<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Syst(em)</title><link>https://sy.st/</link><description>Recent content on Syst(em)</description><generator>Leet - sy.st</generator><language>en-US</language><managingEditor>Leet (i[a]sy.st)</managingEditor><webMaster>i[a]sy.st (Leet)</webMaster><copyright>© sy.st</copyright><lastBuildDate>Sat, 13 Dec 2025 13:26:11 +0100</lastBuildDate><atom:link href="https://sy.st/index.xml" rel="self" type="application/rss+xml"/><item><title>Privacysteps.org</title><link>https://sy.st/blog/privacysteps/</link><pubDate>Tue, 25 Nov 2025 18:00:35 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/privacysteps/</guid><description>&lt;h1 id="what">What?&lt;/h1>
&lt;p>Privacysteps is my new project whose goal is to educate on all levels of privacy and security protective measures. Its difference from other similar sites is a more &amp;ldquo;gamified&amp;rdquo; and simplified aspect with checkboxes, personal statistics, and case studies.&lt;/p>
&lt;h1 id="why">Why?&lt;/h1>
&lt;p>I found that someone wanting to learn about the steps to protect their privacy only had two choices. Either the very simple guides telling you to install a VPN, pay for an encrypted mail service, and block trackers. The other choice is to read long guides of hundreds of pages that are amazing but require too much effort to be understood by most non-technical people or those with a simpler threat model.&lt;/p>
&lt;p>I got this idea when a investigative bookwriter close to me showed me his setup. He had one online computer for research and one offline for compiling this research and writting his books. While a good setup, he also had many other lower level security holes that would nullify those efforts. This is when I found that I had no ressources to recommend to him for his threat level and technicality.&lt;/p>
&lt;h1 id="when">When?&lt;/h1>
&lt;p>The website is already online but the actual content is still being actively worked on. I encourage you to try it now and give any feedback but don&amp;rsquo;t expect it to be complete. If you have some free time and like the idea you can also contribute by sending content, suggestions, or error reports.&lt;/p>
&lt;h1 id="private">Private?&lt;/h1>
&lt;p>The exact database scheme for a user contains only the randomly generetaed account id, time of registration and font settings. You can also opt to not use an account at all and have your progress stored only in your browser. The site also has no tracking and can be fully used with javascript disabled.&lt;/p>
&lt;h1 id="where">Where?&lt;/h1>
&lt;ul>
&lt;li>privacysteps.org&lt;/li>
&lt;li>privstxt6wumq2kelpqjzbky7inyzqu5i4jbc65ixnznb7z5bgsaheid.onion&lt;/li>
&lt;/ul></description></item><item><title>May updates</title><link>https://sy.st/blog/may-updates/</link><pubDate>Tue, 20 May 2025 13:37:00 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/may-updates/</guid><description>&lt;p class="pFirst">
I have been working on a few updates for this website in the last months and as most of those will not get into the rss feed I thought it would be a good idea to write a blog post about them.
&lt;/p>
&lt;h1 id="new-blog-post">New blog post&lt;/h1>
&lt;p>I have written a new blog post about my server. It is ment to be updated over time and is just at it&amp;rsquo;s initial phase right now. You can find it &lt;a href="https://sy.st/blog/server/">here&lt;/a>.&lt;/p>
&lt;h1 id="new-gallery-page">New gallery page&lt;/h1>
&lt;p>I have added a new page to display some of the favorite pictures I took. I just uploaded some recent images I had on disk for now. While a lot more functional with javascript the page also works with javascript disabled. You can see it&amp;rsquo;s first iteration &lt;a href="https://sy.st/gallery/">here&lt;/a>.&lt;/p>
&lt;h1 id="new-recipes-page">New recipes page&lt;/h1>
&lt;p>I have added a page to display some of my favorite recipes. It is still very early in it&amp;rsquo;s development and I cannot guarantee that I will have the motivation to keep it updated. For now it&amp;rsquo;s also only in French as I don&amp;rsquo;t have the patience to translate the rare recipes I already have in markdown. You can find it &lt;a href="https://sy.st/recipes/">here&lt;/a>.&lt;/p>
&lt;h1 id="new-uses-page">New uses page&lt;/h1>
&lt;p>The &amp;ldquo;uses&amp;rdquo; page seems to be the new trend so I made one &lt;a href="https://sy.st/uses/">here&lt;/a>.&lt;/p>
&lt;h1 id="ps">PS&lt;/h1>
&lt;p>All of those more experimental pages that do not mandate their own header link are listed under the &lt;a href="https://sy.st/links/">links&lt;/a> page.&lt;/p></description></item><item><title>My home server</title><link>https://sy.st/blog/server/</link><pubDate>Mon, 19 May 2025 14:20:00 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/server/</guid><description>&lt;p class="pFirst">
While most choices made for this server makes sense to me it is important to note that I already had some of the hardware like the motherboard or some disks. That's in part why I use an AMD cpu while it is recommended to use an Intel cpu for my kind of needs.
&lt;/p>
&lt;h1 id="hardware">Hardware&lt;/h1>
&lt;ul>
&lt;li>Disks:
&lt;ul>
&lt;li>2 * Seagate IronWolf Pro 4 To HDD (ST4000NE001)&lt;/li>
&lt;li>1 * Seagate BarraCuda 4 To HDD (ST4000DMZ04)&lt;/li>
&lt;li>2 * Crucial BX500 SATA 1To SSD (CT1000BX500SSD101)&lt;/li>
&lt;li>YIWENTEC H0101 SATA cable&lt;/li>
&lt;li>M2 to SATA adapter&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Noctua NH-U12S redux&lt;/li>
&lt;li>Ryzen 5 5600G&lt;/li>
&lt;li>Corsair RM650 ATX&lt;/li>
&lt;li>Fractal Design Node 304&lt;/li>
&lt;li>ASRock B450 ITX&lt;/li>
&lt;li>ULANSeN Dual 2.5G pci low profile&lt;/li>
&lt;/ul>
&lt;h1 id="software">Software&lt;/h1>
&lt;p>The OS is Proxmox and everything described bellow is ran on it&amp;rsquo;s own KVM virtual machine. In the future I might make this section more precise and list every docker container and service I run but for now I&amp;rsquo;m too lazy to do it.&lt;/p>
&lt;ul>
&lt;li>Proxmox
&lt;ul>
&lt;li>Run on both SSD&amp;rsquo;s in a zfs mirror&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>OpnSense
&lt;ul>
&lt;li>Every VM containing public facing services is ran through an OpnSense VLAN.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Unraid
&lt;ul>
&lt;li>Run off of a usb key passed trought by proxmox to the VM directly.&lt;/li>
&lt;li>Passtrought of all of the HDD&amp;rsquo;s and 250 Gb of SSD for cache&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>3 * Ubuntu Docker VM&amp;rsquo;s
&lt;ul>
&lt;li>1 for reverse proxy / logs aggregation / security services&lt;/li>
&lt;li>1 for publicly hosted services (monero node, dns, &amp;hellip;)&lt;/li>
&lt;li>1 for private services&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Windows 11 VM&lt;/li>
&lt;li>Ubuntu VM&lt;/li>
&lt;/ul></description></item><item><title>Street photography, a privacy nightmare ?</title><link>https://sy.st/blog/street-photography-a-privacy-nightmare/</link><pubDate>Sat, 12 Apr 2025 11:00:55 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/street-photography-a-privacy-nightmare/</guid><description>&lt;h1 id="introduction">Introduction&lt;/h1>
&lt;p class="pFirst">
So I have been into photography for quite some time now, and with a majority of my days spent in cities, I couldn't miss the subject of street photography. To make it simple for the unaware, street photography is the photography of life in an urban setting, from people to architecture.
