Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)HE
Posts
33
Comments
36
Joined
2 wk. ago

  • Simplex does check alot of those boxes... but smp traffic is easily identifiable unless your jumping through the major hoops of establishing a totally anonymous proxy.

    An encoded message on a pastebin through tor. Congratulations, you've entered pedophile/terrorist level security realm.

    Thats to bad being anonymous and secure puts you in that category. It shouldn't!

  • deflock.me @lemmy.ml

    Springfield police seek suspects in camera pole vandalism

    Privacy @lemmy.ml

    The Perfect Private Messenger

    deflock.me @lemmy.ml

    Hays County ends all contracts with Flock Safety

  • Decode if you dare!

    Settings: List A / H round 10!

    This copy of the codebook will self destruct in 29 days!

    0.5917451305 0.4727323049 3.9454659189 5.4694924209 0.1089294313 0.4560538207 0.5215766578 57.6201633538 1.4298898873 0.0587926009 8.5176379754 1.1780547701 0.5215766578 0.2620544251

  • Secure Coms @lemmy.ml

    Ricochet Refresh is an open-source project to allow private and anonymous instant messaging

    deflock.me @lemmy.ml

    City of Lockhart denies proposal to install Flock cameras

    Secure Coms @lemmy.ml

    Codebook V1

  • Thinking more about this today and reasons why it's going to be pretty un-penatrable.

    It's like if Alice and Bob got in a room and generated an entire new language that only they understood...except you can generate a new language in an instant. Kinda nuts!

  • Secure Coms @lemmy.ml

    Roger Dingledine | Tor: Anonymous Communications for the Dept of Defense and You (Aug 23, 2010)

  • Insightful nevertheless. Nick is one of the creators of Tor...I was pleased to hear straight from the man of all the technicalities of staying anonymous as well as some weaknesses of Tor.

    I appreciate that he doesn't claim Tor is perfect or infailable.

  • Secure Coms @lemmy.ml

    Nick Mathewson - Anonymous Communication

    Secure Coms @lemmy.ml

    Claude Shannon

    deflock.me @lemmy.ml

    Full interview: Flock Safety CEO addresses mass surveillance, access concerns

    deflock.me @lemmy.ml

    I think it's odd that a university needs to run nation wide searches. Consistently searching over 90,000 cameras for there investigations is such a overstep of authority.

  • That would certainly be a step in the right direction to discard immediately.

    There is a way for HOAs to create safe lists that keeps you off a national search, but only for your neighborhood. You aren't excluded from search results outside your HOA installed flock cameras.

    Flock cameras aren't speed cameras though, they are only made to capture license plates, generate vehicle attributes and fingerprint into a searchable database.

    Even if there was a mechanism to exclude me from search results...the moment I pass a camera I am technically searched and cross reference against the bad guy database. There no way around the 4th Amendment unreasonable search violation for me.

  • deflock.me @lemmy.ml

    Sedona rejects license plate readers, removes Flock Safety cameras

    Secure Coms @lemmy.ml

    Other Uses For OTP

    deflock.me @lemmy.ml

    Taxpayer funded AI surveillance: why Flock's 30000 cameras have to go

  • You make good points and I can't provide any documentation. But the documentation won't exist. It would be the closest guarded secret of all time. NSA only holds the upper hand if everyone thinks it's secure. If the secret was out that that they could crack it no one would use it and the advantage is lost.

  • Secure Coms @lemmy.ml

    Secret Documents Reveal N.S.A. Campaign Against Encryption

    deflock.me @lemmy.ml

    Eugene City Council recommends turning off Flock cameras

    Secure Coms @lemmy.ml

    Using spreadsheet to protect your communications from even the most powerful people in the world.

    Secure Coms @lemmy.ml

    Torch

    Secure Coms @lemmy.ml

    Retro Share

    Meshtastic @mander.xyz

    Has anyone implemented Tor hidden service to relay messages to create a broader mesh?

  • Ok,

    Here is a more polished version with MIT license.

    Improvements

    -User counts

    -Connection Status Indicator

    -Ability to turn on persistent rooms. By default, the server only relays in real time. /persist turns on chat logs. The server then stores encrypted messages and users can chat asynchronously.

    -Rotating onion address and keeping existing onion now work correctly. If you rotate a onion address, since encryption keys are partially derived from the onion address, the client will be unable to decrypt messages even if the same password is used.

    -filter command can be used to bootstrap private rooms in a scenario where multiple people want to use the same server, yet chat privately. All it does is filter out messages that it can't decrypt because it has the wrong password.

    -Got rid of ncurses set up menus to slim down the script a bit.

    -Removed redundant server manager commands and now only list two. Quit and Quit and Flush (this deletes everything in the server directory except persistent chat logs if they were turned on)

    New UI

    Example of Encrypted Chat Logs on Server Side

    I noticed some of my devices during testing wouldn't connect without hosting a server in a seperate instance. I'm not sure why this is happening but if you can't connect, try to host a server and then connect to another host. This seemed to fix the issue.

  • Yes that's a good disclaimer. I dont own or maintain this list so some tools may be out of date, compromised, or just not the latest and greatest option.

    That good practice for any list you find online.

    One of my favorites in this collection is the hitchhikers guide. Very in depth with tons of sources.

  • There is good traction on the federal lawsuit in Norfolk. Your absolutely right this is a bipartisan issue. It will set huge precident if IJ wins the case. At the very least, LEO needs warrants to use the system. Right now it's the wild west.

    IJ posts updates of the case here. They have already tried to derail the lawsuit multiple times but they have been able to push through all the appeals thus far so it can actual go to a jury trial.

  • That's a pretty big sandbox if you can host a web application from it though. It's really not that restricted but there are compatibility issues so you find your self rebuilding primitives to make things work.

    I think the next think I want to make is a notes/word processing web app. There is a pretty good use case to be to able to connect and process documents from a private server on any machine.