Who's A Rat - Largest Online Database of Informants and Agents
HomeMembers LoginLatest NewsRefer A LawyerMessage BoardOnline StoreAffiliatesAbout UsContact Us
Who's A Rat - Largest Online Database of Informants and Agents Worldwide!
Site Navigation
Visit Our Store
Refer A Lawyer
Affiliates
Link To Us
Latest News
Top Secret Documents
Make A Donation
Important Case Law
Members Login
Feedback
Message Board
Legal Information
Advertise your AD, Book or Movie

Informants and Agents?Who's a Rat Message Board

WhosaRat.com
Sign up Calendar
 
 
 


Reply
  Author   Comment   Page 5 of 5     «   Prev   2   3   4   5
hannah

Registered:
Posts: 797
Reply with quote  #201 

Experts comment on the latest SNOWDEN LEAKS and DER SPEIGAL ARTICLE


https://www.schneier.com/blog/archives/2013/12/more_about_the.html
http://arstechnica.com/information-technology/2013/12/inside-the-nsas-leaked-catalog-of-surveillance-magic/
http://www.wired.com/threatlevel/2013/12/nsa-hacking-catalogue/
http://www.foreignpolicy.com/articles/2013/11/06/scuttled_at_sea_us_food_aid_reform

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #202 

NSA exploits

http://cryptome.org/2013/12/greenwald-13-1231.pdf
http://cryptome.org/2013/12/nsa-catalog.zip
http://cryptome.org/2013/12/nsa-ant-bildschirm.pdf
http://cryptome.org/2013/12/nsa-ant-w-lan.pdf
http://cryptome.org/2013/12/nsa-ant-usb.pdf
http://cryptome.org/2013/12/nsa-ant-tastatu.pdf
http://cryptome.org/2013/12/nsa-ant-server.pdf
http://cryptome.org/2013/12/nsa-ant-router.pdf
http://cryptome.org/2013/12/nsa-ant-rechner.pdf
http://cryptome.org/2013/12/nsa-ant-raumuber.pdf
http://cryptome.org/2013/12/nsa-ant-mobilfunk.pdf
http://cryptome.org/2013/12/nsa-ant-handys.pdf
http://cryptome.org/2013/12/nsa-ant-firewalls.pdf
http://cryptome.org/2013/12/nsa-catalog-appelbaum.pdf
http://cryptome.org/2013/12/aclu-clapper-077.pdf
http://cryptome.org/2013/12/pauley-13-1227.pdf
http://cryptome.org/2013/12/leon-13-1216.pdf
http://cryptome.org/2013/12/snowden-13-1225.pdf


http://cryptome.org/2013/12/nsa-qfire.pdf
http://leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #203 
https://www.onioncat.org
OnionCat Mailinglist
Posted on December 12, 2013 by eagle

After a long time living without mailing list, it is back up again. To subscribe to the OnionCat list send an email to onioncat-subscribe@onioncat.org or register at the following URL http://mx01.services.blackmesa.at/cgi-bin/mailman/listinfo/onioncat.
Posted in Uncategorized         | Leave a reply
Website Relaunch
Posted on August 4, 2013 by eagle
5        

Nearly five years after we published OnionCat for the first time at the 25C3 in Berlin we chose that it is time now to relaunch the primary website. Nowadays, we know that there is much more surveillance in the background as many of us might have expected as Ed Snowden has disclosed.

OnionCat being a Tor-based decentralized peer-to-peer VPN is a powerful tool to protect against surveillance. It can be used to easily connect to remote systems using protocols different than HTTP such as e.g. SSH or DNS simply by using their OnionCat-created IPv6 addresses.

This website is intended to give as much useful information about OnionCat to any user who is interested in securing network communication against surveillance.
It is not complete yet but we do our best to provide more information as soon as possible.

We have several plans to improve OnionCat and add new features.
Don’t hesitate to contact as and of course have fun and feel free — as in freedom — to use OnionCat and give us feedback!

The old Trac wiki is accessible at https://www.cypherpunk.at/onioncat_trac/.



*************



http://detector.io/

http://detector.io/DetecTor.html

DetecTor.io

DetecTor is an open source project to implement client side SSL/TLS MITM detection, compromised CA detection and server impersonation detection, by making use of the Tor network.

Read the DetecTor design and vision - (pdf)

Material presented at #30C3 conference: Lightning talk video, transcript and workshop slides.

