Home » Author Archives: c3lt1c

Author Archives: c3lt1c

Build a Cheap Linux Server Part II

Build a Cheap Linux Server Part II – Link to part 1 Configuring TCP/IP Settings At the end of the last article we left off with standing up your server on the internet using Dynamic DNS. The next major item to address would be “port forwarding” or NAT (Network Address Translation); however if occurred to me that I can’t make ... Read More »

TOR: Is There a Viable Alternative?

When I first heard about TOR it was probably the most exciting thing I had ever encountered since I had started using computers. I probably jumped onboard when it had been around long enough to be useful and had become quite popular; but was not yet at the point where everyone felt the need to attack, de-anonymize and discredit it. ... Read More »

How Hidden Services DDoSing Works?

Anyone who’s been around the DNMs these past few years will know the frustration of the constant ups and downs experienced for various reasons. Some have closed due to LEA intervention, exit scamming and even other less dramatic reasons. We know that LEA intervention will always be a part of the markets and well so will exit scamming as long ... Read More »

How We Talk to Hidden Services?

It’s true that networking protocols and technologies have changed drastically through the years; from Arpanet, Hubs, BBS and even serial cable WAN connections spanning states and even countries. It is also true that the popular and standard communication protocols have changed quite a bit as well: ATM, Frame Relay, X.25 and eventually TCP/IP. All of these changes have been the ... Read More »

Security Software

The problem with surveillance software is that there’s probably a whole lot out there that we just don’t know about, either because it’s a proprietary application for a private firm or government agency. I’m sure we have all heard about the recent FBI vs Apple debacle in which the FBI demanded that Apple build an app to crack iPhone encryption, ... Read More »

TOR & VPN: A Necessary Couple

There was a time when folks felt beyond anonymous using TOR on its own; but it seems a crazy idea today and I can tell you from experience, that using TOR without VPN gives one a feeling of nakedness. Looking further back there were good old days when mass monitoring felt more like a dystopian novel than government policy. People ... Read More »

Network Address Translation & Security

Most average network users will need to know either little or nothing about NAT (Network Address Translation). The fact is that it’s already being handled for you when your ISP installs your router. It seems that many consumer brand routers make this process seemingly invisible or non-existent as well, but make no mistake:  some form of NATing occurs on all ... Read More »

Wi-Fi Security

It would be reasonable to assume that a vast majority of home internet users have some kind of wireless accessibility for their network of computers, tablets, printers, TVs, etc. In the past, wireless was seen as a convenient, yet risky solution for larger corporations and government entities – When weighing accessibility against security, the latter would most definitely win any ... Read More »

IPsec

IPsec is a both a standard VPN framework as well as a specific protocol that has existed for quite some time and at its core has changed very little. It can trace its origins to somewhere about 1993 when the first IP VPN protocols, such as SP3, NLSP and swipe, were being developed. Eventually and early predecessor ka9q would contribute ... Read More »

How Do Modern Firewalls Work?

Many people think of a firewall as a guard on your network that just works – and in many cases they function without you ever having to explicitly make policies or understand the under-workings. Let’s look at a Microsoft Windows firewall for instance: for the most part these function in the background without you ever having to know the particulars. ... Read More »

Build a Cheap Linux Server

Part I: Building & Preparing My professional expertise is generally limited to all things Network, however I dabbled in other areas in school and continue to dabble in my free time at home. I have always taken an interest in different Operating Systems and how they compare to each other; so once I got over Darwin and its proprietary everything ... Read More »

Agora: A True Survivor in a Brave New World

Agora hasn’t ‘fallen’ per se but has been intentionally taken down by the admins as a proactive attempt to protect themselves and their users after discovering some suspicious activity around their servers which correlates to the recent TOR vulnerabilities – Of course they would not go in to specifics, as this has always been the ever-cautious demeanor of the Agora ... Read More »

Wi-Fi and OPSec

It would be reasonable to assume that a vast majority of home internet users have some kind of wireless accessibility for their network of computers, tablets, printers, TVs, etc. In the past, wireless was seen as a convenient, yet risky solution for larger corporations and government entities – When weighing accessibility against security, the former would most definitely win any ... Read More »

VPN: Encrypt every device on your network for $20

Staying in-line with the VPN theme I decided to build a site-to-site VPN solution – otherwise known as a ‘branch office tunnel’. First, you will need to make sure that your VPN provider supports this function. I personally use NordVPN, however many of the best popular providers support this option in the form of OpenVPN running on a flashed consumer ... Read More »