New 5G protocol vulnerabilities allow location tracking

New 5G protocol vulnerabilities allow location tracking

Security researchers have identified new vulnerabilities in the 5G protocol that could be abused to crash network segments and extract user data, such as location information.

In-kernel WireGuard is on its way to FreeBSD and the pfSense router

In-kernel WireGuard is on its way to FreeBSD and the pfSense router

Mindful of Netgate's exposed position, Donenfeld reached out to core FreeBSD developers Kyle Evans and Matt Dunwoodie, and the three dug in for a mad, week-long sprint to bring the problematic code up to par.

Security experts Can Now Break Encryption that Protects People’s Data Using Quantum Computing

Security experts Can Now Break Encryption that Protects People’s Data Using Quantum Computing

Using the "quantum annealing" method, the company said its research found that even the strongest versions of the advanced encryption standard may be decodable by quantum computers that could be available a few years from now.

Brave browser takes step towards enabling a decentralized web

Brave browser takes step towards enabling a decentralized web

Brave has just taken a step towards supporting a decentralized web, by becoming the first browser to offer native integration with a peer-to-peer networking protocol that aims to fundamentally change how the internet works.

Xayn Blog  -  IOTA as a trust anchor

Xayn Blog - IOTA as a trust anchor

With the help of complete decentralisation, user control and open-source transparency, we're also fighting AI misuse.Now, Xayn is going one step further in its fight against AI misuse by i ncorporating IOTA's Tangle technology as a trust anchor into XayNet .

Secret Service buys location data that would otherwise need a warrant

Secret Service buys location data that would otherwise need a warrant

Law enforcement agencies are required to get a warrant to obtain an individual's mobile phone location data, the Supreme Court ruled in 2018.

WireGuide: All about the WireGuard VPN protocol

WireGuide: All about the WireGuard VPN protocol

WireGuard is a relatively new VPN protocol when compared with the decades old OpenVPN and approaches software development with a different philosophy – do one thing simple and do it well (efficiently).

New 5G flaws can track phone locations and spoof emergency alerts

New 5G flaws can track phone locations and spoof emergency alerts

Last week, the researchers found several security flaws in the baseband protocol of popular Android models — including Huawei’s Nexus 6P and Samsung’s Galaxy S8+ — making them vulnerable to snooping attacks on their owners.

Dnscrypt-protocol/ANONYMIZED-DNSCRYPT.txt at master · DNSCrypt/dnscrypt-protocol · GitHub

Dnscrypt-protocol/ANONYMIZED-DNSCRYPT.txt at master · DNSCrypt/dnscrypt-protocol · GitHub

While the communications themselves are secure, and while the stateless nature of the DNSCrypt protocol helps against fingerprinting individual devices, DNS server operators can still observe client IP addresses.

Beware the GHOST Protocol

Beware the GHOST Protocol

UK internet users and internet users around the world need to beware of the GHOST protocol.In Australia, an anti encryption bill that enables the government to ask for GHOST protocol-like access has passed and is just ripe for abuse.

UK, US, Australia, Canada and New Zealand meet to discuss the “ghost protocol” aka built in encryption backdoors

UK, US, Australia, Canada and New Zealand meet to discuss the “ghost protocol” aka built in encryption backdoors

Representatives from the UK, US, Australia, Canada, and New Zealand recently finished a two day meeting in London where the countries renewed their commitment to seeking encryption backdoors from technology companies around the world. Private Internet Access continues to protest against government encroachment on tech companies and will never built in any encryption backdoors or ghost protocols.

How to enable DNS-over-HTTPS (DoH) in Firefox

How to enable DNS-over-HTTPS (DoH) in Firefox

This mode of operation bypasses the default DNS settings that exist at the OS level, which, in most cases are the ones set by local internet service providers (ISPs).This also means that apps that support DoH can effectively bypass local ISPs traffic filters and access content that may be blocked by a local telco or local government -- and a reason why DoH is currently hailed as a boon for users' privacy and security.

Here’s how we protect your private parts

Here’s how we protect your private parts

At this very moment, cyber hackers from around the world are actively working to steal your personal data, to sell for profit on the black market or impersonate you. With a new data breach happening every day — it’s clear this is a problem affecting everyone.

Why I don't like smartphones

Why I don't like smartphones

Smartphones have powerful CPUs and fast network connections, except that you aren't actually allowed to use these resources in any meaningful sense, because doing so consumes battery power, and people don't want the precious battery life of their phones drained unnecessarily.

WhatsApp Users Under Surveillance Attack

WhatsApp Users Under Surveillance Attack

It is confirmed that hackers have been able to remotely install surveillance software on phones and other devices, by taking advantage of a major flaw in what they discovered in messaging app, WhatsApp. WhatsApp is one of Facebook’s family apps, and Facebook’s challenges with privacy and data breaches has been a matter of public show over the last couple of months, as such, this goes on to add to the larger corporate entity’s headaches.

