background preloader


Facebook Twitter

Cryptographic DNS

Questions about https, Tor, vpn. It is my mindset, I believe that the NSA will read whatever I do online as they want.

Questions about https, Tor, vpn

However I can protect myself against a lot of petty thieves, and annoying spying advertising folks. On the website FAQ for HTTPS Everywhere. "Q. Why is HTTPS Everywhere preventing me from joining this hotel/school/other wireless network? A. You might know of the Firefox App, Firesheep, where one computer grabs the wireless HTPPS connection of another computer as and can collect whatever part of your stuff he wants. The Problem Session hijacking is nothing new. From wiki, Certificate Authorities. Trusted certificates are typically used to make secure connections to a server over the Internet. CA's can be compromised. If a hotel connection can install its own DNS, and other means to pretend that you are, say talking to your bank. There is, as someone mentioned here. In some ways a VPN might keep that from happening, supposing those running the VPN itself is not the ones stealing your login/password. Certificate Patrol - a psyced Firefox/Mozilla add-on.

Drill/KEYS at master · apache/drill. Ldns The goal of ldns is to simplify DNS programming, it supports recent RFCs like the DNSSEC documents, and allows developers to easily create software conforming to current RFCs, and experimental software for current Internet Drafts.

A secondary benefit of using ldns is speed; ldns is written in C it should be a lot faster than Perl. The first major tool to use ldns is Drill, from which part of the library was derived. From version 1.0.0 on, drill is be included in the ldns release and will not be distributed separately anymore. Its version number will follow that of ldns. Ldns depends on OpenSSL for its crypto functions. Feature list IP4 and IP6 support, TSIG support, DNSSEC support; signing and verification, small size, online documentation as well as manual pages. If you want to send us patches please use the code from subversion (trunk). Download The latest release is 1.6.17, dating Jan 10, 2014 Download (checksum sha1: 4218897b3c002aadfc7280b3f40cda829e05c9a4) Compiling. « Back to the Drill Project page Drill Extension This extension performs DNSSEC lookups for the main hostname of the current page in firefox.

It uses Drill to chase the signatures up to a trusted key. The user can specify trusted keys by putting them in a directory of his choice (see usage). If you run it now, you'll get insecure on almost all websites, because since the DNS root is not signed, there is no way to verify that a result is verifiably insecure. Disclaimers This extension is just a small proof of concept for visualising DNSSEC.

Download The current release is 0.7.1, for firefox 3.0.x, is here: drill-0.7.1.xpi. For firefox 2.x and before, please use 0.7: drill-0.7.xpi. Don't forget to install drill, from the ldns library. Usage After installing the extension, the statusbar shows a new icon: normally, for unverified pages, the icon will be: If the hostname record in the DNS is signed and can be traced up to a trusted key, the icon will look like this: Jedisct1/dnscrypt-proxy. Offline-cryptoparty/ at master · orblivion/offline-cryptoparty.

Gpg4win - Secure email and file encryption with GnuPG for Windows. Gnu Privacy Guard (GnuPG) Mini Howto. > Linux Reviews > Howtos > GnuPG Privacy Howtos > This documents explains how to use the GNU Privacy Guard (GnuPG), an Open Source OpenPGP compatible encryption system To keep this program totally free the use of the RSA algorithm and other patented algorithm has been avoided.

Gnu Privacy Guard (GnuPG) Mini Howto

The document was originally written by Michael Fischer v. Mollar in German. The text has been translated and adjusted on some points and cannot be considered as a full one-on- one copy. Making and verifying signatures. A digital signature certifies and timestamps a document.

Making and verifying signatures

If the document is subsequently modified in any way, a verification of the signature will fail. A digital signature can serve the same purpose as a hand-written signature with the additional benefit of being tamper-resistant. The GnuPG source distribution, for example, is signed so that users can verify that the source code has not been modified since it was packaged. Creating and verifying signatures uses the public/private keypair in an operation different from encryption and decryption. Cryptography. A TINY BIT about Cryptography. _Crypto Tools. Encryption censorshiop & net nutrality. The GNU Privacy Guard.