Status: Early development. A sphere-probe utility (beta) is available (monitor your own server and alert on unexpected MITM certificates, or check for certificate consistency of direct and remote connections). Transparent integration into SSL/TLS client protocol code of the NSS library is intended


__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #204 
http://revolution-news.com/us-government-funds-favorite-nsa-proof-apps/



US. Government Funded Your Favorite ‘NSA-Proof’ Apps
0
on 04/06/2014 Americas, USA

Authors’ note: It is very important when reading this article to know that the authors have not accused developers of any wrongdoing, although the authors strongly encourage more independent security audits. Individual developers were unlikely to know about the two laws mentioned in this article. On the other hand, the Broadcasting Board of Governor’s and Radio Free Asia are very well aware of the Smith-Mundt Act and the NDAA 2013 provision. However, there are still serious concerns about financial transparency. How should open source projects be financed? Are there alternative sources of funding that might be better? What rights do users have to be fully informed about a project’s funding? How can projects be more transparent about their funding?


(excerpt)

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #205 
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa


https://tails.boum.org/

Help Support the Little-Known Privacy Tool That Has Been Critical to Journalists Reporting on the NSA
April 2, 2014
By Trevor Timm Follow @TrevorTimm

Edward Snowden famously first contacted Laura Poitras using GPG email encryption, which eventually led to her, Glenn Greenwald, and Barton Gellman breaking the biggest story in decades. However, another tool has been even more critical to all of the main NSA journalists, and many people outside the digital security community have never heard of it: Tails, a ground-breaking operating system that forces privacy best-practices by default.

With assurances from the Tails developers and the main players in the NSA revelations, we feel it's safe to tell this story for the first time, and we hope this vital encryption and anonymity project can finally get the credit—and much needed support—it deserves. You can donate to the Tails project by going here.

We asked the three original NSA journalists about how important Tails was to their work. Here's what they had to say:

Laura Poitras:

"I've been reluctant to go into details about the different steps I took to communicate securely with Snowden to avoid those methods being targeted. Now that Tails gives a green light, I can say it has been an essential tool for reporting the NSA story. It is an all-in-one secure digital communication system (GPG email, OTR chat, Tor web browser, encrypted storage) that is small enough to swallow. I'm very thankful to the Tails developers for building this tool."

Glenn Greenwald:

“Tails have been vital to my ability to work securely on the NSA story. The more I've come to learn about communications security, the more central Tails has become to my approach.”

Barton Gellman:

"Privacy and encryption work, but it's too easy to make a mistake that exposes you. Tails puts the essential tools in one place, with a design that makes it hard to screw them up. I could not have talked to Edward Snowden without this kind of protection. I wish I'd had it years ago."

Tails is an operating system that can be started on almost any computer from a DVD or USB stick. It attempts to solve many of the problems users have when setting up encryption tools for the first time by "doing the right thing" out of the box, by default:

It forces all of your web traffic through the Tor anonymity network, so you don’t have to configure any of the settings on any program.
It allows you to use GPG encryption when you are emailing and/or OTR encryption while instant messaging, with little setup required.
It allows journalists to work on sensitive documents, edit audio and video, and store all their files in an encrypted format.

Critically, Tails never actually touches your hard drive and securely wipes everything you’ve done every time you shut it down (unless you specifically save it on an encrypted drive). This serves two important purposes: first, it helps journalists who are operating in environments or on networks that may already be compromised by governments or criminals. As we learned last week, if you’re working at a big news organization, that’s almost a given. Second, it prevents journalists from leaving any trace of work that they don’t specifically opt-in to leaving. This prevents information leakage and mistakes in case your computer falls into the wrong hands.

All of these qualities make it an ideal tool for journalists who are either steeped in security training or are coming to encryption for the first time and are a big reason why it won Access's 2014 Innovation Award for Endpoint Security. As always, everyone should remember that no privacy tool—including Tails—can guarantee you 100% security from all adversaries, and like all software, Tails may have vulnerabilities or weaknesses that could be exploited. But that's all the more reason to support the project, so those vulnerabilities can be found and fixed as quickly as possible.

The NSA stories have been the biggest story in journalism in the past decade, yet the tool relied on by the reporters who broke the stories is incredibly underfunded. Tails’ 2013 expense report shows that they only had an operating budget of around 42,000 euros, which is less than $60,000. They have only a handful of core developers and none are able to work full-time because of the lack of funds supporting it.

