• chevron_right

      Boostez vos connexions SSH avec QUIC

      news.movim.eu / Korben · Thursday, 15 June, 2023 - 07:00 · 1 minute

    Connaissez-vous quicssh ?

    Eh bien, c’est un proxy QUIC qui promet de révolutionner notre façon de se connecter à un serveur SSH.

    Pour ceux qui ne le savent pas, QUIC est un protocole de transport qui vise à améliorer la vitesse des connexions et la sécurité sur Internet. Pour les plus anciens, ça vous rappeler peut être l’époque où vous avez découvert le TCP/IP… lol

    L’architecture standard d’une connexion SSH fonctionne comme ceci :

    Avec quicssh, pas besoin de modifier le client ou le serveur puisque tout est géré par le proxy QUIC. Ainsi, pour utiliser quicssh, il suffit d’exécuter les commandes client et serveur avec les options qui vont bien et votre connexion SSH transitera par QUIC comme ceci :

    Pour l’installer, entrez la commande suivante :

    go get -u moul.io/quicssh

    Voilà, c’est aussi simple que ça ! Après pour le reste, je vous invite à lire la doc.

    La différence de vitesse entre un client SSH traditionnel et Quicssh est assez remarquable. Je vous invite à faire vos propres tests, mais attention, Quicssh est un projet relativement jeune, donc attendez-vous à quelques bugs, mais aussi à le voir s’améliorer dans les semaines qui viennent…

    Source

    • chevron_right

      A Decade of Pirate Bay Proxy War: Did ISP Blocking Slay the Hydra?

      news.movim.eu / TorrentFreak · Sunday, 21 May, 2023 - 19:20 · 3 minutes

    13hydra Argentina, Australia, Austria, Belgium and Brazil; just two letters of the alphabet and that’s already five countries that have implemented ISP blocking against The Pirate Bay.

    The growing list, which continues with Denmark and persists through Finland, France and Germany, doesn’t stop until it reaches the United Arab Emirates and finally, the UK.

    That’s around 30 countries overall, give or take, that have resorted to ISP blocking because no matter what’s thrown at it, The Pirate Bay simply refuses to die.

    At least in part, the site is still alive after more than a decade of widespread blocking due to the existence of proxy sites. These sites tend to look and feel like The Pirate Bay but operate from different domain names that aren’t yet on ISP blocklists.

    This means that otherwise blocked internet users get to enjoy broadly the same Pirate Bay experience as they did before. At least for a while.

    Rightsholders Also Block Pirate Bay Proxies

    As reported yesterday, one of the most popular Pirate Bay proxy indexing sites recently disappeared from GitHub.

    ProxyBay was a significant player, one that had helped dozens of millions of users gain access to The Pirate Bay by directing them to active Pirate Bay proxy sites. However, in common with The Pirate Bay itself, proxy sites are also subjected to ISP blocking, which can render some of them redundant, not to mention inaccessible.

    Given that proxy sites and proxy indexes contribute to the overall health of the Pirate Bay ‘hydra’, that got us thinking: Is the hydra alive and well? Or has it lost a few too many heads over the years?

    Data Sources Used

    While we’re aware that proxy sites face blocking in several countries, until today we’d never drilled into the details. It quickly became apparent that a complete overview would require significant time and resources but our short report today should help set the tone.

    To weigh rightsholders’ responses to strictly Pirate Bay proxy sites, we obtained domain blocking lists used by ISPs in the UK, Denmark and Italy. The original plan was to include Portugal, India and a handful of other countries but the volume of data was soon overwhelming.

    Instead of including those additional countries, we used data from the Infringing Website List (IWL) operated by the UK’s Police Intellectual Property Crime Unit.

    Proxies Face Massive Blocking

    After merging data from all four sources, we removed any duplicate proxy domains, any domains that weren’t clearly dedicated or directed at the Pirate Bay, plus any domains where their key role could not be identified due to downtime or other reasons.

    The final total of Pirate Bay proxies, all of which are subjected to blocking and/or restrictions on business due to their appearance on the IWL, is 670 to 690 domains, give or take. While that remains a large number, including other countries’ blocklists would’ve inflated that number considerably.

    The big question is whether all of those domains are live, in business, and helping to unblock The Pirate Bay. The simple answer to that is ‘no’. While we were able to test whether sites were active in some way, we couldn’t determine exactly what they were doing, unless we visited every last one and took a screenshot for proof.

    …..So That’s What We Did

    The image below is comprised of roughly 670 screenshots featuring obviously live proxies (mostly white), a lot of seemingly dead proxies (dark), and a surprising number of domains up for sale (mostly blue). (click to enlarge)

    It’s not possible to determine the exact reasons why so many proxies appear to have thrown in the towel, in some cases on multiple domains. That being said, it’s highly likely that ISP blocking played an important role in dampening enthusiasm for spending more money on yet another domain.

