@marove ich bin auf @torproject / #TorBrowser migriert...
Weil ich hab' keine Lust auf #Tracking und shice - #Tor ist nen #Qualitätsfilter!
@marove ich bin auf @torproject / #TorBrowser migriert...
Weil ich hab' keine Lust auf #Tracking und shice - #Tor ist nen #Qualitätsfilter!
@koenvh #FunFact: THIS is actually real when it comes to #OnionServices on #Tor / @torproject despite (or rather because of) having a self-routing and self-administrating, self-authentificating namespace utilizing #Pubkeys for addressing.
Mine merely covers a few #BonaFide ones and there are literal #scam businesses when it comes to the kinds of sites I won't name nor list!
@evangreer @fightforthefuture.org @bsky.app @guardianproject @internetarchive @torproject @signalapp @session @simplex @freedomofpress @eff @privacysafe #PrivacySafe Locker: Secure file #sharing that disappears.
Upload a file or paste a long text memo — and share it for 24 hours before it self-destructs.
Built to be forgotten and, like PrivacySafe Link, you can use it with #Tor @torproject for max #privacy. https://bitsontape.com/p/email-files-privacysafe-locker
@evangreer @fightforthefuture.org @bsky.app @guardianproject Save (by OpenArchive): Preserve your media.
Send photos, videos, or #audio to @internetarchive and archive over #Tor @torproject . Metadata is added by you, *not* your phone. Evidence is vital for protection — please try to balance that with personal #privacy
https://guardianproject.info/apps/net.opendasharchive.openarchive.release/
@JessTheUnstill @bohwaz @punkfairie @ajsadauskas @tomiahonen @fuchsiii
Granted, @tails_live @tails / #Tails and @torproject / #TorBrowser are propably one of the best & most battle-tested options that are useable for #TechIlliterates...
THAT'S NOT GOING TO HAPPEN!
If not for being absurd then for the fact that people need to get things done!
So you can imagine how glad I was when @thunderbird merged #Enigmail into #Thunderbird so there's no more fiddling around getting #PGP/MIME to work!
@JessTheUnstill @bohwaz @punkfairie @ajsadauskas @tomiahonen @fuchsiii Exactly...
Coincidentially, that's why #Android (and #iOS) doesn't let users have #root access because billions of devices owned by mostly "#TechIlliterates" that hardly get #SecurityUpdates would be an even bigger risk if they didn't boot a locked-down #ROM image, thus only allowing for #malware in user-privilegued userspace!
Cuz having a mobile OS that shoves everything through #Tor and only allows #userspace-Apps in the form modern web technologies would be a big #security and #privacy gain.
This is undoubtedly the most promising Post-Quantum TLS deployment situation I have seen for #Tor since we started discussing it more actively in the team. Very exciting!
I hope that OpenSSL 3.5, when released, will make it into #Debian Trixie. That would make deployment of this so much more snappy and easy for the Tor network to upgrade, but that may be dreaming. The timelines here look quite difficult for that to happen, but let's hope.
OpenSSL, unlike BoringSSL, did not require us to make any additions to our codebase (BoringSSL required the PQ-KEM to be enabled explicitly via a function call): the ML-KEM is enabled by default, which will do wonders for adoption as OpenSSL 3.5 gets bundled in more and more OS distributions over time.
However, we did need to modify #Tor slightly to be less conservative with which TLS cipher suites it is willing to use. I will talk with the team about what we do here to get this fixed soon.
Trying out the Post-Quantum TLS feature (called ML-KEM) in #OpenSSL 3.5-beta1 and #Tor was a success!
The experiment is using the same setup as we did with #BoringSSL back when they enabled the Kyber768/x25519 TLS 1.3 group: we use a Tor binary, compiled against a PQC-enabled lib(ssl|crypto), to run a Bridge Server locally and connect a local Bridge Client to the server.
The branch used for this experiment is available from https://gitlab.torproject.org/ahf/tor/-/commits/ahf/openssl-3.5-pqc-experiments
RUSSIA LOSING CONTROL IN CRIMEA: PRECISION DRONE ATTACKS ON RUSSIAN ARMY
by #AnnafromUkraine
10:48
https://www.youtube.com/watch?v=LhiNzu84oS0
GUR continues to demilitarize the occupiers in #Crimea, drones hit: #BK-16 landing craft, #Raptor patrol boat, #TOR-M2 air defense system.
Anna Danylchuk, professor of linguistics at Volyn National University in Lutsk, vlogs every day giving a perspective of an Ukrainian from inside war-torn #Ukraine
Exit relays in tribute to Lunar are online! <3
See our announcement here
https://nos-oignons.net/Actualit%C3%A9s/20250320_lunar_en_ligne
cc @torproject
Les relais de sortie en hommage à Lunar sont en ligne ! <3
Consultez notre annonce ici https://nos-oignons.net/Actualit%C3%A9s/20250320_lunar_en_ligne
cc @torproject
»Unsicherheit – US-Kürzungsrausch gefährdet für das Internet wichtige Open-Source-Projekte:
Die neue US-Regierung entzieht dem Open Technology Fund (OTF) die Mittel. Von diesem sind unter anderem @letsencrypt, @torproject und @fdroidorg finanziell abhängig. Der OTF hat Klage eingereicht«
Sehr heikel und es petrifft, wenn auch "nur" indirekt, alle Menschen auf der Erde. Der Egoismus eines Irren kann uns alle betreffen!
Reblog.
#Trump ha interrotto i fondi destinati all’Open Technology Fund, un ente che da oltre un decennio finanzia strumenti digitali per la libertà online.
Questi fondi rappresentano la quasi totalità del budget dell'#OTF e sono essenziali per il sostegno di numerosi progetti, tra cui #Let'sEncrypt, la rete di anonimizzazione #Tor e il negozio di applicazioni open-source #F-Droid, che l’anno scorso hanno ricevuto rispettivamente 800mila, 500mila e 396mila dollari.
It sounds like #Tor has lost OTF funding again. I didn't know it had regained OTF funding after the first time.
Obviously if you're trying to set up a dictatorship you don't want anyone communicating privately.