Security

Secure Messenger

Password Managers

:::caution

LastPass security issuesarrow-up-right - Wikipedia

:::

Alternate Networks

  • I2Parrow-up-right - I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.

  • Zeronetarrow-up-right - Open, free and uncensorable websites, using Bitcoin cryptography and BitTorrent network.

  • Lokiarrow-up-right - Lokinet is an anonymous, decentralized and IP based overlay network for the internet.

  • SILOarrow-up-right - Offers complete privacy across the network (work in progress project in cooperationship with Loki).

  • IPFSarrow-up-right - A peer-to-peer hypermedia protocol designed to make the web faster, safer, and more open.

  • Yggdrasilarrow-up-right - Makes use of a global spanning tree to form a scalable IPv6 encrypted mesh network.

  • cjdnsarrow-up-right - Cjdns (Caleb James DeLisle's Network Suite) - is a networking protocol and reference implementation, founded on the ideology that networks should be easy to set up.

  • Freenetarrow-up-right - Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) - and chat on forums, without fear of censorship.

  • GnUNetarrow-up-right - GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services.

  • Psiphonarrow-up-right - Run your own server, invite your friends, build a community, provide free and unfiltered Internet access to the world.

  • Scuttlebuttarrow-up-right - A decentralised secure gossip platform that aims to harmonize four perspectives of life: Environment reflecting Technology reflecting Community reflecting Society.

Tor

  • Torarrow-up-right - Tor is free software and an open network that helps you defend against traffic analysis.

:::caution

I'm not responsible for the links, domains, it's content or if the provided .onion links are really the ones advertised. It's impossible for me as individual person to check every single page every second and monitor it's content.

Also be very carefull of scams. you can find the links to some scam sites on torss7t3bxd3qsxn.onionarrow-up-right

:::

:::note Something to consider

Judge Recommends to Deny Summary Judgment Against Tor Exit Node Operator in Piracy Casearrow-up-right - TorrentFreak

:::

:::caution

Bittorrent over Tor isn't a good ideaarrow-up-right - Tor Blog

:::

:::info If you suspect your access to the Tor network is being blocked, you may want to use bridges.

You can get latest Tor bridges from bridges.torproject.orgarrow-up-right

:::

:::tip

Just replace .onion with .onion.ws or any other domain made available by volounteers Tor2webarrow-up-right operators.

Example: http://archivecaslytosk.onion/ => http://archivecaslytosk.onion.ws/

This connects you with Tor2web, which then talks to the onion service via Tor and relays the response back to you.

WARNING: Tor2web only protects publishers, not readers. As a reader installing Tor Browser will give you much greater anonymity than using Tor2web. Using Tor2web trades off security for convenience and usability.

:::

Web Archive

Misc

P2P Networks

Router Firewalls

Antivirus

:::tip Overall Strategy

  • Diversify your analysis approach.

  • Don't rely on the results from a single tool.

  • Run everything with as few privileges as necessary.

  • APT investigations must be seperated from commodity malware, otherwise you give malware authors "ideas".

  • Treat everything like it could be malicious until you have enough evidence to suggest otherwise.

:::

VirusTotal alternatives

Virtualisation

  • FireJailarrow-up-right - Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf.

  • FlatPakarrow-up-right - Standalone apps for Linux are here!

  • KVMarrow-up-right - KVM (for Kernel-based Virtual Machine) - is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V).

  • Sandboxiearrow-up-right - Install and run programs in a virtual sandbox (software based) - environment without writing to the hard drive itself.

  • Virtualboxarrow-up-right - VirtualBox is a general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use.

  • VMWarearrow-up-right - (paid) - Closed source, but maybe the most reliable and used program for creating/booting up a virtual machine.

Checksum verification

Last updated