Podcasts about tor project

Free and open-source anonymity network based on onion routing

  • 87PODCASTS
  • 110EPISODES
  • 47mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Apr 29, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about tor project

Latest podcast episodes about tor project

The Secure Developer
The Case For Steward Ownership And Open Source With Melanie Rieback

The Secure Developer

Play Episode Listen Later Apr 29, 2025 44:11


Episode Summary Is the traditional Silicon Valley startup model harming the security industry? In this episode of The Secure Developer, Danny Allan talks with Melanie Rieback, founder of Radically Open Security, about shaking up the industry with nonprofit business models. Tuning in, you'll learn about the inner workings of Radically Open Security as a non-profit organization and the positive impact its donations have had on the open source ecosystem.We discuss the benefits of a steward-ownership business model, why it pairs so well with open source, and its power to reform venture capital and align incentives with long-term sustainability. For those interested in diving deeper, Melanie shares resources from her startup incubator, Nonprofit Ventures, and her free online Post Growth Entrepreneurship course. Tune in to learn why reforming our business models is vital for preserving and protecting our open source ecosystem and, by extension, security! Show NotesIn this episode, Snyk CTO Danny Allan chats with Dr. Melanie Rieback, founder of Radically Open Security, about her journey from academia and pen testing to founding a cybersecurity company with a radically different business model. Melanie shares the motivations behind creating a not-for-profit organization that donates 90% of its profits to the NLnet Foundation, supporting open source and digital rights initiatives. They discuss the discontent with traditional cybersecurity business practices, including lack of transparency and ethical concerns like selling zero-days.Melanie explains Radically Open Security's structure, operating as a collective primarily using contractors, and how this model has allowed them to grow to 50 people while serving major clients and offering pro-bono work for nonprofits and critical open source projects like the Tor Project and Tails. The conversation then broadens to discuss alternative business models like steward ownership, where profit rights are separated from voting rights, aiming to lock value within the company and prevent mission drift often caused by traditional VC funding.They explore the concept of "Post Growth Entrepreneurship," which Melanie teaches, focusing on non-extractive business models and reforming finance itself. The discussion touches upon whether the tech industry, particularly open source, is moving towards more sustainable and ethical models, citing examples like Signal, Proton, Mastodon, and Mozilla. Melanie emphasizes that the culture of open source developers is often inherently altruistic, not greedy, but can be compromised by traditional funding systems. Finally, Melanie offers resources for listeners interested in learning more about these alternative models.LinksRadically Open SecurityRadically Open Security on LinkedInNLnet FoundationNonprofit VenturesPost Growth Entrepreneurship CourseSnyk - The Developer Security Company Follow UsOur WebsiteOur LinkedIn

Modern Classrooms Project Podcast
Episode 232: Workforce Readiness Training

Modern Classrooms Project Podcast

Play Episode Listen Later Mar 30, 2025 55:30


TR is joined by Sam Meisenburg, co-founder of Study Snacks, to talk about the importance of, and methodologies for, teaching cybersecurity and AI concepts to high schoolers Show Notes Study Snacks (https://meetstudysnacks.paperform.co) Transparent bird feeder (https://birdschoice.com/products/the-window-cafe?variant=44573985800362&country=US¤cy=USD&utm_medium=product_sync&utm_source=google&utm_content=sag_organic&utm_campaign=sag_organic&gad_source=1&gbraid=0AAAAAoYA9hxeiolvGCQzLpPFEsNfGNAnH&gclid=Cj0KCQjwtJ6_BhDWARIsAGanmKeZYebzGNAKXjBOgFLHPRoS4yskAIMh91pHMjvlLtjjQN7X4XFRzlUaApMOEALw_wcB) Brave Browser (https://brave.com/) Onion Router and the Tor Project (https://www.torproject.org) Duck Duck Go (https://duckduckgo.com) (alternative search engine, more private than Google) Connect with Sam on LinkedIn (https://www.linkedin.com/in/sam-meisenberg/). You can also email him at hello@studysnacks.net (mailto:hello@studysnacks.net) Learning Experiences for the Upcoming Week Want to start building your own Modern Classroom? Sign up for our summer Virtual Mentorship Program! From either May 19th - June 22nd or June 23rd - July 27th, work with one of our expert educators to build materials for your own classroom. We have scholarships all over the country so you can enroll for free in places such as NYC, LA, Oakland, Chicago, Minnesota, Alabama, and more. Check out modernclassrooms.org/apply-now (http://modernclassrooms.org/apply-now) to see if there's an opportunity for you! We have a book club! We are reading Rob Barnett's Meet Every Learner's Needs together as a community and our last session is an Author Q&A with Rob Barnett on Wednesday, April 2 at 7:00pm ET. Join us in sharing ideas, questions, and resources. Register here (https://modernclassrooms.zoom.us/webinar/register/WN_RhaTf9F2Q2SWNCBCDQc2aw) Eileen Ng, Nichole Freeman, and Carmen Welton, MCP implementers and DMCE, are presenting at NEASC Educator Showcase 2025 on April 3, in Nashua, NH. If you're attending, make sure to check them out and say hi! Contact us, follow us online, and learn more: Email us questions and feedback at: podcast@modernclassrooms.org (mailto:podcast@modernclassrooms.org) Listen to this podcast on Youtube (https://www.youtube.com/playlist?list=PL1SQEZ54ptj1ZQ3bV5tEcULSyPttnifZV) Modern Classrooms: @modernclassproj (https://twitter.com/modernclassproj) on Twitter and facebook.com/modernclassproj (https://www.facebook.com/modernclassproj) Kareem: @kareemfarah23 (https://twitter.com/kareemfarah23) on Twitter Toni Rose: @classroomflex (https://twitter.com/classroomflex) on Twitter and Instagram (https://www.instagram.com/classroomflex/?hl=en) The Modern Classroom Project (https://www.modernclassrooms.org) Modern Classrooms Online Course (https://learn.modernclassrooms.org) Take our free online course, or sign up for our mentorship program to receive personalized guidance from a Modern Classrooms mentor as you implement your own modern classroom! The Modern Classrooms Podcast is edited by Zach Diamond: @zpdiamond (https://twitter.com/zpdiamond) on Twitter and Learning to Teach (https://www.learningtoteach.co/) Special Guest: Sam Meisenburg.

This Week In Cyberspace
7.22 - Roger Dingledine

This Week In Cyberspace

Play Episode Listen Later Feb 27, 2025 17:15


Roger Dingledine is an American computer scientist known for having co-founded the Tor Project and he still works there as a project Leader, Director, and Research Director.The Tor Project develops and maintains The Tor Browser system, also known as The Onion Router, a free, open source and sophisticated privacy tool that provides anonymity for web surfing and communication. Hear about this and their latest development 'Snowflake'.

Open at Intel
The Open Source Path to Security and Privacy: Divvi Up and Let's Encrypt

Open at Intel

Play Episode Listen Later Jan 23, 2025 22:02


In this episode, Sarah Gran and Brandon Pitman from the Internet Security Research Group (ISRG) dive into their projects, Divvi Up and Let's Encrypt. They discuss the creation and impact of Divvi Up, a privacy-preserving metrics aggregation service, and its role in protecting individual data while providing valuable insights to organizations. They share the journey from collaborating with Google and Apple on COVID-19 exposure notifications to enhancing privacy for Firefox users. The conversation also explores the importance of TLS certificates provided by Let's Encrypt and the challenges and advancements in the realm of online privacy. 00:00 Introduction and Guest Introductions 01:22 Overview of DivviUp 02:29 Privacy Concerns and Data Security 06:18 Real-World Applications and Examples 11:28 Technical Details and Protocols 19:53 Open Source and Community Involvement 20:39 Conclusion and Final Thoughts   Guests: Sarah Gran is the Vice President of the Brand and Donor Development team at Internet Security Research Group (ISRG), the nonprofit entity behind Let's Encrypt, the world's largest certificate authority. Sarah joined ISRG in early 2016, shortly after the Let's Encrypt launch and has helped it become a household name in software development. Sarah has also helped to shape ISRG's latest projects, one focused on bringing memory-safe code to security-sensitive software, called Prossimo, and a privacy-respecting metrics service, called Divvi Up.Sarah is an independent member of the Tor Project's Board of Directors. Previously, Sarah worked as a Vice President at Edelman SF and Deutsch NY in brand and communications strategy groups. Brandon Pitman is the Senior Software Engineer for Divvi Up and has a Master's in Computer Science from Georgia Tech. Prior to ISRG, they worked at Google on a variety of Security, Privacy, and Green Energy projects. Bran came to ISRG to be a part of improving the privacy stance of the Internet as a whole.

Proof of Coverage
How DePIN Protects Your Internet Privacy Better Than VPNs with Anyone

Proof of Coverage

Play Episode Listen Later Nov 13, 2024 38:32


In today's episode, Mahesh sat down with Neuratic, COO of Anyone, to discuss internet privacy and how current solutions lag behind growing awareness. Neuratic explained "privacy washing," where companies claim to protect data while exploiting it for profit, with Google as an example. We explored how the Anyone Network tackles these issues through decentralization, fragmenting user data across relay operators for enhanced privacy, unlike traditional VPNs. The team also shared insights into their unique pseudonymous structure, their rebranding from ATOR after tensions with the Tor Project, and plans for the Anyone Router hardware. We wrapped up with thoughts on tokenomics, Bittensor, OpenAI, and the cultural impact of The Matrix, highlighting Anyone's commitment to a safer online world. Follow Proof of Coverage: ⁠https://x.com/coverageproved⁠ Timestamps: 00:00 - Introduction 00:30 - Sponsor Message 01:00 - Guest Introduction 01:40 - Importance of Privacy 05:30 - Privacy Washing 06:30 - Global Privacy Rights 07:30 - Founders' Qualifications 08:30 - Anonymity in the Team 09:30 - Anyone Network Overview 11:40 - Protocol and VPN Use 13:30 - Emerging Applications 15:30 - Relationship with Tor 18:30 - Rebranding to Anyone 20:30 - Community and Trust 22:30 - Token Utility 24:30 - Fair Launch Concept 26:30 - Hardware Introduction 36:00 - Lightning Round Disclaimer: The hosts and the firms they represent may hold stakes in the companies mentioned in this podcast. None of this is financial advice.

This Week in Linux
279: CUPS Vulnerability, Tails OS + Tor, Ubuntu 24.10, COSMIC Alpha 2 & more Linux news

This Week in Linux

Play Episode Listen Later Sep 28, 2024 23:05


video: https://youtu.be/Oh9D8KVjMcA This week in Linux, we have a lot of great news and a little bit of some unfortunate news regarding a vulnerability with the CUPS printing system. Now, it's not as bad as people are claiming, but we'll get to that in a bit. We also have the merger of the Tor project and the Tails OS project, which is really cool, and Ubuntu 24.10 beta is now available, as well as the Cosmic Desktop has reached an alpha 2 that is now available for download and testing. All of this and more on This Week in Linux, the show that keeps you up to date with what's going on in the Linux and Open Source world. So let's jump right into Your Source for Linux GNews. Forum Discussion Thread (https://forum.tuxdigital.com/t/279-cups-vulnerability-tails-os-tor-ubuntu-24-10-cosmic-alpha-2-more-linux-news/6430) Download as MP3 (https://aphid.fireside.fm/d/1437767933/2389be04-5c79-485e-b1ca-3a5b2cebb006/927e0cdb-8638-4edf-9982-8f5674cf4425.mp3) Support the Show Become a Patron = tuxdigital.com/membership (https://tuxdigital.com/membership) Store = tuxdigital.com/store (https://tuxdigital.com/store) Chapters: 00:00 Intro 00:47 CUPS Remote Code Execution Vulnerability 06:06 Tor Project & Tails OS Join Forces 08:58 Ubuntu 24.10 Beta Available 12:09 COSMIC Desktop Alpha 2 Available 17:16 Valve Engineer Hopes to Accelerate Wayland Development 19:54 Valve to directly collaborate with Arch Linux 21:42 Support the show Links: CUPS Remote Code Execution Vulnerability https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/ (https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/) https://ubuntu.com//blog/cups-remote-code-execution-vulnerability-fix-available (https://ubuntu.com//blog/cups-remote-code-execution-vulnerability-fix-available) https://www.redhat.com/en/blog/red-hat-response-openprinting-cups-vulnerabilities (https://www.redhat.com/en/blog/red-hat-response-openprinting-cups-vulnerabilities) https://thehackernews.com/2024/09/critical-linux-cups-printing-system.html (https://thehackernews.com/2024/09/critical-linux-cups-printing-system.html) https://www.omgubuntu.co.uk/2024/09/ubuntu-secuity-fix-cups-vulnerability (https://www.omgubuntu.co.uk/2024/09/ubuntu-secuity-fix-cups-vulnerability) Tor Project & Tails OS Join Forces https://blog.torproject.org/tor-tails-join-forces/ (https://blog.torproject.org/tor-tails-join-forces/) https://tails.net/news/index.en.html (https://tails.net/news/index.en.html) Ubuntu 24.10 Beta Available https://lists.ubuntu.com/archives/ubuntu-announce/2024-September/000306.html (https://lists.ubuntu.com/archives/ubuntu-announce/2024-September/000306.html) https://www.omgubuntu.co.uk/2024/09/ubuntu-24-10-beta-is-now-available-to-download (https://www.omgubuntu.co.uk/2024/09/ubuntu-24-10-beta-is-now-available-to-download) COSMIC Desktop Alpha 2 Available https://blog.system76.com/post/cosmic-alpha-2-press-release (https://blog.system76.com/post/cosmic-alpha-2-press-release) https://system76.com/cosmic (https://system76.com/cosmic) Valve Engineer Hopes to Accelerate Wayland Development https://gitlab.freedesktop.org/wayland/wayland-protocols/-/merge_requests/339 (https://gitlab.freedesktop.org/wayland/wayland-protocols/-/merge_requests/339) https://www.supergoodcode.com/My-Wayland-Your-Wayland-Our-Wayland/ (https://www.supergoodcode.com/My-Wayland-Your-Wayland-Our-Wayland/) https://www.supergoodcode.com/unsticking-the-very-sticky/ (https://www.supergoodcode.com/unsticking-the-very-sticky/) https://www.phoronix.com/news/Blumenkrantz-Faster-Wayland (https://www.phoronix.com/news/Blumenkrantz-Faster-Wayland) Valve to directly collaborate with Arch Linux https://lists.archlinux.org/archives/list/arch-dev-public@lists.archlinux.org/thread/RIZSKIBDSLY4S5J2E2STNP5DH4XZGJMR/ (https://lists.archlinux.org/archives/list/arch-dev-public@lists.archlinux.org/thread/RIZSKIBDSLY4S5J2E2STNP5DH4XZGJMR/) Support the show https://tuxdigital.com/membership (https://tuxdigital.com/membership) https://tuxdigital.com/store (https://tuxdigital.com/store)

