home.social

#censorshipresistance — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #censorshipresistance, aggregated by home.social.

  1. Nostr: Decentralised Social Protocol

    Learn what Nostr is, how relays and public keys work, why it matters for free speech, and where it fits in the decentralised web.

    beitmenotyou.online/nostr-dece

  2. Nostr: Decentralised Social Protocol

    Learn what Nostr is, how relays and public keys work, why it matters for free speech, and where it fits in the decentralised web.

    beitmenotyou.online/nostr-dece

  3. Tor Privacy and Resilience

    Online privacy should be the default expectation for internet users, challenging the notion that constant surveillance is either necessary or justified. Many people first hear about Tor from dramatic news stories. These stories highlight the most controversial parts, making Tor seem like an entry point to the "dark web" or linking it mainly to crime. Words such as "dark web," "criminal sites," "hidden services," and "anonymous networks" are common, which can make Tor sound suspicious or […]

    beitmenotyou.online/tor-privac

  4. Tor Privacy and Resilience

    Online privacy should be the default expectation for internet users, challenging the notion that constant surveillance is either necessary or justified. Many people first hear about Tor from dramatic news stories. These stories highlight the most controversial parts, making Tor seem like an entry point to the "dark web" or linking it mainly to crime. Words such as "dark web," "criminal sites," "hidden services," and "anonymous networks" are common, which can make Tor sound suspicious or […]

    beitmenotyou.online/tor-privac

  5. ICYMI — this piece still holds up:
    Messaging that works offline, encrypted end-to-end, and resists censorship isn’t just a “tech curiosity.” In an era of network uncertainty and platform centralization, resilient communication matters for activists, journalists, teams in restrictive environments, and anyone who values autonomy.
    Revisit our breakdown here:
    👉 medium.com/@biytelum/offline-e
    #Privacy #Messaging #CensorshipResistance

  6. 🦋 Plus loin que la vidéo : Le Social (5/6)

    La vidéo n'est qu'une brique. L'objectif est de remplacer tout l'écosystème fermé.
    Nous avons connecté Coracle (alternative décentralisée à Twitter/Facebook) à cette infrastructure.

    Contrairement aux applis Web2, Coracle vous permet de dialoguer dans un espace relié à votre "Web of Trust" (WoT). Pas d'algo opaque, juste la synchro N².

    Testez le social ici : coracle.copylaradio.com

    #SocialMedia #Fediverse #Privacy #CensorshipResistance

  7. #Security #GrapheneOS #MollyIM #VPN #ActivistSafety #CensorshipResistance #DigitalRights 1/6 #thread

    www.molly.im Signal-Fork on GrapheneOS combined with a good VPN offers a powerful privacy and security solution, making it an excellent choice for activists and anyone highly targeted.

  8. #Ethereum’s influence on #WallStreet is evident at the Ethereum Community Conference (#EthCC) in Cannes, where institutional giants are building atop its infrastructure: Ethereum’s #stability, #security, and #censorshipresistance are valued by institutions, solidifying its position as the #backbone of #tokenisedfinance. cnbc.com/2025/07/04/the-ethcc- #tech #media #news

  9. И да! Если абстрагироваться от персоналий:

    Мысли следующие:
    **Очередной звоночек** – даже если это действительно было недоразумение, сам факт отключения показывает уязвимость централизованных точек, таких как сайт. Сегодня ошибка провайдера, а завтра – целенаправленная атака, и пользователи без приложений останутся за бортом.
    **Подтверждение децентрализации** – если бы зависела только от сайта, то всё бы рухнуло. Но приложения продолжали работать, что подтверждает саму идею Бастиона – децентрализация и отказоустойчивость.
    **Проблема с массовым восприятием** – большинство пользователей воспринимают сайт как основной ресурс. Даже сам пост сделан через *bastyon.com*, что говорит о том, что значительная часть аудитории использует именно веб-версию. Значит, стоит усиливать информирование о приложениях и их преимуществах.
    **Проблема доступности приложений** – когда сайт не работает, новому пользователю взять приложение неоткуда. Нужны зеркала, децентрализованные источники распространения (IPFS, торренты, P2P), а также информирование пользователей, чтобы заранее устанавливали приложения.
    **Анонс обновлений** – интригует, но было бы неплохо конкретизировать, что за функционал готовится для Покеткойна и Бастиона. Иначе звучит как типичный маркетинговый тизер без деталей.
    В целом, ситуация – ещё одно напоминание, что полагаться на централизованные элементы в децентрализованном проекте – рискованно.