However, in the street photography sphere, a big part of the photographers do not see architecture as street photography. Most seem to define street photography as the photography of people in the streets.
Being a privacy advocate, I, of course, have issues with this idea of street photography. I decided to make this post not only to expose the issues I have with it but also what the solutions could be, with the goal being to open a discussion around this subject. So please email me to discuss this post when you are done reading it and if you have anything to add.
&lt;/p>
&lt;h1 id="expectation-of-privacy-in-public-">Expectation of privacy in public ?&lt;/h1>
&lt;p class="pFirst">
One of the main arguments brought up is that there is no expectation of privacy in public because it is legal, so taking pictures of people without their knowledge or against their will is okay. While from a legal standpoint I'm sure this makes total sense, from a moral one I don't think it does. I also think that hiding a lack of ability to discuss the issue behind a legal standpoint is too easy and not really productive.
Even though in the modern age most people don't care that much about their privacy, I am sure a lot would not like to have a picture of them taken without their knowledge. This can be seen as more and more people getting into street photography post on forums complaining about their photography 'subjects' being mad at them when seen.
&lt;/p>
&lt;h1 id="taking-advantage-of-specific-moments-or-peoples">Taking advantage of specific moments or peoples&lt;/h1>
&lt;p class="pFirst">
First, I think there is a time and place where this is for sure not adequate. For example, I see a lot of pictures of people in their most vulnerable state. Imagine this: you are in the street, you receive a phone call, you learn that you lost someone close to you, you cry, 2 days later you find out on social media that a photographer took a picture of you crying in the streets and it has 4 gazillion views. I can understand the importance of emotions in photographs, but I do not think the mental impact on the involuntary subject is worth the picture.
I also think some people are at risk by having a picture of them taken and therefore shouldn't be photographed. By that I mean children (just go on random websites where photos are uploaded online and see the views on kids in swimsuits...), protesters or people at the beach for instance.
&lt;/p>
&lt;h1 id="posting-those-pictures-online">Posting those pictures online&lt;/h1>
&lt;p class="pFirst">
There are two different levels of street photography privacy issues. While we have discussed some issues with taking photographs of people, the biggest issue I have is with those pictures being posted online.
&lt;/p>
&lt;h2 id="photographing-protests">Photographing protests&lt;/h2>
&lt;p class="pFirst">
When following forums and content creators in the photography space, most seem to think that taking pictures of people's faces at protests and posting them online is fine. While I am sure that sometimes it adds character to an image, I also think that endangering someone's security, private life, and privacy for views on the internet is obviously wrong.
I also see a lot of photographers saying that protesters should have just worn a mask if they wanted their face to not be seen. To that I would respond that in most countries it is illegal to protest with a mask.
TLDR: Do not make the job of the surveillance police for free please.
&lt;/p>
&lt;h2 id="yes-but-i-cannot-wait-for-everyone-to-get-out-of-the-background">Yes but I cannot wait for everyone to get out of the background?&lt;/h2>
&lt;p class="pFirst">
Was not sure how to name this part, but basically I wanted to talk about pictures you take of a place. You cannot expect to take a picture of the Eiffel Tower without any faces showing up. This is why I think that if someone is in the background of a photo and not in an inadequate situation, it is okay to take the picture. Even then, I would prefer for a picture of myself in the background not to be posted online, but I would not be mad about it because, sadly, people HAVE to post pictures online nowadays.
&lt;/p>
&lt;h2 id="buuut-there-are-cameras-everywhere">Buuut, there are cameras everywhere?&lt;/h2>
&lt;p class="pFirst">
Sadly there are. However, I like to believe that most security personnel do not like to capture and publish what the cameras see and that most cameras are not accessible online. This is also a reason the difference between taking pictures and posting them online is very important.
&lt;/p>
&lt;h2 id="uploading-to-the-cloud">Uploading to the cloud&lt;/h2>
&lt;p class="pFirst">
Even if the photos are not posted online, most photographers will backup their pictures into the cloud of their favorite phone or computer maker corporation without any kind of client-side encryption. This means that pictures of you could be used to profile you, your movements, your interests, and train AIs without any way for you to know.
&lt;/p>
&lt;h1 id="but-journalism">But journalism&lt;/h1>
&lt;p class="pFirst">
This argument is the only one I can't really find any counter argument to. The most famous pictures have what I warned against before. Some have kids, some protests, some vulnerable moments, some death, and some all of those. Those pictures without those elements would not mean anything and for sure would not have had the same effects on the world. Also, for those pictures to become what they became and have the impact they had, they had to be shared in public, so not posting them online is not really an option.
When I think of that, I think of the "Napalm Girl" picture. This picture is everything I do not want in a picture: a suffering and naked child. However, it is also what makes this picture what it is.
I don't think most of the photographs I see online that are against the points I made before are anywhere near journalism, and most are for sure just for the views, for shocking's sake, or rage bait. However, I don't think limiting photojournalism to people with an accreditation should be done either. That's why I don't have anything to say against this argument; I think it is valid, just not applicable for most of the photographers I have an issue with.
&lt;/p>
&lt;h1 id="how-to-do-it-morally-from-my-point-of-view">How to do it morally (from my point of view)&lt;/h1>
&lt;p class="pFirst">
I understand that asking someone before taking a photograph of them can lose the moment and character of a picture. However, I do think that at least, after taking the picture, the subject should be let known of the picture and asked if they are okay with it or if they prefer you to remove it. I know a lot of people might not do this because of a fear of being confronted but as I said before, if you can't handle someone being mad or creeped out that you took a picture of them without asking first, maybe you shouldn't be doing street photography.
Also, in most cases, I think the main problem is not really taking the picture (as long as those are adequate photos). The main issue is posting those pictures online for everyone (including AI and social media companies) to see.
In some cases, for example during a protest, I would also blur or remove people's faces (warning: the blur has to be done right for it to serve a real purpose, do your own research). I don't think the face is the subject of a protest photograph most of the time anyway. Plus, this might even add some character to your images.
