RACE (Resilient Anonymous Communications for Everyone) is a distributed system developed to provide resilient, secure, anonymous messaging. You can think of RACE in terms of a network two types of nodes: clients and servers. The clients are devices run by individual users who want to anonymously message one another; the servers are run by volunteer users or organizations that provide the infrastructure to enable anonymous client messaging. Uses special multi-party computation (MPC) algorithms to route messages without individual servers learning the metadata. The specific goals of the original RACE program were to enable up to 20% of the servers to be malicious and colluding without any client messaging metadata being leaked.
Awesome Tor is a curated list of resources, tools, and applications related to the Tor network. This product is produced independently from the Tor anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.
EFF’s Street-Level Surveillance project shines a light on the surveillance technologies that law enforcement agencies routinely deploy in our communities. These resources are designed for advocacy organizations, journalists, defense attorneys, policymakers, and members of the public who often are not getting the straight story from police representatives or the vendors marketing this equipment.
Whether it’s phone-based location tracking, ubiquitous video recording, biometric data collection, or police access to people’s smart devices, law enforcement agencies follow closely behind their counterparts in the military and intelligence services in acquiring privacy-invasive technologies and getting access to consumer data. Just as analog surveillance historically has been used as a tool for oppression, we must understand the threat posed by emerging technologies to successfully defend civil liberties and civil rights in the digital age.
Tinfoil Chat (TFC) is a FOSS+FHD peer-to-peer messaging system that relies on high assurance hardware architecture to protect users from passive collection, MITM attacks and most importantly, remote key exfiltration. TFC is designed for people with one of the most complex threat models: Organized crime groups and nation state hackers who bypass end-to-end encryption of traditional secure messaging apps by hacking the endpoint.
TFC uses XChaCha20-Poly1305 end-to-end encryption with deniable authentication to protect all messages and files sent to individual recipients and groups. The symmetric keys are either pre-shared, or exchanged using X448, the base-10 fingerprints of which are verified via an out-of-band channel. TFC provides per-message forward secrecy with BLAKE2b based hash ratchet. All persistent user data is encrypted locally using XChaCha20-Poly1305, the key of which is derived from password and salt using Argon2id, the parameters of which are automatically tuned according to best practices. Key generation of TFC relies on Linux kernel's getrandom(), a syscall for its ChaCha20 based CSPRNG.
This is a free communication tool that is designed for simplicity, privacy, and security. All interaction between you and your online peers is encrypted. There is no record of your conversation once you all leave.
Serverless, decentralized, ephemeral. Peer to peer whenever possible. Explicitly designed to be self-hostable. Public and private rooms. Audio and video chat. File transfer.
Katzenpost is an anonymous communication network, a decryption mix network and is the first post quantum mix network. Katzenpost is actively being developed and we hope to soon improve our documentation and our website.
It is our mission to research and development useful mixnet protocols to help people communicate more freely.
Our project goals are closely aligned with the cypherpunk's manifesto.
Katzenpost is licensed under the GNU Affero General Public License v3.0. There are a few small sections of code that are licensed under a different license and these respective code modules contain their own LICENSE files.
Large data-hungry corporations dominate the digital world but with little, or no respect for your privacy. Migrating to open-source applications with a strong emphasis on security will help stop corporations, governments, and hackers from logging, storing or selling your personal data.
The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.
A mirror of the site can be downloaded for archival and offline use: https://digitalfirstaid.org/dfak-offline.zip
Git repo: https://gitlab.com/rarenet/dfak
License: Creative Commons By-Attribution v4.0
The CSRC provides a searchable database of resources on the topic of counter-surveillance, with a focus on targeted surveillance against people who have things to hide. We want to help anarchists and other rebels acquire a practical understanding of the surveillance threats they may face in their struggles and in their lives. We prefer resources written by friends and understandable without prior technical knowledge.
A FOSS hacker's guide to CLI, privacy, security, self-hosting, and the Internet.
Github: https://github.com/hashbang/book
Generate random phone numbers for all countries using the mobile phone generator. These numbers are fake, but they are built using the validations of telephone numbers.
For a price of a cinema ticket a month we offer a physical phone number. All your messages are encrypted with your personal key that we cannot access. Has a REST API you can send and receive messages through. They can store contact lists for you, deniably they claim. Accepts cryptocurrency for payment.
This updated guide aims to provide introduction to various tracking techniques, id verification techniques and guidance to creating and maintaining anonymous identities online including social media accounts safely.
Will this guide help you protect yourself from the NSA, the FSB, Mark Zuckerberg or the Mossad if they’re out to find you? Probably not … Mossad will be doing “Mossad things” and will probably find you no matter how hard to try to hide.
Github: https://github.com/AnonymousPlanet/thgtoa
Creative Commons Attribution 4.0 International (cc-by-4.0)
An online service that acts as a telephony middleman - you tell them what number to call, what number you want to show up on both Caller ID and the bill, and what your number is, and they'll connect the two numbers with the spoofed information of your choice.
An application which makes it easier to tunnel IP traffic through the Tor darknet. Stand-alone application. The OS you run this on must have support for IPv6 enabled, though OnionCat can be configured to use IPv4 as well. Gives hidden services IPv6 addresses to make them easier to connect to. Also makes it possible to provide hidden services as easily as one can provide public services on the Net, such as SMTP, DNS, and even VPN.
A command line utility which makes it easy to use certain applications with Tor.
A suite of shell scripts to automate the installation and configuration of FreeBSD in such a manner as to support anonymity and security. Helps with the rapid deployment of BSD machines that can then be used as Tor nodes, hidden service providers, and locked-down desktop machines.