Posts Tagged ‘VPN’

tv crime2ChaosVPN is a system to connect Hackers.

Design principals include that it should be without Single Point of Failure, make usage of full encryption, use RFC1918 ip ranges, scales well on >100 connected networks and is being able to run on an embedded hardware you will find in our today’s router. It should be designed that no one sees other peoples traffic. It should be mainly autoconfig as in that besides the joining node no administrator of the network should be in the need to actually do something when a node joins or leaves. If you want to find a solution for a Network without Single Point of failure, has – due to Voice over IP – low latency and that no one will see other peoples traffic you end up pretty quick with a full mesh based network.

Therefore we came up with the tinc solution. tinc does a fully meshed peer to peer network and it defines endpoints and not tunnels.

ChaosVPN connects hacker wherever they are. We connect road warriors with their notebook. Servers, even virtual ones in Datacenters, Hacker houses, and hackerspaces. To sum it up we connect networks – may be down to a small /32.

So there we are. It is working and it seems the usage increases, more nodes join in and more services pop up.

Installation

  • Installation dependency package

    If you get an “E: The package bison is not available for the candidate” error, please add them to your sources.list file
    deb http://debian.sdinet.de/ stable chaosvpn
    deb-src http://debian.sdinet.de/ stable chaosvpn
    apt-get update

  • Install
    apt-get install chaosvpn
    If the error cannot be installed
    vi /etc/apt/sources.list
    deb http://security.debian.org/debian-security wheezy/updates main
    apt-get update
    apt-get install libssl1.0.0
    apt-get install chaosvpn

Configuration

  • For tinc and chaosvpn docking operation
    mkdir -p /etc/tinc/chaos
    tincd –ne=chaosvpn –generate-keys=2048
    if you get “Error opening file `/etc/tinc/=chaosvpn/rsa_key.priv’: No such file or directory” error, then run a command:
    mkdir /etc/tinc/chaos/ecdsa_key.priv
  •  executed
    tincd –ne=chaosvpn –generate-keys=2048
  • run command
    vi /etc/tinc/chaosvpn.conf
    Change parameters
    $ my_vpn_ip = 172.31。。[1-255]
    Only use a-z, 0-9 and underline
    Ip address to be changed to 172.31.x.x
    Save the exit.
  • you have to join chaosVPN also must write a letter of introduction to indicate your motive, send mail to chaosvpn-join@hamburg.ccc.de
  • If you join, in the terminal input chaosvpn, you can see some information.

    The contents of the letter of introduction are:

  • Start
    /etc/init.d/chaosvpn start
  • View the chaosvpn network port
    route -n

 

Advertisements

Caintech.co.uk

 

 

In today’s society, every citizen is monitored, tracked, and profiled by their government and affiliated agencies; the American National Security Agency (NSA) and the Great Britain Government Communications Headquarters (GCHQ) are two commonly discussed examples. This page is to provide a resource for learning more about staying secure online.

Basic Security Tips:

  • When discussing potentially sensitive or anti-government issues, make sure to use a fake, online alias.
  • Never reveal your real name when associating with your online alias.
  • Always use a virtual private network.
  • Pay for things associated with your online alias, with a prepaid card. Pay for the prepaid card in cash if possible.

Virtual Private Networks

A virtual private network, also known as a VPN, is a service used to add a layer of security and privacy to networks. VPNs are often used by businesses and corporations to protect sesitive data. Although, using a VPN is becoming increasingly more popular for the average person.

Privacy and security is increased, because when active, the VPN will “replace” the users IP address with one from the VPN provider. It will also “change” your domain name system address, also known as DNS address, which will not allow your internet service provider to view what websites you are visiting. In addition to these privacy and security increases, it encrpyts your internet traffic. Most VPN providers offer at least 128-bit AES encryption, which according to documents leaked by Edward Snowden, has not been broken by the NSA yet. Some also offter 256-bit AES encryption, which is more secure.

Warnings

  • Free VPN providers are likely selling their logs and/or compromising your security.
  • Do not tell anyone what provider you are using.
  • Be sure to read the Terms of Service and Privacy Policy before using a VPN service.
  • Do your own research. Don’t trust random sources.

VPN Providers

Below is a list of paid VPN providers. We do not support or endorse any of the providers listed below. We merely provide this list as a starting point into researching the provider that is right for you.

Private Internet Access

IPVanish

AirVPN

TigerVPN

Perfect Privacy

Hide.Me

TorGuard

View a larger list of VPN Providers here.

DNS Leaking

When utilizing an anonymity service, it is extremely important that all traffic coming from your computer is routed through the anonymity network. If any traffic leaks outside of the secure connection to the network, an adversary monitoring your traffic will be able to log your activity.

