Avatar
Skhron - VPS for Bitcoin, Lightning and Monero
2641c5060e4eec82089fdb2c9eb84714660fddf7c23a01d731311481983f0175
Privacy-first VPS hosting provider. Servers in Poland, Warsaw and Sweden, Stockholm. We use only own colocated equipment and operate own network behind AS215467. Check us out: - http://skhroneuxrnchfz3wifchkju6spd3nx4krqe6zbx65hsax7qsbubb4qd.onion/ - https://skhron.eu/ - https://skhron.com.ua/ is our old website We accept Bitcoin, Lightning and Monero using self-hosted BTCPayServer and bitcart.ai instances We also operate our own lightning node (CLN): https://amboss.space/node/02f16437c2b9bf9f38bc4a57d7f32d7c36633725392cebf1faadea11b4ea855a7b

I didn't meant to offend you, it seems I incorrectly assumed that it is the task for your students to try to breach the school network.

As for Metasploit alternative and "Kali/ParrotOS + nmap being a no-brainer" - I think you are messing different stages of an attack as per cyberkill chain framework. There are a lot of scripts and tooling available and they are developed to solve some specific task well.

Metasploit is mostly used for a weaponization and exploitation stages. And personally I see nothing wrong with using it to demostrate a basic attack.

I don't think there are good open-source drop-in replacements for it, but I consider demonstration of a specific vulnerability exploitation manually is a good option, but I am not sure if your goal is to cover some technical aspects of red team or something else.

nostr is not only a social media like twitter, it is pretty powerful technical stack referred to as "protocol". The essential thing I personally like - your account (identity) is not bound to some one central server (instance of mastodon or twitter itself) - there are "relays" run by different people/organizations, and can be easily run by you as well. It makes nostr pretty nice thing when it comes to censorship resistance, as there is no single point of failure (and there is no "nostr CEO")

Replying to Avatar MAHDOOD

This is why services like simplelogin or own domain with a catch-all/unique per-website aliases is a way to go.

They don't want you to know about:

Socks5 Proxies vs VPNs:

These hushed elite secrets are more relevant now than ever.

Did you know that, LinkedIn makes more money off selling user data, then they do from paid job ads?

Or even worse, Twitter's valuation collapsed after Elon Musk's takeover, but then yet according to Fidelity, it got a rebound from Musk's training his AI startup on your data.

It should not surprise you then that both LinkedIn and Twitter, restrict many VPNs for new sign-ups. And more and more websites and services are banning Tor. How can you succeed with privacy under these conditions? In this note, I'll use Nostr's uncensored nature to teach you this critical knowledge, while it still works...

~~~

VPNs

When we think of VPNs, we usually think of protocols like WireGuard. WireGuard has public/private encryption keys, and the traffic is encrypted.

One potential issue with WireGuard is it's typically linked to a Datacenter. These datacenter IPs are then blocked by websites that often want to purposefully find out the identity of their users.

~~~

Socks5 Proxy

Socks5 Proxies simply forward the traffic to make requests from a new destination WITHOUT encryption. This typically is done only in a browser, but it could work in the command line or any app.

Many users wonder what the purpose of a Socks5 Proxy is, if there is no encryption. There are many use-cases.

Some websites may block VPNs coming from Datacenters. Socks5 Proxies are can be used to make the traffic appear to be coming from a residential home.

Speed

Since encryption slows down a VPN, a proxy is more lightweight, and thus faster than WireGuard.

Firewalls

Also WireGuard may have issues with residential firewalls, that socks5 helps avoid.

~~~

Tor Block

Another issue is some websites may block Tor. Tor exit IPs are published and known by all participants.

WireGuard + Tor = Fail

Since WireGuard uses UDP packets, it can't be used in front of Tor. Tor uses TCP only.

OpenVPN Slow

While OpenVPN, on port 443 (with TCP), in theory COULD be used in front of Tor. In reality, this is unbearably slow. Because you're doing 3 hops of Tor AND THEN a 4th encrypted hop on an external network.

To get around the speed issue, most users looking to hide Tor use, instead use Socks5 Proxies. These are fast because it has no encryption, but the ISP can't see anything because you're using Tor first.

Tor Exit Sees

The only one who the user isn't hiding from is the Tor exit. Tor exits still can't see through SSL/TLS or httpS website encryption. In other words, Tor exits can see WHAT domains you visit, but not your username, password, or what data you DO on those websites.

No Sudo

A huge advantage of Proxies is that they don't require sudo. They can just work in just the browser.

Simplified Privacy

Our Datacenter proxies exit the same servers and IP addresses as our WireGuard users. So the website won't know if you're using Tor or a VPN. I hope we make it financially through beta testing, to begin offering residential proxies as well.

Now do both me and humanity a favor, and slam the repost to aid our Nostr bros.

I think that another significant difference between Wireguard (and almost any other VPN solution) from SOCKS5 proxy is that with VPN, website might detect MTU of your connection, which will indicate VPN usage, while with SOCKS5 it will be the default value of 1500 (unless SOCKS5 server uses any sort of tunnel themselves). This makes it harder for a website to detect proxy.

Given this, might be a good idea to use Wireguard+SOCKS5, where SOCKS5 is only accessible over Wireguard, making it basically an encrypted proxy, combining benefits of VPN and proxy.

If privacy is your goal, I would prefer signal over email. Email has too much metadata leaks.

If your goal is conversation confidentiality, PGP is sufficient. However, Signal has better UX, IMO.

It might be due to changes I have made to "My relays" were not applied before application was restarted. Current (known to work) relay configuration looks like following:

The only significant change I have made that I remember is that I previously had "Read" disabled for DM relays.

Replying to unknown

nostr:nprofile1qqs83nn04fezvsu89p8xg7axjwye2u67errat3dx2um725fs7qnrqlgpr9mhxue69uhhyetvv9ujuur0wd6x2u3wwpkxzcm99u0at9yj almost made fdroid obsolete for my needs. Two nextcloud apps left and already asked for them to be added to Zapstore. Disabled the f-droid app for now

Can you briefly list advatnages and disadvantages of zapstore comparing to f-droid please?