&lt;/p>
&lt;h1 id="discuss">Discuss&amp;hellip;&lt;/h1>
&lt;p class="pFirst">
This post was made in an attempt to write down my chain of thoughts and change this post as my position does. I also hope to develop my thinking with your help. If you have anything to add or something you are in disagreement with, please email me (I can quote you on this post).
&lt;/p></description></item><item><title>How to secure a laptop at an hardware level</title><link>https://sy.st/blog/secure-laptop/</link><pubDate>Tue, 25 Mar 2025 13:37:00 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/secure-laptop/</guid><description>&lt;h1 id="introduction">Introduction&lt;/h1>
&lt;p class="pFirst">
So, I was waiting for Stalker 2 to download (154 GB, btw—WTF!) while ADHD kicked in, and I had a new idea. I had an old laptop lying around that I wanted to do something with. This is when I got the idea of trying to make it as private and secure as possible.
I already have some experience with privacy-focused operating systems, having used both Qubes OS and Tails. Now, I wanted to explore what I could do at the hardware level to upgrade my old laptop security.
The goal of this post is to create a simple guide on how to set up a cheap and old laptop that could be thrown out without fear in the most secure way possible. However, this is still an entry-level guide. There is no need to flash a new BIOS or solder anything. The goal is to keep it simple. I plan on doing a more advanced and detailed guide later on, but this one has been sitting in my draft folder for too long.
In this guide, we’ll mostly go from one hardware component to the next, thinking about what we can do to improve security at each step.
&lt;div class="callout">
&lt;div class="callout-inner">
💡 Disconnect the battery first
&lt;/div>
&lt;/div>
&lt;/p>
&lt;h2 id="removing-the-disk">Removing the disk&lt;/h2>
&lt;p class="pFirst">
So when thinking about the disks I think there is three choices:
- Security: Remove the disk entirely from the laptop and operate the OS from an external disk or USB drive.
- Deniability: Keep the disk in the laptop but install only random, non-sensitive files and programs. Avoid using it for your "secure" operating system.
- Simplicity: Use the integrated disk as the main operating system disk while using full disk encryption.
For my specific use case and threat level, I chose to remove the disk entirely for two key reasons:
1) If I want a disposable laptop, I don’t want to have to reinstall the disk setup every time (as in Setup 2 or 3).
2) I do not want to take any chances with logs or data being saved on the disk (as in Setup 2).
3) My laptop as most laptops only has space for SSDs and files on SSDs are notoriously hard to fully erase.
This means that we will need to use an operating system installed on an external USB, disk, or SD card. But first, if this is your only computer, you might want to install your operating system of choice on the external disk. For that I would recommend tails official guide guide: [here](https://tails.net/install/index.en.html) or qubes [here](https://www.qubes-os.org/doc/installation-guide/). See the later chapter "OS choice" for which OS I chose and why.
Certain laptops might have the disk soldered to the motherboard in which case this is out of the scope of this simple tutorial as I don't have any such laptops to experiment with.
If that is not the case then you probably just have to open the back of your laptop and remove the disk. How it looks will depend on the type of disk there is inside. For me there was only a 2.5 disk that was easelly removed.
&lt;/p>
&lt;h2 id="removing-the-camera-and-microphone">Removing the camera and microphone&lt;/h2>
&lt;p class="pFirst">
Most laptops have the microphone and webcam wired together. In my case, I just had to remove the screen bezel by slipping something between the screen and the back of the laptop. After that, I found myself lucky because the mic and webcam could be disconnected with a simple ribbon cable removed on the top of the screen. If yours is not like that you could either try to find the cable on the motherboard to disconnect it or straight up cut it.
As an alternative, if you want a simpler way to do it you might be able to disable both the webcam and the mic in your bios. In my most modern laptop I do have this as an option. This is not that bad as an alternative because one would need to have access to your bios to be able to reactivate the mic and webcam which seems pretty secure to me.
Also, if you remove your mic you might want to also remove/disconnect your speakers. Those could technically be used as microphones. This is if you have an extreme threat level, for most peoples I don't think this should be a threat.
&lt;/p>
&lt;h2 id="os-choice">OS choice&lt;/h2>
&lt;p class="pFirst">
Here I have two main choices I would consider if your goals are security and privacy:
- Tails -> Ideal when you want to leave no trace after use
- Qubes OS -> Easier to use for complicated tasks and ideal if you want to keep your configuration, apps, and files after a reboot. However, Qubes OS requires a laptop with a significant amount of RAM (at least 16GB) due to its use of virtual machines. While RAM is cheap nowadays, your old laptop CPU might not support adding a lot of RAM. If you choose Qubes OS, you might want to consider using one of those expensive, purpose-built laptops from brands like Purism, NovaCustom, or System76, which often come with Intel ME disabled.
For a more detailed breakdown of these two operating systems, I would advise doing your own research, as they are quite opposites in how they work, the objectives they pursue, and the threat models they serve.
&lt;/p>
&lt;h2 id="anti-tempering">Anti-Tempering&lt;/h2>
&lt;p class="pFirst">
I will explore here some methods that can be used to protect your laptop from being opened or at least warn you if it happens. This can prevent unauthorized modifications or backdoors from being installed on your laptop while it is away.
The most common method that even [some](https://novacustom.com/fr/anti-sabotage-pour-les-ordinateurs-portables/) laptop manufacturers now provide as an option is to paint the screws of your laptop with glitter. Each glitter pattern is completely unique and cannot be reproduced making it a simple and trustable visual indicator of compromise. However, the downside of this method is that it makes opening the laptop more difficult in the future.
To make hardware modifications and routine hardware checks easier, you might want to try a different approach. I believe a better way to do it is to follow mullvad recommendation, [here](https://mullvad.net/fr/help/how-tamper-protect-laptop), which involves putting stickers over the screws then painting the borders of those stickers with glitter. This approach makes tampering with your laptop easier to detect while still allowing for easier access when needed.
After applying the glitter, you should take high-definition, top-down photos of each screw. These photos should then be cryptographically signed. This allows you to compare the original images with the current state of the screws to check for any signs of tampering. You can do it visually or use a tool such as [mine](https://github.com/j3/Glitter-Tampering-Detection) (warning: github link).
Doing this could have, as an example, protected Snowden and Wikileaks conversations from being monitored by the CIA (probably), here is an article about it [CryptoPhone implant](https://www.cryptomuseum.com/crypto/gsmk/ip19/implant.htm).
&lt;/p>
&lt;h2 id="wifi-and-bluetooth">Wifi and Bluetooth&lt;/h2>
&lt;p class="pFirst">
For more advanced threat levels, I would also recommend removing the Wi-Fi and Bluetooth cards from your laptop and using only Ethernet, with or without an external router. Bluetooth is a significant source of vulnerabilities. While Wi-Fi vs. Ethernet can be more of a sigint consideration, it’s worth noting that Wi-Fi MAC addresses can and often are spoofed by operating systems. In contrast, I believe it is much more difficult to change the identifiers of an Ethernet card.
