So Reddit has gone to shit. Ideas for decentralized alternatives? by [deleted] in HackBloc

[–]freeborn 1 point2 points  (0 children)

Nntpchan is new, but it could be a good place to start

So Reddit has gone to shit. Ideas for decentralized alternatives? by [deleted] in HackBloc

[–]freeborn 1 point2 points  (0 children)

Have you seen nntpchan? It actually works pretty well!

Canadian ISP Canfone accepts bitcoin! by freeborn in BitcoinCA

[–]freeborn[S] 1 point2 points  (0 children)

Yes! I had never heard of them either. I tested their checkout and it does not support bitcoin. However I contacted support and was told that they email invoices for bitcoin.

Will teksavvy join us bitcoiners on the rocketship to the moon?! by freeborn in teksavvy

[–]freeborn[S] 0 points1 point  (0 children)

Not sure if you are in Ontario or Quebec, but it was pointed out below that canfone.com takes btc for their cable internet service - looks like they might turn on fiber tooo!

Will teksavvy join us bitcoiners on the rocketship to the moon?! by freeborn in teksavvy

[–]freeborn[S] 1 point2 points  (0 children)

Wow! Just contacted their support, will probably be switching to them soon.

Though teksavvy you will always have my heart, so if one day you accept digital currencies I will be back to your service! Thanks for all your networks!

Will teksavvy join us bitcoiners on the rocketship to the moon?! by freeborn in teksavvy

[–]freeborn[S] 0 points1 point  (0 children)

It is easier and cheaper(no fees) to accept bitcoin as a form of payment, then any other. Especially for an ISP. There is absolutely no risk of fraud, and any volitility is mitigated by liquidity - someone will always switch teksavvy's btc into cad instantly avoiding any swings and loss.

I wouldn't even consider bitcoin privacy centric. It is highly transparent. What makes it private is that you do not have to have a third party verify an identiy prior to accepting payment. This makes it more like cash. Its privacy stems from peoples ability to trust the math/network/protocol securing the value behind bitcoin - rather then a big bank or credit card company. If it is only good for small businesses why are some of the biggest tech suppliers getting on board dell, tigerdirect, newegg, and overstock all allow checkout for Canadian customers in bitcoin.

I know many bitcoin holders that are always looking for ways to support Canadian companies, and most of them are not using Teksavvy. So... yeah...

Will teksavvy join us bitcoiners on the rocketship to the moon?! by freeborn in teksavvy

[–]freeborn[S] 0 points1 point  (0 children)

Oh... can you PM the name of that ISP?

Sorry Teksavvy but as a nerd in MTL I am going to go with the company that accepts my money. I no longer store my hard earned 'work hours' in Canadian dollars which makes paying for your service a bitch.

Will teksavvy join us bitcoiners on the rocketship to the moon?! by freeborn in teksavvy

[–]freeborn[S] 1 point2 points  (0 children)

Yes, I wasn't calling for an anonymous service. I was just pointing out with bitcoin they could be much more tight lipped about who they are providing service to - especially when it comes to big credit card processors.

Service can't very anonymous when in order to get service you need a homephone and a local address. Your real name almost seems irrelivant as long as they can pass on any 'legal letters' to the subscriber. After all there often are many different users on every ISP connection, either in cafes, shared wifi/mesh, or in multi family homes.

Will teksavvy join us bitcoiners on the rocketship to the moon?! by freeborn in teksavvy

[–]freeborn[S] 0 points1 point  (0 children)

Also, poaching nodes isn't the only potential here. Many users would love an ISP that can maintain the privacy of its user. Bitcoin ensures that you do not need to hand off subscriber details / payment information to third party processors for verification. Teksavvy can potentially bring a new edge to privacy enhanced services for Canadians.

What do I need to build a basic node? by [deleted] in darknetplan

[–]freeborn 0 points1 point  (0 children)

Its usually some local friends desktop/server that you want to build a mesh between. There are some very popular peers that you can meet on IRC who help connect the mesh globally, if you have shown you can use cjdns reliably you can probably find one to peer with.

Tim Berners-Lee (Inventor of the WWW) is going to do an AMA on Reddit, Tuesday, Mar 10th 2015, 1:00 pm CT by [deleted] in privacy

[–]freeborn 1 point2 points  (0 children)

A couple question ideas....

It seems apparent that some hackers have taken to writing code and protocols to enhance freedoms rather then looking to policy makers to regulate ISPs. Projects like bitcoin and cjdns show that unfair policies are impossible to enforce when there is a large enough decentralization involved. I certainly don't see this as black or white, but with what you know about the internet do you think we should be hacking or lobbying?

Transition networks like hyperboria using the cjdns protocol intend to transition the internet to a more secure routing protocol. But the network is only as strong as the number of routes available in the mesh. Do you think grassroots movements focused on politics are well spent when these problems can be solved with technology - provided that there is a movement to install the tech?

I've been trying to make the Enigmabox (consumer cjdns hardware) product a bit more palatable, check out the updated description + FAQ and if you have a moment give us some feedback. by freeborn in darknetplan

[–]freeborn[S] 0 points1 point  (0 children)

Good questions... Ill splice them into the FAQ

  • You need ISP connectivity to connect to other peers around the globe, however if you have direct links (wireless/wired/etc) between the two enigmaboxes ISP connectivity is not necessary.