    **Библиография:**
    Andreas M. Antonopoulos, *Mastering Bitcoin: Unlocking Digital Cryptocurrencies* (2017).
    Gavin Wood, *Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform* (2014).
    Tim Berners-Lee, *Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web* (1999).
    Misha Glenny, *McMafia: A Journey Through the Global Criminal Underworld* (2008).
    Ethan Zuckerman, *Rewire: Digital Cosmopolitans in the Age of Connection* (2013).
    **Хэштеги:**
    #Bastyon #Decentralization #DigitalFreedom #Blockchain #DecentralizedApps #CensorshipResistance #Web3 #InternetFreedom #TechNews #Crypto #Pocketcoin #privacy

    matrix.to/#/!vFghCaGskTTqrJizg

  10. И да! Если абстрагироваться от персоналий:

    Мысли следующие:
    **Очередной звоночек** – даже если это действительно было недоразумение, сам факт отключения показывает уязвимость централизованных точек, таких как сайт. Сегодня ошибка провайдера, а завтра – целенаправленная атака, и пользователи без приложений останутся за бортом.
    **Подтверждение децентрализации** – если бы зависела только от сайта, то всё бы рухнуло. Но приложения продолжали работать, что подтверждает саму идею Бастиона – децентрализация и отказоустойчивость.
    **Проблема с массовым восприятием** – большинство пользователей воспринимают сайт как основной ресурс. Даже сам пост сделан через *bastyon.com*, что говорит о том, что значительная часть аудитории использует именно веб-версию. Значит, стоит усиливать информирование о приложениях и их преимуществах.
    **Проблема доступности приложений** – когда сайт не работает, новому пользователю взять приложение неоткуда. Нужны зеркала, децентрализованные источники распространения (IPFS, торренты, P2P), а также информирование пользователей, чтобы заранее устанавливали приложения.
    **Анонс обновлений** – интригует, но было бы неплохо конкретизировать, что за функционал готовится для Покеткойна и Бастиона. Иначе звучит как типичный маркетинговый тизер без деталей.
    В целом, ситуация – ещё одно напоминание, что полагаться на централизованные элементы в децентрализованном проекте – рискованно.

    **Библиография:**
    Andreas M. Antonopoulos, *Mastering Bitcoin: Unlocking Digital Cryptocurrencies* (2017).
    Gavin Wood, *Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform* (2014).
    Tim Berners-Lee, *Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web* (1999).
    Misha Glenny, *McMafia: A Journey Through the Global Criminal Underworld* (2008).
    Ethan Zuckerman, *Rewire: Digital Cosmopolitans in the Age of Connection* (2013).
    **Хэштеги:**
    #Bastyon #Decentralization #DigitalFreedom #Blockchain #DecentralizedApps #CensorshipResistance #Web3 #InternetFreedom #TechNews #Crypto #Pocketcoin #privacy

    matrix.to/#/!vFghCaGskTTqrJizg

  11. И да! Если абстрагироваться от персоналий:

    Мысли следующие:
    **Очередной звоночек** – даже если это действительно было недоразумение, сам факт отключения показывает уязвимость централизованных точек, таких как сайт. Сегодня ошибка провайдера, а завтра – целенаправленная атака, и пользователи без приложений останутся за бортом.
    **Подтверждение децентрализации** – если бы зависела только от сайта, то всё бы рухнуло. Но приложения продолжали работать, что подтверждает саму идею Бастиона – децентрализация и отказоустойчивость.
    **Проблема с массовым восприятием** – большинство пользователей воспринимают сайт как основной ресурс. Даже сам пост сделан через *bastyon.com*, что говорит о том, что значительная часть аудитории использует именно веб-версию. Значит, стоит усиливать информирование о приложениях и их преимуществах.
    **Проблема доступности приложений** – когда сайт не работает, новому пользователю взять приложение неоткуда. Нужны зеркала, децентрализованные источники распространения (IPFS, торренты, P2P), а также информирование пользователей, чтобы заранее устанавливали приложения.
    **Анонс обновлений** – интригует, но было бы неплохо конкретизировать, что за функционал готовится для Покеткойна и Бастиона. Иначе звучит как типичный маркетинговый тизер без деталей.
    В целом, ситуация – ещё одно напоминание, что полагаться на централизованные элементы в децентрализованном проекте – рискованно.

