Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit here or GitHub Ξ
Ξ If you're looking for tutorials/guides, check out the new https://cryptostorm.is/#section6 Ξ

Search found 8 matches

by killswitch
Sat Aug 15, 2015 10:21 pm
Forum: general chat, suggestions, industry news
Topic: The Adversary Spectrum
Replies: 0
Views: 13935

The Adversary Spectrum

People begin taking an interest in security when they get sick of their browsers not doing what they want. Then comes a VPN, then maybe the Tor browser bundle, and finally, if they are technically literate, they may partially set aside Windows or OSX, and move to VMs running under VirtualBox. The so...
by killswitch
Sun Jul 26, 2015 3:05 pm
Forum: #cleanVPN ∴ encouraging transparency & clean code in network privacy service
Topic: Understanding Adversary Resistant Networking
Replies: 0
Views: 15835

Understanding Adversary Resistant Networking

There are a variety of bad things that can happen when an adversary can connect a public IP address to your online activities. This can range from the bratty kid next door pranking you, to the MPAA suing you for downloading a movie, to intelligence agency or law enforcement attention. There are a nu...
by killswitch
Sat Jul 25, 2015 5:26 am
Forum: cryptostorm reborn: voodoo networking, stormtokens, PostVPN exotic netsecurity
Topic: Quad VPN & the snake oil of "multi-hop" VPNs
Replies: 4
Views: 21245

Re: Quad VPN & the snake oil of "multi-hop" VPNs

Looping VPN sessions through two concentrators owned by the same provider might provide advantage in some situations, but depending on implementation. But the tunnel in a tunnel setup between two nodes owned by the same operator is just begging for attention from NSA's TURBULENCE system. VPN within ...
by killswitch
Fri Jul 24, 2015 10:04 pm
Forum: cryptostorm in-depth: announcements, how it works, what it is
Topic: Creating Adversary Resistant Networking Configurations
Replies: 1
Views: 10180

Creating Adversary Resistant Networking Configurations

There are two schools of thought regarding Adversary Resistant Networking, one depends on application level proxies, the other on fail closed VPN configurations. Tor offers a SOCKS5 port, usually 127.0.0.1:9050 if you're running Tor locally, or port 9100 on a nearby machine if you're splitting gatew...
by killswitch
Fri Jul 24, 2015 1:57 pm
Forum: cryptostorm in-depth: announcements, how it works, what it is
Topic: Selecting An Adversary Resistant Computing Solution
Replies: 0
Views: 14875

Selecting An Adversary Resistant Computing Solution

The Cryptostorm desktop OS demographic in some ways mirrors the real world's Windows/Mac/Linux division, but Mac/Linux are more prevalent, at least among those who visit the #cryptostorm IRC channel. A portion of these subscribers reveal, after some discussion, that they truly need an adversary resi...
by killswitch
Fri Jul 24, 2015 12:08 pm
Forum: #cleanVPN ∴ encouraging transparency & clean code in network privacy service
Topic: Adversary Resistant Systems
Replies: 4
Views: 11203

Re: Adversary Resistant Systems

Cryptostorm is a marvel, but it's like a remote alpine valley - there is a huge learning curve to climb before one has enough background to read the content with any confidence that they're absorbing the details. This is great as a first cause, as an incubator for such thinking, but imagine how this...
by killswitch
Thu Jul 23, 2015 9:51 am
Forum: #cleanVPN ∴ encouraging transparency & clean code in network privacy service
Topic: Adversary Resistant Systems
Replies: 4
Views: 11203

Re: Adversary Resistant Systems

Technically correct, parityboy, and there are places where defining Adversary Resistant Networking will get deep, but this is part of an overall effort to lay claim to and properly define the terms Adversary Resistant Computing, Hosting, and Networking. I imagine there will be a couple of posts a we...
by killswitch
Wed Jul 22, 2015 9:34 pm
Forum: #cleanVPN ∴ encouraging transparency & clean code in network privacy service
Topic: Adversary Resistant Systems
Replies: 4
Views: 11203

Adversary Resistant Systems

The world has been shaken in 2015. First the Office of Personnel Management lost everything it had on four million Americans with security clearances. Then Italy's Hacking Team lost control of the entire contents of their corporate systems. Then in quick succession NYSE and United Airlines were down...

Go to advanced search

Nothing to display.

Login