ivpn.net
tfc
Our great sponsors
ivpn.net | tfc | |
---|---|---|
106 | 50 | |
97 | 1,153 | |
- | - | |
9.4 | 0.6 | |
7 days ago | 5 days ago | |
Vue | Python | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ivpn.net
-
Ask HN: Who is hiring? (December 2023)
IVPN | Full-stack Web Developer | Remote (UTC-1 to UTC+3) | Full-time | https://www.ivpn.net
IVPN is a privacy-focused VPN service in operation since 2010. We have high ethical standards, regular security audits and a stellar reputation among security and privacy analysts.
We are looking for a Full-stack Web Developer to work on a new project for a privacy-friendly DNS solution.
Ideally you possess the following knowledge:
-
Ask HN: Who is hiring? (October 2023)
IVPN | Technical Writer, Privacy and Security | Remote (UTC-5 to UTC+7) | Part-time (20h) | https://www.ivpn.net
IVPN is a privacy-focused VPN service in operation since 2010. We have high ethical standards, regular security audits and a stellar reputation among security and privacy analysts.
We are looking for a Technical Writer to create in-depth guides about privacy, information security and VPN use. We prefer quality over quantity, and aim for providing real value to our technical audience as opposed to churning out surface level, keyword stuffed content marketing posts.
To qualify for this role, credentials and number of years of experience does not necessarily matter, given you have a deep interest in privacy, come equipped with technical skills, and have a knack for writing.
This is a remote, part-time (20 hours per week) position with a possibility of switch to full-time depending on the progress of projects and your goals.
You can email me directly to discuss the role: [email protected]
-
⟳ 4 apps added, 121 updated at f-droid.org
IVPN - Secure VPN for Privacy (version 2.10.3): Privacy focused VPN service with WireGuard
-
Ask HN: Who is hiring? (August 2023)
IVPN | Senior Infrastructure Engineer | Remote (UTC-1 to UTC+3) | Full-time | https://www.ivpn.net
IVPN is a privacy-focused VPN service in operation since 2010. We have high ethical standards, regular security audits and a stellar reputation among security and privacy analysts. We are planning to overhaul our VPN infrastructure with a new server build to radically improve the transparency of our service.
We are looking for an experienced infrastructure engineer to research and develop a new server architecture for our VPN gateways that is open, immutable, diskless and secure, using open-source software and multiple layers of security technologies. You will also be responsible for the initial provisioning of servers, from procurement to building and final distribution to data centers (travel might not be required).
If you have:
-
MoneroKon 2023 is next week! Here is what to expect
IVPN
-
I purchased Brave VPN two months ago and I can't use it so far
Honestly, I wouldn't bother with Brave VPN too much. There are better ones out there for less or approximately the same price. IVPN is a good example. For the same monthly price, you get an ad and tracker blocker also.
- Best Mullvad alternative
-
Event Poll - Monerokon
"In front of us, we have CBDCs introduced, privacy rights eroded, our actions tracked and used against us. If you want to fight for a future free from surveillance: this is the place to be in 2023." - - Viktor Vecsei, COO of IVPN, an open-source, audited, privacy focused VPN service with WireGuard and ad+tracker blocking, one of the sponsors of Monero Konferenco 2022. https://www.ivpn.net
-
My VPN provider is shutting off port forwarding, what to use now?
I was in the same boat. I moved to https://www.ivpn.net.
- Inconsistent logging claim
tfc
- Tinfoil Chat – Onion-routed, endpoint secure messaging system
-
Signal's president vows to reject UK law on message scanning before encryption
>No e2ee app has compromised device part of their threat model.
Oh really, here's one I made earlier https://github.com/maqp/tfc :-)
>The whole OS can.
So how are you backdooring a bash script that comments out lines of code from Linux source before compiling it?
You lying to policy makers with "it can be done" mindset sound like a stupid con that burns a lot of money and time in the process.
-
Most secure and private (trace resistant) messaging app in market?
But as I said, it is way easier to install Pegasus on your phone or to grab / steal the unlocked phone from your hand, than break any of these. If you want absolute privacy, you should think about your physical security, and the trustworthiness of your devices before choosing the right chat app. Check the Tinfoil Chat for more information.
