After our first visit by law enforcement due to our Tor exit infrastructure, we finally took the time to write and publish our first transparency report: https://applied-privacy.net/posts/first-transparency-report/
Our DNS privacy service's resolver hosts do not send ICMP packets in response to closed UDP ports (net.inet.udp.blackhole=1).
This disrupts the SAD DNS cache poisoning attack.
Thanks to https://deSEC.io our reverse DNS zone 100.70.109.in-addr.arpa is now also DNSSEC signed (in addition to our forward zones).
We are happy to have a new sponsor onboard: https://mailbox.org
they provide us with email services.
Why we choose them:
- access to mailboxes via onion v3 services
- transparency reports
and they even run a Tor exit relay
You can find their onion addresses on this page:
There will also be a Tor organizations meetup at #36c3, day 3 at 9pm:
Again this year at #36c3 there will be a Tor relay operators meetup, day 1 at 9pm in lecture room 11. We'll be there:
The slides from our yesterday's PrivacyWeek 2019 talk are online now:
We are excited to literally announce our own Autonomous System
thanks for the mention :)
one minor correction:
automatic does not send your DNS traffic to google but it attempts to use DoT with your current DNS resolver IP address (with no authentication)
that is the opportunistic profile
see slide 41+42 from our easterhegg talk slides:
We are happy to announce our second privacy enhancing service:
Today we are launching our DNS Privacy services supporting DNS-over-TLS and DNS-over-HTTPS
Encrypt all the things, DNS included!
The slides from our past PrivacyWeek talk:
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!