jemand ausführlicher getestet?
19
Boardcafe / Re: Windows 10 und Datenschutz
« Last post by Markus on September 12, 2015, 12:44:27 AM »
Gerade auch das Upgrade gemacht. Hat super geklappt.
Vielleicht mache ich jetzt auch eine Fresh install.
Kannst du Performanceunterschiede zwischen dem Vorgänger und Windows 10 erkennen? Meine Tochter meint, dass Windows 10 insgesamt flotter läuft.

Quote
Bei mir rennt Owncloud lokal auf meinem Router mit. Ich hab mir selbst einen Router mit Firewall und so gebastelt, weil ich den ganzen Router-out-of-the-Box Dingern nicht ganz traue.
Naja - bei iptables muss man schon ein bisserl aufpassen.
Kann ich gut nachvollziehen, vor 20 Jahren habe ich das auch gemacht. ;D Mittlerweile ist für mich viel wichtiger, dass das Homenet funktioniert, selbst wenn die eine oder andere Blackbox darin läuft. Nur so nebenbei erwähnt: Umzugsbedingt mussten wir zu Unitymedia wechseln (nach 10 Jahren T-Com mit einigen Jahren VDSL), und da bin ich ja schon mal gespannt, ob es genauso zuverlässig funktioniert wie bei T-Com. ;)
20
Privacy apps for mobile devices / Briar: Secure messaging, anywhere
« Last post by crypton on September 06, 2015, 10:37:04 PM »

Secure messaging, anywhere

    Peer-to-peer encrypted messaging and forums
    Messages are stored securely on your device, not in the cloud
    Connect directly with nearby contacts - no Internet access required
    Free and open source software


How it Works

Briar is a messaging app designed for activists, journalists, and anyone else who needs a safe, easy and robust way to communicate. Unlike traditional messaging tools such as email, Twitter or Telegram, Briar doesn't rely on a central server - messages are synchronized directly between the users' devices. If the Internet's down, Briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis. If the Internet's up, Briar can sync via the Tor network, protecting users and their relationships from surveillance.


Briar uses direct, encrypted connections between users to prevent surveillance and censorship.

Briar provides private messaging and public forums that are protected against the following surveillance and censorship threats:

    Metadata surveillance. Briar uses the Tor network to prevent eavesdroppers from learning which users are talking to each other. Each user's contact list is encrypted and stored on her own device.
    Content surveillance. All communication between devices is encrypted end-to-end, protecting the content from eavesdropping or tampering.
    Content filtering. Briar's end-to-end encryption prevents keyword filtering, and because of its decentralized design there are no servers to block.
    Takedown orders. Every user who subscribes to a forum keeps a copy of its content, so there's no single point where a post can be deleted.
    Denial of service attacks. Briar's forums have no central server to attack, and every subscriber has access to the content even if they're offline.
    Internet blackouts. Briar can operate over Bluetooth and Wi-Fi to keep information flowing during blackouts.

Briar is designed to resist surveillance and censorship by an adversary with the following capabilities:

    All long-range communication channels (internet, phone network, etc) are comprehensively monitored by the adversary.
    The adversary can block, delay, replay and modify traffic on long-range communication channels.
    The adversary has a limited ability to monitor short-range communication channels (Bluetooth, WiFi, etc).
    The adversary has a limited ability to block, delay, replay and modify traffic on short-range communication channels.
    The adversary can deploy an unlimited number of devices running Briar.
    There are some users who can keep their devices secure - those who can't are considered, for the purposes of the threat model, to be controlled by the adversary.
    The adversary has a limited ability to persuade users to trust the adversary's agents - thus the number of social connections between the adversary's agents and the rest of the network is limited.
    The adversary can't break standard cryptographic primitives.

Our long-term plans go far beyond messaging: we'll use Briar's data synchronization capabilities to support secure, distributed applications including blogging, crisis mapping and collaborative document editing. Our goal is to enable people in any country to create safe spaces where they can debate any topic, plan events, and organise social movements.

https://briarproject.org/index.html
Pages: 1 [2] 3 4 ... 10