Mozilla offers research grant for a way to embed Tor inside Firefox

Mozilla offers research grant for a way to embed Tor inside Firefox

A better Tor integration is one of the key points that Mozilla is willing to fund via its Research Grants 2019H1 program that the organization announced last month. For this, Mozilla is willing to provide research grants that will help discover a better way of integrating Tor into Firefox without the current performance losses.

Purism Launches Suite of Privacy Protecting Services and Apps Called Librem One

Purism Launches Suite of Privacy Protecting Services and Apps Called Librem One

Librem Chat – End-to-end encrypted messaging using an open network for secure, decentralized communication powered by the Matrix protocol. See Also: Private Internet Access (PIA) VPN Service Forges First OEM Partnership with Purism to Offer Hardware and Software Bundles with Powerful Privacy Protection.

Integrating Network-Layer Privacy Protections With Cryptocurrencies

Integrating Network-Layer Privacy Protections With Cryptocurrencies

While significant effort has focused on protocol-layer protections, publications mapping IP addresses through tracking transaction broadcast origins and subsequently making connections with identities (through public keys) have amplified concerns that protocol-layer solutions are not the only means needed to safeguard privacy.

Whois Lookup | Website Hacking #1

Whois Lookup | Website Hacking #1

is a very famous website help to perform Whois lookup just by entering the IP address or domain name. To perform Whois lookup open your terminal in your Kali Linux and type the whois following with IP address or domain name like.

Now you can have your own channel inside Facebook to keep your messages and posts private

Now you can have your own channel inside Facebook to keep your messages and posts private

Mark Nadal, a self-described “political activist fighting against surveillance capitalism,” today unveiled Private Party, a disarmingly simple protocol that evades the data capture used by tech giants.

MLS and Federated Messaging

MLS and Federated Messaging

For messaging with only two participants, Loki Messenger has both an Asynchronous mode using Swarm storage on the Service Node network, and a faster Synchronous mode which allows users to send messages directly to each other via Lokinet.

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI If you are new to LOKI, the Australian project is self described on their landing page as a “privacy network which will allow users to transact and communicate privately over the internet, providing a suite of tools to help maintain the maximum amount of anonymity possible while browsing, transacting and communicating online”.

P2P mesh routing

P2P mesh routing

It would be impossible to implement one these protocols in order to create and maintain such a net as Netsukuku is, where every each node is a router by itself, because the map of all the routes would require a space, on each pc connected to the net, of about 10GB.

Tide Foundation gives consumers full control of personal data on blockchain

Tide Foundation gives consumers full control of personal data on blockchain

As for consumers controlling encryption keys, the company says it has created a patented technology to simplify the process of managing those keys in order to put that process within reach of anyone, one that passes what they call “the Grandpa Test.” “We have developed a layer, a decentralized way to dumb down blockchain to a ubiquitous user experience on the web,” Yuval Hertzog, the other company co-founder explained.

University of Michigan Internet-Wide Scanning Research

University of Michigan Internet-Wide Scanning Research

The data collected through these connections consists only of information that is already publicly visible on the Internet. It helps computer scientists study the deployment and configuration of network protocols and security technologies.

BEAM vs. Grin: A Complete Comparrison – Real Simple Crypto

BEAM vs. Grin: A Complete Comparrison – Real Simple Crypto

As BEAM and Grin have started taking their first steps as live implementations of the MimbleWimble protocol, however, questions have begun to come up about what each project aims to do, how they aim to do it, and the groups behind them.

The 5G Protocol May Still Be Vulnerable to IMSI Catchers

The 5G Protocol May Still Be Vulnerable to IMSI Catchers

A number of fantastic papers explore vulnerabilities in 2G , 3G , and 4G which are potentially the same ones exploited by commercial CSSs. The upcoming 5G protocol for cellular communications promised many improvements over the current 4G standard, including a claim that it would protect mobile users from cell-site simulators.

2019: The Year of Enigma

2019: The Year of Enigma

If you’re organizing a conference or event this year and would like a member of the Enigma team to speak or present on privacy, secret contracts, or decentralization, we’re interested!

Exploring Privacy Pass

Exploring Privacy Pass

Let’s say the secret key of the Privacy Pass server is the number and there’s a publicly known point on the curve called and execute the protocol as follows: This has the problem of tracking, since the server will be able to store all this data and correlate it to the user when the s is used by the user.

The official release of AdGuard DNS — a new unique approach to privacy-oriented DNS

The official release of AdGuard DNS — a new unique approach to privacy-oriented DNS

And if there is a difference for you, you probably know the answer anyway :) AdGuard DNS recently added DoH support, which brings our service to the forefront of privacy protection.