DNS or the domain name system is used to translate domain names such as http://www.duckduckgo.com into numerical IP addresses such as 111.222.333.444, which are required to route packets of data on the internet. Whenever your computer needs to contact a server on the internet, such as when you enter a domain name into your browser, your computer reaches out to a DNS server and requests the IP address associated with that domain name. Most Internet service providers assign their customers a DNS server which they control and use for logging and recording your internet activities.

Under certain conditions, although connected to the anonymity network, the operating system will continue to use its default DNS servers instead of the anonymous DNS servers assigned to your computer by the anonymity service. DNS leaks are a huge privacy threat since the anonymity service may be providing a false sense of security while data is leaking.

Be sure to check if you are leaking any data by visiting one of the websites below.

DNS Leak Test
IP Leak

Search Engine Tracking

The sad truth is that no matter where we go, big corporations and governments attempt to track, profile, and control us. Even our own “beloved” Google search engine is used to track everything we search for. Everytime you use a regular search engine, your search data is recorded. Major search engines capture your IP address and use tracking cookies to make a record of your searches, the time, and the links you choose – then they store that information in a huge database.

Investigation of those searches reveal a shocking amount of personal information about you, such as your interests, family circumstances, political believes medical conditions, financial status, and more. This database is a modern-day gold mine for government officials, hackers, and marketers. To stop storing your future searches in this database, it is recommended that you use alternative search engines.

Alternative Search Engines

There are many search engine alternatives to Google, Yahoo, Bing, and Yandex that are dedicated to the privacy of their users. The list below is a small list of the alternative search engines available.

DuckDuckGo

StartPage

Disconnect Search

IXQuick

 

TV watching

What is a virtual private network (VPN)

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization’s network.

That’s all well and good but what do you really want a VPN for; looking at Facebook from school, downloading torrents from a site that your ISP has blocked, to watch streaming sites from a foreign county or just to stop big brother from spying on you.
So having said that below is a list of the top 19 free VPN services (would have been 20 but one site was down)

 

 

1) Free VPN by WSC

The Free VPN service protects web surfing session on your home Internet network as well as on Public Internet networks (both wired and wireless). Free VPN enables you to access all web content freely and securely. Free VPN supports Windows 7/Vista/XP (both 32 bit and 64 bit)

Free VPN Features

  • Access blocked websites from within a corporate environment
  • Watch Hulu.com, Pandora.com, ABC.com, BBC.co.uk Abroad
  • Use VoIP software like Skype if it’s blocked.
  • Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices and ISP hubs.
  • Hide your IP address for your privacy online.

Download – thefreevpn to access blocked websites.

2) Hotspot Shield

Hotspot Shield is yet another free VPN service available that ensures your privacy and security online. If you want to install Hotspot Shield on your iPhone then visit here for more information on how to configure free VPN on iPhone. It works on both wireless and wired connections providing unlimited Bandwidth. Supports Windows 7/Vista/XP, Mac OS, Snow Leopard.

Features of Hotspot Shield

  • Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
  • Protect yourself from identity theft online.
  • Hide your IP address for your privacy online.
  • Access all content privately without censorship; bypass firewalls.
  • Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices.

Download – Hotspot Shield to protect your identity online

3) AlwaysVPN

AlwaysVPN creates an encrypted link between your computer and AlwaysVPN servers and then forwards all of your internet traffic through this link.

AlwaysVPN Features

  • Prevent local eavesdroppers from listening in on your web communication.
  • Bypass restrictive firewalls.
  • Allows you to Access US only web content like Hulu, ABC and other video networks that were blocked previously.
  • Bypass Government firewalls or web content filtering.

4) Tor VPN

Tor is free software that protects your online privacy, business activities and relationships. Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe’s PDF plugin, and others that can be manipulated by hackers into revealing your IP address and thereby stealing confidential information. Using Tor might disable Youtube. If you want to view videos at Youtube, you can reconfigure Torbutton to allow it. Supports Windows Mac OS and Linux.

Download Tor to protect your online privacy

5) ItsHidden

Most free VPN service on the Internet like Tor provides limited bandwidth or usage restriction. ItsHidden.com is the ultimate FREE surfing privacy service on the Internet that provides you over 5 GB of dedicated bandwidth to its users. ItsHidden works on BitTorrent (BT) traffic (both upload and download transfer) making it useful for users whose torrent traffic been choked by their ISP, or users who need to hide themselves for anti-piracy organizations from sharing copyrighted content. There is no software required and ItsHidden.com works on all Platforms including Windows, Mac, Linux, IPhone etc

Features of ItsHidden

  • ItsHidden.com is fast and reliable with over 5 gigabits of dedicated bandwidth.
  • Instant access & no software is needed
  • Total privacy, no records of your surfing are kept by us
  • 128-bit secure connection to ensure privacy over all networks

Sign up for ItsHidden VPN service.

