Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit here or GitHub Ξ
Ξ If you're looking for tutorials/guides, check out the new https://cryptostorm.is/#section6 Ξ
To stay ahead of new and evolving threats, cryptostorm has always looked out past standard network security tools. Here, we discuss and fine-tune our work in bringing newly-created capabilities and newly-discovered knowledge to bear as we keep cryptostorm in the forefront of tomorrow's network security landscape.
- Posts: 1492
- Joined: Sun Dec 16, 2012 6:34 am
This is pretty interesting stuff keybase is doing with Tor...http://fncuwbiisyh6ak3i.onion/docs/command_line/tor
I wonder if there's not a much wider applicability to this sort of layered-security model in the context of network events that need to be able to take place surreptitiously in a hostile LAN/WAN context...
Return to “cryptostorm reborn: voodoo networking, stormtokens, PostVPN exotic netsecurity”
Who is online
Users browsing this forum: No registered users and 6 guests