If you’d like to help journalists uncover more stories like the NSA revelations, help them by helping Tails. You can donate to them right now on our front page, along with other free software projects like Tor, Open WhisperSystems, and the LEAP encryption access project. You can also support Tails’ Knight Open News Challenge proposal, which could also get the Tails team critical funding so they can stay ahead of the security curve.

Next month, Tails will be launching version 1.0, a critical milestone for software projects. Let’s help them get to 1.0 and beyond.





-----------------------------


https://tails.boum.org/

Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to:

use the Internet anonymously and circumvent censorship;
all connections to the Internet are forced to go through the Tor network;
leave no trace on the computer you are using unless you ask it explicitly;
use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.


__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #206 
http://www.hacker10.com/other-computing/ethicmail-the-legal-resistant-email-service/



ETHICmail, the legal resistant email service
Posted on 3 April, 2014 by Hacker10        
1        
Share

ETHICmail is a secure email service that aims at stopping massive and illegal surveillance orders. ETHICmail secures your connection to their servers with SSL Perfect Forward Secrecy, 4096-bit digital certificates and their proprietary SecureStorage AES 192-bit encryption engine for data storage.

One unique ETHICmail feature not found elsewhere is emergency remote full data wipe of your email messages by sending a mobile phone SMS code to your account. ETHICmail also has a specialist legal team that reviews and challenges unfounded surveillance orders, Gmail claims to have that too so I would not call the last feature unique but ETHICmail notifies the individual when they receive a warrant against him whenever it is possible.

(excerpt)






------------------------------------------------
FRee anonymity/Leak Test at the JonDonym site: (see what people can see about your identity)
http://ip-check.info/?lang=en
(click the cancel button to begin the test)

JonDonym provides anon surfing
https://anonymous-proxy-servers.net/index.html

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #207 
http://www.hacker10.com/other-computing/secure-chat-communications-suite-goldbug/

Thank you to my sisters at Hacker 10





Secure chat communications suite GoldBug
Posted on 25 March, 2014 by Hacker10        
Share

GoldBug is an open source secure Instant Messenger with cascade encryption, a way to secure your messages using multiple ciphers, also known as multiencryption. The program main features are encrypted groupchat, sending of encryption keys encrypting them, end to end encryption, public IRC channels with encryption, integrated BitMail, chat over Tor, forward secrecy, sending of random fake messages to confuse eavesdroppers, authenticated chat and many others.

This program constitutes a full suite of chat utilities using encryption with the advantage that you will be able to interact with your friends in multiple different ways without having to install new software, and the disadvantage being that so many buttons and technical terms can be confusing.
Encrypted Instant Messenger GoldBug

Encrypted Instant Messenger GoldBug

Documentation is clear and comprehensive, you can read every single feature detail in GodlBug website or download a .pdf help manual. GoldBug interface is fairly workable, with tabs quickly switching in between features, one click takes you to the IRC chat window and another click to the StarBeam filesharing and another click to the Instant Messenger chat.

After installation you will be asked to create a username and password with a minimum of 16 characters before generating the public encryption keys. GoldBug uses end to tend encryption with multiple layers implementing trusted open source cryptology like GnuPG and OpenSSL, you can set your own encryption components with RSA, EL Gamal and DSA, customizing key size, cipher, hash and iteration. Tailored integrals that should not significantly increase your security level, but nice to have anyway, the more security variables, the more an attacker will need to fingerprint you before launching an attack on the scheme you are using.

This program looks and security resembles my previously reviewed FireFloo Communicator, both programs appear to share part of the code but GoldBug has many more elements like the IRC chat, Tor and file sharing, and it is fully documented, I liked it much more because of this.

I liked that the messenger is open source and it adopts known encryption algorithms and technologies. I would feel reasonably safe behind this program, favouring it over others because third party data retention is not possible in GoldBug as there is no central server and all of the different ways it has to securely communicate with each other peer to peer, it comes out as a well thought messenger.

I wish other developers would stress user documentation as much as GoldBug has done, this is a first class secure communications program.

