Packet Pusher
2.74K subscribers
773 photos
41 videos
11 files
557 links
InfoSec, Tor Relays, Monero, Linux. Shares ≠ Endorsements.

Mail: [email protected]
GPG: t.iss.one/packet_pusher/3
XMR:
858UDWfimHGPaTyckAjdLVhZcXztHMHfZNqNiuSw3545P1MACspMWqtimdULiwMSWsP47QNGwPeFUSaDTN9wfTUU6tKL1nQ
Download Telegram
Accurate time is incredibly important for cryptography. Things like certificates and pki all rely on having an accurate clock. NTP was never designed with security in mind, and a network-level adversary can manipulate normal plaintext NTP traffic in ways that would allow them to make your clock jump forward or backwards. Preventing this means your system needs a reliable source of time. NTS (Network Time Security) adds a layer of authenticated encryption to normal NTP which helps to mitigate the tampering part of this problem. Afaik, only Chrony and NTPsec provide NTS-secured NTP. I recommend Chrony because it is pretty straightforward to configure and reliable.

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_basic_system_settings/assembly_overview-of-network-time-security-in-chrony_configuring-basic-system-settings
The EU Wants Its Own DNS Resolver that Can Block ‘Unlawful’ Traffic

The EU is planning to develop its own government-run DNS resolver. The project dubbed DNS4EU is meant to offer a counterweight to the popular resolvers that are mostly based in the U.S. Aside from offering privacy and security to users, the DNS solution will also be able to block "illegal" websites, including pirate sites.

https://torrentfreak.com/the-eu-wants-its-own-dns-resolver-that-can-block-unlawful-traffic-220119/

#eu #dns
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Encrypt your DNS. If you don't already, use Android's "Private DNS" feature under your network settings. If you're on Linux, use DnsCrypt-Proxy. If you use Chrome or FireFox, set up your browser to use DNSoverHTTPS.
Excellent script for finding public proxies that allow https traffic. What you decide to use them for is up to your imagination. Do also be careful and never trust a public proxy - ie use a VPN/Tor before connecting to said proxy.
https://github.com/stamparm/fetch-some-proxies
A good reason to ditch Bitcoin and similar cryptocurrencies in favor of Monero.

With that being said, the SPLC's publishing of Monero addresses holds no weight because, unlike other cryptocurrencies, there is no way for them to surveil the inputs and outputs of the Monero blockchain.

TLDR: Basically, they can't see who sends Monero to a given wallet, where funds from that wallet go, or even if the given wallet has funds in it to begin with. That is the power of Monero.
https://mobile.twitter.com/Hatewatch/status/1480651996302557187
***Repost, but still highly relevant.***

BLUF: Use at least a 7 to 8 word passphrase for encryption.

For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security against normal bruteforcing.

Why a couple of words and not just some 16 or 20 random character password? Memorization. A passphrase is significantly easier to memorize compared to a password, and it holds up stronger thanks to key stretching.

For security against an adversary (like the NSA/FBI) who will probably have a quantum computer within the next decade, the passphrase needs to be longer.
Packet Pusher
***Repost, but still highly relevant.*** BLUF: Use at least a 7 to 8 word passphrase for encryption. For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security…
It really boils down to what your threat model is. It could include any number of things from simple unauthorized access, all the way to the feds confiscating your mobile device and hooking it up to one of Cellebrite's black boxes - in the end, its up to you.
Packet Pusher
https://www.eff.org/dice
Use something like a password manager as well. Say you use something like KeePassXC or Bitwarden to manage passwords and have a phone and a laptop. You would only have to memorize 3 passphrases. One to unlock your password manager and the other two to unlock your devices. The rest can all be safely stored in your password manager.
1