    **Библиография:**
    Andreas M. Antonopoulos, *Mastering Bitcoin: Unlocking Digital Cryptocurrencies* (2017).
    Gavin Wood, *Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform* (2014).
    Tim Berners-Lee, *Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web* (1999).
    Misha Glenny, *McMafia: A Journey Through the Global Criminal Underworld* (2008).
    Ethan Zuckerman, *Rewire: Digital Cosmopolitans in the Age of Connection* (2013).
    **Хэштеги:**
    #Bastyon #Decentralization #DigitalFreedom #Blockchain #DecentralizedApps #CensorshipResistance #Web3 #InternetFreedom #TechNews #Crypto #Pocketcoin #privacy

    matrix.to/#/!vFghCaGskTTqrJizg

  12. И да! Если абстрагироваться от персоналий:

    Мысли следующие:
    **Очередной звоночек** – даже если это действительно было недоразумение, сам факт отключения показывает уязвимость централизованных точек, таких как сайт. Сегодня ошибка провайдера, а завтра – целенаправленная атака, и пользователи без приложений останутся за бортом.
    **Подтверждение децентрализации** – если бы зависела только от сайта, то всё бы рухнуло. Но приложения продолжали работать, что подтверждает саму идею Бастиона – децентрализация и отказоустойчивость.
    **Проблема с массовым восприятием** – большинство пользователей воспринимают сайт как основной ресурс. Даже сам пост сделан через *bastyon.com*, что говорит о том, что значительная часть аудитории использует именно веб-версию. Значит, стоит усиливать информирование о приложениях и их преимуществах.
    **Проблема доступности приложений** – когда сайт не работает, новому пользователю взять приложение неоткуда. Нужны зеркала, децентрализованные источники распространения (IPFS, торренты, P2P), а также информирование пользователей, чтобы заранее устанавливали приложения.
    **Анонс обновлений** – интригует, но было бы неплохо конкретизировать, что за функционал готовится для Покеткойна и Бастиона. Иначе звучит как типичный маркетинговый тизер без деталей.
    В целом, ситуация – ещё одно напоминание, что полагаться на централизованные элементы в децентрализованном проекте – рискованно.

    **Библиография:**
    Andreas M. Antonopoulos, *Mastering Bitcoin: Unlocking Digital Cryptocurrencies* (2017).
    Gavin Wood, *Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform* (2014).
    Tim Berners-Lee, *Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web* (1999).
    Misha Glenny, *McMafia: A Journey Through the Global Criminal Underworld* (2008).
    Ethan Zuckerman, *Rewire: Digital Cosmopolitans in the Age of Connection* (2013).
    **Хэштеги:**
    #Bastyon #Decentralization #DigitalFreedom #Blockchain #DecentralizedApps #CensorshipResistance #Web3 #InternetFreedom #TechNews #Crypto #Pocketcoin #privacy

    matrix.to/#/!vFghCaGskTTqrJizg

  13. Check out Paskoocheh, the ultimate marketplace for Iranians seeking to bypass censorship and enhance online privacy! 🌐✨ Launched in 2016, this app store has facilitated over 7 million downloads, empowering users with essential tools for secure communication and information access. Together with developers, Paskoocheh fosters a resilient digital ecosystem. 💪🔒 #Paskoocheh #InternetFreedom #CensorshipResistance asl19.org/en/projects/paskooch

  14. It seems that #Firefox-based browsers will have to publicly state their positions like what they will do if will get such smelly request like what #Mozilla
    received.
    #Censorship #CensorshipResistance

  15. CW: research review

    J. Vilalonga et al., "TorKameleon: Improving Tor's Censorship Resistance With K-anonimization and Media-based Covert Channels"¹

    The use of anonymity networks such as Tor and similar tools can greatly enhance the privacy and anonymity of online communications. Tor, in particular, is currently the most widely used system for ensuring anonymity on the Internet. However, recent research has shown that Tor is vulnerable to correlation attacks carried out by state-level adversaries or colluding Internet censors. Therefore, new and more effective solutions emerged to protect online anonymity. Promising results have been achieved by implementing covert channels based on media traffic in modern anonymization systems, which have proven to be a reliable and practical approach to defend against powerful traffic correlation attacks. In this paper, we present TorKameleon, a censorship evasion solution that better protects Tor users from powerful traffic correlation attacks carried out by state-level adversaries. TorKameleon can be used either as a fully integrated Tor pluggable transport or as a standalone anonymization system that uses K-anonymization and encapsulation of user traffic in covert media channels. Our main goal is to protect users from machine and deep learning correlation attacks on anonymization networks like Tor. We have developed the TorKameleon prototype and performed extensive validations to verify the accuracy and experimental performance of the proposed solution in the Tor environment, including state-of-the-art active correlation attacks. As far as we know, we are the first to develop and study a system that uses both anonymization mechanisms described above against active correlation attacks.