Visit GoldBug IM homepage


http://goldbug.sourceforge.net/

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #208 
http://www.hacker10.com/internet-anonymity/tor-proxy-anonymous-instant-messenger-torsion/


Tor proxy anonymous Instant Messenger Torsion
Posted on 23 March, 2014 by Hacker10        
Share

Torsion IM is a decentralized real time instant messenger alternative to TorChat that runs on the Tor network. Available for Windows, Mac and Linux, during installation you will be given the option to connect directly to the Tor network or if you are behind a restrictive firewall or in a country that filters the Internet and blocks Tor nodes, you can arrange your network settings.

Inside Torsion network settings you can specify any open port that is not blocked by your firewall, or, enter a Tor bridge address that will get around ISP censorship. Tor bridge relays are not listed anywhere, you can only get them via email following the instructions described in the Tor project website.
Tor proxy instant messenger Torsion

Tor proxy instant messenger Torsion

There is no need to create an account, a Torsion IM contact address will be automatically created for you when you install the software, in the form of “torsion:hslmfsg47dmcqctb“, this will also be your login credentials, no need for a password, registration details are virtually zero, no email, no nothing, just a cryptic torsion: address and the nick of your choice. The messenger interface is easy as pie, it has two buttons, a plus sign where you add a torsion ID contact address to chat with that person and a settings button that lets you see your list of contacts and remove them.

You will not have to separately install Tor software to get the Torsion IM running, the program automatically connects to the Tor network. You can browse the Internet with your real computer IP while the messenger chat is anonymously routed through Tor. I tried to run Torsion IM from behind a VPN (LT2P) and it worked smoothly, with no lagging time and no network trouble.

This is a marvellous metadata free instant messenger that gets the job done, no emoticons or sounds or distractions of any kind, just plain text to get to the point when planning the next revolutionary action over the Tor network, without any central server that could be compromised and with data encrypted over the wire, it can resist censorship and monitoring.

Torsion IM has not been audited by anybody but it is open source and fairly well documented. The messenger will not interoperate with other protocols and both parts need to be using the same program, to convince your friends to stop using insecure Windows Live Messenger and Yahoo, you count with the wonderful benefit of not having to explain to them what Tor is, Torsion IM will configure itself to use the Tor network during installation and it will enable people to use it straight away without reading any manual and not affecting their browser settings.

Note: Torsion IM is experimental and not endorsed by the Tor project.

Visit Torsion IM homepage



https://github.com/special/torsion/releases

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #209 
http://www.hacker10.com/computer-security/encrypted-instant-messenger-firefloo-communicator/



Encrypted Instant Messenger FireFloo Communicator
Posted on 18 March, 2014 by Hacker10        
Share

Firefloo Communicator is a portable open source instant messenger that secures communications with public and private encryption keys. The program can interact with any other messenger using the standard Extensible Messaging and Presence Protocol (XMPP). Jabber based messengers like Pidgin, Trillian, Gmail Chat, Coccinella and Jitsi will all be able to exchange mesh in between. FireFloo Communicator will not connect with the proprietary Yahoo or Windows Live messengers. Since Yahoo messenger has been proved vulnerable to spying by leaked Snowden’s secret documents, there is nothing you will be missing anyway.

One of the strengths of the XMPP network in which FireFloo Communicator flows is that there is no central server, anybody can run an XMPP server. Its decentralization makes it impossible to take the whole network down, if a public server is under attack you can connect to different server or roll down your own, this also makes wiretapping harder as the network is comprised of multiple nodes with no single point of failure, and the echo protocol for multi-encrypted messaging takes care of packet sniffing.
Encrypted instant messenger FireFloo Communicator

Encrypted instant messenger FireFloo Communicator

FireFloo Communicator is one of the few instant messengers that does not require you to enter an email address to create an account, you only have to pick an username and password to start chatting with your friends. After extracting FireFloo Communicator files to a folder, clicking on the FireFloo.exe file will start the chat straight away, I wasn’t asked for administrator rights when running it in Windows Vista.

During account creation security preferences can be tweaked changing your encryption key size from 2048bits to 15369bits, which is clearly an overkill, but paranoid types should welcome it. Other security configurations include changing the RSA default key to ElGamal and changing the AES256bit cipher to Serpent256, Camellia256 or Twofish. The default security options looked fine to me, I don’t think it is needed to modify anything but you will not break the program if you do, it might just change software performance, like a slighter lagging time.
FireFloo Communicator server settings

FireFloo Communicator server settings

FireFloo Communicator interface is simple but functional, you have five tabs from where to access FriendsList, Group Chat, Add a friend, Settings and Cryptopad, an encryption notepad where you can copy and paste encrypted text to send via insecure means, like email. The Rosetta CryptoPad also has cipher and hashing configuration options for you to customize at will, I found this additional tool a genial extension as it only takes one extra tab and covers email encryption without needing another program for that.

This is a program that has only been recently released, still in beta and it has some bumps to fix, the help manual is one of them, it doesn’t come with one. There is no mobile or Linux version but the source code is ready to compile and one can be created. A promising instant messenger to keep an eye for, the best part being its Jabber compatibility and security, with the low points being the lack of a help manual and basic chat features.

Visit FireFloo homepage

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #210 
http://www.hacker10.com/computer-security/encrypted-voice-over-ip-chat-mumble-works-with-tor/





Encrypted Voice over IP chat Mumble works with Tor
Posted on 12 March, 2014 by Hacker10        
5        
Share

Mumble is an open source VoIP program for group or P2P chat that runs in Windows, Mac and Linux, with iPhone and Android versions in beta. Mumble encryption is implemented with public/private key authentication and unlike Microsoft owned Skype, which supposedly also encrypts calls, in Mumble cryptography experts can scrutinise the code to make sure that the NSA has not inserted a backdoor or weakened the algorithm.

Mumble is widely used by gamers due to its low latency and background noise reduction resulting in superb audio quality, but you can use it for any kind of communication. Ninety per cent of the public chatrooms I visited where gaming clans and I had to manually add activist related Mumble servers like occupytalk. For high privacy group calls you have got to manage everything yourself, including the server, otherwise a rogue operator could carry out a man-in-the-middle attack to eavesdrop on you.
Mumble server encryption details

Mumble server encryption details

When you first install Mumble you will be prompted if you would like to run your own server (called Murmur) this will give you total control over who can access the chatroom but it requires staff and time. The other option is to join one of the dozens of public Mumble servers classified by countries and create there your own chatroom or rent a Mumble server from a specialist provider, they can be easily found with an Internet search for Mumble server hosting.

The Mumble client Audio Tuning Wizard helps you correctly set input levels for your sound card with voice activity detection and sound quality as well as optional text to speech to read typed in messages. Messages are read with a metallic voice but you have the option of buying a professional text to speech package from a third party and add it if you are going to use the feature a lot. The second Mumble client step creates a digital certificate to authenticate with servers. The most likely is that the servers you visit will have a free self-signed digital certificate poping up a warning window that you will have to accept before joining, this is not a huge security risk if you examine the certificate before accepting it and it only has to be done once.

Besides AES256-bit encryption Mumble has the edge over other VoIP tools because it can communicate with the TCP protocol, this is absolutely necessary for any program to be tunnelled in Tor and most VoIP programs only work with UDP, Mumble also has very low bandwidth needs, it will not clog Tor nodes and it works as Push to talk (PTT), you need to push a button to transmit voice, instead of an always on call connection.

You can either connect directly to Tor running it in your computer and configure Mumble by going to Configuration>Network tick the checkbox that says “Force TCP Mode” and fill in the SOCKS5 proxy settings with localhost and 9050 for the port, or roll your own anonymous Mumble server for your friends renting a VPS, installing the Mumble server software in the VPS, configuring the server firewall to accept incoming connections in Mumble’s default port 64738, installing Tor in the VPS and from then on all voice calls made using that server will be encrypted and anonymous.

Visit Mumble homepage
http://mumble.sourceforge.net/

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #211 
http://www.hacker10.com/mobile-phone/best-smartphone-apps-to-exchange-secret-messages/

Best smartphone apps to exchange secret messages
Posted on 16 March, 2014 by Hacker10        



-------------

http://www.hacker10.com/other-computing/conceal-secret-messages-inside-text-with-snow-steganography/

Conceal secret messages inside text with SNOW steganography
Posted on 20 March, 2014 by Hacker10        


------------------



http://www.hacker10.com/internet-anonymity/review-cheap-no-logs-vpn-provider-liquidvpn/

Review cheap no logs VPN provider LiquidVPN
Posted on 17 March, 2014 by Hacker10        


------------------

http://www.hacker10.com/encryption-software-2/encrypt-data-in-mac-os-iphone-and-ipad-with-krypton/