&lt;/p>
&lt;h2 id="kill-switch">Kill-Switch&lt;/h2>
&lt;p class="pFirst">
If you are using Tails, you will only need a lanyard for this step. If you are using a disk with Qubes OS, you might need both a lanyard and a USB key. Simply plug your USB key into your computer and attach it to the lanyard. If you are running Linux, you can easily create a small script (or use one from GitHub) that will shut down your computer and encrypt the persistence when the peripheral is removed. The lanyard ensures that if you are forcibly separated from your computer, the disk will automatically shut down, keeping your disks encrypted at rest and/or losing persistence in the case of Tails.
&lt;/p></description></item><item><title>Darknetlive.com full archive (.md)</title><link>https://sy.st/blog/darknetlive-archive/</link><pubDate>Tue, 19 Nov 2024 13:00:37 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/darknetlive-archive/</guid><description>&lt;p class="pFirst">
The 26th of febryary 2024 the darknet market Incognito Market exit scammed and extorted its vendors. Not long after, it's admin Lin Rui-siang AKA Pharoah got arrested [article](https://archive.is/VLOTx) because of his terrible opsec. I don't care that much about this story (as funny as it is) however, the problem is that Pharoah also bought and took control of darknetlive before his downfall.
&lt;/p>
&lt;p>Darknetlive was an awesome ressource with a lot of articles and history about the darknet (730 articles to be exact). When the exit scam occured I knew darknetlive would probably not survive so I made this archive.&lt;/p>
&lt;p>The way the files are named is page_x_clicked_y.md, x being the page number and y being the number of the article on said page (there was 1-5 articles per page). Each file contains the title of the article, some metadata about the article (time to read, publish daten tags and ammount of words) and it&amp;rsquo;s content.&lt;/p>
&lt;p>As of now I am pretty certain darknetlive will not come back up anytime soon so I uploaded the link to the archive here: &lt;a href="https://sy.st/archive/data/DarknetLive_Archive.zip">link&lt;/a>.&lt;/p></description></item><item><title>Decrypting Proton Privacy Policy</title><link>https://sy.st/blog/decrypting-proton-privacy-policy/</link><pubDate>Tue, 27 Aug 2024 13:00:37 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/decrypting-proton-privacy-policy/</guid><description>&lt;h2 id="introduction">Introduction&lt;/h2>
&lt;p>If you read some of my posts on this website you might have seen that I like Proton. However, every now and then, there is a new controversy about Proton handing out data to feds. My take on that is that peoples should be more careful of their opsec and try to understand why Proton need some data unencrypted and which.&lt;/p>
&lt;p>However, to be fair, Proton are also not really been open about this, they have a Privacy Policy for each of their services with walls of text. That&amp;rsquo;s why I wanted in this article to present the metadata they collect in a simpler way.&lt;/p>
&lt;p>PS: For this article we will concentrate on a &amp;ldquo;basic&amp;rdquo; Proton account meaning not using any insecure extra features like easy-switch, referral, chat support, scribe, in order to keep it simple.&lt;/p>
&lt;h2 id="proton-account">Proton Account&lt;/h2>
&lt;table>
&lt;thead>
&lt;tr>
&lt;th>Email adress&lt;/th>
&lt;th>Verification Email&lt;/th>
&lt;th>Verification Phone number&lt;/th>
&lt;th>IP&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>&lt;a href="mailto:anon@pm.me">anon@pm.me&lt;/a> or &lt;a href="mailto:anon@gmail.com">anon@gmail.com&lt;/a>&lt;/td>
&lt;td>&lt;a href="mailto:verifemail@gmail.com">verifemail@gmail.com&lt;/a>&lt;/td>
&lt;td>+1 3370000&lt;/td>
&lt;td>Depends (read bellow)&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table>
&lt;p>They state in their privacy policy that both the email or phone number used for verification or account recovery are stored hashed. Hashing is a one way encryption that if given the same parameters and same text always gives the same result. This mean that it can be brute forced by feds. Proton has also already been found giving those out as the result of a court order. To make it clear I left them in clear text on the table.&lt;/p>
&lt;p>By default, IP logs are not kept. However, they might be in those cases:&lt;/p>
&lt;ul>
&lt;li>Combat abuse and fraud (this is extremely vague)&lt;/li>
&lt;li>Are engaged in activities that breach our terms and conditions (extremely vague too, is this malicious at this point ?)&lt;/li>
&lt;li>If you enable authentication logging for your Account&lt;/li>
&lt;li>If you voluntarily participate in Proton&amp;rsquo;s advanced security program&lt;/li>
&lt;li>If they receive a court order they will turn on IP logging on your account&lt;/li>
&lt;/ul>
&lt;h2 id="proton-mail">Proton Mail:&lt;/h2>
&lt;h3 id="about-an-email">About an email&lt;/h3>
&lt;table>
&lt;thead>
&lt;tr>
&lt;th>sender and recipient email addresses&lt;/th>
&lt;th>IP of sending server&lt;/th>
&lt;th>attachment names&lt;/th>
&lt;th>message subject&lt;/th>
&lt;th>message sent and received times&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>&lt;a href="mailto:jane.doe@pm.me">jane.doe@pm.me&lt;/a> to &lt;a href="mailto:anon@pm.me">anon@pm.me&lt;/a>&lt;/td>
&lt;td>8.8.8.8&lt;/td>
&lt;td>pdf for John Doe.pdf&lt;/td>
&lt;td>Hi John Doe, I hope no one found your real name yet:):):)&lt;/td>
&lt;td>2024-04-20 07:13:37 and 2024-01-69 07:15:35&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table>
&lt;p>This is a lot of informations that can be used but this is also pretty much the minimum of informations they need unencrypted in order to be able to process an email with the implementation of PGP.&lt;/p>
&lt;p>PS: Email cotent, if sent unencrypted to a Proton Mail address is processed unencrypted by Proton Mail (to encrypt it but also to check for spam). They claim to never store it on disk but this is a limitation of email that has to be known. It also seems that Proton is sending some email metadata to spamhaus for spam detection which mean that some informations about your emails is sent to spamhaus (a Company that can be hated for a lot of reasons).&lt;/p>
&lt;h3 id="about-an-email-account">About an email account&lt;/h3>
&lt;table>
&lt;thead>
&lt;tr>
&lt;th>number of messages sent&lt;/th>
&lt;th>amount of storage space used&lt;/th>
&lt;th>total number of messages&lt;/th>
&lt;th>last login time&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>135&lt;/td>