    #arXiv #ResearchPapers #TorKameleon #Tor #CensorshipResistance #Privacy #CovertChannels
    __
    ¹ arxiv.org/abs/2303.17544

  16. Hello, fediverse!

    We publish the academic open access journal Proceedings on Privacy Enhancing Technologies and host the annual Privacy Enhancing Technologies Symposium. We are a top research venue dedicated to novel applied and theoretical research into the design, analysis, experimentation, and fielding of privacy-enhancing technologies.

    This account will mostly be for announcements about deadlines and events, but we'll also boost posts from our authors about their research, so follow along to learn about cool privacy things.

    Please consider boosting so your pals can find us, too!

    #privacy #tech #privacyTech #surveillance #anonymousCommunication #differentialPrivacy #censorshipResistance #dataProtection #HCI #trafficAnalysis #MLPrivacy #genomicPrivacy
    #Introductions #TwitterMigration

  17. This may sound controversial but…

    For suppressed people who value basic #digitalSovereignity, knowing that almost all #banks in #Australia are being man-in-the-middled (#MitMd) by the likes of #Amazon, CloudFlare et al. We propose a weirdly radical solution…

    Start using #cheques.

    Call the bank and ask for a #chequeBook. The current #MitM attackers cannot stop us from paying with a cheque and we can sign with a message of our choosing. *wink

    #censorshipResistance #cloudFlare #stopCAGEMAFIA

  18. CW: research review

    The papers for this review:

    * "Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale"
    * "HyPFuzz: Formal-Assisted Processor Fuzzing"
    * "FPGA-Patch: Mitigating Remote Side-Channel Attacks on FPGAs using Dynamic Patch Generation"
    * "30 Years of Synthetic Data"
    * "On the Limits of Cross-Authentication Checks for GNSS Signals"
    * "New Ways to Garble Arithmetic Circuits"
    * "Exploration of Quantum Computer Power Side-Channels"
    * "Side-Channel Analysis of Integrate-and-Fire Neurons within Spiking Neural Networks"
    * "Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories"
    * "Multi-step Jailbreaking Privacy Attacks on ChatGPT"
    * "Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country"

    #IACR #arXiv #ResearchPapers #TLS #Fuzzing #FPGA #SideChannelAttacks #SyntheticData #GNSS #GPS #GarbledCircuits #QuantumComputers #PowerSideChannelAttacks #NeuralNetworks #SpikingNeuralNetworks #ChatBots #ChatGPT #CensorshipResistance

  19. CW: research review

    J. Vilalonga et al., "TorKameleon: Improving Tor's Censorship Resistance With K-anonimization and Media-based Covert Channels"¹

    The use of anonymity networks such as Tor and similar tools can greatly enhance the privacy and anonymity of online communications. Tor, in particular, is currently the most widely used system for ensuring anonymity on the Internet. However, recent research has shown that Tor is vulnerable to correlation attacks carried out by state-level adversaries or colluding Internet censors. Therefore, new and more effective solutions emerged to protect online anonymity. Promising results have been achieved by implementing covert channels based on media traffic in modern anonymization systems, which have proven to be a reliable and practical approach to defend against powerful traffic correlation attacks. In this paper, we present TorKameleon, a censorship evasion solution that better protects Tor users from powerful traffic correlation attacks carried out by state-level adversaries. TorKameleon can be used either as a fully integrated Tor pluggable transport or as a standalone anonymization system that uses K-anonymization and encapsulation of user traffic in covert media channels. Our main goal is to protect users from machine and deep learning correlation attacks on anonymization networks like Tor. We have developed the TorKameleon prototype and performed extensive validations to verify the accuracy and experimental performance of the proposed solution in the Tor environment, including state-of-the-art active correlation attacks. As far as we know, we are the first to develop and study a system that uses both anonymization mechanisms described above against active correlation attacks.

