[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/netplus/ - Networks and Plus

Catalog

Name
Email
Subject *
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Options
dicesidesmodifier
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 5 per post.


File: 1451432371762.jpg (57.28 KB, 1400x1410, 140:141, front-1393846082939.flat.jpg)

 No.458[Reply]

hey anons my friend know a way to spy on anyone by only his number He didn't want to tell me the whole secret to me but told me he uses Spyware script autoresponder by sending a sms to the victim with a kind of code and Then he will have the access to go get the whatsapp database and coby it and but it in bluestacks and it works

 No.459

sounds interesting. i dont personally use whatapp, but does it allow you to view/send regular sms and thus the app reads a malicious sms and spits out the database? or is whatapps not sms based?




File: 1434726719330.gif (1.99 MB, 766x800, 383:400, 1433540833072.gif)

 No.97[Reply]

Hi, for someone who is a complete newbie to all of this, do you have any info graphics or simple guides on how to get started with general internet security, how to easily get proxies running, what you can/can't do on Tor (how does one for example handle downloads and torrents) ect?

Thanks in advance, and it's great this board exist!

16 posts and 9 image replies omitted. Click reply to view.

 No.449

>>102

>>103

I know it's not likely to cause any psychological or physiological harm, but that is damn, damn yucky.


 No.454

>>206

Windows users could also be pedos, GNU/Linux just makes it harder for the NSA to catch them.


 No.455

>>382

Disconnect has been replaced by PrivacyBadger. Also, Adblock Edge is dicontinued and Adblock Plus has sold out to Jewgle or something, I don't know exactly what and been replaced by uBlock Origin. Not uBlock, because that is shit.


 No.456

>>382

Firefox v26 is old. I need to work on porting cliget to PaleMeme


 No.470

>>213

So what is his

>I can tell you with a lot of certainty LE does hate Tails. It makes push button forensics basically impossible which drives up costs as we need specialized staff to do covert activity online. It also means we spend more time looking at less evidence, officers usually take everything on a raid, in some cases its resulted in huge portions of useless crap we have to look at.

is all a ruse, tying to convince people to use TAILS because they have a 0day?




File: 1440453747402.jpg (18.71 KB, 598x236, 299:118, CKykNT5UAAEOlnT.jpg)

 No.350[Reply]

ASHLEY MADISON CHEATERS LIST

Here it is, the complete list of Ashley Madison adulterers, which will provide many, MANY years of hometown FUN, FUN, FUN, discerning the local philanderers!!! DOWNLOAD NOW!!!

AMCL.zip 847.6 MB

https://mega.nz/#!5pB3QZJD!oIaWujqkqAiOqtvRPzgu6Oh6y4c6-4qor_J-qaUfPGg

 No.356




File: 1444137342042.gif (362.96 KB, 1200x675, 16:9, image.gif)

 No.388[Reply]

Hey folks, I'd love to put together a piratebox router, as I live in a heavily populated neighbourhood with a fuckton of university students around. Anyone put one together? Any advice?

 No.389

install gentoo


 No.424

It looks like you would have luck with this. Get some friends on board if they're interested.


 No.431

File: 1445489567438.jpg (138.13 KB, 500x333, 500:333, 1439522065392-4.jpg)

Start taking interest in your aspirations

stop living in dream land


 No.446

Download the Piratebox app on an Android phone.


 No.450

install tinyboard name wifi as free internet




File: 1440463695403.jpg (15.65 KB, 230x316, 115:158, spy.jpg)

 No.351[Reply]

THIS ONE IS CREEPY: PROOF WINDOWS 10 IS CLANDESTINE BEYOND ALL DOUBT:

Anonymous wrote:

I did test with the telemetry websites you listed (see below), I blocked them in my firewall, as an outgoing rule for each one. I could not go online after that!! I unblocked them again, and tried blocking one by one, no matter what, even with only one of them blocked, I could not connect to the internet!:

df.telemetry.microsoft.com

reports.wes.df.telemetry.microsoft.com

cs1.wpc.v0cdn.net

vortex-sandbox.data.microsoft.com

pre.footprintpredict.com

oca.telemetry.microsoft.com

oca.telemetry.microsoft.com.nsatc.net

vortex-sandbox.data.microsoft.com

pre.footprintpredict.com

i1.services.social.microsoft.com

i1.services.social.microsoft.com.nsatc.net

telemetry.appex.bing.net

telemetry.urs.microsoft.com

cs1.wpc.v0cdn.net

statsfe1.ws.microsoft.com

vortex.data.microsoft.com

vortex-win.data.microsoft.com

telecommand.telemetry.microsoft.com

telecommand.telemetry.microsoft.com.nsatc.net

oca.telemetry.microsoft.com

oca.telemetry.microsoft.com.nsatc.net

sqm.telemetry.microsoft.com

sqm.telemetry.microsoft.com.nsatc.net

My response: You don't have to hit any address first to then hit a web site, The above is not possible absent a sabotaged operating system.