&lt;td>2.56gb&lt;/td>
&lt;td>1265&lt;/td>
&lt;td>2024-04-20 01:33:07&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table>
&lt;h2 id="proton-drive">Proton Drive&lt;/h2>
&lt;h3 id="about-a-file">About a file&lt;/h3>
&lt;table>
&lt;thead>
&lt;tr>
&lt;th>size of the encrypted file&lt;/th>
&lt;th>file/folder creation and modification times&lt;/th>
&lt;th>permissions&lt;/th>
&lt;th>username of uploader&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>2.6gb&lt;/td>
&lt;td>2024-04-20 01:33:07&lt;/td>
&lt;td>Edit&lt;/td>
&lt;td>&lt;a href="mailto:jane.doe@pm.me">jane.doe@pm.me&lt;/a>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table>
&lt;h3 id="about-a-shared-file">About a shared file&lt;/h3>
&lt;table>
&lt;thead>
&lt;tr>
&lt;th>size of the encrypted file&lt;/th>
&lt;th>file/folder creation and modification times&lt;/th>
&lt;th>permissions&lt;/th>
&lt;th>username of uploader&lt;/th>
&lt;th>last access time&lt;/th>
&lt;th>number of times accessed&lt;/th>
&lt;th>creator&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>2.6gb&lt;/td>
&lt;td>&lt;/td>
&lt;td>Edit&lt;/td>
&lt;td>&lt;a href="mailto:jane.doe@pm.me">jane.doe@pm.me&lt;/a>&lt;/td>
&lt;td>2024-04-20 01:33:07&lt;/td>
&lt;td>13&lt;/td>
&lt;td>&lt;a href="mailto:jane.doe@pm.me">jane.doe@pm.me&lt;/a>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table>
&lt;h2 id="proton-calendar">Proton Calendar&lt;/h2>
&lt;h3 id="about-an-event">About an event&lt;/h3>
&lt;table>
&lt;thead>
&lt;tr>
&lt;th>event start and end time&lt;/th>
&lt;th>time zone&lt;/th>
&lt;th>repetition rule&lt;/th>
&lt;th>event creation&lt;/th>
&lt;th>last event update&lt;/th>
&lt;th>event status&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>2024-04-20 01:33:07 to 2024-04-20 02:33:07&lt;/td>
&lt;td>Europe/Zurich&lt;/td>
&lt;td>Repeat Weekly&lt;/td>
&lt;td>2024-04-10 13:33:07&lt;/td>
&lt;td>2024-04-11 14:09:00&lt;/td>
&lt;td>active&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table>
&lt;h2 id="proton-vpn">Proton VPN&lt;/h2>
&lt;p>There is not much information on what is collected. If we trust their privacy policy it means that they keep no log of any action. However, payment and account data are still collected (see bellow).&lt;/p>
&lt;h2 id="proton-pass">Proton Pass&lt;/h2>
&lt;h3 id="about-an-entry">About an entry&lt;/h3>
&lt;p>Everything seems to be encrypted except alias email adresses. It means that by a hack or court order a bad actor could get all the emails on every website you registered to (and link those easelly because the default alias generation add the website URL at the start).&lt;/p>
&lt;h2 id="proton-wallet">Proton Wallet&lt;/h2>
&lt;p>All of your TXIDS, wallets, exchange rates for transactions and even notes you wrote are saved unencrypted. You are also limited on the number of wallets you can create with a limit of two wallets and 4 adresses. It is also stated in their privacy policy that they may use the data they have (everything) to track fraud at their discretion (do they check the txids with chain analysis firms ? this is not clear but not denied). &lt;strong>There is no Privacy in any way there.&lt;/strong>&lt;/p>
&lt;p>PS: There is external services to buy, sell and exchange crypto on Proton Wallet. If you want privacy I would advise against using those and check on orangefren, trocador or kycnot.me for kyc-free options.&lt;/p>
&lt;h2 id="payment">Payment&lt;/h2>
&lt;p>Proton Mail always had a problem of payment methods. You cannot pay in Monero or any other Privacy Coin for that matter. Even their bitcoin payment option (which is not private in any way if not made using mixers, coinjoins, etc) is managed by a third party.&lt;/p>
&lt;p>If you pay with credit card then your payment information will be sent to a third party but not your account information (this might work with a txid only ? Not clear on how your transaction and account are linked). The last 4 digits of your credit card are saved.&lt;/p>
&lt;h2 id="ios-and-android-apps">IOS and Android apps&lt;/h2>
&lt;ul>
&lt;li>Analytics and statistics using external services (&amp;ldquo;e.g. &lt;a href="http://fabric.io/">fabric.io&lt;/a>&amp;rdquo;).&lt;/li>
&lt;li>Crash reporting via Play Store app statistics, App Store app statistics, or self-hosted (Sentry).
It is not stated in the Privacy Policy but you should be able to deactivate both the analytics and crash reporting on the app settings page.&lt;/li>
&lt;/ul>
&lt;h2 id="others-considerations">Others considerations&lt;/h2>
&lt;ul>
&lt;li>Backups from all of Proton services are kept for up to 30 days.&lt;/li>
&lt;li>I wouldn&amp;rsquo;t expect the fact that they only accept Swiss court orders to protect anyone, they seem to not be to hard to get (&lt;a href="https://proton.me/legal/transparency">Proton transparency page&lt;/a>)&lt;/li>
&lt;li>Proton employ a local installation of self-developed analytics tools. Analytics are anonymized whenever possible and stored locally. &lt;em>This is very much not clear on what they collect, when and how.&lt;/em>&lt;/li>
&lt;li>They use external CDN(s) (like &lt;a href="https://cloudinary.com">https://cloudinary.com&lt;/a> for their landing page). Those might collect your informations too.&lt;/li>
&lt;li>Simple Login and Proton Pass are not hosted on Proton owned servers and infrastructure but rather on some rented/owned servers on external data-centers.&lt;/li>
&lt;/ul>
&lt;h2 id="conclusion">Conclusion&lt;/h2>
&lt;p>Most of the data collected by Proton is data that needs to be collected in order for their services to work. However, there is also a lot of data that,for a privacy service, should not be collected (like billing, recovery / verification email and number and ips).&lt;/p>
&lt;p>Wallet, their last product, seems to offer no benefit and even be a really bad way to use bitcoin as it will link your crypto payments, transactions and balance to your other accounts (email, pass, drive, etc).&lt;/p></description></item><item><title>I am moving...</title><link>https://sy.st/blog/sy-dot-st/</link><pubDate>Tue, 09 Jul 2024 11:00:55 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/sy-dot-st/</guid><description>&lt;h1 id="alert-">Alert !!!&lt;/h1>
&lt;p class="pFirst">
The domain for this website has been changed to sy.st. For now, the old domain redirects to this one, so you shouldn't even notice it. However, I may take the old domain down soon. Therefore, I recommend changing the domain on your favorite RSS reader if you still want to read my rants.