    Since the data was at hand, we decided to throw all of the live domains at their DNS and then wait for a list of IP addresses to come out. We fed those into an IP location service which produced the map in the image below.

    The large blue blob on the left, representing the location where most Pirate Bay proxies point, is the home of Cloudflare and another kind of proxy – a reverse proxy.

    That means that in all likelihood, the Pirate Bay proxies are hosted somewhere else entirely, not unlike The Pirate Bay itself. At least for now.

    From: TF , for the latest news on copyright battles, piracy and more.

    • chevron_right

      Fighting VPN criminalization should be Big Tech’s top priority, activists say

      news.movim.eu / ArsTechnica · Monday, 20 March, 2023 - 11:00 · 1 minute

    Fighting VPN criminalization should be Big Tech’s top priority, activists say

    Enlarge (credit: Aurich Lawson | Getty Images)

    “Women, life, freedom” became the protest chant of a revolution still raging in Iran months after a 22-year-old Kurdish woman, Mahsa Amini, died while in custody of morality police. Amini was arrested last September for “improperly” wearing a hijab and violating the Islamic Republic's mandatory dress code laws. Since then, her name has become a viral hashtag invoked by millions of online activists protesting authoritarian regimes around the globe.

    In response to Iran's ongoing protests—mostly led by women and young people—Iranian authorities have increasingly restricted Internet access. First, they temporarily blocked popular app stores and indefinitely blocked social media apps like WhatsApp and Instagram. They then implemented sporadic mobile shutdowns wherever protests flared up. Perhaps most extreme, authorities responded to protests in southeast Iran in February by blocking the Internet outright, Al Arabiya reported . Digital and human rights experts say motivations include controlling information, keeping protestors offline, and forcing protestors to use state services where their online activities can be more easily tracked—and sometimes trigger arrests.

    As getting online has become increasingly challenging for everyone in Iran—not just protestors—millions have learned to rely on virtual private networks (VPNs) to hide Internet activity, circumvent blocks, and access accurate information beyond state propaganda. Simply put, VPNs work by masking a user's IP address so that governments have a much more difficult time monitoring activity or detecting a user's location. They do this by routing the user's data to the VPN provider's remote servers, making it much harder for an ISP (or a government) to correlate the Internet activity of the VPN provider's servers with the individual users actually engaging in that activity.

    Read 47 remaining paragraphs | Comments

    • chevron_right

      How to Setup and Enable WhatsApp Proxy on Linux

      TREND OCEANS · Sunday, 15 January, 2023 - 10:37

    When you are cut off from your loved ones for an extended period of time, how do you think you will feel? I mean, it’s bad, right? To solve this problem, WhatsApp made a feature called “WhatsApp proxy,” which lets you talk to your loved ones even if the government blocks or disrupts the connection.

    Read More

    #linux #tools #web #ubuntu #docker #proxy #tech #whatsapp #socialmedia

    Android application for on-line privacy and security.

    InviZible Pro. (Open source)
    New version 5.9.0

    Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

    InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

    DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

    Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

    The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

    InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

    - InviZible Pro does not support ipv6 at this time.

    Features:
    * No root required
    * Hides location and IP
    * Unblocks the restricted web content
    * Prevents tracking
    * Allows access to hidden networks
    * ARP spoofing detection
    * Built-in firewall
    * Tethering supported
    * No analytics
    * No advertisements
    * Open source
    * Material design theme

    Premium feature:
    * Automatic Updates – Use the latest versions of InviZible Pro, and its modules such as DNSCrypt , Tor, and Purple I2P.
    * Absence of reminder about the need to support the project.
    * Priority technical advice.
    * Material design night theme

    What's New
    * Updated DNSCrypt to version 2.1.2.
    * Added http3 option to DNSCrypt settings (DoH3, HTTP over QUIC).
    * Updated Tor to version 4.7.10.
    * Updated Tor snowflake bridge to version 2.3.0.
    * Tor restarts if the internet connection is lost.
    * Fixed requesting Tor bridges via the app interface.
    * Updated Purple I2P to version 2.43.0.
    * Added SSU2 option to Purple I2P settings.
    * Added Italian translation.
    * Fixes and optimizations.

    Please visit the project’s page: https://invizible.net/en

    Download from Google Play: https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

    F-droid: https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

    Take a look at source code: https://github.com/Gedsh/InviZible

    #android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro
    • chevron_right

      Connexion instable ? Voici la solution !

      news.movim.eu / Korben · Friday, 8 July, 2022 - 07:00

    Si vous êtes basé en Chine ou dans un pays où la connexion est vraiment instable, compliquée ou si vous utilisez des moyens de connexion qui coupent souvent (satellite, wifi public merdique…etc.), voici un proxy à tester absolument.

    Son nom : Hysteria !