Encrypt data in Mac OS, iPhone and iPad with Krypton
Posted on 12 February, 2014 by Hacker10        


---------------
http://www.hacker10.com/computer-security/jam-wifi-signals-using-your-wireless-card-with-wifijammer/

Jam Wifi signals using your wireless card with wifijammer
Posted on 6 February, 2014 by Hacker10        


------------------

http://www.hacker10.com/computer-security/anonymous-encrypted-communications-with-leap-bitmask/

http://www.hacker10.com/internet-anonymity/anonymous-tor-browser-snowden-tribute-released/

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #212 

http://electrospaces.blogspot.com/2012/06/highly-secure-mobile-phones.html

World's Most Secure Mobile Phones March 24, 2014
General Dynamics: Sectéra Wireless GSM Phone
- Produced from 2002-2012 by the American company General Dynamics Corp.
- For GSM and GPRS networks.
- Ordinary Motorola Timeport GSM phone, with a special Security Module attached at the back side of the phone, replacing the battery cover.
- Approved by the NSA for conversations up to the level of TOP SECRET * and by NATO for up to COSMIC TOP SECRET. This phone is also used by the British government for mobile communications up to the level of SECRET.*
- Encryption with US Type 1 and approved Suite B (including AES and ECDH) encryption algorithms.
- There are slightly modified modules for the UK, Canada, Australia and New Zealand. There's also a version, using the AES algorithm only, which is exportable to other countries.
- The price of this phone is 2.095,- US dollar.
- More details in the factsheet (pdf)

> As of 2013, General Dynamics replaces this phone by GD Protected, a platform for securing high-end Samsung and LG smartphones.

-----------------
http://electrospaces.blogspot.nl/2013/05/general-dynamics-secures-high-end.html


GD PROTECTED is the current method of phone encryption (2013-)


May 21, 2013
General Dynamics secures commercial smartphones for classified information
(Updated: January 18, 2014)

In February this year, the communications division of defense contractor General Dynamics presented a software platform called GD Protected. This is the first product that secures commercial available Android smartphones in a way that they can be allowed to handle classified information.

For decades, General Dynamics has been manufacturing devices for securing top level communications of the US government and armed forces, like the Sectéra voice encryption family. One of those products was a highly secure cell phone for GSM, which was produced from 2002 until 2012.




------------------
http://electrospaces.blogspot.com/2014/02/nsa-director-alexanders-phones.html

February 27, 2014
NSA director Alexander's phones
(Updated: March 16, 2014)

After a range of articles about how NSA intercepts foreign communications, we now take a look at the equipment that NSA uses to secure their own telecommunications, more specific those of its director.

-------------

http://electrospaces.blogspot.com/2013/04/how-obamas-blackberry-got-secured.html


April 20, 2013
How Obama's BlackBerry got secured
(Updated: November 1, 2013)

Around January 20, 2009, when Barack Obama took over the office of president of the United States, there was quite a lot of media attention about the fact that he had to give up his BlackBerry, because it was considered to be a security risk.

This caused almost world wide media attention, but the follow-up was less accurately covered and a number of different stories were told. Here we will show that Obama actually kept his beloved BlackBerry, but only after it had been secured by special encryption software and some additional security measures.


--------------------
http://cryptome.org/2014/03/https-ta.pdf

HTTPS Traffic Analysis Risks and Defenses March 4, 2014


__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #213 

http://www.wired.com/2014/05/onionshare/?mbid=social_fb

Free App Lets the Next Snowden Send Big Files Securely and Anonymously

By Andy Greenberg
05.21.14 |
1:54 pm |

When Glenn Greenwald discovered last year that some of the NSA documents he’d received from Edward Snowden had been corrupted, he needed to retrieve copies from fellow journalist Laura Poitras in Berlin. They decided the safest way to transfer the sizable cache was to use a USB drive carried by hand to Greenwald’s home in Brazil. As a result, Greenwald’s partner David Miranda was detained at Heathrow, searched, and questioned for nine hours.

That’s exactly the sort of ordeal Micah Lee, the staff technologist and resident crypto expert at Greenwald’s investigative news site The Intercept, hopes to render obsolete. On Tuesday he released Onionshare—simple, free software designed to let anyone send files securely and anonymously. After reading about Greenwald’s file transfer problem in Greenwald’s new book, Lee created the program as a way of sharing big data dumps via a direct channel encrypted and protected by the anonymity software Tor, making it far more difficult for eavesdroppers to determine who is sending what to whom.