&lt;/p>
&lt;h1 id="why-">Why ?&lt;/h1>
&lt;p>Why sy.st ?&lt;/p>
&lt;p>Syst = system; that sounds cool, right ? I also always liked short domains. To fully use this domain I might make some services I have been hosting for myself publicly accessible like privacy frontend proxies, dns, tor nodes, &amp;hellip;&lt;/p>
&lt;p>Why .st ?&lt;/p>
&lt;p>.st is the gtld of Sao Tome. It is just like every other gtld, except it is operated by Bahnhof. Bahnhof is an hosting provider and one of the largest isp in Sweden. They have hosted Wikileaks and The Pirate Bay in the past and have a reputation for protecting their customers against free speech and privacy issues in multiple instances (see their Wikipedia page). While it may seem like an unusual way to choose a tld, that&amp;rsquo;s just how my mind works.&lt;/p></description></item><item><title>Full archive of a discord about forensics for LE and spyware companies</title><link>https://sy.st/blog/dfir-discord-archive/</link><pubDate>Thu, 04 Jul 2024 14:20:00 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/dfir-discord-archive/</guid><description>&lt;p class="pFirst">
So, about a month ago, I was browsing Twitter, Xitter, or whatever, and I saw the Graphene OS account discussing a Discord server named DFIR that they had been on before being banned. This Discord server only accepts members who are active law enforcement personnel, forensic students, or representatives of forensic products (such as Cellebrite and similar spyware companies). Naturally, when something is restricted, I want to see it. After searching more of Graphene OS's tweets about the server, I discovered that due to the way they set up their permissions, you could access the Discord server's content without joining it. Instead, you could use Discord's discovery feature.
&lt;/p>
&lt;p>Unable to read the messages at the time, I had to find a way to archive the server without being able to join it. I was able to do so by using a little JavaScript code on the browser. This post exists to share the data I obtained so you can maybe learn some interesting techniques and countermeasures from it (educationnal purpose only). Here is the data unformatted, available in .xlsx format, organized by categories and channels.&lt;/p>
&lt;p>&lt;a href="https://sy.st/archive/data/digital_forensics_discord.zip">Link&lt;/a>&lt;/p>
&lt;p>PS: My GPT lawyer advised me to make it clear that this data was publicly accessible and that I&amp;rsquo;m nowhere near the US.&lt;/p></description></item><item><title>Privacy and security implications of using a custom domain for email</title><link>https://sy.st/blog/email-custom-domain/</link><pubDate>Thu, 04 Jul 2024 13:37:00 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/email-custom-domain/</guid><description>&lt;h2 id="introduction">Introduction&lt;/h2>
&lt;p class="pFirst">
Continuing my series of posts on email privacy and security, I wanted to discuss the second piece of advice offered by many people: having a custom domain for personal email. I will focus only on using a domain for everyday email or as an alias domain. Spoiler: I do believe custom domains have their applications for business or branding purposes (such as I have with my blog domain).
&lt;/p>
&lt;h2 id="privacy">Privacy&lt;/h2>
&lt;h3 id="correlation">Correlation&lt;/h3>
&lt;p class="pFirst">
To begin, if you've ever done even a little bit of OSINT, you know that you can search for all accounts linked to a specific email address. This is one of the primary reasons why you might choose to use email aliases for every different website on which you register an account.
&lt;/p>
&lt;p>However, while you can search for a specific email address on those websites, you can also most of the time search by domain (&lt;em>examples of such sites include the biggest ones including dehashed, leakcheck, snusbase, etc.&lt;/em>). This means that if you are the only one using a particular domain, even if you are using it for aliases, you are linking all of your accounts through the data point of your domain.&lt;/p>
&lt;h3 id="kyc">KYC&lt;/h3>
&lt;p class="pFirst">
The second privacy concern is that if you do not want your domain to be locked (which you obviously don't want if you are using this domain for your accounts), you will need to comply with ICANN registration terms. The main issue here is that you will have to complete a KYC and give all of your personal informations in order to register your domain. You could input fake informations but you would take the risk of having your domain locked.
&lt;/p>
&lt;p>This issue can be addressed by using certain services like njal.la that register domains for you (which is what I use for this site), but you are still trusting one more intermediary than if you used your email provider&amp;rsquo;s domain. Nowadays, most registrars also offer WHOIS privacy services for free. However, as with every website, there is always a risk of a data breach, so I wouldn&amp;rsquo;t trust them with my personal information.&lt;/p>
&lt;h2 id="security">Security&lt;/h2>
&lt;p class="pFirst">
First, if your domain gets stolen, it is unlikely that you will get it back, and if you do, your registrar may not be very secure (because anyone could make a fake id and get your domain). On the other hand, your email provider has their domain registered by their company and has access to every lawyer and public attention they would need to get their domain back in a matter of minutes.
&lt;/p>
&lt;p>Secondly, even if you set an alert for your domain&amp;rsquo;s expiration, you might forget and lose your domain. However, this is not really an issue if you are organized (this is an issue for me).&lt;/p>
&lt;h2 id="more">More&lt;/h2>
&lt;p class="pFirst">
Using a custom domain can make you appear like a business or a serious person, which might be beneficial, but it could also make you seem strange and get your accounts locked on some services.
&lt;/p>
&lt;p>Domain prices changes, and the biggest problem is that once you have paid for a domain and used it for your accounts, you will likely need to keep it indefinitely if you want to keep your old accounts secure. Because someone could social engineer and get access to your account using an old email address it was registered on. So, if one day you can&amp;rsquo;t afford it, or forget about it, you might give someone access to all of your accounts.&lt;/p>
&lt;h2 id="conclusion">Conclusion&lt;/h2>
&lt;p class="pFirst">
My conclusion, like most of my posts (I know I am a little bit negative on this blog), is that this is not the best solution if you want to increase your privacy and/or security. However, using a custom domain might be convenient because if your email provider shuts down, you can easily move to another one. But if you choose an email provider with a good track record, this shouldn't be a significant concern. Custom domains are also useful for creating more professional-looking email addresses.
&lt;/p>
&lt;p>As always, I am more than happy to discuss my thoughts with anyone. If you have any arguments that I may have missed (which I’m sure there are plenty, as I wrote this in under 15 minutes after reading another Reddit post), I would appreciate hearing them. Thanks for reading:)&lt;/p></description></item><item><title>My 1 year experience of using GrapheneOS</title><link>https://sy.st/blog/my-1-year-experience-of-using-grapheneos/</link><pubDate>Sat, 06 Apr 2024 10:00:10 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/my-1-year-experience-of-using-grapheneos/</guid><description>&lt;p>PS: I first made this script in the hope of making a video out of it to attract the interest of more peoples into phone privacy and GrapheneOS. However, due to a lack of time and motivation I don&amp;rsquo;t think I will be making this video anytime soon so I decided to publish it here.&lt;/p>
&lt;h2 id="what-is-graphene-os-">What is graphene OS ?&lt;/h2>
&lt;p class="pFirst">
Graphene OS is a fork of AOSP (android) focused on privacy and security. It was originally started by Daniel Micay in 2014 and is now being developed by the community and thanks do donations.