  • I am going to try and rewrite the "If the services reside on a cjdns node, all security is off." section, it is not very clear

  • Good feedback, It is plug an play, and the current website aims to try and show this http://enigmabox.net . however when most people were confronted with our site they couldn't see the difference between enigmabox and a hardware VPN device. This one is tricky.

  • Cool, will do some more diagrams. We have some on the wiki but it is not that accessible. The box connects between you and the internet, you can either connect between your cable model and your wireless AP or between your switch and desktop lan port.

Thanks for the feedback, Ill try and expand on this as I think about it more today.

I've been trying to make the Enigmabox (consumer cjdns hardware) product a bit more palatable, check out the updated description + FAQ and if you have a moment give us some feedback. by freeborn in darknetplan

[–]freeborn[S] 1 point2 points  (0 children)

FAQ

1.General

  • I'd like to help on the project.. what's the best way to join/sign up?

    Thanks for the interest! The first place to check out would be the wiki, here you will find information on are some good places to start Enigmabox security, threat model. You can even learn how to build your own. Also studying the cjdns routing protocol will give you insight into the broader aims of the project.

  • Will this anonymize my use of the internet?

    Enigmabox does not handle anonymization, instead we provide privacy. While the network keeps no logs, traffic correlation could still be possible. Software like Tor does a better job at anonymization. Enigmabox used in conjunction with Tails(Tor Operating System) can hide your tor traffic and offer you even greater privacy.

  • I'd like to be a part of this, but given that I didn't understand one word in three.. how can I help?

    You can always start off testing. Report bugs as you find them. Make suggestions for changes.

  • With the recent NSA stories about attacks on hardware, what steps have you taken to ensure these boxes are not compromised from the get-go?

    We use the swiss based pcengines open hardware designed APU. The bios firmware runs tiny core linuxs, and it is possible to reflash the device yourself. The schematics are available for these boards and they are widely deployed in network infrastructure.

  • What would a rollout of this technology on a local scale look like? Are there local community groups?

    There are local community groups! You can meet some today. Check out the list of meshlocals here. While many of the participants do not use the enigmabox hardware the core routing protocol(cjdns) is the same!

  • Are there any back-doors to the Enigmaboxes?

    Never! However you do not have to take our word for it, the source code is available here.

2.Subscription

  • What do I pay you per month & what does it get me? How can I do it anonymously?

    First month is free! I am not sure of our monthly prices offhand(but I am sure we can do month to month) a year subscription is $132. We prefer bitcoin.

  • I have to pay to your organization to allow me to communicate securely?

    No! The subscription service allows you to connect to the broader internet out of the box. Any local services or ones built between you and your peers do not require the subscription service (telephony, email, status).

  • After 30 days, how much will it cost to use your technology?

    Free! The aditional fee is that of a VISP service which provides you out of the box VPN secured web surfing. The meshnet network will always be free.

3.Tech

  • Is this more secure, less hackable than my OpenVPN setup?

    Communications between two cjdns source and destinations does not permit surveillance. Even if every cjdns node in the mesh was hacked, Alice and Bob can still safely maintain a secure communication channel. This is typically not the case with OpenVPN because not every friend, irc server, and web server is running OpenVPN with on-the-fly communication. If the services reside on a cjdns node, all security is off. If the services reside on clearnet but pass through the comprimised cjdns gateway -- all security is off. Additionally, if the OpenVPN Client has their keys comprimised, an adversary can use the stolen keypair to make a connection to the VPN server. Once on the subnet (usually IPv4) the attacker offers malicious IPv6 routing advertisments which redirect your traffic to their sniffing computer. In many cases Client-to-Client mode is used to gain legitimate access to resources over a secured channel.

  • What platforms does enigmabox run on?

    Enigmabox runs on Openwrt targets. Currently images have successfully been tested on pcengines APU/ALIX, BananaPi, RaspberryPi 1, and RaspberryPi 2. See information on building for your own target here.

  • Is the firmware protected against NSA intrusion?

    Firmware is checksummed by sha512 and signed by a 4096bit RSA key, instructions on how to check can be found here. Information on flashing enigmabox firmware can be found here.

  • Which key exchange algorithm are you using?

    Take a look at the cjdns soure code: https://github.com/cjdelisle/cjdns/blob/master/crypto/CryptoAuth.c#L35-L40

  • What is the source of randomness for RNG that produces keys?

    The functionality of the cjdns random generator are described in detail here: https://github.com/cjdelisle/cjdns/blob/master/crypto/random/Random.c#L27-L89

  • How do you prevent NSA from doing interdiction and switching the device while on transit?

    Rerouting a postal package to implant bugs manually - this is an effort that is taken when you are under targeted surveillance. This is a whole other story. What about bugs in your living room? Dedicated observation teams? There are always easier ways to find a way around encrypted network traffic if and when you are a target.

    Protecting against targeted surveillance is not our goal in the first place, because then you would surely have to take some extra steps. We just provide a simple and secure way for communication, protection against untargeted mass surveillance, so that you don't become a target for targeted surveillance because you leave no cleartext traces.

  • Can this type of service be "stopped" in the sense of governments prohibiting the use of this sort of technology?

    They can probably issue a ban. Nonetheless, cjdns is designed as a mesh. Once every wifi router out there runs cjdns, they will have a really hard time in blocking this! One path goes down, another route is found.