 No.364

uz jsem jim tam postnul odpoved:

that is just a bullshit. I just tried to verify you findings and I event went little deeper:

1. I used checkpoint firewall on the W10 and blocked all the sites you posted > internet access working.

2. I even blocked some additional (*.microsoft.com and *.bing.net and *.bing.com) > internet access working

3. I used COMODO firewall instead of the checkpoint one > internet access working.

4. I blocked all of them on my router > internet access working


 No.439

Well, if there was any doubt, Microsoft has come out and admitted that their surveillance and tracking tools are a core part of the OS and under no circumstances can be completely disabled.

Getting back to 7 and "securing" it (and those are massive quotes) is the "best" middleground for staying with MS. Installing non-systemd Linux is your only real hope of avoiding that shit.

Still, good work, and good find.


 No.448

>>351

Looks like some fucktard needs to read his firewall's manual.




File: 1433203380763-0.jpg (20.74 KB, 800x400, 2:1, whonix.jpg)

File: 1433203380763-1.jpg (64.91 KB, 941x506, 941:506, whonix-architecture.jpg)

 No.12[Reply]

What is Whonix?

Whonix is a GNU/linux disto intended to allow you to communicate over the Internet anonymously using tor. The benefit of Whonix over using the tor browser bundle alone is that Whonix forces ALL your traffic over the tor network and does not allow connections that bypass tor. This has the benefit of being able to use programs other then the web browser (irc, IM, jitsi, etc.) without having to worry about DNS leaks, proxy compliance and other connection leaks that could potentially compromise your anonymity, this also provides a level of protection from certain types malware attacks from revealing your identity by ensuring that any malware could only connect out via tor.

Whonix is distributed as two virtual machine (virutalbox) images, a 'Gateway' and a 'Workstation'. The workstation build is configured to route all traffic to the gateway where tor runs, this means that even if an attacker gains access to run code on your workstaiton through malware, a browser exploit or other method, there is still no way for them to disable tor or change your firewall settings to allow a direct connection to the Internet that could revel your identity.

Whonix provides stream isolation, meaning that different applications use different tor circuits to prevent identity correlation. See https://www.whonix.org/wiki/Stream_Isolationc for more info on stream isolation and a list of what applications are preconfigured to use it and how to enable it on others including one's you install yourself. You can connect multiple Workstations to the gateway for complete isolation.

The official Whonix build is distributed as two Debian based VirutalBox images ,KVM setup instructions can be found here https://www.whonix.org/wiki/KVM , for a QubesOS based solution see https://www.whonix.org/wiki/Qubes

Whonix Links:

https://www.whonix.org

Post too long. Click here to view the full text.

35 posts omitted. Click reply to view.

 No.195

>>173

Using windows

Run in a browser ip-check.info

Run openvpn as admin. and start vpn

Go to step 1

Make sure u visit dnsleaktest.com

Start whonix gateway

Wait until time sync started before u start 'workstation'

Step 1 again


 No.327

>>195

>using windows

why? what about a linux distro?


 No.328

>>327

still trying to figure out what distro go use.

Considering alpine at the moment.


 No.390

Is it possible to install kernel 4.2 in Qubes OS? I can't start or configure X because kernel is missing amdgpu driver (GPU is R9 285). X -configure just says "Number of created screens does not match number of detected devices. Configuration failed.". Qubes Live USB boots but after Fedora's blue loading bar there is just blinking _ on top of the screen. Ctrl-Alt-F2 gives console access though so I think it's just X start failure.


 No.447

Should configure a VPN through the workstation or on the host?

Which is easiest?




File: 1444986445920-0.png (42.73 KB, 714x795, 238:265, pica.PNG)

File: 1444986445952-1.png (51.64 KB, 703x782, 703:782, pica 2.PNG)

 No.425[Reply]

I wanted to stop them using my IP.