&lt;/p>
&lt;h2 id="why-did-i-install-graphene-os-">Why did I install Graphene OS ?&lt;/h2>
&lt;p class="pFirst">
I have been in the cybersecurity field for a long time and this is what made me realize how important Privacy and Security really are. I would consider myself a quite paranoid individual and this is why, when I needed to change my phone, I decided to buy a Pixel 6 and use Graphene OS.
&lt;/p>
&lt;h2 id="installing-graphene-os">Installing Graphene OS&lt;/h2>
&lt;p class="pFirst">
The biggest caveat with graphene OS is that it can only be installed on pixel phones due to the security requirements and OEM unlocking needs of Graphene OS being only accessible on the Pixel devices. Also, as Graphene OS devs follows google security updates preferably a modern pixel (they still do updates for older phones for now).
&lt;/p>
&lt;p>However, when you do have your pixel phone in your possession it is really easy to install graphene OS. Just go to their web installer, click on the buttons you are asked to click and you should be set in under half an hour.&lt;/p>
&lt;h2 id="post-install--software">Post-install + Software&lt;/h2>
&lt;p class="pFirst">
Now that you have installed graphene OS you will be granted with a surprisingly clean and unblotted home page by modern standards. It can even be a little bit disruptive at first.
&lt;/p>
&lt;p>That&amp;rsquo;s why we will be installing some essentials right away. However, I first have to explain how Google Play Services works in Graphene OS. Graphene OS trait google apps as normal apps so you can manage the permissions and uninstall Google Play Services, Google Store, etc and they not installed by default.&lt;/p>
&lt;p>Without Google Play Services, you might not receive notifications, be able to install the Play Store, etc. However, most of the problems can be addressed utilizing certain apps.&lt;/p>
&lt;p>After every installation of graphene OS my essential apps are:&lt;/p>
&lt;ul>
&lt;li>Aurora store to use the app store without any google account.&lt;/li>
&lt;li>Fdroid to download Open Source apps that for the majority do not need google play services for notifications&lt;/li>
&lt;li>Proton suite to replace email, calendar, drive and photos backup apps.&lt;/li>
&lt;li>Signal + Threema to replace SMS&lt;/li>
&lt;li>Read You for rss feeds&lt;/li>
&lt;li>Obsidian for note taking&lt;/li>
&lt;li>Syncthing to backup files to my server&lt;/li>
&lt;/ul>
&lt;h2 id="positives">Positives&lt;/h2>
&lt;p class="pFirst">
We talked briefly about what benefits could graphene OS offer but I wanted to give some of the ones I prefer that might speak more to you.
&lt;/p>
&lt;p>First and foremost, Graphene OS goes a long way to reduce the attack surface of your mobile device with features such as improved sandobxing, storage scopes, PIN scrambling, &amp;hellip;&lt;/p>
&lt;p>Secondly, GrapheneOS also permit much more privacy by removing all of google services and applications by default. It also permit to manage app permissions much more in depth with the Network and individual Storage Scopes permissions for example.&lt;/p>
&lt;p>As a consequence of removing all of this bloat, Graphene OS appears quite boring and empty to the user which is quite refreshing to see on a smartphone nowadays.&lt;/p>
&lt;p>It can also be installed really easelly via a web browser without even using adb or any other tool and if you ever have a problem or encounter a bug you can count on the GrapheneOS community to help you.&lt;/p>
&lt;p>To see a detailed list of all of the features of GrapheneOS you can go on the GrapheneOS website to the features page.&lt;/p>
&lt;h2 id="negatives">Negatives&lt;/h2>
&lt;p class="pFirst">
But to be fair, Graphene OS also has some negatives. The first one being that it needs to be installed on a Pixel device which limits your choice of phone however the pixel is a really capable device that excluding the more premium phones is often seen as the best android phone for it's price to performance ratio.
&lt;/p>
&lt;p>The second thing that might be a problem for some is the lack of SafetyNet support. This means that google pay and some banking apps will not work on Graphene OS. I do not use google pay and never had any issues with the banking apps I use.&lt;/p>
&lt;p>Keeping a backup of your phone can also be a difficult task on Graphene OS. I save most of the data I need (photos and documents) on Proton Drive so this is fine for me. However; I still need to connect my phone to my computer to do a Backup every few months.&lt;/p>
&lt;p>Using Graphene OS you also lack most of the features of a Pixel device running on a stock OS like all of the new Ai stuff. I see this as a positive.&lt;/p>
&lt;p>To end with the negatives there is also some small bugs from time to time but Graphene OS developers are usually fast at fixing these so you shouldn&amp;rsquo;t run into many of them and if you do, it shouldn&amp;rsquo;t be critical ones.&lt;/p>
&lt;h2 id="more-ressources">More ressources&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://wonderfall.space">https://wonderfall.space&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://discuss.grapheneos.org">https://discuss.grapheneos.org&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://grapheneos.org/history">https://grapheneos.org/history&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://grapheneos.org/features">https://grapheneos.org/features&lt;/a>&lt;/li>
&lt;/ul></description></item><item><title>Privacy and security implications of selfhosting your emails</title><link>https://sy.st/blog/selfhosting-email/</link><pubDate>Sat, 18 Nov 2023 11:00:55 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/selfhosting-email/</guid><description>&lt;h2 id="introduction">Introduction&lt;/h2>
&lt;p class="pFirst">
Every time you see someone in search of a way to gain privacy mooving their emails from google to somewhere else and asking where they should moove there is two kind of responses. First, there is the peoples that will give privacy respecting email services like ProtonMail, TutaNota, Skiff... Then, there is the peoples that will just say that you cannot trust these services and that the only good way is to selfhost your mail server. I will try to explain why I think this second category is wrong in most if not all situations.
&lt;/p>
&lt;h3 id="security-implication-of-selfhosting-your-email">Security implication of selfhosting your email&lt;/h3>
&lt;p class="pFirst">
The security implications of selfhosting your email server are already reminded under every reddit post of someone talking about it so i will not go too far into that but here are the main arguments.
