Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
∞ take a peek at our legendary cryptostorm_is twitter feed if you're into that kind of thing ∞
Ξ we're rolling out voodoo network security across cryptostorm - big things happening, indeed! Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit GitHub Ξ

CGIProxy

To stay ahead of new and evolving threats, cryptostorm has always looked out past standard network security tools. Here, we discuss and fine-tune our work in bringing newly-created capabilities and newly-discovered knowledge to bear as we keep cryptostorm in the forefront of tomorrow's network security landscape.

Topic Author
subatomic
Posts: 2
Joined: Sat Jan 16, 2016 12:24 pm

CGIProxy

Postby subatomic » Sat Jan 16, 2016 2:12 pm

I mentioned this in a request to CStorm support but also thought I would post it here to see what the rest of yous thought.

For a long time I used [redacted] as a VPN service, but I've come to believe their service is likely compromised and my online activity was being linked to their IPs (hence my departure). [Redacted] offered, in addition to VPN, CGI proxies on all it's exit nodes. This allowed one to both make an additional hop with additional encryption and to allow varying levels of filtering on the web service/content (cookies, scripts, ads, referrer) before it ever got to your browser. It also allowed on-the-fly tunneling from foreign machines where installing a VPN client might not be feasible (libraries, hotels, etc.) This I loved. It wasn't perfect, and it broke some pages, but it made for an (idealistically) more secure and anonymous (and sometimes faster) session. One could, of course, use any number of free proxy servers or use one of the proxies Torguard offers, but the whole point here is trust, both technically and philosophically.

http://www.jmarshal.com/tools/cgiproxy

I want cryptostorm to do the same thing, only better. Imagine a firewall, of sorts, that could (also) actively examine and filter out web traffic for cutting-edge attacks and/or malware -- things the CS team deemed 'the most dangerous' for it's users at any given time-frame.

I'd use it.

Return to “cryptostorm reborn: voodoo networking, stormtokens, PostVPN exotic netsecurity”

Who is online

Users browsing this forum: No registered users and 1 guest

cron

Login