Archiv: operating systems


21.10.2021 - 17:12 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

19.10.2021 - 20:22 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

19.10.2021 - 20:12 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

19.10.2021 - 09:12 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

24.09.2021 - 17:02 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

24.09.2021 - 16:49 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

04.09.2021 - 19:46 [ SecurityMagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(February 6, 2020)

While both offer encryption of DNS data using the same TLS protocol, there are some very important differences:

– Protocol layering: while DoT is essentially DNS over TLS, DoH is in fact DNS over HTTP over TLS.
– Different port numbers: DoT traffic uses a dedicated port 853, and can thus be distinguished at the network layer. DoH uses port 443 (HTTPS) due to the protocol layering.
– Different capabilities: DoT is largely the same DNS as we know it, while DoH to an extent combines features of DNS and HTTP.

30.07.2021 - 07:21 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

30.07.2021 - 07:17 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

14.07.2021 - 08:39 [ ClassicPress.net ]

ClassicPress: The CMS for Creators

Improved Security

ClassicPress has a “security-first” approach. All key security patches from WordPress are backported to ClassicPress. Also, no matter how exciting a new feature is, if it’s not secure, it won’t be added.

14.07.2021 - 08:29 [ Lireo.com ]

Is It Time to Consider ClassicPress, Alternative to WordPress?

(March 31, 2021 )

ClassicPress is under active development, has the familiar WordPress interface many longtime WordPress users know, and releases regular security updates.

In addition, they have active community forums and a Slack channel.

11.06.2021 - 10:43 [ AddictiveTips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

11.06.2021 - 10:41 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

06.06.2021 - 12:35 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

06.06.2021 - 12:32 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

06.06.2021 - 12:22 [ AddictiveTips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

06.06.2021 - 12:22 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

24.03.2021 - 17:09 [ free-proxy.cz/en/ ]

Free Proxy

There are currently … proxy servers in our database

24.03.2021 - 17:06 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

24.03.2021 - 17:03 [ Browserleaks.com ]

What Is My IP Address

DNS Leak Test

Test Results:

24.03.2021 - 16:51 [ AddictiveTips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

24.03.2021 - 16:44 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

24.03.2021 - 16:22 [ SecurityMagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(February 6, 2020)

While both offer encryption of DNS data using the same TLS protocol, there are some very important differences:

– Protocol layering: while DoT is essentially DNS over TLS, DoH is in fact DNS over HTTP over TLS.
– Different port numbers: DoT traffic uses a dedicated port 853, and can thus be distinguished at the network layer. DoH uses port 443 (HTTPS) due to the protocol layering.
– Different capabilities: DoT is largely the same DNS as we know it, while DoH to an extent combines features of DNS and HTTP.

03.03.2021 - 13:06 [ macobserver.com ]

5 Encrypted DNS Services to Use on iOS and macOS

Short for Domain Name System, DNS is commonly referred to as the “phone book” of the internet. It helps connect web browsers with web servers by translating addresses like 104.26.0.124 into www.macobserver.com. Here are five encrypted DNS services that I recommend.

There are several different ways to use a DNS server. One is to manually go into network settings on each and configure the Wi-Fi. The second way is to download an app, and the third way is to go into your router settings and configure it there.

03.03.2021 - 12:56 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

03.03.2021 - 12:45 [ addictivetips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

03.03.2021 - 12:07 [ free-proxy.cz/en/ ]

Free Proxy

There are currently 7156 proxy servers in our database

03.03.2021 - 12:04 [ Browserleaks.com ]

Browserleaks.com

It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.

BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.

03.03.2021 - 12:00 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

17.02.2021 - 18:02 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

17.02.2021 - 17:56 [ Browserleaks.com ]

Browserleaks.com

It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.

BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.