The picture is related. I didn't type them in the /leftypol/

 No.429

omg just change your ip address faggot use google


 No.445

>>425

If it's a static IP then I would suggest chaning the passsword to your router and scaning your system for sniffers.

If it's a daynamic IP, reboot, rince and repeat.




File: 1444572883742.jpg (16.43 KB, 799x704, 799:704, access-point.jpg)

 No.414[Reply]

Is an access point also technically a switch, since it allows multiple machines to connect to a router?

 No.423

I think switches can identify and direct the communication and access point only allow the connection to a network.So no they're not the same, a switch controls traffic by himself an access point doesn't.


 No.437

Each individual wireless connection to an AP is NOT within its own collision domain. Thus, an AP is not a switch. It is a hub.




File: 1433169170762-0.png (147.13 KB, 420x420, 1:1, rs.png)

File: 1433169170763-1.jpg (101.63 KB, 1467x874, 1467:874, rs1.jpg)

File: 1433169170763-2.jpg (84.6 KB, 1468x865, 1468:865, rs2.jpg)

File: 1433169170763-3.jpg (118.86 KB, 1464x872, 183:109, rs3.jpg)

 No.3[Reply]

Retroshare is a free software, completely decentralized, secure and (optionally with v0.6 + tor) completely anonymous 'friend2friend' network and application. Features include, messaging, filesharing (between only specific or all friends openly and publicly anonymously), forums, irc style chat and more through the use of plugins. Retroshare is a friend2friend network meaning you only ever connect directly to the people in you friends list and may connect to your friend's friends and so on through anonymous tunnels. Retroshare utilizes opnPGP and openSSL for authentication and encryption. Version 0.6 which is incompatible with version 0.5 introduces many new features including the ability to create multiple 'sub identities' so that you can create multiple identities for use in forums and chat without having to create a new account. Versions 0.6 also has support for tor which can work in two ways, by using tor only to connect to other people running tor hidden node while allowing 'clearnet' connections to yourself, or by running in hidden mode yourself so that people in your friends connect to you using your tor hidden service address instead of you ip address, this is the recommenced mode of operation for people who want to remain anonymous from people in their friends list.

JOIN OUR RETROSHARE+TOR COMMUNITY

Watch the getting started video https://d.maxfile.ro/nkygkxmwmh.webm

or

http://udgdahofbq52bzxk.onion/img/how_to.webm

Join the /netplus/ chatserver http://udgdahofbq52bzxk.onion/

And swap your certificate here >>6

See also the v0.5 certificate swap thread here >>8

91 posts and 5 image replies omitted. Click reply to view.
Post last edited at

 No.325

>>307

retroshare has built in tor support. IDK about i2p but if you are going to use it with i2p I would not enable dht.

while i2p uses DHT, they developers have to tell reotrshare to use the same type of DHT.

You should trust it because it works like a friend to friend network. You talk to only those you trust and it uses SSL/TLS (standard open security protocols that you are using for eg. to post here.)

If you use retroshare with tor or i2p it will add a layer of security. That is why you should trust it.

>>322

added. I am >>236


 No.378


 No.387

>>378

Wait, how long has the chatserver been down for? Is this whole thing dead?


 No.420

I added countless annons

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 No.422

>>387

months and no but people usually post keys in the other thread.

>>325

recent retroshare has i2p support too. hidden nodes operate in "darknet" mode which disables DHT and Discovery.

clearnet nodes can set tor and i2p/i2pd proxies.




File: 1444383238752.png (458.17 KB, 1239x1640, 1239:1640, paranoid anons tech guide.png)

 No.400[Reply]

I'm passing this on to /netplus/ because I don't want you to be left out and uninformed.

Dumping massive /tech/ guide and redpill

Warning:

following these instructions may severely break your computer and firefox and may ruin your privacy and your entire life.

do any of these things at your own risk.

I am not responsible for anything bad that happens to you.

Some of these things DO mess up your ability to use 8chan and screw up the way the site functions so pick and choose carefully, use saves/different profiles or something.

This may void your warranty.

Ask a professional and the mozilla team before doing anything.

You have been warned.

first open about:config

to protect against SSLv3 exploit you can use the mozilla addon "SSL version control"

or set security.tls.version.min = 1 in about:config for Mozilla Firefox.

