JanusVM isn't just a firewall. It is a VPN, which is the distinguishing factor of why it is better than Tor alone or Tor + Firewall, specifically...
Tor only protects at OSI Layer 7 (application layer). Leaks and fingerprinting is very easy at this level. Try loading Tor through JanusVM, which...
We've got the legacy site still in place and the new site at the same time. Complicated black magic. With the creation of new accounts, forum and...
Whew, that was fun. Website publicly accessible on the normal domain, DNS issues settling down. Anyone who needs access to their forum account...
global dns propagation can take up to 24 hours, but is usually propagated within 6 hours.
I can hit it just fine, guess DNS isn't propagating quickly. The problem should resolve itself when dns updates. [ATTACH]
Yes. The XeroBank Forum opens in a few hours.
FULL STOP. A large quantity of users does not ensure that anyone has looked at the code at all. Groups of people are very foolish, only...
Just looking at the website you can gather a few things. 1) Their vpn is based on VPS/cloud servers. This means that it is highly unlikely they...
Depends on the client/server relationship. ex: I run Left4Dead over XeroBank on UDP protocol and it works fine. You'll need paid vpn to be able...
I don't think whole disk will work for you, especially if you are rebooting and don't have a DRAC or KVM. Ubuntu will do userland encryption so...
Soon.
The only time we get complaints about torrents is when xerobank users are doing file sharing while connected to a xerobank exit node in the USA....
Just use a non-US exit node and we won't get complaints.
Not really. You can use disk encryption, but physical access trumps software security.
Sing along with me. Here is the melody. Here are the lyrics:
Sure. The bulletproof hosting has two aspects to it. The first is securing what you are doing against hackers and hardening it. The second aspect...
Here is a presentation about tor vulnerabilities from 2008, given by Roger, the lead dev of tor project: Slides | Video (62 minutes)
Not yet, this is outside the network threat model. But it isn't outside of the realm of protection we could provide using our client-side...
http://www.wilderssecurity.com/showpost.php?p=1828969&postcount=612
We've got a new design coming called Clarion. It allows us to place virtually unlimited exit nodes in virtually any country connected to the...
Not stolen data, attack details. You're thinking of weak certificates that use rsa and weak hashing. By strongarmed certificates, I'm talking...
Katio, You are just full of excellent questions. For some time now I've been working with some folks to provide a simple anonymity metric. It...
Yes. The system is vulnerable to the compromise of the CTs where the keys reside. However, the compromising the CTs requires the powers of a...
:D Ah excellent question. We call that the "cryptographic terminator" because it terminates the encrypted stream and either sends it out directly...
Separate names with a comma.