“If you use a filesharing service like Dropbox or Mega or whatever, you basically have to trust them. The file could end up in the hands of law enforcement,” Lee says. “This lets you bypass all third parties, so that the file goes from one person to another over the Tor network completely anonymously.

“It’s basically 100 percent darknet.”

READ MORE





-------------------------------------

GET ONIONSHARE NOW!

https://github.com/micahflee/onionshare

OnionShare

OnionShare lets you securely and anonymously share a file of any size with someone. It works by starting a web server, making it accessible as a Tor hidden service, and generating an unguessable URL access and download the file. It doesn't require setting up a server on the internet somewhere or using a third party filesharing service. You host the file on your own computer and use a Tor hidden service to make it temporarily accessible over the internet. The other user just needs to use Tor Browser to download the file from you.

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #214 

Blackphone Maker Silent Circle Raises $30M

By Stephanie Mlot
May 21, 2014 02:18pm EST
2 Comments

The company will use this round of funding to help meet the "overwhelming demand" for its secure smartphone.
http://www.pcmag.com/article2/0,2817,2458370,00.asp

---------------



BlackPhone maker Silent Circle raises $30M, moves to Switzerland
Crazy demand: CEO tells Ars he plans on shipping 3 million phones within a year.

by Cyrus Farivar - May 21 2014, 8:55pm UTC

http://arstechnica.com/business/2014/05/blackphone-maker-silent-circle-raises-30m-moves-to-switzerland/

-----------




http://www.pcmag.com/article2/0,2817,2453964,00.asp
http://www.pcmag.com/article2/0,2817,2454241,00.asp

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #215 
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa


Help Support the Little-Known Privacy Tool That Has Been Critical to Journalists Reporting on the NSA
April 2, 2014


-------------


http://www.ibtimes.co.uk/improve-online-privacy-tails-os-edward-snowden-used-evade-nsa-1445767

http://www.theregister.co.uk/2014/05/01/secure_os_tails_1_released/

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #216 
http://wikileaks.com.br/NoPlaceToHide4Fr33.pdf

FREE BOOK BY GLENN GREENWALD


NO PLACE TO HIDE (June 22, 2014)
EDWARD SNOWDEN, THE NSA AND THE SURVEILLANCE STATE

GET YOUR FREE COPY HERE:
http://wikileaks.com.br/NoPlaceToHide4Fr33.pdf

---------





Military & Defense More: NSA Edward Snowden Military Surveillance
The Smartphone Even The NSA May Have Trouble Hacking Is Coming Soon

Paul Szoldra

Jun. 18, 2014, 8:22 PM
http://www.businessinsider.com/silent-circle-blackphone-2014-6

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #217 

Exclusive: A review of the Blackphone, the Android for the paranoid
Custom-built with privacy in mind, this handset isn’t for (Google) Play.

by Sean Gallagher - Jun 30, 2014 1:00 am UTC
http://arstechnica.com/security/2014/06/exclusive-a-review-of-the-blackphone-the-android-for-the-paranoid/2/







A Phone That Lies for You
An Android hack allows users to put decoy data on a smartphone
Jun 1, 2014 |By Jesse Emspak
http://www.scientificamerican.com/article/a-phone-that-lies-for-you-an-android-hack-allows-users-to-put-decoy-data-on-a-smartphone/





        NSA Targets the Privacy-Conscious for Surveillance

Jake Appelbaum et al., are reporting on XKEYSCORE selection rules that target users -- and people who just visit the websites of -- Tor, Tails, and other sites. This isn't just metadata; this is "full take" content that's stored forever.
https://www.schneier.com/blog/archives/2014/07/nsa_targets_pri.html






Google Glass Snoopers Can Steal Your Passcode With a Glance
By Andy Greenberg 06.24.14 | 6:30 am
http://www.wired.com/2014/06/google-glass-snoopers-can-steal-your-passcode-with-a-glance/







Anonymous encrypted webchat with Echoplexus
Hacker10 | 5 June, 2014
http://www.hacker10.com/computer-security/anonymous-encrypted-webchat-with-echoplexus/




Best programs to change your DNS settings
Hacker10 | 20 May, 2014
http://www.hacker10.com/computer-security/best-programs-to-change-your-dns-settings/

