The post details the design of a custom binary format for SARE-encrypted files, emphasizing the need for a simple, self-contained structure that supports hybrid cryptography and optional signatures. The author explains the layout ...
The blog post discusses the author's project, the Sare Project, which aims to create a hybrid post-quantum encryption library as a replacement for GPG. The author reflects on their previous work, explaining the design choices made...
The article discusses Iran's National Information Network (NIN), a state-controlled intranet designed to maintain domestic services during internet blackouts. It explains how the NIN allows selective blackouts of international pla...
The post discusses Haraka Hash, an AES-based permutation designed for high throughput on modern CPUs, contrasting it with traditional hash functions like SHA-256. It highlights Haraka's advantages in cryptographic applications, pa...
The blog post discusses the potential threat of a 51% attack on Monero by a mining pool called Qubic. A 51% attack allows a miner or pool to control the network, enabling them to double spend transactions and censor others. Monero...
The text discusses the concept of digital autonomism, emphasizing the potential for personal autonomy through technology. It highlights the idea of breaking free from external controls and taking control over our own lives, financ...
The text discusses the privacy and security issues with Telegram, and introduces a client called 'Partisan Telegram' that aims to address these issues. It explains how Partisan Telegram works, its features, and the security measur...
The text discusses how Monero fulfills Satoshi's promise of electronic cash, contrasting it with Bitcoin and other cryptocurrencies. It explains Monero's untraceability, its technologies like ring signatures, RingCT, stealth addre...
The post discusses the technical aspects of Bitmessage, a peer-to-peer and decentralized email-like service. It explores the features, encryption methods, and protocols used in Bitmessage, as well as its vulnerabilities and potent...
The author developed a multi-algorithm simple Proof of Work library in Rust to handle any data and verify any data using it. The library is expandable and general-purpose, not tied to a specific blockchain. It is meant for prevent...
The text discusses the lack of security in sessions and how it can be exploited in a CTF. It provides a code example and suggests methods to prevent such problems, such as storing an identifying key in the session instead of the a...
The text is a guide for those living under heavy internet censorship and restrictions who want to host their own censorship circumvention tools and services to access the free internet. It explains how to host VPN and Proxy servic...
The post discusses the methods used by governments to detect and block internet traffic, including IP blocking, DNS spoofing, protocol blocking, packet filtering, deep packet inspection, and active probing. It also provides inform...
The author shares the process of creating a portable USB stick for ZeroNet to sync data between Linux machines without using a third-party server. The process involves wiping the USB stick, encrypting it using LUKS2, setting up a ...
The author shares their experience of working on a CTF challenge from 247CTF.com, explaining why using ECB mode for encryption with block ciphers like AES or Twofish isn't a good idea. They provide the source code and discuss the ...
The text is a guide to maintaining security, privacy, and anonymity on ZeroNet. It covers topics such as browser security, traffic encryption, using Tor, protecting identity, and achieving anonymity. The guide is divided into thre...
The blog post provides a comprehensive understanding of ZeroNet, a decentralized and peer-to-peer network created in 2015. It discusses the technologies used, the resistance to censorship, anonymity for users, peer discovery metho...
The text discusses the use of SSH protocol to bypass internet censorship, focusing on dynamic port forwarding. It provides detailed instructions on setting up SSH, creating users, modifying SSHD, and enhancing security. It also ex...
The author discusses the problems with rbash and the need to create a black hole shell to restrict user access. They explain the process of creating the shell using the Rust programming language and the ctrlc crate. The author als...
The post highlights the unique features and technologies of the cryptocurrency VerusCoin, including its focus on privacy, security, the Verus Vault feature, and its scalability through PBaaS. It compares VerusCoin to Ethereum and ...
The text discusses the development of a CLI application in Rust to retrieve bridges from the BridgeDB website, eliminating the need to open a browser. It explains the process of setting up the binary crate, implementing the librar...
The text discusses simple ways to increase privacy and security online, including using a password manager, being cautious with VPNs, encrypting devices, and changing apps and services. The author emphasizes the importance of prot...
The text discusses the concept of crypto anarchy, which allows individuals and groups to communicate and interact anonymously using computer technology. It explores the potential impact on government regulation, economic interacti...