To restore change the value back to the security.tls.version.min = 0. That's it.

In Mozilla Thunderbird you can set it also in about:config, which You can find in: Tools → Options → Advanced → General → Config Editor.

Always use a firefox fork that gets regular good security updates. never use a main distribution. the underdogs are your friends.

remember to explore "about:permissions" as well.

(search these so they come up)

network.http.pipelining TRUE

network.http.pipeliniPost too long. Click here to view the full text.

5 posts omitted. Click reply to view.

 No.406

which brings me to my final point, my great revelation of the plot against freedom itself.

WINDOWS, MINT, AND SYSTEMD ARE ALL CONNECTED!

How would anyone have ever guessed this ingeniously designed plot!? You are all drooling fools!

I will make it easy for a stupid "person" to understand.

>windows 10 released

>ignorant uninformed people keep using it, even though it steals your wifi and social networking passwords

>smarter yet still a multitude of levels more stupid than I, freedom seeking people attempt to flee this evils grasp and beg for knowledge online to the best of their pathetic ability

>mint and ubuntu shills pop up and fool a percentage of them promising ease of use

>meanwhile other shills scare them away from linux entirely by throwing noobs right into the grinder "installll gentoooo, installlll archhhh, installlllll fedoraaaa, installllll redhattt"

>meanwhile yet again, systemd spreads through linux like a virulent plague, infecting and un-freedoming multiple linux distrobutions, forcing users to run around trying to remove it or find another distro with no systemd. So I Welcome you all… to the NSA/Prism hotel where there is a Mint under every pillow and a pervert voyeur looking through your Windows.

You can check in but you can't check out, so enjoy your stay because you are never getting out! -√¿#΅ςγζτεηη–εггôř΅∞8∞8∞8∞8

you can check out, the ticket is truth. may it set you free, now run!

So I'm going to give you a bunch of really good information because I care alot. If you really want good out of your firefox browser, consider this. don't use firefox. It's just as bad as windows/google. Use a fork, and the addons: noscript, request policy,Post too long. Click here to view the full text.


 No.407

another addon that has been shilled a huge amount on 8chan is disconnect:

>disconnect

https://addons.mozilla.org/en-US/firefox/addon/disconnect/

>About this Add-on Disconnect, named one of the 100 best innovations of the year by

Popular Science

and one of the 20 best Firefox add-ons by

Lifehacker

lets you visualize and block the otherwise invisible websites that track your search and browsing history.

>Our privacy policy, in a sentence: We don't collect your IP address or any other personal info

>except the info you volunteer.

>wall street journal

>CNN

>The new york times

>60 Minutes

>Forbes

https://disconnect.me

http://techcrunch.com/2012/03/22/disconnect-me-raise/

https://gigaom.com/2013/04/15/ex-googler-releases-big-update-to-disconnect-a-data-blocking-tool/

>Launched in 2010 by a

Post too long. Click here to view the full text.


 No.408

The project is strongly endorsed by various feminist groups that have nothing to do with technology. The system is headed by a developer reputed for making low-quality software. If literally any other piece of software had the kind of bugs described in the various systemd issue trackers, they wouldn't even be accepted in distro repos, yet systemd has been widely adopted in a matter of months, breaking compatibility and not offering upgrade paths even on the likes of strong server OSs like debian or centos. SELinux - a NSA project - developers are strongly for systemd, nevermind the numerous bugs and undoubtedly numerous security vulnerabilities. Speaking of, there has been NO audit of systemd even though everyone is accepting systemd no matter how security-sensitive the distro is meant to be. It's pretty evident that something is really wrong with systemd's adoption. basically the bastards who want to enslave the world decided that the best way to control opensource is to create their own and promote it until it's the standard even though it shouldn't be.

new people would fall for it and the more knowledgeable are facing a lack of support for their alternatives. The project to create an all-encompassing system that can be easily infiltrated by, at will to provide root access and spy on arbitrary non-backdoored systems is being funded by, and is being promoted by the, global elite across the entire community. It's clear that the adoption of systemd is not normal and there's something hiding behind it. Nobody has ever been specific about what kind of problem systemd solves, nobody has ever even mentioned having a problem before systemd appeared, and suddenly it spreads like wildfire.

systemd's design is flawed intentionally to increase its attack vector and make it vulnerable for outside attackers to break it more easily. There is a reason why systemd is pushed by Red hat, an American company with very close ties to the N$@. Red hat controls Fedora, so Fedora adopted it first, then Red hat enterprise linux and because Red hat funds most of debian, they also caved in. Basically all of the major distros are controlled by Red hat one way or another. Everyone hates Gnome, yet it is still here, why you ask…… it is Red hat. Red Hat wants control of Linux. Anyone who opposes systemd is in the way of them controPost too long. Click here to view the full text.