-
Are there fully anonymous alternatives to Session/Telegram?
TFC
-
Testing a new encrypted messaging app's extraordinary claims
There is software that lives up to these claims, it's Tinfoil Chat. The article is correct about the necessary trade-offs: due to peer to peer transport (onion hidden service 2 onion hidden service) both ends of the conversation have to be online -- it at least spools the message waiting for the recipient to appear.
For hole punching and signaling that has to be done by third party, well, the third party is TOR
TFC then goes on to break out the encryption and decryption machines from the network and passes messaging over opto-couplers to prevent your keys from getting exfiltrated. Qubes qrexec could similarly isolate the components.
-
Apple advances user security with powerful new data protections
> If you want maximum security use an air gapped computer. But that won't let you send messages on the go.
You can, with some inconvenience, use optical diodes to transmit data from a trusted input device to an untrusted network device for transport over tor, and then push the received messages over a second diode to a display device that decrypts the messages, so that even if you receive an exploit/malware, there is no physical connection that allows unencrypted data to be exfiltrated.
-
Peer-to-Peer Encrypted Messaging
Briar is one of the most important secure messaging projects currently. Not only does it remove the need to trust the vendor about content (like with all E2EE messaging apps), you also get to keep the metadata about communication to yourself as data transits from one Tor Onion Service to another.
The downside is of course, you need to keep the endpoint powered on when you want to be reachable so it will increase the battery drain on your phone.
Note: There's also a desktop client if that's easier to keep online https://briarproject.org/download-briar-desktop/
One extremely important thing Briar is doing, is it's using the P2P as means to host alternative social interaction formats, like forums and blogs. Similar to Signal/WhatsApp stories (which is somewhat similar to microblogs/FB wall), it's a way to indirectly share information. You could pretty much emulate any social media platform on top of E2EE protocol with ~zero infrastructure cost and without having to worry about data mining. I'd argue what Briar's innovating on here is one of the most important aspects in what's left for secure messaging.
Finally a small caveat: Briar will share your Bluetooth MAC address with all peers so it can automatically use that when you're in close proximity with your peer. Thus sharing your Briar ID publicly is not a good idea for two reasons:
1) major global adversaries may have access to that information (e.g. if Google aggregates it) which can deanonymize your account. This also allows slightly technical person to confirm identity of briar account if they suspect it's you (a bit wonky threat model but still).
2) it ties everything you do across your accounts on same device together, so there's strong linkability even if you rotate the identity key by reinstalling the app.
Briar is pretty clear about this in it's FAQ, but it's still not very well known although it definitely should be.
---
That being said, if you want similar Onion Service based communication with no such linkability, there's https://cwtch.im/ which is a fantastic project.
There's also https://www.ricochetrefresh.net/
Both are spiritual successors to John Brooks' `Ricochet` application.
You can also chat and share files (among other things) with https://onionshare.org/
(And finally, you can get remote exfiltration security for keys/plaintexts with TFC https://github.com/maqp/tfc (my personal work), at the cost of losing some features like message forwarding etc that the architecture prevents you from doing.)
- 'Stay away from WhatsApp, been spy tool for 13 years': Telegram founder Pavel Durov warns users
- Tin Foil Chat – Security Trough Light Diode
- Offline Encryption?
What are some alternatives?
linux-cli-community - Linux command-line client for ProtonVPN. Written in Python.
Telegram - Telegram for Android source
mullvadvpn-app - The Mullvad VPN client app for desktop and mobile
EndGame - EndGame DDoS filter.
Grafana - The open and composable observability and data visualization platform. Visualize metrics, logs, and traces from multiple sources like Prometheus, Loki, Elasticsearch, InfluxDB, Postgres and many more.
session-desktop - Session Desktop - Onion routing based messenger
appsmith - Platform to build admin panels, internal tools, and dashboards. Integrates with 25+ databases and any API.
go-libp2p-tor-transport - 🚧 WIP: tor transport for libp2p
n8n - Free and source-available fair-code licensed workflow automation tool. Easily automate tasks across different services.
OnionShare - Securely and anonymously share files, host websites, and chat with friends using the Tor network
uBlock - uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean.
securedrop - GitHub repository for the SecureDrop whistleblower platform. Do not submit tips here!