6) UltraSurf

UltraSurf is a popular tool to protect Internet privacy with anonymous surfing and browsing. The tool hides or mask the IP addresses and locations, clean browsing history, cookies & more to hide your identity online. With Ultrasurf you can also browse any website freely, that were blocked before. Support Windows only.

Download UltraSurf 9.8. Firefox users need to download the Firefox add-on besides the software

7) NotMyIP

NotMyIP is free online privacy protection software that hides your real online identity from cyber thieves by masking your IP address, which might reveal sensitive information. Not my IP lets you access blocked websites, allows you to vote and comment on forums you were banned before, and further more to prevent other people (organizations) to follow you online by providing you different proxies from all over the world.

Download Not My IP – Free Online Protection Tool.

8) Freenet

Freenet is free tool that allows you to share files, browse, publish, and chat on forums, without fear of censorship anonymously. Freenet when used in “darknet” mode, where users only connect to their friends, is very difficult to detect. Communications by Freenet nodes are encrypted and are routed through other nodes to make it extremely difficult to determine who is requesting the information and what its content is. Supports Windows, Mac OS, Linux

Download Freenet for Windows, Mac OS and Linux

9) Freegate

Freegate is an anti-censorship tool that enables internet users from mainland China, Iran, Syria, Tunisia, Turkey and United Arab Emirates, to view blocked websites and content by their governments. The tool uses multiple open proxies allowing users to penetrate firewalls used to block web sites. Freegate works by tapping into an anti-censorship backbone, DynaWeb, DIT’s P2P-like proxy network system and FirePhoenix used most widely to get around China’s Great Firewall. Supports Windows OS only.

Download – Freegate to penetrate China’s Great Firewall

10) GPass

GPass is a highly advanced software that encrypts online data, hide IP address, and sidestep content filtering and monitoring using a number of secure channels to connect to the Internet and break through the Internet blockade. It encrypts the data sent on the internet, keeping your content safe. The tool allows accessing blocked websites by penetrating into the firewalls and bypassing network censorship. GPass supports streaming audio/video, email, instant messaging, download managers, as well as web surfing. Supports Windows.

Download GPass for Windows

11) JonDo

The JonDo anonymous proxy software protects your Internet access against observation from ISPs, websites and even against the anonymous proxy servers and their operators. Blogger can use it for publishing their views anonymously in order to avoid punishment, disadvantages at work.Supports Windows, Mac OS, Linux

Download JonDo for Windows Mac & Linux

12) UltraVPN

UltraVPN is a client/server SSL VPN solution based on OpenVPN. It encrypts and anonymizes your network connection.

UltraVPN Features

  • Watch streaming websites like hulu.com or favorite-tvshows.com
  • Access blocked websites from within a corporate environment
  • Connect or log in into MSN if it’s blocked
  • Use VoIP software like Skype if it’s blocked
  • Protect your email and browsing privacy

Download UltraVPN for Windows

13) GNUnet

GNUnet is a secure peer-to-peer networking tool that uses a service on top of the networking layer allowing anonymous file-sharing. The tool uses link-encrypted connections with stable bandwidth utilization to communicate between peers. GNUnet uses a simple, excess-based economic model to allocate resources.

Download GNUnet for Windows, Mac & Linux

14) Alonweb

VPN service offers to preserve anonymity on the web and encrypt the transferred data. VPN provides a secure connection, hides your real IP address and encrypts the transferred data (correspondence, passwords, sent files). Just register yourself for free anonymous web surfing. Free VPN service from Alonweb offers its users connection via two servers: Netherlands and Panama with some limitations (not for premium users) like – Only 1Gb of data traffic per month is available, maximum HTTP request size is 2Mb, heavy traffic consuming protocols and games are blocked.

Register yourself on Alonweb for free VPN

15) Your Freedom

Your Freedom VPN service that bypass restrictive firewalls, filter web proxies and hides network or IP address. Once installed you can easily penetrate into a firewall or a filtering web proxy and access blocked web pages. The tool allows you to stay anonymous, as your IP address is not logged with every access to someone’s web page. Nearly all applications work with Your Freedom, but make sure to have an Internet access entirely. It also allow you to play many online games like World of Warcraft, Second Life, Lineage 2, Final Fantasy XI, EVE Online and many more through web proxies. Supports Windows and Mac

Download Your Freedom to bypass firewalls & Filter web proxies

16) CyberGhost

CyberGhost conceals your IP address and completely protects your data transmissions from eavesdroppers. With 128-bit AES encryption, you can surf anonymously. Supports Windows OS only.