Ask Noah Show
Ask Noah Show 386

Ask Noah Show

Play Episode Listen Later Jun 26, 2024 53:53


-- During The Show -- 01:20 Pocket 386 IBM compatible system It's a toy Classic vs today's games Electrical components in power systems ARSTechnica (https://arstechnica.com/gadgets/2024/06/the-ultimate-windows-3-1-laptop-sellers-behind-book-8088-are-back-with-pocket-) Aliexpress (https://www.aliexpress.us/item/3256805356267711.html) 06:15 Tor Browser 13.5 VPN camp vs Tor Camp FBI drops cases rather than reveal methods Fingerprinting EFF Cover your tracks (https://coveryourtracks.eff.org/) Letter boxing Using Tor EFF SSD (https://ssd.eff.org/) 9 to 5 Linux (https://9to5linux.com/tor-browser-13-5-improves-fingerprinting-protections-and-bridge-settings) 13:30 Tails Amnesic Incognito Live system 6.4 Highlights random cryptographic seed switch to HTTPS for repos updates to Tor and Thunderbird Noah's tor laptop 9 to 5 Linux (https://9to5linux.com/tails-6-4-introduces-random-seed-to-strengthen-all-cryptography) 16:30 SIP & 3CX SIP and Astrisk (https://www.asterisk.org/) 3CX dropping SIP/STUN support SIP only needs user name password server SIP gets blocked 3CX Tunneling in app SBC Supported phones Fanvil (Cheap Chinese) Yaelink (Cheap Chinese) Snom (German) Cisco and Polycom are the biggest Businesses already have phones ISPs are the biggest competitor Limited support phones Gigaset Grandstream Polycom Cyberdata Proprietary is a place holder Phone network is "un-ownable" Grandstream UCM (https://www.amazon.com/Grandstream-GS-UCM6301-UCM6301-IP-PBX/dp/B08NFJGSS9) ATA in ATA out FreePBX under the hood DTEC (https://en.wikipedia.org/wiki/Digital_enhanced_cordless_telecommunications) WiFi Phone Grandstream WP825(https://www.amazon.com/Grandstream-WP825-IP-Phone-Bluetooth/dp/B0BJKP1H8F) RSSI Beep Grandstream FXO Gateway (https://www.amazon.com/dp/B001NHNW4U) Vodia (https://web.vodia.com/why-vodia) VitalPBX (https://vitalpbx.com/) Yaestar (https://www.yeastar.com/) FreePBX (https://www.freepbx.org/) Refreshed UI All options available Paid commercial modules Admin module Any SIP trunk (including JMP.chat) SIP on Mobile Linphone Bria Google Play (https://play.google.com/store/apps/details?id=com.cpc.briax&hl=en_US&pli=1) Apple Store (https://apps.apple.com/us/app/bria-mobile-voip-softphone/id1236194368) Voxtelesys (http://www.voxtelesys.com/asknoah) 46:30 News Wire Emacs 29.4 - GNU.org (https://lists.gnu.org/archive/html/info-gnu/2024-06/msg00007.html) Plasma 6.1 - KDE.org (https://kde.org/announcements/plasma/6/6.1.0/) Darktable - Darktabnle (https://www.darktable.org/2024/06/darktable-4.8.0-released/) Tor Browser 13.5 - Tor Project (https://blog.torproject.org/new-release-tor-browser-135/) Openshot 3.2 - Phoronix (https://www.phoronix.com/news/OpenShot-3.2-Released) Monochrome TV Mode - Phoronix (https://www.phoronix.com/news/Linux-6.11-DRM-Monochrome-TV) Intel Battlemage - Phoronix (https://www.phoronix.com/news/Intel-Battlemage-Linux-6.11) MLinux 45.1 - 4MLinux (https://4mlinux-releases.blogspot.com) Tails 6.4 - Tails (htps://tails.net/news/version_6.4/) Rafel RAT - The Hacker News (https://thehackernews.com/2024/06/iranian-hackers-deploy-rafel-rat-in.html) Patched Ollama Vulnerability - The Register (https://www.theregister.com/2024/06/24/rce_ollama_wiz/) Chameleon AI modles - Toms Guide (https://www.tomsguide.com/ai/meta-just-dropped-an-open-source-gpt-4o-style-model-heres-what-it-means) 1.5 NPU Driver - Phoronix (https://www.phoronix.com/news/Intel-Linux-NPU-Driver-1.5) Apple Open-Source Models - Apple Insider (https://appleinsider.com/articles/24/06/19/apple-researchers-add-20-more-open-source-models-to-improve-text-and-image-ai) Mozilla AI - Mozilla (https://blog.mozilla.org/en/products/firefox/firefox-news/ai-services-on-firefox/) MoonIndex - Phys.org (https://phys.org/news/2024-06-moonindex-source-software-lunar-surface.html) 49:00 KDE 6 Plasma Desktop Kubuntu standard issue at Altispeed Polished out of the box Explicit Sync New remote desktop X2GO -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/396) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed)

Ask Noah Show
Ask Noah Show 395

Ask Noah Show

Play Episode Listen Later Jun 19, 2024 53:54


This week we talk about network documentation and alerts! What makes a good alert? When should you tap a human on the shoulder, and what should be left to the backlog? -- During The Show -- 01:50 Music Production On Linux - William MuseScore (https://musescore.org/en) LMMS (https://lmms.io/) Audacity (https://www.audacityteam.org/) Write in if you do music on Linux! 05:45 DIY Smart Plug - Charlie Instructables (https://www.instructables.com/Plug-It-Open-Source-Smart-Plug/) TH3D Studio (https://www.th3dstudio.com/product/ezplug-open-source-wifi-smart-plug/) Enough electricity it could kill you 09:15 Thoughts from the AMA - Steve S "good enough" "Class of tool" vs "disposable" CLECs moving away from copper Convert to VOIP and ATA Cell companies not held to the same standard Right tool for the right job 17:30 Frappe.io - theendbeta Frappe.io (https://frappe.io/products) Looks cool Lots of apps Haven't used it 22:00 News Wire Perl 5.40 - Perl Doc (https://perldoc.perl.org/perldelta) Tor Browser 13.0.16 - Tor Project (https://blog.torproject.org/new-release-tor-browser-13016/) Firefox 127 - Mozilla (https://www.mozilla.org/en-US/firefox/127.0/releasenotes/) ICEWM 3.6 - Github (https://github.com/ice-wm/icewm/releases/tag/3.6.0) Cinnamon 6.2 - OMG Ubuntu (https://www.omgubuntu.co.uk/2024/06/cinnamon-6-2-desktop-whats-new) Opensuse Leap 15.6 - Opensuse (https://get.opensuse.org/leap/15.6/) Open Standards - Health Care IT News (https://www.healthcareitnews.com/news/linux-foundation-seeks-collaborators-new-interoperability-open-standard) Open Source Summit - PR News Wire (https://www.prnewswire.com/news-releases/the-linux-foundation-announces-schedule-for-open-source-summit-europe-2024-302172461.html) In-Vehicle Linux Milestone - Businesswire (https://www.businesswire.com/news/home/20240617966014/en/Red-Hat-Achieves-Major-Milestone-for-In-Vehicle-Linux-with-Functional-Safety-Assessment-and-Certification-for-Linux-Math-Library) DISGOMOJI - Bleeping Computer (https://www.bleepingcomputer.com/news/security/new-linux-malware-is-controlled-through-emojis-sent-from-discord/) Unity Catalog - Datanami (https://www.datanami.com/this-just-in/databricks-open-sources-unity-catalog-creating-the-industrys-only-universal-catalog-for-data-and-ai/) OpenVLA - Venture Beat (https://venturebeat.com/ai/openvla-is-an-open-source-generalist-robotics-model/) OpenSora - GitHub (https://github.com/hpcaitech/Open-Sora) Stable Difusion 3 Medium - Stability.ai (https://stability.ai/news/stable-diffusion-3-medium) 23:20 NetBox Interview Adam Kennedy - Senior Network Admin Network documentation NetBox Single source of truth DCIM (Data Center Infrastructure Management) Holds tons of information Documenting changes Importing/Exporting information Netbox and Ansible Extra information 34:00 Best Practices OS Ticket - Client notes Markdown docs Plain text Explorable and discoverable GNS3 (https://www.gns3.com/) NetBox falls down with multiple clients Menu Bar hides What is standard documentation? 3 Choices Plain text Wiki system Purpose built software Good to re-evaluate from time to time Cost of up ending the apple cart 48:00 Alerts What is a good alert? They need to be actionable What the problem is How it happened Where do I go Why dashboards are bad Ticket back log Human attention -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/395) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed)

mnemonic security podcast
Guidance for High-Risk Individuals

mnemonic security podcast

Play Episode Listen Later Jun 3, 2024 30:33 Transcription Available


When we talk about securing an organisation's assets, we most often mean its data, devices, servers, or accounts, but are we doing enough to secure the group of people leading the company? Or the ones doing high risk work on behalf of the organisation?To discuss the importance of securing high-risk individuals, like journalists, politicians and executives, Robby is joined by an expert in this field, Runa Sandvik, journalist, security researcher and founder of Granitt. At Granitt, Runa works with digital security for journalists and other at-risk people, building on her experiences working at The New York Times, Freedom of the Press Foundation and The Tor Project.During the conversation, they talk about how to secure devices when travelling to high-risk countries, what tools to use and at what time, and how threat actors usually target individuals. Runa also shares how she works to secure accounts and devices for her clients.

Boston Computation Club
04/23/24: Pegasus Panel

Boston Computation Club

Play Episode Listen Later Mar 26, 2024 125:43


For this event, Holmes Wilson of Fight for the Future moderated a panel retrospective on the Pegasus malware. Our panelists were: - Jonathan Rugman: Foreign Affairs Correspondent at Channel 4 News, BAFTA Award-winning journalist, visiting lecturer at University of London, and Senior Associate Fellow at RUSI. - Raya Sharbain: education and communities coordinator at the Tor Project, and digital rights activist at the Jordan Open Source Association as well as the Digital Arabia Network. - Elina Castillo Jimenéz: feminist human rights lawyer and digital activist at the Amnesty International Tech Lab. - Prashant Anantharaman: former speaker at the club who completed his PhD at Dartmouth under Sergey Bratus and now works at Narf Industires. And … - Hinako Sugiyama: international human rights lawyer and law professor at UC Irvine. This was one of our best events ever and well worth the listen.

Tech Talk Y'all
I'm running at 300Mbks, and other tech stories for less nerdy individuals

Tech Talk Y'all

Play Episode Listen Later Mar 16, 2024 36:49


Brought to you by TogetherLetters & Edgewise! In this episode:  Google, Apple, and Firefox release new Speedometer 3.0 browser benchmark Google says Chrome can now protect you better while preserving your privacy Tor's new WebTunnel bridges mimic HTTPS traffic to evade censorship The Tor Project introduces WebTunnel to help you bypass Tor network censorship Apple to allow iOS app downloads direct from websites in the EU EU parliament adopts 'historic' rules to govern Artificial Intelligence House passes TikTok bill. Are TikTok's days numbered? What you need to know. Italy regulator fines TikTok $11 million over content checks Google won't let you use its Gemini AI to answer questions about an upcoming election in your country Amazon plans 'Big Spring Sale' that's not just for Prime members starting March 20 US health department opens probe into UnitedHealth hack Deadly brain cancer shrinks after CAR-T therapy — but for how long is unclear  FCC Officially Raises Minimum Broadband Metric From 25Mbps to 100Mbps Weird and Wacky:  Google's newest office has AI designers toiling in a Wi-Fi desert ‘Polio Paul,' who spent most of the past 70 years in an iron lung, dies at 78 Tech Rec: Sanjay - Small Mini WiFi Bluetooth RP-SMA Antenna  Adam - DJI Osmo Pocket 3 Find us here: sanjayparekh.com & adamjwalker.com Tech Talk Y'all is a proud production of Edgewise.Media --- Send in a voice message: https://podcasters.spotify.com/pod/show/techtalkyall/message

The Daily Decrypt - Cyber News and Discussions
Roblox Malware, FakeBat Malvertising Surge, and Tor’s WebTunnel Censorship Evasion

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Mar 14, 2024


Today, we uncover a Roblox malware scam, explore the rise of FakeBat through malvertising, and highlight Tor's innovative WebTunnel for evading censorship. From the playful realms of Roblox to the frontlines of digital freedom with Tor, this episode is a journey through the evolving challenges and solutions in our online world. Protect your digital footprint and join the conversation on cybersecurity, privacy, and the relentless quest for a free internet. Article URLs: Roblox: https://www.zscaler.com/blogs/security-research/tweaks-stealer-targets-roblox-users-through-youtube-and-discord FakeBat: https://www.malwarebytes.com/blog/threat-intelligence/2024/03/fakebat-delivered-via-several-active-malvertising-campaigns TOR: https://www.bleepingcomputer.com/news/security/tors-new-webtunnel-bridges-mimic-https-traffic-to-evade-censorship/ Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: Roblox, malware, cybersecurity, digital privacy, FakeBat, malvertising, Tor, WebTunnel, online security, internet censorship, gaming, digital rights, data protection, hacking, antivirus Search Phrases: How to protect against Roblox malware Understanding malvertising and FakeBat malware Tor's WebTunnel for bypassing internet censorship Latest cybersecurity threats 2024 Safe gaming practices for parents and children Fighting digital surveillance and censorship Effective antivirus and malware protection tips Digital privacy concerns in online platforms Strategies for secure internet browsing Overcoming hacking in gaming communities Enhancements in Tor for secure communication Detecting and preventing online ad-based malware Innovations in digital privacy and security Techniques for safeguarding personal data online Analysis of current cyber threats and solutions Transcript: Mar 14 [00:00:00] offsetkeyz: A nefarious malware targets Roblox users, tricking them with the false promise of enhanced gameplay, only to steal personal information. [00:00:12] HGF: Fake bat malware leaps from the shadows of online ads, preying on unsuspecting victims with the disguise of legitimacy. [00:00:20] offsetkeyz: Tor Project unveils WebTunnel, a masterstroke in digital disguise. Outmaneuvering censorship with a stealthy sophistication. In the digital playground of Roblox, a new villain lurks. Not in the game, but in the guise of a performance boost. [00:00:42] HGF: Oh, Roblox, where my niece says she's gonna be the next digital Picasso. But really, what is it? Just a bunch of blocky characters bumping into each other? [00:00:50] offsetkeyz: It's more than that. Roblox is a sprawling online platform that lets users design, play, and share their own games and experiences. Think of it as [00:01:00] a digital Lego set, but with infinite pieces and possibilities. [00:01:04] HGF: Infinite pieces? You're saying if I wanted to build a castle with a moat filled with laser sharks, I could? Mmm, [00:01:11] offsetkeyz: sharky. Absolutely! Roblox provides the tools and the canvas. Your imagination brings it to life! Roblox It's powered by a robust game development system that lets creators script events, design levels, and even monetize their creations. [00:01:27] HGF: Monetize? So kids are making bank on this? My lemonade stand suddenly seems less impressive. [00:01:34] offsetkeyz: Yep, gone of the days of lemonade stands. Some developers on Roblox earn serious money through in game purchases using a virtual currency called Robux. It's a whole economy. Roblox is a vibrant community with millions of user generated games. There's something for everyone, from obstacle courses and simulators, to role playing games and beyond. But here's the twist. Discovered by Zscaler's Threat [00:02:00] Labs, attackers are exploiting platforms like YouTube and Discord to distribute a malware called Tweaks, or Tweaker. It promises to optimize your frames per second, but instead it's a one way ticket to Hacksville. So, [00:02:15] HGF: it's like ordering a performance enhancing smoothie but ending up with a bellyache that steals your wallet? [00:02:21] offsetkeyz: Oh yeah, there are tummyache survivors out there. But this PowerShell based malware silently siphons off sensitive data. Think Wi Fi passwords, location, Roblox IDs, and even in game currency. Like [00:02:35] HGF: a digital pickpocket. But wait, PowerShell? Is that like a superhero power? [00:02:40] offsetkeyz: Quite. PowerShell is a scripting language for Windows, often used by system administrators for automation, but in our villain's hands, it becomes a tool for theft. [00:02:51] HGF: I see, so they're using PowerShell for evil. Got it. How bad is this [00:02:57] offsetkeyz: breach? Given Roblox's [00:03:00] massive user base, where 45 percent are under 13, the scale is concerning. It's not just gamers at risk, it's potentially their parents and even corporations, thanks to remote work blurring the lines between personal and professional devices. [00:03:15] HGF: Yikes, so my quest for smoother gameplay could put dad's spreadsheets in jeopardy? [00:03:21] offsetkeyz: Precisely! The attackers cleverly disguised their malicious intent, using legitimate looking videos and discord communities to spread tweaks. They even offer a free version to lure users into their trap. Free? [00:03:36] HGF: Sounds like the only thing free about it is the trip to hackerland. What can the good folks at home do to protect themselves? [00:03:43] offsetkeyz: The golden rule is stick to reputable sources for game enhancements, avoid disabling antivirus software for dubious downloads, and maintain skepticism towards too good to be true offers on social platforms. Got [00:03:57] HGF: it. Keep it legit or risk a cyber hit. [00:04:00] Any word from the digital knights at Zscaler? [00:04:03] offsetkeyz: Zscaler's Threat Labs is on the front line. Their sandbox technology uncovering the murky tactics and techniques of this malware campaign. It's a reminder of the constant cat and mouse game in cyber security. [00:04:15] HGF: So the moral of the story, if an FPS booth sounds too good to be true on Discord or YouTube, it probably is. [00:04:29] offsetkeyz: February saw a surge in search based malvertising. with Fakebat leading the charge. A cunning malware distributed through ads for popular software, which was reported by Malwarebytes on Tuesday. See the link in the show notes. [00:04:44] HGF: Fakebat? That sounds like a villain from a Saturday morning cartoon. So what, now I can't even click on things I search for with [00:04:51] offsetkeyz: Google? Remember, if you're searching for something specific, try not to click on the advertisement results. Anyone can buy these advertisement [00:05:00] spaces, and trick you into clicking them by impersonating the site you're trying to find. This malware has been impersonating brands like Parsec and FreeCAD. Both are cutting edge technologies in their respective fields. Like a wolf in sheep's [00:05:14] HGF: clothing. How do they even get these ads in front of people? [00:05:18] offsetkeyz: malvertising campaign gets creative., They've leveraged URL shorteners and even compromised legitimate websites, making these malicious ads appear trustworthy. Victims are lured into clicking, which kicks off a redirect chain ending in malware installation. Once installed, Fakebat reaches out to its command and control servers, putting victims data at risk. So, what's [00:05:41] HGF: the digital equivalent of locking our doors and windows? [00:05:44] offsetkeyz: The key is caution. Avoid clicking on ads for software downloads, and ensure your system's security measures are up to date. Utilizing tools like Threat Down DNS Filter can block malicious ads at the source, offering a layer [00:06:00] of protection. Got [00:06:01] HGF: it. Be skeptical of too good to be true ads and maybe invest in a cyber guard dog. How is Google dealing with this ad [00:06:09] offsetkeyz: apocalypse? The incidents have been reported to Google, highlighting the ongoing battle between security researchers and malvertisers. It's a digital cat and mouse game. with each side constantly evolving their strategies. [00:06:23] HGF: This actually happened to me when I was shopping for a pan at our place. It was like a website. I clicked on the sponsored one and it was like at our place. com and it almost got me, but the font looked a little bit off. Really? Yeah. I think I sent it to, this is like last year, but I'll never forget how identical to the site it looked, but everything was on super sale and it was like, hurry, act now. And they never do that. And I was like, Good [00:06:50] offsetkeyz: catch. I actually had a friend order shoes at my recommendation from my favorite shoe store called Vivo Barefoot. Except he went [00:07:00] and googled it, and it, the first one on Google was vivobarefootusa. com, and he actually ordered shoes from them. And never got [00:07:09] HGF: them. [00:07:10] offsetkeyz: And never [00:07:12] transition: Uh, uh, uh, uh, uh, uh. [00:07:24] offsetkeyz: The Tor Project has just unveiled their latest innovation, WebTunnel. A new bridge designed to camouflage Tor connections amidst regular HTTPS traffic, making it a formidable foe against censorship. Tor is all about privacy and overcoming digital barriers. Bridges in the Tor network are like secret pathways that aren't listed in the public directory, helping users connect without drawing attention. However, countries with tight censorship have gotten better at spotting these connections, Causes the need for WebTunnel, which disguises Tor traffic to look just like any other HTTPS web traffic.[00:08:00] This makes it much harder for these countries to block without also disrupting HTTPS connections, which are vital for a secure internet. How does this magic work? It's all about the art of disguise. WebTunnel wraps Tor's data packets in a layer that mimics WebSocket like HTTPS connections. To any observer on the network, it appears as if the user is simply visiting websites, making it difficult to distinguish and block Tor users specifically. And what about [00:08:29] HGF: those living under the watchful eye of Big Brother? Any luck for [00:08:33] offsetkeyz: them? That is the heart of the matter. WebTunnel proving to be effective in countries who govern internet usage, but some of them, like China and Iran, are figuring out ways to detect it. Tor recommends adding a layer of obfuscation using the OBFS4 protocol. [00:08:52] HGF: OBFS what? Sounds like something out of a spy novel. [00:08:56] offsetkeyz: Not far off, oBFS4, or as I like to [00:09:00] call it, the OB4 Skater, is a protocol designed to disguise internet traffic, making it difficult for third parties to determine what's being transmitted. This is crucial in places where censorship is rampant and access to information is restricted. [00:09:15] HGF: Hide and seek with your internet connection. If I'm in a country that's not too fond of free information, it's OBFS4 could be my ticket to [00:09:23] offsetkeyz: the wider world. Exactly, yeah. OBFS4 is a critical tool for those in oppressive regimes, offering a lifeline to unrestricted information. It exemplifies the ongoing battle for digital freedom, ensuring that the internet remains open and accessible to all. A lot of companies IT departments block Tor on their network. For good reason. So, the main purpose of the WebSocket is to allow citizens of oppressive regimes to Access the internet unrestricted, but I'm wondering what the implications will be for IT departments trying to detect [00:10:00] this type of traffic on their networks. It will blend in with everything else, which could open some, some floodgates for some activity. And that's all we've got for you today. Huge thanks to Hot Girl Farmer for joining us and delivering the news. And we will talk to you some more tomorrow.

The True Beauty Brooklyn Podcast
International Women's Day | The Iranian Women's Rights Movement with Yasmine Aker

The True Beauty Brooklyn Podcast

Play Episode Listen Later Mar 8, 2024 64:04


Today I am sharing what is easily my favorite conversation, with the incredible activist, actress, and singer, Yasmine Aker. I have been following the uprising and protests in Iran since the murder of Mahasa Amini a little over a month prior to the airing of this episode. The Iranian women, youth, and LGBTQ+ community are risking their lives for a chance at the liberties and freedoms that we have today. The freedoms these courageous people are fighting for are similar in many ways to the freedoms currently attempting to be stripped from Americans.  To help amplify the voices of these incredibly brave women and because this is not either of our cultures, we are here to support Yasmine's voice and the story of the Iranian Women's Rights Movement that is happening right now.  To learn more about Yasmine, please visit her Instagram page @iamyasmi Here are some accounts on Instagram, people can follow and amplify: @middleEastmatters    @sarahrmni   @golFarahani   @ranarahimpour_bbc   @collectiveforblackiranians @from___iran   @1500tasvir    Due to Sanctions its not possible to send any funds to Iran, but here are some fundraisers working for progress in Iran:  This is the GoFundMe fundraiser seeking to accelerate and prolong global visibility and coverage through billboards/mainstream media outlets: www.gofundme.com/f/FreeIranCallForMedia  People can also donate to the Tor Project to help restore the internet in Iran: www.torproject.org  People can share their VPN with Snowflake -- https://snowflake.torproject.org/ or Tooseh app www.tooseh.org  List of resources and petitions:   https://freeirancalltoaction.com/  www.iranhumanrights.org Demand that the United Nations urgently create an international mechanism to hold the Iranian Authorities accountable 1-212-963-7160 Call the United Nations Women's Department 1-646-781-4400  Thanks to today's sponsors, OneSkin and Ritual!   OneSkin is the world's first skin longevity company. By focusing on the cellular aspects of aging, OneSkin keeps your skin looking and acting younger for longer.  Get started today with 15% off using code TRUEBEAUTY at oneskin.co. That's 15% off oneskin.co with code TRUEBEAUTY.  Reduce wrinkles without compromising on clean science. HyaCera from Ritual is a skin supplement you can actually trust. Get 20% off your first month for a limited time at ritual.com/TRUEBEAUTY. Start Ritual or add HyaCera to your subscription today. That's ritual.com/TRUEBEAUTY for 20% off. Send your beauty questions and beauty baddie moments of the week to truebeautypodcast@gmail.com . Follow me on Instagram @thetruebeautypodcast and @thebrownelizabethtaylor And Click here to subscribe to my YouTube Channel Don't forget to rate us 5-stars,  subscribe, and leave a review on Apple iTunes. Tell a friend to tell a friend if you like the show! Learn more about your ad choices. Visit megaphone.fm/adchoices

Techlore Talks
Apple Confirms Government Spies on Notifications!

Techlore Talks

Play Episode Listen Later Dec 14, 2023 35:12


Episode #16. The government collects data & metadata from Apple & Google push notifications, exciting announcements from the Tor Project, Simple Tools sold out, my involvement at the Bitwarden open source security conference, and more!Join our ForumOur Patreon—Timestamps:00:00 Government spying on push notifications16:06 Tor Project Announcements23:14 Simple Tools Sells Out28:50 Henry Bitwarden Conference Talk—Techlore Talks:Video PlaylistRSS Feed—Techlore Links:HomepageTechlore ForumGo Incognito CourseSupport Techlore! Get full access to Techlore Dispatch at dispatch.techlore.tech/subscribe

El Bit

Resumen de noticias de Bitcoin «El Bit», desde ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠La librería de Satoshi⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, con la producción de ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Proyecto Bitcoin⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠  Nuestras fuentes de hoy: Los ETF spot de Bitcoin tienen casi $100 millones en activos bajo gestión en Brasil DEMAND lanza el primer grupo de minería de Bitcoin Stratum V2 CZ no puede regresar a los Emiratos Árabes Unidos antes de la sentencia Tor Project duplicará las donaciones de hasta $75.000 hasta fin de año Al cierre, el precio de Bitcoin se mantiene alrededor de los 37.386  USD dólares por moneda Si te gusta nuestro contenido, ayúdanos a seguir entregándolo. Valor por valor todos ganamos: ⚡️ https://geyser.fund/project/proyectoencriptado  ⚡️ proyectobitcoin@getalby.com ⚡️ user73191561@fountain.fm

Risky Business News
Risky Biz News: Tor Project removes 1k relays linked to cryptocurrency scheme

Risky Business News

Play Episode Listen Later Nov 22, 2023


A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu. You can find the newsletter version of this podcast here.

Late Night Linux Extra
Linux Downtime – Episode 79

Late Night Linux Extra

Play Episode Listen Later Aug 27, 2023 20:14


We are all on board with the right to be forgotten but it can cause some tricky problems for open source projects – particularly small ones. Plus why we won't stop going on about why we take such a dim view of crypto. Amolith mentioned a toot from the Tor Project.       HelloFresh... Read More

Late Night Linux All Episodes
Linux Downtime – Episode 79

Late Night Linux All Episodes

Play Episode Listen Later Aug 27, 2023 20:14


We are all on board with the right to be forgotten but it can cause some tricky problems for open source projects – particularly small ones. Plus why we won't stop going on about why we take such a dim view of crypto. Amolith mentioned a toot from the Tor Project.       HelloFresh... Read More

Hacking Humans
Encore: darknet (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Jul 25, 2023 4:47


A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.

Word Notes
Encore: darknet (noun)

Word Notes

Play Episode Listen Later Jul 25, 2023 4:47


A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors. Learn more about your ad choices. Visit megaphone.fm/adchoices

Intego Mac Podcast
Episode 299: Threads Launches, Amazon Primes Again, and Carmakers Surveil Drivers

Intego Mac Podcast

Play Episode Listen Later Jul 6, 2023 27:53


Meta's Twitter competitor Threads has launched, and with it comes the same privacy risks as with the company's Facebook and Twitter. Amazon Prime Day is just around the corner, and we explain why that cheap iPhone might not be a good deal. And US carmakers are snarfing up data from Bluetooth connected phones. Show Notes: Firefox to end macOS Mojave, Windows 7/8 updates—Here's why that's a good thing Meta is launching “Threads, an Instagram app” (a Twitter competitor) on July 6 *Note: a few hours after we recorded, Twitter stopped blocking non-logged in users from viewing tweets.* 8 essential tips to stay safe shopping online on Cyber Monday and Cyber Week Caution! These Black Friday “deals” may be bad for your security - these tips also apply to Amazon Prime Day. CamelCamelCamel Pricepulse Surveillance on Wheels: How Top US Car Makers Spy on Drivers How to take control of another computer using Google Chrome Remote Desktop Google's Dark Web Monitoring Feature Now Available for All US Gmail Users Tor Project Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com, and use this link for a special discount when you're ready to buy.

Privacy Files
Dark Web 101

Privacy Files

Play Episode Listen Later Jun 3, 2023 71:05


The internet is a lot of things. It is informative...sometimes deceptive. It brings people together when they are separated by great physical distances. It makes shopping easier than at any other time in human history. But there is also a dark side. But is it as sinister as the media makes it out to be? The dark web conjures up images of a deep recess within the web where anything goes. A place where so-called "red rooms" live stream the torture and murdering of innocent people. A shadowy digital world where hitmen sell their services for as little as $5,000. But is the dark web really this evil? In this episode of Privacy Files, we kick of a multi-part series on the dark web by laying the foundation for what the dark web really is and how it came about. We start by explaining the differences between the surface web, the deep web and the dark web. The surface web, the indexed part of the web most of us are familiar with, is less than 10% of the entire web. Considering that in April 2023 there were more than 30 billion webpages indexed on the surface web alone, the entirety of the web is mind-blowing. Then we dive into the origins of the dark web by looking at its history and evolution. The dark web as we know it today traces its roots back to the 1990s when researchers at the Naval Research Lab (NRL) created the first designs and prototypes for onion routing, which relies on a decentralized network. In the mid-2000s the Tor Project launched and the Tor browser soon followed. Today, the Tor browser is how most people access the dark web, with one study placing the number of daily Tor users at 2.6 million. While Tor and the dark web are used by criminals, they are also championed by privacy advocates around the world. These privacy patriots include whistleblowers, political dissidents, independent journalists and those fighting government censorship. In all, we give you an objective look at the good and the bad of the dark web. Our conclusions might surprise you. They surprised us. To wrap up the episode, we provide you with some helpful tips for navigating the dark web and leave you with a few clear words of caution. If you don't have a good reason for navigating the dark web, it's probably best to stay away. Links Referenced: https://www.techspot.com/article/2660-the-dark-web/ https://www.dailymail.co.uk/sciencetech/article-12119027/Im-tech-correspondent-used-dark-web-day-heres-saw.html https://www.tomshardware.com/news/dark-web-chatgpt-unleashed-meet-darkbert https://kratikal.com/blog/surface-web-and-dark-web-exploring-layers-of-web/ https://www.kaspersky.com/resource-center/threats/deep-web https://www.youtube.com/watch?v=0UuHn27dFpE https://www.imf.org/en/Publications/fandd/issues/2019/09/the-truth-about-the-dark-web-kumar https://www.youtube.com/watch?v=luvthTjC0OI https://www.makeuseof.com/dark-web-legitimate-uses/ https://www.youtube.com/watch?v=EgXeXmNecto https://www.dailymail.co.uk/sciencetech/article-12042561/I-bought-5-items-Dark-Web-wont-believe-sent.html https://www.torproject.org/ OUR SPONSORS: Anonyome Labs - Makers of MySudo and Sudo Platform. Take back control of your personal data. www.anonyome.com MySudo - The world's only all-in-one privacy app. Communicate and transact securely and privately. Talk, text, email, browse, shop and pay, all from one app. Stay private. www.mysudo.com Sudo Platform - The cloud-based platform companies turn to for seamlessly integrating privacy solutions into their software. Easy-to-use SDKs and APIs for building out your own branded customer apps like password managers, virtual cards, private browsing, identity wallets (decentralized identity), and secure, encrypted communications (e.g., encrypted voice, video, email and messaging). www.sudoplatform.com

Thriller Bitcoin
SNL #62: macOS BTC

Thriller Bitcoin

Play Episode Listen Later Apr 8, 2023 42:17


Join Car and Keyan to discuss Stacker News top posts, Car & Keyan's favorite posts of the week, and top stackers.We discuss: The Bitcoin Whitepaper Is Hidden in Every Modern Copy of macOSSN Discussion Bitcoin in El Salvador: An honest live reportSN Discussion Introducing Mutiny Wallet: Private, unstoppable bitcoin paymentsSN Discussion Mullvad and The Tor Project releases a new web browserSN Discussion Introducing Nostr Wallet Connect- Native Zapping in AmethystSN Discussion Car's pick:  A list of resources for devs looking to learn and build their careers in BitcoinSN Discussion Keyan's pick: Gig: How nostr can benefit readers and writersSN Discussion For the week of April 7th, 2023.Stacker News Live WebsiteThriller Bitcoin SN NewsletterPlease find us on YouTube & BitcoinTVWe love Foundation app for Lightning 2.0 podcastingSend us a Boost, and we will read it on the next SNLWe also send 26% of our sats streamed to us over to opensats.comSupport contributors to Bitcoin and other free and open-source projectsFollow Car on TwitterZap Car on NostrFollow Car on SNLearn more about Thriller BitcoinFollow Keyan on TwitterZap Keyan on NostrFollow Keyan on SNLearn more about Stacker News

WIRED Security: News, Advice, and More
Tor Project's New Privacy-Focused Browser Lets You Layer a VPN

WIRED Security: News, Advice, and More

Play Episode Listen Later Apr 4, 2023 3:53


Mullvad Browser, a collaboration between the nonprofit and Mullvad VPN, offers an anti-tracking browser designed to be used with a VPN.Read the article here

Hírstart Robot Podcast
Az okostelefonok non plus ultrája lett a Samsung Galaxy S23 Ultra

