After our first visit by law enforcement due to our Tor exit infrastructure, we finally took the time to write and publish our first transparency report: https://applied-privacy.net/posts/first-transparency-report/
Our DNS privacy service's resolver hosts do not send ICMP packets in response to closed UDP ports (net.inet.udp.blackhole=1).
This disrupts the SAD DNS cache poisoning attack.
Thanks to https://deSEC.io our reverse DNS zone 100.70.109.in-addr.arpa is now also DNSSEC signed (in addition to our forward zones).
We are happy to have a new sponsor onboard: https://mailbox.org
they provide us with email services.
Why we choose them:
- access to mailboxes via onion v3 services
- transparency reports
and they even run a Tor exit relay
You can find their onion addresses on this page:
There will also be a Tor organizations meetup at #36c3, day 3 at 9pm:
Again this year at #36c3 there will be a Tor relay operators meetup, day 1 at 9pm in lecture room 11. We'll be there:
The slides from our yesterday's PrivacyWeek 2019 talk are online now:
We are excited to literally announce our own Autonomous System
We are happy to announce our second privacy enhancing service:
Today we are launching our DNS Privacy services supporting DNS-over-TLS and DNS-over-HTTPS
Encrypt all the things, DNS included!
The slides from our past PrivacyWeek talk:
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!