This is a serious usability / documentation bug in both I2P and Tor and we still need more conversation and research to find a solution: https://trac.i2p2.de/ticket/1850 ( thank you again to @sarahjamielewis for her research)
Old Unix error messages should be treasured https://www.reddit.com/r/ProgrammerHumor/comments/68tfez/old_unix_error_messages_should_be_treasured/
I've finally updated the I2P-Bote Git mirror with over a year of dev work from Monotone, including Gradle build scripts: https://github.com/i2p/i2p.i2p-bote
I'm going to move I2P-Bote dev entirely to GitHub to reduce contributor friction (including my own). Hopefully this means more people contributing in the future! There's plenty to do for people who like working on UX, DHTs or high-latency comms. I'd particularly love to see mixnet functionality added ๐
Hidden Treasure: Intrusion Detection with ETW (Part 1) https://blogs.technet.microsoft.com/office365security/hidden-treasure-intrusion-detection-with-etw-part-1/
Hedgehog in the Fog: Creating and
Detecting IPv6 Transition
Mechanism-Based Information Exfiltration
Covert Channels https://ccdcoe.org/sites/default/files/multimedia/pdf/ip6eva_0.pdf
A collection of resources for OSX/iOS reverse engineering.
https://github.com/michalmalik/osx-re-101
Automatically Inferring Malware Signatures
for Anti-Virus Assisted Attacks https://www.sec.cs.tu-bs.de/pubs/2017-asiaccs.pdf
Using Ubuntu .DESKTOP as a Malware Vector http://blog.mazinahmed.net/2017/04/using-ubuntu-desktop-as-malware-vector.html
I'm getting back into the swing of working on @i2p proposals (for changing the network specifications), starting with editing and expanding prop 125 which is aimed at improving network performance. Comments welcome!
https://geti2p.net/spec/proposals/125-obep-to-one-of-many-tunnels
Hopefully I'll manage to bash through several more proposals from my backlog this weekend ๐
mimipenguin -
A tool to dump the login password from the current linux desktop user. https://github.com/huntergregal/mimipenguin
A guide to learn bash https://github.com/Idnan/bash-guide
Evilginx - Advanced Phishing with Two-factor Authentication Bypass https://breakdev.org/evilginx-advanced-phishing-with-two-factor-authentication-bypass/
And from that, I think I now have a reasonable-sounding proposal for decentralised shared randomness in #I2P :smile: Gonna leave it stewing in my brain during work tomorrow, and then try writing it up for Fun Friday to see if it actually makes sense :fingers_crossed:
Chisel: a fast TCP tunnel, transported over HTTP https://github.com/jpillora/chisel
Mastodon, I2p, Tor, Bitcoin, Zcash, Ricochet, Ring...
The Secure and Decentralised Internet, the rebirth of the Internet that we always talked about that needed to happen "some day", is slowly coming together right in front of our eyes... it's happening \o/
Thanks to all the dedicated cipherpunks
Certificate Transparency with Privacy https://arxiv.org/pdf/1703.02209.pdf
I2P things are happening...if only I didn't crash the chatroom with my awesomeness lol. CARRY ON WITHOUT ME :rofl:
A collection of resources for Linux reverse engineering https://github.com/michalmalik/linux-re-101
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sysmon logs https://github.com/VVard0g/ThreatHunter-Playbook
Legality of keylogging/spy software (Canada) https://www.reddit.com/r/canada/comments/2sysmf/legality_of_keyloggingspy_software/