 No.409

that's all. I hope this helps many of you.


 No.421

So, you crossposted this shit on netplus too.

How many boards did you spam with this? 5? 10? Jeez




File: 1439628076317.png (2.25 KB, 160x107, 160:107, freenet.png)

 No.329[Reply]

found this cool program says it's different than tor… just wanted to know if it's "more secure" it's also open source (java)

Link to project https://freenetproject.org/

 No.335

>>329

>open source (java)

Heh, not really.

The open source JVM isn't the same as the closed one, it's also shit in comparison, and for some reason, the paid one has 3000% superior performances. And even then, if you wanted to make your own JVM, you'd have to certificate it to have called it that, using a test tool that isn't open source.

I seriously like all those cool languages like C# too, but for now I'd rather stick to C/C++ if I want something truly open source.


 No.360

File: 1441376753127.png (52.37 KB, 740x600, 37:30, Freenet_Request_Sequence.png)

>>329

If you want to access content anonymously:

If you are using Freenet in opennet mode, it is as secure as Tor. If you are using Freenet in darknet mode with trusted friends/peers, it is superior to Tor.

If you want to publish content (website, files):

Freenet is probably more secure, because you dont need to operate your own server. Just upload data and you can shutdown your computer. No entity will be able to hack your content or take it down.

>>335

I don't have any problems with "OpenJDK 64-Bit Server VM"


 No.368

>>335

> The open source JVM isn't the same as the closed one, it's also shit in comparison, and for some reason, the paid one has 3000% superior performances. And even then, if you wanted to make your own JVM, you'd have to certificate it to have called it that, using a test tool that isn't open source.

> This is how clueless Java haters are.

I only wonder about one thing. If you are so stupid, how easy would it be to trick you into defeating all layers of security a great many people worked on by your own hands?


 No.372

>>335

lol, openjdk is completely fine. 3000% is a number straight out of your ass. C++ is fine, but java is, too. C# is shit.




File: 1435643292114.gif (542.01 KB, 500x500, 1:1, trust.gif)

 No.176[Reply]

mng - mesh networking general


.- _ _ -.
/ / \ \
( ( (` (-o-) `) ) )
\ \_ ` -+- ` _/ /
`- -+- -`
I
/|\
/\|/\
/|-V-|\
_/-\/_\/-\_
/ mng \

catch-all for mesh network hardware and protocol discussion, and perhaps some info about services that aren't covered in other threads

bring questions and we'll try to answer them as best we can

>>intro<<

http://www.fastcompany.com/3044686/mesh-networks-and-the-local-internet-movement

>> news <<

Cubans build private mesh network: https://archive.is/CbTUb

Mesh networking coming to Bluetooth LE: http://www.v3.co.uk/v3-uk/news/2396896/bluetooth-to-get-mesh-networking-capability-for-the-internet-of-things1

>> topics <<

protocols

-> olsrd, batman-adv, ham-net, 802.11s

decentralized services

-> hyperboria, namecoin, diaspora, tahoe-lafs, forban

hardware

-> custom rigs, ubiquiti products, tv whitespace gear, mesh potato

-> low-Post too long. Click here to view the full text.

9 posts and 5 image replies omitted. Click reply to view.

 No.321

>>226

First time visting this board. Just wanted to give a shout out to this server, been using it for awhile with dnscrypt-proxy

https://dnscrypt.pl/


 No.340

>>181

Isn't this where hardware can fill the void? Design a box with a simple network connection, two separate boards with a single one-way connection between the two that only carries a request. Let the connected side run over a low frequency open network with no security, and then once the data moves over to the twin system you can encrypt it there before transferring to a more complex machine for uer interaction.

Of course people could eventually determine your ownership by inserting some form of proprietary data packet and track it to your everyday machine, then match it to the transmitting board- but if we can make the 'connection box' cheap it could be replaced periodically to fix that issue.

Just put this to words a second ago so please correct me if I missed something.


 No.346

Byzantium needs seeders. http://project-byzantium.org/


 No.347

>OLSR/byzantium meshnet in each city and town

>forban, tox, URC, i2p-bote/bitmessage allow them all to talk to one another

>most or some nodes on the mesh probably have some connection to the greater internet, anything that needs to go outside the town/city can do so though those nodes, through Tor.

>edgenet

http://theedg.es/#/


 No.365

File: 1441693525798.jpg (268.26 KB, 1024x1039, 1024:1039, 1413944780928.jpg)

>>346

is byzantium still alive? havent seen many updates




File: 1440464156979.jpg (645.78 KB, 1600x900, 16:9, EVIL SOFTWARE.jpg)

 No.352[Reply]

THIS ONE IS CREEPY: PROOF WINDOWS 10 IS CLANDESTINE BEYOND ALL DOUBT:

Anonymous wrote:

I did test with the telemetry websites you listed (see below), I blocked them in my firewall, as an outgoing rule for each one. I could not go online after that!! I unblocked them again, and tried blocking one by one, no matter what, even with only one of them blocked, I could not connect to the internet!:

df.telemetry.microsoft.com

reports.wes.df.telemetry.microsoft.com

cs1.wpc.v0cdn.net

vortex-sandbox.data.microsoft.com

pre.footprintpredict.com

oca.telemetry.microsoft.com

oca.telemetry.microsoft.com.nsatc.net

vortex-sandbox.data.microsoft.com

pre.footprintpredict.com

i1.services.social.microsoft.com

i1.services.social.microsoft.com.nsatc.net

telemetry.appex.bing.net

telemetry.urs.microsoft.com

cs1.wpc.v0cdn.net

statsfe1.ws.microsoft.com

vortex.data.microsoft.com

vortex-win.data.microsoft.com

telecommand.telemetry.microsoft.com

telecommand.telemetry.microsoft.com.nsatc.net

oca.telemetry.microsoft.com

oca.telemetry.microsoft.com.nsatc.net

sqm.telemetry.microsoft.com

sqm.telemetry.microsoft.com.nsatc.net

My response: You don't have to hit any address first to then hit a web site, The above is not possible absent a sabotaged operating system.

 No.363

that is just a bullshit. I just tried to verify you findings and I event went little deeper:

1. I used checkpoint firewall on the W10 and blocked all he sites you posted > internet access working.

2. I even blocked some additional (*.microsoft.com and *.bing.net and *.bing.com)

3. I used COMODO firewall instead of the checkpoint one > internet access working.

4. I blocked all of them on my router > internet access working




File: 1433427902891-0.png (9.62 KB, 280x280, 1:1, gnupg.png)

File: 1433427902892-1.png (36.67 KB, 500x521, 500:521, pgp1.png)

 No.24[Reply]

OpenPGP (Pretty Good Privacy) is a set of standards and protocols for encrypting and signing messages using private and public keys. PGP is the most popular method of encrypting email messages. There are multiple PGP implementations both free and proprietary, I will be discussing GPG (GNU Privacy Guard).

PGP works by generating two associated keys, a private key that you keep to yourself, this is used to sign messages and to decrypt messages that other people have encrypted for you using your public key which you distribute, using your public key people can encrypt message that can then only be decrypted using your private key and they can also use your public key to verify messages that have been signed with your private key.

For more information about PGP, GPG and Public-key cryptography see the following links.

http://www.openpgp.org/about_openpgp/

https://www.gnupg.org/documentation/index.html

https://en.wikipedia.org/wiki/Pretty_Good_Privacy

https://en.wikipedia.org/wiki/Public-key_cryptography

The following guide is for people using GNU/Linux and I will be using the seahorse frontend, KDE users will prefer KGPG. Windows users can use gpg4win http://www.gpg4win.org/

Mac users can probably do something to but it would likely involves penises, and not in the good way.

16 posts and 10 image replies omitted. Click reply to view.
Post last edited at

 No.239

>>218

using subkeys in pgp is an ugly mess.

pgp is a fucking piece of shit with an awful user interface but it does work and you can write scripts to hide the ugliness but i don't think there exists something to properly handle subkeys yet.

but until something better comes along we're stuck with it, and these days it seems that 99% of new crypto applications are just scams targeted at hipsters.