Hírstart Robot Podcast

Play Episode Listen Later Apr 4, 2023 4:24


Az okostelefonok non plus ultrája lett a Samsung Galaxy S23 Ultra Player     2023-04-04 11:36:03     Mobiltech Telefon Elismerés Okostelefon Samsung A Samsung csúcsmodelljének idei kiadása a Galaxy S23, amit háromféle változatban választhatsz, és ezek közül rögtön a legnagyobb és legizmosabb Ultrát próbáltuk ki, ami nemcsak a kijelzőjével és a sebességével, de a kamerájával és a tollával is elnyerte az elismerésünket. Koherens rádiójeleket fogtak egy távoli, Földszerű bolygóról Rakéta     2023-04-04 11:18:48     Tudomány Rádió A tőlünk 12 fényévre elhelyezkedő planéta egy Földhöz hasonló sziklás bolygó – a felfedezés a remények szerint segíthet az idegen élet utáni kutatásban a távoli csillagrendszerekben. Élj sokszínűen! Indul az idei Xiaomi Fan Festival Digital Hungary     2023-04-04 05:40:00     Mobiltech Tavasz Ajándék Xiaomi Speciális ajánlatokkal és ajándékokkal ünnepli elkötelezett felhasználóit a világ leginnovatívabb technológiai gyártói közé tartozó Xiaomi. Az immár hagyománnyá vált, világszerte megrendezett tavaszi Xiaomi Fan Festival keretében április 3-tól idehaza is páratlan ajánlatokkal jelentkeznek az elektronikai termékeket árusító üzletláncok és online ke Jó hírt kaptak, akik napelemes rendszert csatlakozatnának a hálózathoz Öko-drive     2023-04-04 04:34:43     Tudomány Gazdaság Energia Napelem Az új kormányhatározat lehetővé teszi az új napelemes rendszerek visszatáplálását, de az Energiahivatal javaslatai alapján korlátozott területeken. Az év végéig az üzembe helyezett rendszerek szaldós elszámolásúak lehetnek. Biztonságban böngészni: ezt ígéri a Mullvad IT Business     2023-04-04 11:27:48     Infotech Windows Böngésző Adatvédelem Linux Firefox Kifejezetten az adatvédelmet állítja a középpontba a Mullvad böngésző. Méghozzá platformfüggetlenül: Linux, MacOS és Windows alatt is futtatható, míg Firefox alatt béta állapotban lévő bővítményként telepíthető. Az ingyenesen letölthető, új böngésző a Tor Project és a Mullvad VPN közös projektjeként jelent meg – mindkét szervezet éppen a felhasznál Star Wars Jedi: Survivor – Az összes képesség feloldásához több kell, mint a fő történet! theGeek     2023-04-04 05:12:38     Gaming Interjú Star Wars Survivor A Star Wars Jedi: Survivor játékban a teljes képességfa kifejlesztéséhez a játékosoknak a fő sztorin túlra kell menniük, szemben az előd Jedi: Fallen Order játékkal. A Star Wars Jedi: Survivor játék direktora, Stig Asmussen a Game Rant-nek adott interjúban beszélt a képességfáról és annak változásairól a Fallen Order óta. A Jedi: Fallen Order képes Konkurenst kapott Magyarországon a Revolut 24.hu     2023-04-04 07:30:08     Infotech Eurózóna Az eurózónán kívül először Magyarországon indul el a Lightyear befektetési platform. Még az idén elkezdik a kínai űrinternet telepítését Bitport     2023-04-04 12:31:00     Infotech USA Kína Műhold Lassan indul be a projekt, de az amerikai szolgáltatók már most is éles versenyre számítanak az állami hátszéllel röpködő kínai műholdakkal szemben. Ausztráliában is betiltották a tiktokozást a kormányzati eszközökön 444.hu     2023-04-04 06:15:13     Infotech Ausztrália Nemzetbiztonság Mert túl sok adatot gyűjt a felhasználókról és nemzetbiztonsági kockázatot jelenthet. Az ASUS tisztázta, hogy áprilisi tréfa volt-e a nemrég bejelentett Steam Deck riválisa PCWorld     2023-04-04 09:01:14     Infotech Asus Áprilisi tréfa Kiderült, hogy megkapjuk-e az ASUS ROG Allyt, avagy csak egy kegyetlen poén volt. Csillére hasonlít az új holdjáró IT Business     2023-04-04 09:03:24     Infotech USA Világűr SpaceX 2026-ban, a SpaceX egyik Starship rakétájával indulhat a Hold felé az Astrolab nagyméretű holdjáró járműve. A FLEX nevet kapott, speciális, elektromos meghajtású gépkocsi a legnagyobb méretű jármű lesz, amely eddig a Hold felszínén gördült: a több, mint két tonnás tömeg háromszor akkorának ígérkezik, mint az 1971-ben és 1972-ben használt, amerikai Az emberi szervezet olyan részleteit is látjuk, amelyeket korábban nem tudtunk megjeleníteni Gyártástrend     2023-04-04 14:21:25     Tudomány Mesterséges intelligencia Transzformáció zajlik a medicinában is a mesterséges intelligencia és az új technológiák hatására, kiváltképp így van ez a képalkotó eljárások esetében, ahol rendkívül dinamikusan változik többek között az is, hogy mit és mennyire jól látnak a radiológusok.  Focizó robotot fejlesztettek National Geographic     2023-04-04 11:49:59     Tudomány Robot A négylábú szerkezet megtanulta különféle terepeken is rúgni a labdát, e képességeit a katasztrófák elhárításában lehet majd használni.

Hírstart Robot Podcast - Tech hírek
Az okostelefonok non plus ultrája lett a Samsung Galaxy S23 Ultra

Hírstart Robot Podcast - Tech hírek

Play Episode Listen Later Apr 4, 2023 4:24


Az okostelefonok non plus ultrája lett a Samsung Galaxy S23 Ultra Player     2023-04-04 11:36:03     Mobiltech Telefon Elismerés Okostelefon Samsung A Samsung csúcsmodelljének idei kiadása a Galaxy S23, amit háromféle változatban választhatsz, és ezek közül rögtön a legnagyobb és legizmosabb Ultrát próbáltuk ki, ami nemcsak a kijelzőjével és a sebességével, de a kamerájával és a tollával is elnyerte az elismerésünket. Koherens rádiójeleket fogtak egy távoli, Földszerű bolygóról Rakéta     2023-04-04 11:18:48     Tudomány Rádió A tőlünk 12 fényévre elhelyezkedő planéta egy Földhöz hasonló sziklás bolygó – a felfedezés a remények szerint segíthet az idegen élet utáni kutatásban a távoli csillagrendszerekben. Élj sokszínűen! Indul az idei Xiaomi Fan Festival Digital Hungary     2023-04-04 05:40:00     Mobiltech Tavasz Ajándék Xiaomi Speciális ajánlatokkal és ajándékokkal ünnepli elkötelezett felhasználóit a világ leginnovatívabb technológiai gyártói közé tartozó Xiaomi. Az immár hagyománnyá vált, világszerte megrendezett tavaszi Xiaomi Fan Festival keretében április 3-tól idehaza is páratlan ajánlatokkal jelentkeznek az elektronikai termékeket árusító üzletláncok és online ke Jó hírt kaptak, akik napelemes rendszert csatlakozatnának a hálózathoz Öko-drive     2023-04-04 04:34:43     Tudomány Gazdaság Energia Napelem Az új kormányhatározat lehetővé teszi az új napelemes rendszerek visszatáplálását, de az Energiahivatal javaslatai alapján korlátozott területeken. Az év végéig az üzembe helyezett rendszerek szaldós elszámolásúak lehetnek. Biztonságban böngészni: ezt ígéri a Mullvad IT Business     2023-04-04 11:27:48     Infotech Windows Böngésző Adatvédelem Linux Firefox Kifejezetten az adatvédelmet állítja a középpontba a Mullvad böngésző. Méghozzá platformfüggetlenül: Linux, MacOS és Windows alatt is futtatható, míg Firefox alatt béta állapotban lévő bővítményként telepíthető. Az ingyenesen letölthető, új böngésző a Tor Project és a Mullvad VPN közös projektjeként jelent meg – mindkét szervezet éppen a felhasznál Star Wars Jedi: Survivor – Az összes képesség feloldásához több kell, mint a fő történet! theGeek     2023-04-04 05:12:38     Gaming Interjú Star Wars Survivor A Star Wars Jedi: Survivor játékban a teljes képességfa kifejlesztéséhez a játékosoknak a fő sztorin túlra kell menniük, szemben az előd Jedi: Fallen Order játékkal. A Star Wars Jedi: Survivor játék direktora, Stig Asmussen a Game Rant-nek adott interjúban beszélt a képességfáról és annak változásairól a Fallen Order óta. A Jedi: Fallen Order képes Konkurenst kapott Magyarországon a Revolut 24.hu     2023-04-04 07:30:08     Infotech Eurózóna Az eurózónán kívül először Magyarországon indul el a Lightyear befektetési platform. Még az idén elkezdik a kínai űrinternet telepítését Bitport     2023-04-04 12:31:00     Infotech USA Kína Műhold Lassan indul be a projekt, de az amerikai szolgáltatók már most is éles versenyre számítanak az állami hátszéllel röpködő kínai műholdakkal szemben. Ausztráliában is betiltották a tiktokozást a kormányzati eszközökön 444.hu     2023-04-04 06:15:13     Infotech Ausztrália Nemzetbiztonság Mert túl sok adatot gyűjt a felhasználókról és nemzetbiztonsági kockázatot jelenthet. Az ASUS tisztázta, hogy áprilisi tréfa volt-e a nemrég bejelentett Steam Deck riválisa PCWorld     2023-04-04 09:01:14     Infotech Asus Áprilisi tréfa Kiderült, hogy megkapjuk-e az ASUS ROG Allyt, avagy csak egy kegyetlen poén volt. Csillére hasonlít az új holdjáró IT Business     2023-04-04 09:03:24     Infotech USA Világűr SpaceX 2026-ban, a SpaceX egyik Starship rakétájával indulhat a Hold felé az Astrolab nagyméretű holdjáró járműve. A FLEX nevet kapott, speciális, elektromos meghajtású gépkocsi a legnagyobb méretű jármű lesz, amely eddig a Hold felszínén gördült: a több, mint két tonnás tömeg háromszor akkorának ígérkezik, mint az 1971-ben és 1972-ben használt, amerikai Az emberi szervezet olyan részleteit is látjuk, amelyeket korábban nem tudtunk megjeleníteni Gyártástrend     2023-04-04 14:21:25     Tudomány Mesterséges intelligencia Transzformáció zajlik a medicinában is a mesterséges intelligencia és az új technológiák hatására, kiváltképp így van ez a képalkotó eljárások esetében, ahol rendkívül dinamikusan változik többek között az is, hogy mit és mennyire jól látnak a radiológusok.  Focizó robotot fejlesztettek National Geographic     2023-04-04 11:49:59     Tudomány Robot A négylábú szerkezet megtanulta különféle terepeken is rúgni a labdát, e képességeit a katasztrófák elhárításában lehet majd használni.

The Russians
Triple Threat

The Russians

Play Episode Listen Later Mar 12, 2023 19:39


This is a free preview of a paid episode. To hear more, visit yasha.substack.comWe recently went to the local theater to watch Ithaca, a new documentary about Julian Assange that focuses on his dad's efforts to get him out of London's Belmarsh Prison, where he's been held in solitary since 2019 while fighting extradition to United States on espionage charges — initially under Trump but now under Biden. Oh how things change!To add some context to the film, we watched and discuss two other Julian Assange docs: Laura Poitras' Risk and Alex Gibney's We Steal Secrets. They amount to a decade's worth of documentaries about Wikileaks — chronicling the increasing repression and marginalization and hopelessness of Julian and his project to change the world by freeing information.—Yasha and EvgeniaA couple of notes on our discussion.The three films are all very different. Of the three, Risk is probably the most interesting to watch but also the most deceptive and least informative. It gives viewers a false sense of intimacy and reality, while on the backend being very manipulative.As we discus in the ep, most viewers probably won't know that after Risk premiered at Cannes — and after Laura Poitras appeared and hugged on the red carpet with Wikileaks sidekick Jacob Appelbaum — Poitras re-edited the film, changing the narrative to show Julian Assange and Jacob Appelbaum not as heroes but as predators. Yasha first found out about this sneaky re-edit from Julian back in 2017 when Julian was still holed up in the Ecuadorian Embassy. Julian felt betrayed and explained the re-editing of the film as Laura's attempt to protect her reputation from a couple of things that happened not long after the film had its premier in France. One was that Jacob Appelbaum — the Tor Project frontman with whom Laura was intimately involved with — was accused of being a sexual predator and was then cancelled by the privacy community. The second was that Julian became fully toxic in liberal circles during the 2016 presidential election: he was seen as a Russian asset who backed Trump over Hillary and released all those damaging emails.So as Julian explained: because of all of this Poitras had to betray her two friends — one of whom was in captivity, the other who used to be her lover — to make sure she came out of these scandals clean, even though she had no problem with any of this until it became public and a problem for her career. It was a tangled, gross situation.“I think it's mostly defensive. She's the daughter of a billionaire, and has an apartment in Tribecca, Manhattan,” Julian wrote to Yasha back then. “But she's pretty simple. She aspires to maximise her status among the Tribecca/Greenwich Village, etc. set.”

