Encrypted
Jump to navigation
Jump to search
General
See also DNS#DNSCurve, Security#TLS.2FSSL, Network#VPN
Overlay
Tor
- https://torproject.org/ - "The Onion Router" - Developed by the US Navy and EFF, widely used.
- https://www.antagonism.org/anon/ssh-tor.shtml
- http://www.howtoforge.com/anonymous-ssh-sessions-with-tor
Usage
sudo systemctl start tor google-chrome-stable --proxy-server="socks://localhost:9050" -incognito chromium --proxy-server="socks://localhost:9050" -incognito
- https://trac.torproject.org/projects/tor/wiki/doc/Preventing_Tor_DNS_Leaks
- https://www.dnsleaktest.com/
Software
- https://www.torproject.org/projects/torbrowser.html.en - Easy to use, for USB sticks.
- https://www.torproject.org/projects/vidalia - gui
Exit nodes
- https://blog.torproject.org/running-exit-node
- https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy
- http://raidersec.blogspot.co.uk/2013/09/mapping-tor-relays-and-exit-nodes.html
Hidden services
- https://www.torproject.org/docs/hidden-services.html.en
- http://en.wikipedia.org/wiki/List_of_Tor_hidden_services
- http://resources.infosecinstitute.com/tor-hidden-services/
Search
- https://kbhpodhnfxl3clb4.onion.to/ - torsearch
Social
Other
I2P
- http://i2p2.de/ - "Invisible Internet Protocol" - Uses 'garlic' routing.
- http://syndie.i2p2.de - Software for blogging on a I2P network