    Cet outil réseau une fois déployé sur un serveur permet grâce au protocole QUIC d’optimiser les réseaux de mauvaise qualité pour favoriser une connexion relativement stable.

    Hysteria peut ainsi être utilisé en SOCKS5 (TCP / UDP), HTTPS / HTTP, relai TCP / UDP, TProxy, TUN / TAP…etc. Bref, un gain de qualité pour tous ceux qui surfent dans des conditions difficiles.

    Force à vous !

    Pour ceux que ça tente, la documentation est ici .

    Android application for on-line privacy and security.

    InviZible Pro. (Open source)
    New version 5.8.0

    Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

    InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

    DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

    Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

    The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

    InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

    - InviZible Pro does not support ipv6 at this time.

    Features:
    * No root required
    * Hides location and IP
    * Unblocks the restricted web content
    * Prevents tracking
    * Allows access to hidden networks
    * ARP spoofing detection
    * Built-in firewall
    * Tethering supported
    * No analytics
    * No advertisements
    * Open source
    * Material design theme

    Premium feature:
    * Automatic Updates – Use the latest versions of InviZible Pro, and its modules such as DNSCrypt , Tor, and Purple I2P.
    * Absence of reminder about the need to support the project.
    * Priority technical advice.
    * Material design night theme

    What's New
    * Updated Tor to version 4.7.8.
    * Updated Tor snowflake bridge to version 2.2.0.
    * Updated Tor obfs4proxy to version 0.0.13.
    * Updated Purple I2P to version 2.42.1.
    * Implemented real-time connection logs for Root mode.
    * Improved real-time connection logs for VPN mode.
    * Added a switch to enable/disable real-time connection logs.
    * Improved firewall for Root mode.
    * The "Run modules with Root" option is no longer supported and will be hidden in the Common Settings.

    Please visit the project’s page: https://invizible.net/en

    Download from Google Play: https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

    F-droid: https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

    Take a look at source code: https://github.com/Gedsh/InviZible

    #android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro
    Android application for on-line privacy and security.

    InviZible Pro. (Open source)
    New version 5.7.0

    Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

    InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

    DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

    Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

    The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

    InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

    - InviZible Pro does not support ipv6 at this time.

    Features:
    * No root required
    * Hides location and IP
    * Unblocks the restricted web content
    * Prevents tracking
    * Allows access to hidden networks
    * ARP spoofing detection
    * Built-in firewall
    * Tethering supported
    * No analytics
    * No advertisements
    * Open source
    * Material design theme

    Premium feature:
    * Automatic Updates – Use the latest versions of InviZible Pro, and its modules such as DNSCrypt , Tor, and Purple I2P.
    * Absence of reminder about the need to support the project.
    * Priority technical advice.
    * Material design night theme

    What's New
    * Updated Tor to version 4.7.6.
    * Updated Tor snowflake bridge to version 2.1.0.
    * Updated Purple I2P to version 2.41.0.
    * Implemented the use of Tor relays as default vanilla bridges.
    * Implemented Tor bridges sorting and swipe to refresh bridges ping.
    * Implemented firewall for Root mode.
    * Optimized memory usage in VPN mode.
    * Added Turkish translation.

    Please visit the project’s page: https://invizible.net/en

    Download from Google Play: https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

    F-droid: https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

    Take a look at source code: https://github.com/Gedsh/InviZible

    #android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro
    Android application for on-line privacy and security.

    InviZible Pro. (Open source)
    New version 5.6.0

    Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

    InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

    DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

    Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

    The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

    InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

    - InviZible Pro does not support ipv6 at this time.

    Features:
    * No root required
    * Hides location and IP
    * Unblocks the restricted web content
    * Prevents tracking
    * Allows access to hidden networks
    * ARP spoofing detection
    * Built-in firewall
    * Tethering supported
    * No analytics
    * No advertisements
    * Open source
    * Material design theme

    Premium feature:
    * Automatic Updates – Use the latest versions of InviZible Pro, and its modules such as DNSCrypt , Tor, and Purple I2P.
    * Absence of reminder about the need to support the project.
    * Priority technical advice.
    * Material design night theme

    What's New
    * Updated Tor to version 4.6.10 (onion v2 services are no longer supported).
    * Updated Tor snowflake bridge to version 2.0.1.
    * Updated Tor geoip and default bridges.
    * Updated Purple I2P to version 2.40.0.
    * Fixed visiting onion websites with DNSCrypt force_tcp enabled.
    * Pausing InviZible instead of completely shutting down when using another VPN.
    * Improved the Arp Spoofing attack detector.
    * Optimized battery usage.
    * Improved firewall.

    Please visit the project’s page: https://invizible.net/en

    Download from Google Play: https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

    F-droid: https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

    Take a look at source code: https://github.com/Gedsh/InviZible

    #android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro