Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
∞ take a peek at our legendary cryptostorm_is twitter feed if you're into that kind of thing ∞
Ξ we're rolling out voodoo network security across cryptostorm - big things happening, indeed! Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit GitHub Ξ
Ξ We've updated our CA certificate. All members need to be using the latest ones by Dec 22. See this page for more infoΞ
To stay ahead of new and evolving threats, cryptostorm has always looked out past standard network security tools. Here, we discuss and fine-tune our work in bringing newly-created capabilities and newly-discovered knowledge to bear as we keep cryptostorm in the forefront of tomorrow's network security landscape.
- Posts: 1492
- Joined: Sun Dec 16, 2012 6:34 am
This is pretty interesting stuff keybase is doing with Tor...http://fncuwbiisyh6ak3i.onion/docs/command_line/tor
I wonder if there's not a much wider applicability to this sort of layered-security model in the context of network events that need to be able to take place surreptitiously in a hostile LAN/WAN context...
Return to “cryptostorm reborn: voodoo networking, stormtokens, PostVPN exotic netsecurity”
Who is online
Users browsing this forum: No registered users and 6 guests