Screw The Commute Podcast
714 - Privacy and security: Tom talks Tor Browser

Screw The Commute Podcast

Play Episode Listen Later Feb 20, 2023 9:54


I'm going to talk about the Tor Browser today. Now, if you need some super high security when looking things up online, then you might want to learn about this somewhat famous or I don't know, maybe we could call it infamous browser. Here's their tagline. Browse privately. Explore freely. Defend yourself against tracking and surveillance and circumvent censorship. That's their tagline. Plus it gives you access to what you may have heard of as the dark web. Screw The Commute Podcast Show Notes Episode 714 How To Automate Your Business - https://screwthecommute.com/automatefree/ Internet Marketing Training Center - https://imtcva.org/ Higher Education Webinar – https://screwthecommute.com/webinars See Tom's Stuff – https://linktr.ee/antionandassociates 00:23 Tom's introduction to Tor Browser 02:16 Lots of uses for this browser beyond privacy 04:29 Exploring the Internet freely and being secure 06:27 Using a Virtual Private Network Entrepreneurial Resources Mentioned in This Podcast Higher Education Webinar - https://screwthecommute.com/webinars Screw The Commute - https://screwthecommute.com/ Screw The Commute Podcast App - https://screwthecommute.com/app/ College Ripoff Quiz - https://imtcva.org/quiz Know a young person for our Youth Episode Series? Send an email to Tom! - orders@antion.com Have a Roku box? Find Tom's Public Speaking Channel there! - https://channelstore.roku.com/details/267358/the-public-speaking-channel How To Automate Your Business - https://screwthecommute.com/automatefree/ Internet Marketing Retreat and Joint Venture Program - https://greatinternetmarketingtraining.com/ KickStartCart - http://www.kickstartcart.com/ Copywriting901 - https://copywriting901.com/ Training - https://screwthecommute.com/training Disabilities Page - https://imtcva.org/disabilities/ Tom's Patreon Page - https://screwthecommute.com/patreon/ Tom on TikTok - https://tiktok.com/@digitalmultimillionaire/ The Tor Project - https://www.torproject.org/ Email Tom: Tom@ScrewTheCommute.com Internet Marketing Training Center - https://imtcva.org/ Related Episodes Virtual Private Networks - https://screwthecommute.com/589/ Dr. Wayne Pickering - https://screwthecommute.com/713/ More Entrepreneurial Resources for Home Based Business, Lifestyle Business, Passive Income, Professional Speaking and Online Business I discovered a great new headline / subject line / subheading generator that will actually analyze which headlines and subject lines are best for your market. I negotiated a deal with the developer of this revolutionary and inexpensive software. Oh, and it's good on Mac and PC. Go here: http://jvz1.com/c/41743/183906 The Wordpress Ecourse. Learn how to Make World Class Websites for $20 or less. https://screwthecommute.com/wordpressecourse/ Join our Private Facebook Group! One week trial for only a buck and then $37 a month, or save a ton with one payment of $297 for a year. Click the image to see all the details and sign up or go to https://www.greatinternetmarketing.com/screwthecommute/ After you sign up, check your email for instructions on getting in the group.

This is Reality - The Reality Winner Podcast
#15 - Double Standards: Trump and the Espionage Act

This is Reality - The Reality Winner Podcast

Play Episode Listen Later Dec 22, 2022 20:50


Micah Lee, a computer security engineer who develops technology to protect whistleblowers, gives his unique thoughts in this episode. He shares why he believes whistleblowers are important to our democracy and how the Espionage Act of 1917 reveals the imbalance in the American justice system. MICAH LEE - BIO Micah Lee is First Look Media's Director of Information Security. He is a computer security engineer and an open-source software developer who writes about technical topics like digital and operational security, encryption tools, whistleblowing, and hacking using language that everyone can understand without dumbing it down. He develops security and privacy tools such as OnionShare, Dangerzone, and semiphemeral. Before joining The Intercept, he worked as a staff technologist at the Electronic Frontier Foundation, where he explained how technologies work to journalists and lawyers, and worked to encrypt the web. He is a founder and former board member of the Freedom of the Press Foundation, a member of the Distributed Denial of Secrets advisory board, and a Tor Project core contributor. Learn more about your ad choices. Visit megaphone.fm/adchoices

The True Beauty Brooklyn Podcast
The Iranian Women's Rights Movement with Yasmine Aker

The True Beauty Brooklyn Podcast

Play Episode Listen Later Oct 28, 2022 55:16


Today we are sharing what is easily our favorite conversation, with the incredible activist, actress, and singer, Yasmine Aker. We have been following the uprising and protests in Iran since the murder of Mahasa Amini a little over a month prior to the airing of this episode. The Iranian women, youth, and LGBTQ+ community are risking their lives for a chance at the liberties and freedoms that we have today. The freedoms these courageous people are fighting for are similar in many ways to the freedoms currently attempting to be stripped from Americans. To help amplify the voices of these incredibly brave women and because this is not either of our cultures, we are here to support Yasmine's voice and the story of the Iranian Women's Rights Movement that is happening right now. To learn more about Yasmine, please visit her Instagram page @iamyasmiHere are some accounts on Instagram, people can follow and amplify:@middleEastmatters @sarahrmni @golFarahani @ranarahimpour_bbc @collectiveforblackiranians@from___iran @1500tasvir Due to Sanctions its not possible to send any funds to Iran, but here are some fundraisers working for progress in Iran: This is the GoFundMe fundraiser seeking to accelerate and prolong global visibility and coverage through billboards/mainstream media outlets: www.gofundme.com/f/FreeIranCallForMedia People can also donate to the Tor Project to help restore the internet in Iran: www.torproject.org People can share their VPN with Snowflake -- https://snowflake.torproject.org/ or Tooseh app www.tooseh.org List of resources and petitions: https://freeirancalltoaction.com/ www.iranhumanrights.orgDemand that the United Nations urgently create an international mechanism to hold the Iranian Authorities accountable1-212-963-7160Call the United Nations Women's Department1-646-781-4400Send us your beauty questions and beauty baddie moments of the week to truebeautybrooklynpodcast@gmail.com.Follow us on Instagram @truebeautybrooklynpodcast and @truebeautybrooklyn & @thebrownelizabethtaylor and @alixlynly Book in-person or virtual skincare or brow appointments at www.truebeautybrooklyn.com Don't forget to rate us 5-stars, subscribe, and leave a review on Apple iTunes.Tell a friend to tell a friend if you like the show!See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Global Tech Leaders' Podcast
Woman in Tech Series: Isabela Fernandes, Executive Director at TOR Project shares the importance of anonymity.

Global Tech Leaders' Podcast

Play Episode Listen Later Sep 29, 2022 40:14


Welcome to the Woman in Tech Series from the Global Tech Leaders Podcast. Today we are speaking to Isabela Fernandes Executive Director of The TOR Project. She joined in 2015 as a Project Manager and has led teams into collaborative strategy building and road mapping to an unprecedented level in the organisation. She leads the UX team and implementation of some of the critical improvements to the platform as the Executive Director. We kick off by asking Isabela to share with us her journey and what has led her to where she is today. Got into computers in the late 90s. Self-learning and self-taught. Free software movement. Federal Government in Brazil. Twitter. Then we ask Isabela to share more about what TOR Project is and what they do. The mission is about human rights. Privacy. TOR Network. Run by volunteers. Onion of layers and encryption. Keeping people anonymous over the internet. “We don't want to take over the internet, we want to change it.” Leakage of MetaData. Non-profit organization. Disguise connections. Then we ask Isabela how they balance those who want to be anonymous versus law enforcement and what kind of scenarios can she share on this. Human rights defenders. Law enforcement can do investigations. Anonymity. Next, we ask Isabela, does the TOR Project give people their own version of the internet. No, you have the same version and the browser is similar to the usual one. Success stories of using TOR Project. Influence change. Then we ask Isabela how is the TOR Project funded. Grants from private foundations. Grants from the government. Direct donations. Donations in cryptocurrency. To collaborate with TOR Project go to their website. Annual memberships. Mobile VPN and New York Times Volunteers running services all around the world. Never be satisfied. Challenge everything. Next, we ask Isabela, in terms of women in tech, what has been her experience as a female leader in technology. Never easy, wasn't easy 20 years ago and it's not easy now. Shared computers. Wrote code on paper. Women don't stop fighting. Never give up. Changed the culture at TOR. Culture of diversity and respect. Equity. Then we ask Isabela what advice would she give younger women that want to enter the tech world. Mentorship. Believe in yourself. Don't let others blur your vision. Trust yourself. Lastly, we ask Isabela what is a tool she can't live without. Paper and a pen. Calendar. Communication tools. --- Send in a voice message: https://anchor.fm/gloabl-tech-leaders/message

Rustacean Station
Tor with Nick Mathewson

Rustacean Station

Play Episode Listen Later Mar 4, 2022 67:27


Allen Wyma talks with Nick Mathewson, one of the creators of Tor Project. Tor is free and open-source software for enabling anonymous communication. Contributing to Rustacean Station Rustacean Station is a community project; get in touch with us if you'd like to suggest an idea for an episode or offer your services as a host or audio editor! Twitter: @rustaceanfm Discord: Rustacean Station Github: @rustacean-station Email: hello@rustacean-station.org Timestamps [@0:39] - Nick's Bio & Tor Project Introduction [@2:33] - Deeper dive into Tor [@8:07] - Advantage of Rust over C when trying to bring stronger privacy to internet. [@21:44] - The History of Tor [@26:02] - How does Tor stay in business despite being a free service? [@28:11] - What is Onion Routing and how does it work at a high level? [@38:54] - The Tor Browser [@42:14] - Advise on how to maintain anonymity online [@55:17] - Rust vs other languages [@1:03:54] - Tips & tricks for people who are starting off in Rust [@1:06:00] - Parting thoughts Other Resources Tor's Github Credits Intro Theme: Aerocity Audio Editing: Plangora Hosting Infrastructure: Jon Gjengset Show Notes: Plangora Hosts: Allen Wyma

Console DevTools
Web standards & privacy, with Desigan (Dees) Chinniah (Tor / Ex-Mozilla) - S02E08

Console DevTools

Play Episode Listen Later Feb 24, 2022 32:47


In this episode, we speak with Desigan Chinniah, previously at Mozilla, advisor to many web startups and now on the board of Tor. We discuss the evolution of web tech from websites to complex decentralized applications running on browser APIs, the competitiveness of the browser rendering engine versus the UX layer and how developers think about privacy. Does it live in browser settings, extensions or on the protocol core level?About Dees ChinniahDesigan Chinniah is a creative technologist. After two decades of dot-com checks in, Dees now has a portfolio of advisory roles (Ably, Coil, Replay, SEDNA, Zama) and board positions (Ushahidi, The Tor Project). He invests early into diverse and under-represented minority founders and is a mentor at Design Club, Mozilla and Seedcamp.Other things mentioned:MozillaFigmaVS CodeHTML5GeckoWebKitBraveFirefoxOperaEdgeHomomorphic encryptionReplayGlitchSourcegraphDesiganchinniah.comLet us know what you think on Twitter:https://twitter.com/consoledotdevhttps://twitter.com/davidmyttonhttps://twitter.com/cyberdeesOr by email: hello@console.devAbout ConsoleConsole is the place developers go to find the best tools. Our weekly newsletter picks out the most interesting tools and new releases. We keep track of everything - dev tools, devops, cloud, and APIs - so you don't have to. Sign up for free at: https://console.dev.

Bitcoin Takeover Podcast
S10 E8: Harry Halpin on Nym, Mixnets, Tor, and Rediscovering Forgotten Cypherpunk Inventions

Bitcoin Takeover Podcast

Play Episode Listen Later Feb 20, 2022 96:03


Harry Halpin is a privacy lover and freedom advocate who embarked on an ambitious journey to create a better Tor, which is actually decentralized and provides incentives. The name of his project is Nym & it makes use of mixnets to prevent traffic analysis

Opt Out
Network privacy via Tor w/ Isabela Bagueros from the Tor Project

Opt Out

Play Episode Listen Later Feb 6, 2022 91:21


Wanting to get a better grasp of what the Tor network can do for your privacy, and what it can't do? This episode, we're sitting down with Isabela to chat about the Tor network.More about Isabela Bagueros:Isabela's guest profile -- https://optoutpod.com/guests/isabela-bagueros/More about Tor:Website -- https://www.torproject.org/Tor Browser -- https://www.torproject.org/download/Community hub -- https://community.torproject.org/Community and bug reports -- https://forum.torproject.org/Tor Snowflake -- https://snowflake.torproject.org/Running a relay -- https://community.torproject.org/relay/Donations -- https://donate.torproject.org/Opt Out's Sponsors:Cake Wallet, an easy to use Monero mobile wallet -- https://optoutpod.com/sponsors/#cake-walletLocalMonero, an excellent and privacy-preserving way to buy and sell Monero -- https://optoutpod.com/sponsors/#localmoneroIVPN, an ethical, no-nonsense, non-logging VPN provider -- https://optoutpod.com/sponsors/#ivpnSupporting Opt Out:Donations -- https://optoutpod.com/about/#donationsLeave a review on your favorite podcast platform, if possible!Share it with your friends, family, and other communities!Support the show (https://optoutpod.com/about/#donations)

MEDUZA/EN/VHF
Roskomnadzor 2.0: Is Russia's censorship agency really capable of blocking Tor? We asked an expert.