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #218 
LOGIN To FACEBOOK USING TOR
https://facebookcorewwwi.onion/

details here:
https://threatpost.com/facebook-creates-onion-site-now-accessible-via-tor-network/109121

http://betanews.com/2014/11/01/facebook-opens-up-to-tor-users-with-new-secure-onion-address/
---------------
Weekend Edition Oct 31-Nov 02, 2014
Share on facebook Share on twitter Share on google More Sharing Services 13
Why Cyber Security is a Magic Act
The FBI Can Bypass Encryption
by BILL BLUNDEN

http://www.counterpunch.org/2014/10/31/the-fbi-can-bypass-encryption/

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #219 
http://www.hacker10.com/other-computing/wireless-anti-surveillance-device-cyborg-unplug/

Find and disconnect unauthorized devices from your WIFI NET

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #220 
http://www.hacker10.com/internet-anonymity/islamic-state-guide-to-remain-anonymous-online/

Disclaimer- I ado not support ISIS or islamic terrorists.

This information is for IT Professionals
Posted for informational purposes:
Islamic State guide to remain anonymous online
Hacker10 | 27 August, 2014
- See more at: http://www.hacker10.com/internet-anonymity/islamic-state-guide-to-remain-anonymous-online/

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
hannah

Registered:
Posts: 797
Reply with quote  #221 
http://www.hacker10.com/mobile-phone/best-smartphone-apps-to-exchange-secret-messages/

http://www.hacker10.com/computer-security/encrypted-voice-over-ip-chat-mumble-works-with-tor/

http://www.hacker10.com/internet-anonymity/tor-proxy-anonymous-instant-messenger-torsion/

http://www.hacker10.com/other-computing/pgp-encrypted-webmail-service-intactmail/


Remember, Snowden used TAILS.
https://tails.boum.org/

__________________
Test your connection for leaks:
http://ip-check.info/?lang=en

Use TAILS
https://tails.boum.org/

How to boot from USB and other great stuff:
http://www.rmprepusb.com/

Open pdf and word files online instead of on your puter'
http://view.samurajdata.se/

USE the net more securely:
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
https://www.torproject.org/download/download

http://www.theintelligencenews.com/


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"



"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"
0
wispuled

Registered:
Posts: 18
Reply with quote  #222 

dreambox 7080 hd


dreambox 7080


dreambox dm 820




DM7020 hd v2


sunray sr4

0
joeb

Registered:
Posts: 8,742
Reply with quote  #223 
http://www.rigorousintuition.ca/board2/viewtopic.php?f=8&t=29299





Jane CIA Mayer of The (CIA) New Yorker continues to infiltrate the Left, especially through Amy Goodman's Pacifica Radio news show, Democracy Now!

http://www.democracynow.org/2010/8/25/t ... illionaire

In 2008, Jane CIA Mayer used her book, 'The Dark Side,' to make many think she was 'with them' as an opponent of torture while her book actually promoted CIA disinformation about 9/11, IranContra, Vietnam, and US biological warfare during the Korean War.

Her new CIA disinformatiion decoy project uses a homonym to pre-empt the upcoming new book by Professor Peter Dale Scott, author of 'Cocaine Politics' and longtime exposer of CIA drug culture.

She would have us applaud her for her expose of rich reich-wingers who set up fronts named-
the Koch brothers.
SOUNDS LIKE "COKE brothers."
Amazingly, she never mentions the CIA's use of the rich as tools such as H. L. Hunt or Richard Melon Scaife (see 'mysterious death of Steve Kangas') or many others.

Yes, on radio and video this aural homonym strategy works. Less so in text but who reads?

If they are readers of the Wall Street Journal front page, they would have also seen
> an ad for Morgan Stanley that was a picture of a horse.
"Horse" is a nickname for heroin, a major economy in US-occupied Afghanistan which has been part of the Pentagon-Wall Street equation since the 1950s when the US took over Golden Triangle economies from the proxy forces of the French in Indochina.

All part of the most basic psyops strategy of providing-
competing associations for keywords, images, and themes that are subversive to power.
0
Previous Topic | Next Topic
Print
Reply

Easily create a Forum Website with Website Toolbox.

? ?
Copyright ? 2001-2004 Who?s A Rat. All Rights Reserved.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.
?