30.01.2021 - 16:01 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

30.01.2021 - 16:00 [ addictivetips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

18.01.2021 - 16:09 [ addictivetips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

18.01.2021 - 16:00 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

18.01.2021 - 15:50 [ DNSprivacy.org ]

DoT servers

Oct 2020: The list below has been updated to retain only those servers that appear to still be actively maintained

18.01.2021 - 15:47 [ securitymagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(06.02.2020)

Obviously, time will tell if DoT continues to prevail or whether DoH will start to gain ground. As mentioned at the beginning of the article there is a hot debate going on right now about the direction the Internet industry should take. Suffice to say that even nation state authorities are involved in the debate, which speaks to the level and importance of the discussion.

18.01.2021 - 15:41 [ ZDNET.com ]

NSA warns against using DoH inside enterprise networks

The NSA urges companies to host their own DoH resolvers and avoid sending DNS traffic to third-parties.

18.01.2021 - 15:40 [ National Security Agency / Pentagon ]

Adopting Encrypted DNS in Enterprise Environments

Use of the Internet relies on translating domain names (like “nsa.gov”) to Internet Protocoladdresses. This is the job of the Domain Name System (DNS). In the past, DNS lookups were generally unencrypted, since they have to be handled by the network to direct traffic to the right locations. DNSover Hypertext Transfer Protocol over Transport Layer Security (HTTPS), often referred to as DNS over HTTPS (DoH), encrypts DNS requests by using HTTPS to provide privacy, integrity, and “last mile” source authenticationwith a client’s DNS resolver. Itis useful to prevent eavesdropping and manipulationof DNStraffic.While DoH can help protectthe privacy of DNS requests and the integrity of responses, enterprises that use DoH will lose some of the control needed to govern DNS usage within their networksunless they allow only their chosen DoH resolver to be used.Enterprise DNS controlscan prevent numerous threat techniques used by cyber threat actors for initial access, command and control, and exfiltration.

08.01.2021 - 23:04 [ .infosecurity-magazine.com ]

SAD Reality for DNS

The researchers determined that 35% of open resolvers are open to the attack, as well as four of six home routers made by well-known brands.

They also found that 12 of 14 popular public resolvers (now 11—Cloudflare says they’ve corrected their systems) are susceptible. Even a patched DNS server could be made vulnerable by an unpatched or misconfigured NAT gateway.

Their 19-page paper on the exploit includes lists of devices and services tested. They have since set up a SAD DNS website featuring a Q&A and a tool that anyone can use to determine whether their DNS is vulnerable.

The flaw is being tracked as CVE-2020-25705, and affects Linux 3.18 – 5.10, Windows Server 2019 version 1809 and newer, macOS 10.15 and newer, and FreeBSD 12.1.0 and newer. The researchers did not test earlier versions of the listed operating system.

31.08.2019 - 08:38 [ Project Zero team at Google ]

Implant Teardown

The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage. We can see here screenshots of the apps on the left, and on the right the contents of the database files stolen by the implant which contain the unencrypted, plain-text of the messages sent and received using the apps:

(…)

There’s something thus far which is conspicuous only by its absence: is any of this encrypted? The short answer is no: they really do POST everything via HTTP (not HTTPS) and there is no asymmetric (or even symmetric) encryption applied to the data which is uploaded. Everything is in the clear. If you’re connected to an unencrypted WiFi network this information is being broadcast to everyone around you, to your network operator and any intermediate network hops to the command and control server.

This means that not only is the end-point of the end-to-end encryption offered by messaging apps compromised; the attackers then send all the contents of the end-to-end encrypted messages in plain text over the network to their server.

31.08.2019 - 08:26 [ Project Zero team at Google ]

A very deep dive into iOS Exploit chains found in the wild

I recommend that these posts are read in the following order:

31.08.2019 - 08:20 [ Gizmodo ]

Google Hackers Reveal Websites Hacked Thousands of iPhone Users Silently for Years

“To be targeted might mean simply being born in a certain geographic region or being part of a certain ethnic group,” he said. “All that users can do is be conscious of the fact that mass exploitation still exists and behave accordingly; treating their mobile devices as both integral to their modern lives, yet also as devices which when compromised, can upload their every action into a database to potentially be used against them.”