nice, I can now get RSS feeds for these email-only newsletters using github.com/leafac/kill-the-new.

- This Week in Security: this.weekinsecurity.com

- The Wiretap: forbes.com/newsletter/thewiret

Quad9 is moving to Switzerland:

“The Swiss government produced findings of law that Quad9 is exempt from both law enforcement and intelligence data-collection and retention requirements, as well as KYC.”

- quad9.net/news/blog/quad9-publ
- Discussion: teddit.net/r/privacytoolsIO/co

Help users in Iran reconnect to Signal

“We’ve added support in Signal for a simple TLS proxy that is easy to set up, can be used to bypass the network block, and will securely route traffic to the Signal service.”

signal.org/blog/help-iran-reco

Interesting new open-source iOS app, ZudVPN. Deploy a personal IKEv2 VPN with Pi-hole to a VPS *from* the app.

- zudvpn.com
- github.com/zudvpn/ZudVPN

Added to encrypted-dns.party for Apple devices:

- Faelix Privacy DoH: faelix.net/ref/dns/#privacy-dn
- Free Radio Munich DoH: ffmuc.net/wiki/doku.php?id=knb

And now looks like there are signed profiles directly from dnsforge.de and get.yepdns.com.

Show thread

Helpful filterlist for uBlock Origin, "Fuck Fuckadblock," a successor to reek's "Anti-Adblock Killer list."

bogachenko.github.io/fuckfucka

Watching this video [1] comparing the malware blocking effectiveness of 3rd party DNS resolvers got me thinking...

For some security focused use cases wouldn't it be valuable if there were a way to leverage multiple DNS resolvers with a strategy where DNS requests are sent to multiple resolvers in parallel and responses are returned only once it's determined that no resolver blocked the request? 🤔

[1] forums.lawrencesystems.com/t/d

Show thread

Playing with Pi-hole [1] and PiVPN [2] on a VPS and learned about the Pi-hole Remote iOS app [3] on the subreddit [4]. Wow, it’s really nice! 😍

[1] pi-hole.net
[2] pivpn.io
[3] apps.apple.com/us/app/pi-hole-
[4] teddit.net/r/pihole

TIL reading CitizenLab's "Great iPwn" report from last month [1] that Turkey’s Government-run Computer Emergency Response Team (USOM) [2] maintains a public filterlist of malicious hosts they observe.

Hosts: usom.gov.tr/url-list.txt (~90k domains, ~2 MB)

[1] citizenlab.ca/2020/12/the-grea
[2] en.wikipedia.org/wiki/TR-CERT

Nice, @ooni’s Probe app recently added a test to validate connectivity to @riseup’s VPN.

- ooni.org/nettest/riseupvpn

Good to see: Mullvad had Cure53 audit the security of their infrastructure.

“The security awareness and overall security posture should be regarded as rather good, as expected Cure53 were not able to discover any Personally-Identifiable-Information attached to Mullvad's end-users.”

mullvad.net/en/blog/2021/1/20/

Interesting.. The search engine selection preconfigured in Ghostery's upcoming browser (based on Firefox) includes a new one called Tailcat, "The open, unbiased search engine." No privacy policy or about page yet that I can find - just that it's based in Munich, Barcelona 🤔

meow.tailcat.com

github.com/ghostery/user-agent

Splendid, looks like Ekoru (ekoru.org, a search engine similar to Ecosia) modified their privacy policy several times in Nov 2020 and now appears to log IP addresses at least...Thanks Wayback Machine!

ekoru.org/privacy/

Proton's blog posts [1] [2] don't state details on the filter lists being used, only that it's a "massive database of sites known to host malware, spyware, or any other malicious software."

But it looks like they mentioned on Reddit [3], "We have both public and proprietary lists that we maintain." 😕

[1] protonvpn.com/blog/netshield-a
[2] protonvpn.com/support/netshiel
[3] teddit.net/r/ProtonVPN/comment

Show thread
Show older
nitrohorse Ⓐ

Personal instance of nitrohorse (nitrohorse.com).