MEDUZA/EN/VHF

Play Episode Listen Later Dec 10, 2021 4:04


In early December, users in Russia began to have trouble accessing the Tor browser. After several days of technical difficulties, reports emerged that Russia's censorship agency (Roskomnadzor) had sent a notice to the Tor Project team, demanding that they remove unspecified "prohibited content." The project's landing website is currently blocked in Russia, while the Tor browser itself works intermittently. What does this mean for RuNet users? And is Roskomnadzor really capable of fully blocking the Tor browser? For answers to these and other questions, Meduza turned to Leonid Yevdokimov, a technical expert at the digital rights group Roskomsvoboda. Original Article: https://meduza.io/en/feature/2021/12/10/roskomnadzor-2-0

Good and Geeky Books
Privacy and Security for Activism

Good and Geeky Books

Play Episode Listen Later Nov 6, 2021 13:54


I recommend Tails the amnesiac operating system if you are a whistle blower, activist or ordinary person in need of the most secure ways to share information. If you have to use a computer which is not your own then Tails is the business and recommended by EFF, Snowden and the Tor Project as well as by the Good and Geeky me.

Lock and Code
Beyond the VPN: Ultimate online privacy, with The Tor Project's Isabela Bagueros

Lock and Code

Play Episode Listen Later Oct 25, 2021 51:53


What does online privacy mean to you? Maybe it's securing your online messages away from prying eyes. Maybe it's keeping your browsing behavior hidden from advertisers. Or maybe it's, like for many people today, using a VPN to hide your activity from your Internet Service Provider. But because online privacy can mean so many things, that also means it includes so much more than just using a VPN. Today, we speak to The Tor Project Executive Director Isabella Bagueros about what other types of online tracking users are vulnerable to, even if they're using a VPN, how else users can stay private online without becoming overwhelmed, and why users should be careful about trusting any one, single VPN.

nft now podcast
Demystifying DAOs with pplpleasr

nft now podcast

Play Episode Listen Later Aug 4, 2021 36:50


pplpleasr is an artist who first rose to prominence in the crypto space due to her viral animations for popular DeFi protocols like Aave and SushiSwap. Her breakthrough ‘x*y=k' NFT featured an animation of a Uniswap unicorn adventuring through a symbolic DeFi landscape to the “Ethereum promised land.” The auction caused the spontaneous creation of pleasrDAO, a collective of 23 Ethereum addresses, who won the auction for 310 ETH ($525K). pplpleasr announced that she'd be donating all of the proceeds to ​​the Stand With Asians movement. Since then, pleasrDAO has become a major player in the NFT space with high-profile purchases like Edward Snowden's first NFT ($5+ million), the original Doge photo ($4+ million), Tor Project (nearly $2 million) and more.In this episode we dive into…- What is a DAO? What are the pros and cons of running an organization as a DAO? How does she foresee they will impact the broader business landscape in the coming years? - The initial Uniswap auction that led to pleasrDAO's creation.- What motivated her decision to donate all of the proceeds from her landmark sale to combat AAPI discrimination?- What is the mission of pleasrDAO?- How does pleasrDAO function structurally? What role does she play in its decisions?- The story behind the Snowden, Doge and Tor auctions.- What role does she foresee DAOs playing in the NFT space going forward? - What inspires her most about the NFT space's future?- What projects does she have in the works?- And much more!To sign up for the nft now newsletter where we break down the NFT market into actionable insights each week, go to: https://www.nftnow.co To follow pplpleasr on Twitter, go here: https://twitter.com/pplpleasr1To follow pplpleasr on Instagram, go here: https://instagram.com/pplpleasr See acast.com/privacy for privacy and opt-out information.

CyberGeek Podcast | پادکست سایبرگیک

امنیت و حریم شخصی در فضای اینترنت جزء چالش برانگیزترین مواردی است که از مردم عادی تا کارشناسان بهش می پردازن. ما همیشه نگران این هستیم که اطلاعات شخصیمون در فضای مجازی و اینترنت به خطر بیفته. پروژه TOR در واقع راهکاری است که به ما در حفظ حریم شخصیمون کمک میکنه. تو این اپیزود در مورد این پروژه و چگونگی کارکردش صحبت می کنیم. . منبع مربوط به قسمت اینترنت: https://www.cloudflare.com/learning/network-layer/how-does-the-internet-work/ منابع مربوط به قسمت پروژه TOR: https://medium.com/swlh/tor-how-does-it-work-d0be02ddb539 https://cdn.ttgtmedia.com/rms/pdf/Hiding%20Behind%20the%20Keyboard_Ch%202.pdf https://portswigger.net/daily-swig/tor-security-everything-you-need-to-know-about-the-anonymity-network وب سایت مربوط به نمایش تعداد رله ها و bridgeها در شبکه TOR: https://metrics.torproject.org/networksize.html منتظر انتقادات و نظرات شما عزیزان هستیم: کانال تلگرام https://t.me/cybergeekpodcast توییتر https://twitter.com/cybergeek_p اینستاگرام https://instagram.com/cybergeekpodcast

NFT Roundtable
Highest Selling Woman NFT Artist Discusses Artistic Journey and 2 Mil Dollar NFT Sale

NFT Roundtable

Play Episode Listen Later Jun 19, 2021 47:32


Itzel Yard is a generative artist from Panama who is making big waves in the NFT space after a 2 million dollar NFT sale in collaboration with the Tor Project. See artist social media pages below.    https://twitter.com/ix_shells https://www.instagram.com/ix_/   Learn more about the NFT Roundtable Podcast by visiting our website    NFT Roundtable Website - https://www.blacknftart.co/nft-roundtable-podcast IG - https://www.instagram.com/blacknftart/ Twitter - https://twitter.com/blacknftart

The Gate 15 Podcast Channel
The Gate 15 Interview EP 7. A look at 2020, security, and the media with Runa Sandvik and Brad Barkett

The Gate 15 Podcast Channel

Play Episode Listen Later Dec 28, 2020 51:38


In this episode of The Gate 15 Interview, Andy Jabbour enjoys a really fun talk with Runa Sandvik and Brad Barkett, two security veterans both with considerable experience working to secure media at some of America's most well-known papers. In this podcast we discuss: 2020 and the cyber threat environment The threats facing media today The role of media in security What we might anticipate in the new year Among other topics! Runa and Brad share some candid perspective, and a few fun tidbits about themselves in this year-end discussion on the cyber threat environment, security issues, and the media. Please enjoy this episode of The Gate 15 Interview on Anchor, Apple, Spotify, as well as other locations. Runa Sandvik: Runa is a senior security researcher with years of experience in security and information sharing. Today, Runa works on digital security for journalists and other high-risk people. Her work builds upon experience from her time at The New York Times, Freedom of the Press Foundation, and The Tor Project. She is a board member of the Norwegian Online News Association, and tweets as @runasand. Brad Barkett: Brad a 20 year security veteran, and has been working as a security architect for the Washington Post since 2015, with a background in telecoms, MSS, IDS, DDOS, firewalls, proxies. Currently , Brad has a preference for social topics like cyber anti-personnel, disinfo, OSINT, threat intel, social psychology, and social engineering. Long standing hobby interests include synthesis and electronic music, and more recently, being a relatively middling 40+ amateur folkstyle wrestler and nogi jiu-jitsu player. Brad has two brothers, Mike and JJ, who are also security professionals. A few references mentioned in our discussion include: ·  Ford Foundation Cybersecurity Assessment Tool. ·  Freedom of the Press Foundation ·  A new report from the Freedom of the Press Foundation: A record breaking number of journalists arrested in the U.S. this year ·  Updating how we think about security, INFILTRATE 2018, by Matt Tait

CERIAS Security Seminar Podcast
Kelley Misata, Results from the Field: Cybersecurity in Nonprofits and Why it Matters

CERIAS Security Seminar Podcast

Play Episode Listen Later Nov 4, 2020 55:38


The last time you gave to a favorite charity, did you think about their cybersecurity? Do you sit on the board of a nonprofit? Are nonprofits using your cybersecurity solutions? The "wild" of the Internet and continually evolving threat landscape force nonprofits to defend themselves against intrusion and cyber-attacks. Breaking down the myths and assumptions about nonprofits' cybersecurity, this session spotlights approaches and exciting results from local nonprofit organizations of all sizes. Join us with your favorite nonprofit in mind and walk away with new information about this overlook business sector and why it matters. About the speaker: Dr. Kelley Misata is a cyber and information security executive with 15+ years of experience in strategic initiatives, business development, community and customer growth, marketing, and communications. Today, Dr. Misata is the Founder and CEO of Sightline Security, a security start-up missioned to helping underserved enterprises and community sectors. She is also the President and Executive Director of The Open Information Security Foundation (OISF), a nonprofit organization that owns and manages the open-source network security technology, Suricata. Her leadership experience with both Sightline and OISF, combined with her past role as Communications Director at The Tor Project, allows Dr. Misata to use her expertise in bringing complex cyber and information security principles to a wide array of business sectors and audiences. A business-minded researcher with a groundbreaking dissertation in nonprofits' information security, she continually draws on current trends and conversations in information security and privacy to create strategies that intersect people, process, and technology. Dr. Misata holds a Ph.D. in Information Security from Purdue University, a Masters Degree in Business Administration and Marketing from Bentley University, and a Bachelor of Science in Marketing from Westfield University.

humans-of-infosec
Episode 38 Bruce Schneier: On the Future of Public-Interest Tech

humans-of-infosec

Play Episode Listen Later Feb 18, 2020 29:10


In our latest episode, renowned security technologist Bruce Schneier joined Caroline Wong for an enlightening conversation on the future of public-interest technology. Hailed as a “security guru” by The Economist, Bruce has authored more than a dozen books on security and cryptography, testified before Congress, and served on multiple government committees. Bruce is currently a fellow at the Berkman Klein Center for Internet & Society at Harvard University, a Lecturer in Public Policy at the Harvard Kennedy School, and a board member of the EFF, AccessNow, and the Tor Project. Hundreds of thousands of people regularly read his blog “Schneier on Security.” He joined Humans of InfoSec to discuss the future of ethical technology and the role technologists can play in positively shaping public policy.

Data Security and Privacy with the Privacy Professor

Many listeners have sent questions over the past two years about the dark web • What is the dark web? Is it the same as the dark net? How is it different from the deep web? • Is it legal to go into the dark web? • What is Tor? • What are some real-life crimes found on dark web? • What are some of the most disturbing activities in the dark web? • What do information security and privacy pros need to know about the dark web to help them with their job responsibilities? • What should the general public know about the dark net? Tune in to hear Rebecca discuss these topics and more with Andrew Lewman, co-founder of The Tor Project, Farsight Security & DarkOwl, and technology advisor to Interpol's Crimes Against Children Initiative.

What Bitcoin Did
Bitcoin 2019 Review with Matt Odell - WBD181

What Bitcoin Did

Play Episode Listen Later Dec 31, 2019 162:41


Location: New York Date: Monday, 23rd December Project: Tales from the Crypt & Rabbit Hole Recap Role: Co-host The Bitcoin space moves fast, and 2019 has been no different. Starting the year at the bottom of a harsh bear market after hitting a low of $3,100, Bitcoin began 2019 trading close to $3600. While the price spiked at around $14,000, it has settled in the $7-8k range, representing an approximate 100% rise in price. Also, despite the volatility, the hashrate has reached an all-time high. Bitcoin has been featured widely in the media, and everyone from NFL player Russell Okung to Donald Trump and even President Xi have spoken about it. The Lightning Network has grown from strength to strength with Bitfinex now accepting Lightning deposits and the Tor Project accepting Lightning donations.  The SEC is still yet to approve a Bitcoin ETF with Bitwise' proposal the latest to be rejected. Jack Dorsey launched Square Crypto, and Facebook made plans to launch a 'cryptocurrency' called Libra. With exchanges, Cryptopia was hacked and subsequently shut down, and QuadrigaCX suffered the same fate following the suspicious and shock death of its CEO Gerald Cotten. So 2019 has been a busy year in Bitcoin and my final interview of the year is with Matt Odell, co-host of the Tales from the Crypt and Rabbit Hole Recap. We take a look back at 2019, discussing Bitcoin only businesses, the most important projects and our predictions for 2020.