    #arXiv #ResearchPapers #TorKameleon #Tor #CensorshipResistance #Privacy #CovertChannels
    __
    ¹ arxiv.org/abs/2303.17544

  20. CW: research review

    J. Vilalonga et al., "TorKameleon: Improving Tor's Censorship Resistance With K-anonimization and Media-based Covert Channels"¹

    The use of anonymity networks such as Tor and similar tools can greatly enhance the privacy and anonymity of online communications. Tor, in particular, is currently the most widely used system for ensuring anonymity on the Internet. However, recent research has shown that Tor is vulnerable to correlation attacks carried out by state-level adversaries or colluding Internet censors. Therefore, new and more effective solutions emerged to protect online anonymity. Promising results have been achieved by implementing covert channels based on media traffic in modern anonymization systems, which have proven to be a reliable and practical approach to defend against powerful traffic correlation attacks. In this paper, we present TorKameleon, a censorship evasion solution that better protects Tor users from powerful traffic correlation attacks carried out by state-level adversaries. TorKameleon can be used either as a fully integrated Tor pluggable transport or as a standalone anonymization system that uses K-anonymization and encapsulation of user traffic in covert media channels. Our main goal is to protect users from machine and deep learning correlation attacks on anonymization networks like Tor. We have developed the TorKameleon prototype and performed extensive validations to verify the accuracy and experimental performance of the proposed solution in the Tor environment, including state-of-the-art active correlation attacks. As far as we know, we are the first to develop and study a system that uses both anonymization mechanisms described above against active correlation attacks.

    #arXiv #ResearchPapers #TorKameleon #Tor #CensorshipResistance #Privacy #CovertChannels
    __
    ¹ arxiv.org/abs/2303.17544

  21. CW: research review

    J. Vilalonga et al., "TorKameleon: Improving Tor's Censorship Resistance With K-anonimization and Media-based Covert Channels"¹

    The use of anonymity networks such as Tor and similar tools can greatly enhance the privacy and anonymity of online communications. Tor, in particular, is currently the most widely used system for ensuring anonymity on the Internet. However, recent research has shown that Tor is vulnerable to correlation attacks carried out by state-level adversaries or colluding Internet censors. Therefore, new and more effective solutions emerged to protect online anonymity. Promising results have been achieved by implementing covert channels based on media traffic in modern anonymization systems, which have proven to be a reliable and practical approach to defend against powerful traffic correlation attacks. In this paper, we present TorKameleon, a censorship evasion solution that better protects Tor users from powerful traffic correlation attacks carried out by state-level adversaries. TorKameleon can be used either as a fully integrated Tor pluggable transport or as a standalone anonymization system that uses K-anonymization and encapsulation of user traffic in covert media channels. Our main goal is to protect users from machine and deep learning correlation attacks on anonymization networks like Tor. We have developed the TorKameleon prototype and performed extensive validations to verify the accuracy and experimental performance of the proposed solution in the Tor environment, including state-of-the-art active correlation attacks. As far as we know, we are the first to develop and study a system that uses both anonymization mechanisms described above against active correlation attacks.

    #arXiv #ResearchPapers #TorKameleon #Tor #CensorshipResistance #Privacy #CovertChannels
    __
    ¹ arxiv.org/abs/2303.17544

  22. This may sound controversial but…

    For suppressed people who value basic #digitalSovereignity, knowing that almost all #banks in #Australia are being man-in-the-middled (#MitMd) by the likes of #Amazon, CloudFlare et al. We propose a weirdly radical solution…

    Start using #cheques.

    Call the bank and ask for a #chequeBook. The current #MitM attackers cannot stop us from paying with a cheque and we can sign with a message of our choosing. *wink

    #censorshipResistance #cloudFlare #stopCAGEMAFIA

  23. This may sound controversial but…

    For suppressed people who value basic #digitalSovereignity, knowing that almost all #banks in #Australia are being man-in-the-middled (#MitMd) by the likes of #Amazon, CloudFlare et al. We propose a weirdly radical solution…

    Start using #cheques.

    Call the bank and ask for a #chequeBook. The current #MitM attackers cannot stop us from paying with a cheque and we can sign with a message of our choosing. *wink

    #censorshipResistance #cloudFlare #stopCAGEMAFIA

  24. This may sound controversial but…

    For suppressed people who value basic #digitalSovereignity, knowing that almost all #banks in #Australia are being man-in-the-middled (#MitMd) by the likes of #Amazon, CloudFlare et al. We propose a weirdly radical solution…

    Start using #cheques.

    Call the bank and ask for a #chequeBook. The current #MitM attackers cannot stop us from paying with a cheque and we can sign with a message of our choosing. *wink

    #censorshipResistance #cloudFlare #stopCAGEMAFIA