Download CyberGhost to surf anonymously

17) Loki Network Project

It is free VPN service and SSL based free VPN server to protect your private data like IP address, e-mail/FTP/HTTP passwords, web-sites visited, uploaded/downloaded files and etc. It also bypasses internet access limitations, if any. Public Loki VPN Service also protects data from being intercepted by various network sniffers in your LAN segment and safely bypass traffic interception and analyses on corporate, ISP or even country level firewall. Supports Windows only.

Download Loki Network Project to bypass any limitations in visiting web-sites or any other Internet services

18) Comdo EasyVPN

Free VPN software, Comodo EasyVPN uses 128 bit encryption providing you complete security right on top of Internet. EasyVPN allows you to create your own private ‘network-within-the-Internet’ that only the contacts you invite are able to view and use.

Features of Comodo EasyVPN

  • Access your PC from anywhereEasyVPN makes it simple to gain control of any machine in your network.
  • Security by Comodo – EasyVPN allows you to create your own private ‘network-within-the-Internet’ that only the contacts you invite are able to view and use.
  • Remote File and Printer Sharing – Creating an EasyVPN network allows you to exchange files and folders and even print to your local printer from any remote location.

Download Comodo EasyVPN 32 bit version | 64 bit version

19) Wippien

Wippien allows you to access your friends’ shares, printers, services, desktop, even ping them by providing an IP address. Wippien uses WeOnlyDo wodVPN component to establish P2P between peers, and then redirects all traffic from Virtual Network Adapter through wodVPN to remote side.

Download Wippien

VPN (Virtual Private Network) technology lets a computer using a public Internet connection join a private network by way of a secure “tunnel” between that machine and the network. The most common case is a business allowing its employees to connect to its work network from home or from the road.

There are two principal ways to configure VPN. The first and more-common scenario, called outgoing, is setting up a remote computer to call into the office network. The second scenario, called incoming, occurs on the network side, where a computer allows secure connections from other computers. Windows 7 comes preloaded with the Agile VPN client, which makes setting up either kind of connection relatively easy.

Step by Step: Connecting to a VPN (Outgoing)

Step 1 Click the Start button. In the search bar, type VPN and then select Set up a virtual private network (VPN) connection.

Step 2 Enter the IP address or domain name of the server to which you want to connect. If you’re connecting to a work network, your IT administrator can provide the best address.

Step 3 If you want to set up the connection, but not connnect, select Don’t connect now; otherwise, leave it blank and click Next.

Step 4 On this next screen, you can either put in your username and password, or leave it blank. You’ll be prompted for it again on the actual connection. Click Connect.

Step 5 To connect, click on the Windows network logo on the lower-right part of your screen; then select Connect under VPN Connection.

Step 6 In the Connect VPN Connection box, enter the appropriate domain and your log-in credentials; then click Connect.


Step 7 If you can’t connect, the problem could be due to the server configuration. (There are different types of VPN.) Check with your network administrator to see what kind is in use–such as PPTP–then, on the Connect VPN Connection screen, select Properties.

Step 8 Navigate to the Security tab and select the specific Type of VPN from the drop-down list. You may also have to unselect Include Windows logon domain under the Options tab. Then click OK and Connect.

Step by Step: Building a VPN (Incoming)

Step 1 Click the Start button, and, in the search bar, type Network and Sharing.

Step 2 Click Change Adapter Settings in the left-hand menu.

Step 3 Click File, and then New Incoming Connection.

Step 4 Select the users you’d like to give access to and click Next.

Step 5 Click Through the Internet and select Next.

Step 6 Select the Internet Protocol you’d like to use. (The default TCP/IPv4–the line highlighted in the screenshot below–will work fine.)

Internet users in Pakistan might have a harder time protecting their information — from authority interception and crooks alike — after a ban on virtual private networks (VPNs) takes effect.

The Pakistan Telecommunications Authority sent a legal notice to the country’s ISPs, ordering them to turn in customers who use VPNs, The Guardian reports. According to the notice, anyone who wants to use a VPN needs to ask for special permission.

VPNs allow you to go undetected while using the Internet and sending messages. They are commonly used to access blocked sites (Facebook, Twitter ect) or to create a secure network for a business’s remote employees.

Pakistani authorities say the purpose of the ban, which was instated in 2010 but was not seriously enforced, is to inhibit terrorist communications. All Internet activity in Pakistan is routed through the state-run Pakistan Internet Exchange, creating an easy opportunity for the government to monitor messages that aren’t protected by a VPN.

Paul Ducklin, Sophos’s head of technology for Asia Pacific, argues in a blog post that the ban will also make it much easier for crooks to hijack valuable information. “An Internet in which encryption was banned altogether would be even more dangerous than what we have today,” he writes.

Bans on encryption software aren’t rare. India, China and Iran are just a few of the countries that require some state approval for encryption software.

Source: Guardian, Mashable