est.social on üks paljudest sõltumatutest Mastodoni serveritest, mida saab fediversumis osalemiseks kasutada.
est.social on mõeldud Eestis üldkasutatavaks Mastodoni serveriks. est.social is meant to be a general use Mastodon server for Estonia.

Administraator:

Serveri statistika:

90
aktiivsed kasutajad

#meek

0 postitusega0 osalejaga0 postitust täna
Kevin Karhan :verified:<p><a href="https://infosec.space/tags/WhatsMissing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsMissing</span></a>: A tool to check if <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> are still available/online/reachable that one can use either <a href="https://infosec.space/tags/standalone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>standalone</span></a> (with <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> and/or <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> Expert Bundle) or on <span class="h-card" translate="no"><a href="https://venera.social/profile/tails_live" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails_live</span></a></span> / <span class="h-card" translate="no"><a href="https://fosstodon.org/@tails" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails</span></a></span> / <a href="https://infosec.space/tags/Tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tails</span></a>. </p><ul><li>Cuz I do run into issues and kinda want to sort <a href="https://infosec.space/tags/Bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridges</span></a> by availability so I don't waste time on a <a href="https://infosec.space/tags/TorBridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridge</span></a> that is down and also thin-out the list of bridges that ain't online anymore.</li></ul><p>Whilst I do acknowledge that <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> do disrecommend having a huge list of Tor Bridges on hand, I do regularly need them for contacts who are behind a <a href="https://infosec.space/tags/GreatFirewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreatFirewall</span></a> and can't <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Tunnel out of it.</p><ul><li>Sadly <a href="https://infosec.space/tags/BridgeDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BridgeDB</span></a> <a href="https://bridges.torproject.org" rel="nofollow noopener noreferrer" target="_blank">doesn't offer</a> good <a href="https://infosec.space/tags/filtering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>filtering</span></a> options so one can't just query types effectively like <em>"I need <a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> on <a href="https://infosec.space/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a>"</em> or <em>"I can only use Ports 80 &amp; 443 on <a href="https://infosec.space/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>"</em> which may work.</li></ul><p>Espechally being able to filter for <a href="https://infosec.space/tags/IPv4only" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4only</span></a> and not just <a href="https://infosec.space/tags/IPv6only" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6only</span></a> is something I miss, alongside the filter for <a href="https://infosec.space/tags/PluggableTransports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PluggableTransports</span></a> type as <span class="h-card" translate="no"><a href="https://social.librem.one/@guardianproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>guardianproject</span></a></span> <a href="https://infosec.space/tags/Orbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Orbot</span></a> seems to only handle <a href="https://infosec.space/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> and not webtunnel or <a href="https://infosec.space/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a> at all...</p><ul><li>I'm pretty certain that merely pinging a bridge at it's port isn't working as a shure-fire way to check for it's availability.</li></ul>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://chaos.social/@wmd" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>wmd</span></a></span> <span class="h-card" translate="no"><a href="https://denden.world/@miqokin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>miqokin</span></a></span> I've yet to find a nation that <a href="https://chaos.social/@wmd/113899189531053167" rel="nofollow noopener noreferrer" target="_blank">criminalizes</a> <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> but not <a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a>|s that facilitate the same...</p><ul><li>Also commercial VPN providers are relatively easy to detect, filter &amp; block unless they support <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Tunneling.</li></ul><p>Whereas <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> has multiple ways to circumvent <a href="https://infosec.space/tags/InternetCensorship" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetCensorship</span></a>, includibg multiple <a href="https://infosec.space/tags/proxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxy</span></a> &amp; 9bfuscation systems like <a href="https://infosec.space/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a>, <a href="https://infosec.space/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a>, <a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> and regular <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> on included, public query-able amd private lists...</p>
Kevin Karhan :verified:<p>One thing that <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> is missing is a way to check availability and reachability of <a href="https://infosec.space/tags/Bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridges</span></a> with a simple tool. </p><ul><li>This is kinda vital as I do occasionally setup private <a href="https://infosec.space/tags/bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bridges</span></a> and also want to enshure the private <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> list I have is up to date.</li></ul><p>Manually adding/removing one <a href="https://infosec.space/tags/bridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bridge</span></a> after the other in <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> and see if those connect is a relatively inefficient process and merely pinging them isn't viable either, espechally on <a href="https://infosec.space/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a>, <a href="https://infosec.space/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> and <a href="https://infosec.space/tags/snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snowflake</span></a> type bridges.</p><ul><li>Now to make the obvious clear: I'd <em>NEVER</em> publicly list any <a href="https://infosec.space/tags/TorBridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridge</span></a> on my <a href="https://github.com/greyhat-academy/lists.d" rel="nofollow noopener noreferrer" target="_blank">lists.d repo</a> obviously, because that would only harm <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a>... </li></ul><p>I'm not even asking for like a fancy tool that is as clean as <span class="h-card" translate="no"><a href="https://infosec.exchange/@micahflee" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>micahflee</span></a></span> 's <a href="https://infosec.space/tags/OnionShare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnionShare</span></a> but merely a <a href="https://infosec.space/tags/CLI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CLI</span></a> thing (if necessary I'd build some <a href="https://infosec.space/tags/bash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bash</span></a> script) to automatically attempt to connect to said bridge and either spit out an <em>ok</em> or <em>error</em>. </p><ul><li>Something one can just feed with a text file and that'll spit out a different file with ok/working bridges and/or discards the non-working ones from the list.</li></ul><p>And yes, this tool is kinda crucial as I want to quickly sift through a load of bridges that work on restricted ports (22, 80, 443) and thus can bypass the <a href="https://infosec.space/tags/GreatFirewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreatFirewall</span></a> and <a href="https://infosec.space/tags/Roskomnadzor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Roskomnadzor</span></a> filtering...</p><ul><li>So people fleeing can at least safely communicate.</li></ul><p>If anyone at <a href="https://infosec.space/tags/TorProject" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorProject</span></a> needs more details, I'll gladly exchange them in a secure manner. </p><ul><li>I also applied for a <a href="https://infosec.space/tags/gitlab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gitlab</span></a> account so I can help improve <a href="https://infosec.space/tags/documentation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>documentation</span></a> (ideally with some nice step-by-step screenshots so even <em>"<a href="https://infosec.space/tags/TechIlliterates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechIlliterates</span></a>"</em> can i.e. add a <a href="https://infosec.space/tags/bridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bridge</span></a>)...</li></ul>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://void.lgbt/users/ActuallyAubrey" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ActuallyAubrey</span></a></span> That depends on the juristiction in question, the plan &amp; provider in question as well as used hardware in question.</p><ul><li>In case of even remotely suspected <a href="https://infosec.space/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stalkerware</span></a> I do recommend to get personally-owned, controlled, secured and hidden hardware to enable unsurveiled comms.</li></ul><p>Consider telephony &amp; SMS inherently &amp; unfixably insecure.</p><ul><li>If in doubt get a new Android with an anonymous prepaid SIM that has affordable data options and use <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> and <a href="https://infosec.space/tags/Orbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Orbot</span></a> with <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> on ports 80 &amp; 443 which use <a href="https://infosec.space/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a> &amp; <a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> transports, so any surveiling party will only see non-suspicious HTTPS traffic.</li></ul><p>OFC a maliciously configured CPE/Router can log &amp; report <em>all</em> pachets that travel through, but <a href="https://infosec.space/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> &amp; <a href="https://infosec.space/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> or any unencrypted comms are susceptible.</p>