 No.333

I have a couple of questions:

It seems you don't really need a valid e-mail address to generate a new pair of keys, right? You can make a new pair without linking it to any address?

And when I make a new pair of keys the process is completely local by default? Nothing related to PGP goes through my connection?


 No.338

How do I save a pair of keys, in order to transfer it to an external device? I mean, where do I find the secret key?


 No.339


 No.358

File: 1440948543470.gif (7.75 KB, 181x146, 181:146, ONMP.gif)

>>217

>Pond

>>>Pond is forward secure, asynchronous messaging for the discerning. Pond messages are asynchronous, but are not a record; they expire automatically a week after they are received.

May I suggest to give a look at onionmail

Clearnet site: onionmail.info

Hidden site: louhlbgyupgktsw7.onion

It's free software and you can download it from their site. It's a federation of servers. Like XMPP, each one can talk to each other, and the whole subnet can talk to other Tor or clearnet email providers.

Note that the site hosts just a list of public hidden node, that are running the real servers

>https://archive.is/http://www.hacker10.com/internet-anonymity/onionmail-an-anonymous-mail-server-running-on-tor/

May I underline something in "Rulez" page you can look at browsing one of the actual servers i.e.

>http://wc2eyfmw7wrwomf4.onion/rulez.html

or

>http://ndo2plzaruzxk6sb.onion/rulez.html

or

>http://ridotnp5m5lp22gw.onion/rulez.html

and so on, pick one

>

>[2.0] Sending emails

>

>(1) Mail messages are saved only in the recipient's server and encrypted

>with mulPost too long. Click here to view the full text.




File: 1433178231921.jpeg (90.68 KB, 1024x1024, 1:1, onion.jpeg)

 No.5[Reply]

This thread is for sharing tor hidden service (.onion) links. Please post links in the format:

name – URL – Description

Do NOT post links to material that is illegal in the United States.

Check to see if a link is already posted before posting.

When the thread fills up I will aggregate everything somewhere before renewing it

TOP LINKS

Clear Web Search Engines

Duckduckgo – 3g2upl4pq6kufc4m.onion – this is ddg's hidden service address. Site is the same as duckduckgo.com

searx from La Quadrature du Net – 3g2upl4pq6kufc4m.onion – searx is a free software 'meta' search engine that proxies your searches and provies results from multiple popular search engines, this instance is hosted by La Quadrature du Net

searx from anon - 7jwxg5rakyfvikpi.onion – same as above, the admin does not provide any details about themselves

Hidden Service Search Engines

grams – grams7enufi7jmdl.onion – searches many different market/auction sites at once

Not Evil – hss3uro2hsxfogfq.onion – a hidden service search engine

Image Boards

8chan – fullchan4jtta4sx.onion – dank memes

overchan – 2nq3v6fnrwp72nao.onion – links to overchan nodes including tor hidden service sites and eeepsites (i2p)

Email and Chat (Remember to always use pgp and OTR to encrypt your communications)

tormail – jmcz7xp2kszu6vba.onion – email provider with .onion servers. You get two addresses attached to your account, a @tormail.net and a @mailshow34bxmjmd.onion

sigaint – sigaintevyh2rzvw.onion – same as above

torbox – torbox3uiot6wchz.onion – torbox is a tor only mail service that will route mail addressed only to other toboPost too long. Click here to view the full text.

 No.155


 No.169

TORCH (Search Engine) - http://xmh57jrzrnw6insl.onion/

Overchan frontends - http://allyour4nert7pkh.onion/overchan.txt

FBIchan - http://fbichanc6yfagl4l.onion/

Torflix (streaming) - http://prnstmrpfkgkaw5v.onion/

Imperial Library of Trantor - http://xfmro77i3lixucja.onion/

Jotunbane's Reading Club - http://c3jemx2ube5v5zpg.onion/


 No.348

>>155

>tfw nearly all the on topic sites on the uncensored hidden wiki are dead and I've already downloaded their good stuff

>downloaded and set up RS

>added nearly every anon who posted his cert

>kept it online for about 4 days

>checked it randomly throughout those days

>in all that time only one person accepted me and barely talked to me

>after a week I forgot my password


 No.349

>>5

The link for La quadrature du Net's Searx is wrong (you pasted the the ddg one), can you post the right one?




Delete Post [ ]
[]
[1] [2] [3]
| Catalog
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]