The LAVA Flow | Libertarian | Anarcho-capitalist | Voluntaryist | Agorist

Trump has gone full-on authoritarian in a trifecta of comments and actions. Are you surprised? What's in the News with stories on square root guns, banks scared of crypto, coward cops update, lost money, and US arming ISIS. Also, an Ancap Apps update on why I no longer recommend Tor Browser. Finally, a #NHItsLikeThisToo with some news on liberty in the state! This episode is brought to you by ZenCash, a cryptocurrency that infuses privacy, anonymity, and security done right. Also brought to you by NordVPN, the fastest, easiest to use service to protect your online presence that I've ever seen.   WHAT'S RUSTLING MY JIMMIES Holy shit, guys. I pay so little attention to national politics these days because it has so little effect on me here in New Hampshire, but I could not miss Trumps latest ridiculous totalitarian comments. And, this is the fucking guy that some libertarians, including one of my favorite libertarians, Walter Block, actually supported!   WHAT'S IN THE NEWS In no tolerance, no brains news, a discussion among students at Oberlin High School in Oberlin, La., about a mathematical symbol led to a police investigation and a search of one of the student's homes.   In no shit Sherlock news, Bank of America, one of the world's largest financial institutions, admitted in an annual report that cryptocurrencies are a threat to its business model.   In Coward Cops update news, shortly after I wrote the Jimmies segment in last week's episode about the coward resource officer who hid like a little baby during the school shooting in Florida, it was released that three other Broward County Sheriff's deputies were also outside the school and had not entered.   And, what's worse is that the Miramar Police Department has suspended two officers from their SWAT team for responding to the school shooting without having orders to do so.    In it's only stolen money news, an annual financial report released by the US Treasury this month showed the government lost over a trillion dollars in 2017. That is more than Australia's entire Gross Domestic Product.   In old news news, an extensive field investigation into the origins of Isis' weaponry in Syria and Iraq has found that weapons supplied by the US and Saudi Arabia to the Syrian opposition often ended up in the jihadis' hands, enhancing the “quantity and quality” of their armaments.      ANCAP APPS In an Ancap App update, a piece of software I've recommended in the past has now been moved off of my recommended list. The Tor Project hailed as a bulwark against the encroaching surveillance state, has received funding from a US government agency and cooperates with intelligence agencies. Tor, the free software which enables anonymous communication over the internet, is a “privatized extension of the very same government that it claimed to be fighting,” claims journalist Yasha Levine, who obtained 2,500 pages of correspondence about the project via Freedom of Information Act (FOIA) requests.   NEW HAMPSHIRE, IT'S LIKE THIS TOO There have been some interesting updates in New Hampshire that give us even more freedoms in the state. First of all, the New Hampshire House of Representatives passed a bill banning the use of “sobriety checkpoints” by state and local police departments, following long-running criticism that the practice is unconstitutional and ineffective. Secondly, the New Hampshire House of Representatives voted to kill a bill that would have increased oversight for homeschool students. House bill 1263 would have required that homeschool students have their annual assessments reviewed by either state officials or nonpublic school principals.

The Manifest
Episode 7: The Update Framework with Trishank Karthik Kuppusamy

The Manifest

Play Episode Listen Later Nov 13, 2017 57:05


Wherein we chat with Trishank Karthik Kuppusamy about The Update Framework, a security layer that lets package managers assure the veracity and integrity of their packages. We talk about how it grew out of the TOR Project, how it works, how Uptane is used for package management in cars (!), and what package maintainers can do to help their own security. Special Guest: Trishank Karthik Kuppusamy.

The Safety Doc Podcast
My Tense Trip To The Dark Web - Risks & Rewards of TOR

The Safety Doc Podcast

Play Episode Listen Later Aug 26, 2017 60:01


“The dark web—which utilizes a technology created by military researchers in the 1990s to allow intelligence operatives to exchange information completely anonymously—is unknown to many. It's been said to be a breeding ground for organized crime, sex traffickers, and hackers. But it's also used by good actors, including whistle-blowers and activists.” https://phys.org/news/2017-03-dangers-dark-web.html THE ONION ROUTER (TOR). Dr. Perrodin shares that the Tor Browser, which is the door to the dark web, is astoundingly easy to access. In fact, the Tor Browser is a version of Mozilla Firefox that has been modified by the Tor Project for enhanced security and privacy. When you open the browser, it automatically connects to the Tor network, which encrypts and bounces your connection to the Internet around in a way that's supposed to make it difficult to spy on you. The TOR Browser is rated 3.5 / 5 stars from 26 votes on CNET with most low ratings due to TOR's slow speed. Learn more about the Tor Project at www.torproject.org IS IT LEGAL TO SURF THE DARK WEB? It is legal to use Tor, but it does host illegal content. An illegal act conducted via Google Chrome or Internet Explorer would also be illegal if conducted via TOR. The dark web is a network of websites that only run on anonymous browsers, which will hide the identity of the user and the people who run the sites – so detection of nefarious acts is more difficult when a person uses a TOR browser. WHAT IS VPN? A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data as it hides your IP address - or the address of your computer. TOR is almost always paired with a VPN such as CyberGhost, NordVPN, or Trust.Zone. While TOR is free, VPN's cost about $10 a month. FIVE THINGS YOU NEED TO KNOW ABOUT TOR. (1) It Protects the Identity of the User Through ‘Hopping' Across Devices Worldwide; (2) To Find a Site on Tor You Need to Know the Address of the Onion Service. This means the “dark web” websites have .onion in their address; (3) Less Than Half of the Activity on the Dark Web is Illegal; (4) The Dark Web Was Originally Meant to Safeguard Government Communications. “Onion Routing” was originally developed in order to protect intelligence communications online. The United States Naval Research Laboratory created Tor in the mid-1990s. The project was transferred to the Defense Advanced Research Projects Agency (DARPA) in 1997 and underwent its first round of software testing on 20 September 2002. Tor was publicly launched a year later. (5) Anyone Can Volunteer to Be Part of Network Running Tor. TOR AND SAFETY. The presence of the TOR icon, which is an onion, on a computer or other device might imply that the user is accessing websites that broker drugs, sex trafficking or other dangerous activities. Remember, TOR doesn't create a historical log. Those that support TOR argue that the service is necessary to protect against increasing government surveillance and corporate tracking. FOLLOW. DR. PERRODIN: On Twitter @SafetyPhD and subscribe to “The Safety Doc” YouTube channel & SoundCloud RSS feed. DR. PERRODIN'S SAFETY BLOG: crisisprepconsulting.wordpress.com SAFETY DOC WEBSITE: www.safetyphd.com David will respond to discussion thread comments & emails. The Safety Doc Podcast is hosted & produced by David Perrodin, PhD. ENDORSEMENTS. Opinions are those of the host & guests and do not reflect positions of The 405 Media or supporters of “The Safety Doc Podcast”. The show is curse free & adheres to nondiscrimination principles while seeking to bring forward productive discourse & debate on topics relevant to personal or institutional safety. Email David: thesafetydoc@gmail.com

BSD Now
81: Puffy in a Box

BSD Now

Play Episode Listen Later Mar 18, 2015 86:09


We're back from AsiaBSDCon! This week on the show, we'll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They're getting BSD in the hands of Windows admins who don't even realize it. We also have all this week's news and answer to your emails, on BSD Now - the place to B.. SD. This episode was brought to you by Headlines Using OpenBGPD to distribute pf table updates (http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers) For those not familiar, OpenBGPD (https://en.wikipedia.org/wiki/OpenBGPD) is a daemon for the Border Gateway Protocol (https://en.wikipedia.org/wiki/Border_Gateway_Protocol) - a way for routers on the internet to discover and exchange routes to different addresses This post, inspired by a talk about using BGP to distribute spam lists (https://www.youtube.com/watch?v=Vet0eQB00X0), details how to use the protocol to distribute some other useful lists and information It begins with "One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems." If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files OpenBGPD is part of the OpenBSD base system, but there's also an unofficial port to FreeBSD (https://www.freshports.org/net/openbgpd/) and a "work in progress" pkgsrc version (http://pkgsrc.se/wip/openbgpd) *** Mounting removable media with autofs (http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html) The FreeBSD foundation has a new article in the "FreeBSD from the trenches" series, this time about the sponsored autofs (https://www.freebsd.org/cgi/man.cgi?query=autofs&sektion=5) tool It's written by one of the autofs developers, and he details his work on creating and using the utility "The purpose of autofs(5) is to mount filesystems on access, in a way that's transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes." He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives It ends with a real-world example of something we're all probably familiar with: plugging in USB drives and watching the magic happen There's also some more advanced bonus material on GEOM classes and all the more technical details *** The Tor Browser on BSD (http://trac.haqistan.net/blog/adventures-ports-tor-browser) The Tor Project has provided a "browser bundle (https://www.torproject.org/projects/torbrowser/design/)" for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost It has, however, only been released for Windows, OS X and Linux - no BSD version "[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves." Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started If you've got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved) *** OpenSSH 6.8 released (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html) Continuing their "tick tock" pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it's a major upgrade, focused on new features (we like those better of course) Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys You can now require multiple, different public keys to be verified for a user to authenticate (useful if you're extra paranoid or don't have 100% confidence in any single key type) The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers *** NetBSD at AsiaBSDCon (https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html) The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you'd expect It covers their BoF session, the six NetBSD-related presentations and finally their "work in progress" session There was a grand total of 34 different NetBSD gadgets (https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0) on display at the event *** Interview - Lawrence Teo - lteo@openbsd.org (mailto:lteo@openbsd.org) / @lteo (https://twitter.com/lteo) OpenBSD at Calyptix (http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf) News Roundup HardenedBSD introduces Integriforce (http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce) A little bit of background on this one first: NetBSD has something called veriexec (https://www.netbsd.org/docs/guide/en/chap-veriexec.html), used for checking file integrity (http://wiki.netbsd.org/guide/veriexec/) at the kernel level By doing it at the kernel level, similar to securelevels (https://en.wikipedia.org/wiki/Securelevel), it offers some level of protection even when the root account is compromised HardenedBSD has introduced a similar mechanism into their "secadm" utility You can list binaries in the config file that you want to be protected from changes, then specify whether those can't be run (http://i.imgur.com/wHp2eAN.png) at all, or if they just print a warning They're looking for some more extensive testing of this new feature *** More s2k15 hackathon reports (http://undeadly.org/cgi?action=article&sid=20150305100712&mode=flat) A couple more Australian hackathon reports have poured in since the last time The first comes from Jonathan Gray, who's done a lot of graphics-related work in OpenBSD recently He worked on getting some newer "Southern Islands" and "Graphics Core Next" AMD GPUs working, as well as some OpenGL and DRM-related things Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in mandoc (http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man) Ted Unangst also sent in a report (http://undeadly.org/cgi?action=article&sid=20150307165135&mode=flat) to detail what he hacked on at the event With a strong focus on improving SMP scalability, he tackled the virtual memory layer His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8 All the trip reports are much more detailed than our short summaries, so give them a read if you're interested in all the technicalities *** DragonFly 4.0.4 and IPFW3 (https://www.dragonflydigest.com/2015/03/10/15733.html) DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4 It includes a minor list of fixes (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html), some of which include a HAMMER FS history fix, removing the no-longer-needed "new xorg" and "with kms" variables and a few LAGG fixes There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version Shortly after it was released, their new IPFW2 firewall was added to the tree (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html) and subsequently renamed to IPFW3 (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html) (since it's technically the third revision) *** NetBSD gets Raspberry Pi 2 support (https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added) NetBSD has announced initial support for the second revision (http://www.raspberrypi.org/products/raspberry-pi-2-model-b/) of the ever-popular Raspberry Pi board There are -current snapshots available for download, and multiprocessor support is also on the way The NetBSD wiki page about the Raspberry Pi also has some more information (https://wiki.netbsd.org/ports/evbarm/raspberry_pi/) and an installation guide The usual Hacker News discussion (https://news.ycombinator.com/item?id=9172100) on the subject If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it *** OpenIKED as a VPN gateway (http://puffysecurity.com/wiki/openikedoffshore.html) In our first discussion segment, we talked about a few different ways to tunnel your traffic While we've done full tutorials on things like SSH tunnels (http://www.bsdnow.tv/tutorials/stunnel), OpenVPN (http://www.bsdnow.tv/tutorials/openvpn) and Tor (http://www.bsdnow.tv/tutorials/tor), we haven't talked a whole lot about OpenBSD's IPSEC suite This article should help fill that gap - it walks you through the complete IKED setup From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide's got it all *** Feedback/Questions Gary writes in (http://slexy.org/view/s21G9TWALE) Robert writes in (http://slexy.org/view/s206aZrxOi) Joris writes in (http://slexy.org/view/s28Um5R7LG) Mike writes in (http://slexy.org/view/s2yAJsl1Es) Anders writes in (http://slexy.org/view/s21dMAE55M) *** Mailing List Gold Can you hear me now (https://www.marc.info/?l=openbsd-misc&m=142577632205484&w=2) He must be GNU here (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html) I've seen some... (https://www.marc.info/?l=openbsd-cvs&m=142593175408756&w=2) ***