techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

5.3K
active users

#torbrowser

9 posts6 participants0 posts today
Replied in thread

@JessTheUnstill @bohwaz @punkfairie @ajsadauskas @tomiahonen @fuchsiii

Granted, @tails_live @tails / #Tails and @torproject / #TorBrowser are propably one of the best & most battle-tested options that are useable for #TechIlliterates...

THAT'S NOT GOING TO HAPPEN!

If not for being absurd then for the fact that people need to get things done!

  • And it's not as if I haven't taught people how to get started, ranging from having to crash-course someone remotely via chat to hand-on #CryptoParty sessions: If it's way more complex than an AKM chances are people won't stick with it!

So you can imagine how glad I was when @thunderbird merged #Enigmail into #Thunderbird so there's no more fiddling around getting #PGP/MIME to work!

Replied in thread

@ajsadauskas @JessTheUnstill @tomiahonen @fuchsiii obviously, that would've been a good standard for everyone, given that almost all non-#Gaming #Apps these days are #WebApps and at that point we'd not have 100+ MB #bloatware that essentially just loads a #Website and can't even cache shit!

Personally I believe the @europarl_en & @EUCommission could do that and establish as well as enforce an #EC #norm, just as they did with #USBc, #CCS2 and #GDPR!

#Android needs to be better as in being more than just the "lesser evil" compared to iOS!

Continuing my survey of current web browsers, I'll note that the Tor Browser is really good at its job of keeping your private web browsing actually private, and there are mitigations available for edge cases like someone being able to tell that you're using Tor (even if they can't tell what you're doing with it).

The cost of that privacy is mostly that it's slow and won't be able to handle some web applications (either because features have been disabled or because the website blocks Tor), so it's inconvenient for everyday browsing, but if you need to hide activity from a stalker, an abuser, a harassment campaign, a government, etc. it's worth learning how to use it.

Close-up of several old books, pressed next to each other spine out like they're on a shelf, bound in canvas and with varying thicknesses and faded colors. No titles are visible, but the leftmost has a design resembling a tall stalk with alternating leaves and berries, and the rightmost has a design that could be leaves or dragonfly wings, one mostly visible at the top and the other barely visible at the bottom.
Kelson Reviews StuffWeb Browser at Kelson Reviews Stuff

Snow White — Beware the Bad Apple in the Torrent

A new malware campaign is targeting users attempting to download the Snow White movie through torrent sites. The attackers exploit a compromised blog to distribute a malicious torrent package disguised as a pirated version of the film. The package contains a fake codec installer that, when executed, deploys sophisticated malware. This malware disables security features, installs the TOR browser, and communicates with a Dark Web C2 server. The campaign revives old social engineering tactics while incorporating modern malware delivery methods and anti-detection techniques. The article provides file hashes and IoCs for detection, emphasizing the ongoing risks associated with pirated content and the importance of updated security measures.

Pulse ID: 67e5309b5ce9eebde6617131
Pulse Link: otx.alienvault.com/pulse/67e53
Pulse Author: AlienVault
Created: 2025-03-27 11:03:55

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Private #Browserfenster verhindern keine Identifikation im Netz.

Die #IP-Adresse und das Browser-#Fingerprinting ermöglichen weiterhin das Benutzer-#Tracking.

Wer wirkliche #Anonymität sucht, sollte auf Tools wie den #TorBrowser setzen. Doch auch der schützt nicht vor allen Gefahren.

deutschlandfunk.de/was-bringt-

Replied in thread

@StaceyCornelius In the past I did configure seperate systems for clients so they can travel without fuss regardless if "P.R." #China or #Russia or the #USA or #KSA...

  • The trick is to never have anything on your device and have a dedicaded burner!

Using @tails_live / @tails / #Tails and @torproject / #TorBrowser and when that's not an option, a #SSH-Tunnel / #OpenVPN or #WireGuard-#VPN to be able to #VNC into a machine.

  • Remember: They can only extract data that was saved on a machine!

CONSIDER THE #US ENEMY TERRITORY AS IN "If you wouldn't enter #NorthKorea, then why would you enter the USA?"