&lt;/p>
&lt;p>The first point is that it is not easy to do, even with the new all in packages like mailinabox you still need some understanding of what you are doing. Then, even if this works, if you forget some basic configuration of your domain or to update your server you risk being the source of some spam emails and having to restart everything from nothing having to get a new ip and domain.&lt;/p>
&lt;p>The second is that if you are using said packages and not installing everything by yourself it is hard to maintain. You need to check your domain reputation, your ip reputation, that everything is up to date and well configured&amp;hellip;&lt;/p>
&lt;p>There is also no E2E encryption by default, so if you want to encrypt your emails you also need to use PGP with everyone. While it is pretty much the same with &amp;ldquo;privacy respecting&amp;rdquo; email services there is still E2E enryption protocols between their users and as more and more peoples are using proton in the community it is easier. These services also have enryption at rest using your PGP key which I haven&amp;rsquo;t seen offered in any email selfhosting solution.&lt;/p>
&lt;h3 id="privacy-implication-of-selfhosting-your-email">Privacy implication of selfhosting your email&lt;/h3>
&lt;p class="pFirst">
The point that is always made agaisnt services like proton is that "they gave an ip to authorities". The thing is you can't selfhost your email server at home (most isp block the ports needed) and it add some security concerns. You will need to host your mail server or at least relay on an hosting provider which mean you are trusting an hosting provider more that these privacy oriented services that are encitivized to do the best they can to keep their reputation.
&lt;/p>
&lt;p>Maybe you are telling yourself &amp;ldquo;yes but I can encrypt my disks&amp;rdquo;. Without even talking about cold boot attacks (because it&amp;rsquo;s not like you will keep your email server offline) the problem is that every email going in and out of your server is directly connected to your server. It mean that you are unique on the network and can be easelly wiretaped. More than your mail being wiretaped in mean that every connection made to your server would be too, including yourself fetching your mails.&lt;/p>
&lt;h3 id="privacy-implication-of-using-a-privacy-respecting-email-provider">Privacy implication of using a &amp;ldquo;privacy respecting&amp;rdquo; email provider&lt;/h3>
&lt;p class="pFirst">
The first one is that you cannot be sure that they do what they say. What if proton was really an honeypot and that the NSA is behind it like it has already been the case with Crypto AG ? What if they are not but a certain offer make them change ? You dont know and will not until it's too late.
&lt;/p>
&lt;p>The second one is metadata, on the internet every packet needs some informations to go from point a to point b. This is the case for you emails with the header not being hidden when using PGP but also for your IP adress being sent to the server on your access. While proton always had (as far as I can remember) a Transparency page stating that they would give out everything they could (pretty much only IP adresses and recovery informations) to a Swiss Court legal request it maybe was not as clear as people would have liked which make a lot of people loose trust in Proton.&lt;/p>
&lt;p>The thing is, every point I made here is also true for selfhosting your own email server if not even more true. Getting your IP adress is easier because you are unique on the network. Getting your email metadata is even easier it just needs an access to your physical server or router.&lt;/p>
&lt;h2 id="conclusion">Conclusion&lt;/h2>
&lt;p class="pFirst">
To conclude, if you are an individual looking for more privacy for your emails there is so much you can do but it will never be perfect. You should always refer to your threat model to see what is better for you but if you don't need an email server for more than sending and recieving a few emails I don't see any benefit to selfhosting your email server.
&lt;/p>
&lt;p>As always, I am more than happy to discuss my thoughts with anyone. If you have any arguments that I may have missed (which I&amp;rsquo;m sure there are plenty, as I wrote this in under 15 minutes after reading another Reddit post), I would appreciate hearing them. Thanks for reading:)&lt;/p></description></item><item><title>Is Countermail the most secure email service ?</title><link>https://sy.st/blog/countermail/</link><pubDate>Wed, 15 Nov 2023 13:00:37 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/countermail/</guid><description>&lt;h1 id="introduction">Introduction&lt;/h1>
&lt;p class="pFirst">
CounterMail is yet another "encrypted" and "anonymous" email provider. Countermail may be the oldest service of its kind still active, with a domain registered in May 2008 and the service ready in May 2010. However, they are less well-known than their competitors, possibly due to their invite-only registrations, which limit their user base.
&lt;/p>
&lt;figure>
&lt;img src="https://sy.st/img/countermail.png"
alt="Countermail inbox page."
loading="lazy">
&lt;figcaption>Countermail inbox page.&lt;/figcaption>
&lt;/figure>
&lt;h1 id="claims">Claims&lt;/h1>
&lt;p class="pFirst">
They seem to be based in Sweden, but neither the company nor its members are disclosed on their website. The webmail platform is Roundcube (open source), and encryption/decryption occurs client-side using OpenPGP.js. While their main website is behind Cloudflare, the login and webmail are not; the proxy used is hosted at "Adminor" in Sweden. They do not provide a Tor link and require JavaScript for client-side decryption, similar to most services of this type. To register, you need an invite code, and unlike Tuta/Tutanota, there is no wait time, and no phone number is required as it is the case with ProtonMail.
&lt;/p>
&lt;p>They claim to only provide email metadata to Swedish authorities after reviewing the requests with their lawyers which is also the claimed to be the case with ProtonMail and Tuta/Tutanota. According to their assertions, the metadata shared in this case would only include email recipients and subjects, which is standard since this information cannot be encrypted with PGP as it needs to be known to the mail server. Additionally, they assert that they do not store nor have the capability to log client IP addresses.&lt;/p>
&lt;h1 id="cons">Cons&lt;/h1>
&lt;p class="pFirst">
There are multiple issues with CounterMail, but the main concern for me is trust. The company and its employees remain hidden, raising questions about who would take accountability in case something goes wrong. There is also a clear lack of communication and updates, the only blog posts are some changelogs with only minor improvements.
&lt;/p>
&lt;p>There are also privacy issues; they lack a Tor domain (which seems unusual for a service of this type), and they do not accept Monero. Unfortunately, the limited acceptance of Monero is a common issue, with Tuta/Tutanota being the only email service that supports Monero through a proxy seller.&lt;/p>
&lt;p>CounterMail also doesn&amp;rsquo;t have any open-source clients. The issue goes further as they don&amp;rsquo;t even have any client. Even their password manager named SafeBox needs to be accessed in the account settings. Not that I would have used it anyway as it lacks many modern functions.
&lt;figure>
&lt;img src="https://sy.st/img/safebox.png"
alt="Safebox password manager hidden in the settings."
loading="lazy">
&lt;figcaption>Safebox password manager hidden in the settings.&lt;/figcaption>
&lt;/figure>
&lt;/p>
&lt;p>They also don&amp;rsquo;t have their own data centers nor even their own IP addresses, which could pose issues as they have less control over their infrastructure compared to, for example, ProtonMail or Tuta/Tutanota.&lt;/p>
&lt;p>The last issues may not be problematic for the majority of people but could be viewed as concerns for others. Firstly, this is an invite-only service, which might seem unusual for a privacy-focused service to limit access in such a way (though they are not the only ones, and I understand the desire to control access). Secondly, they are relatively expensive, with a price slightly higher than ProtonMail Plus despite offering a lot less functionalities and updates. They also do not offer any free-plan (there is only a 7 day free trial).&lt;/p>
&lt;h1 id="conclusion">Conclusion&lt;/h1>
&lt;p class="pFirst">
I'm a firm believer that competition is always a good thing, and every service serves its own purpose. However, it appears that CounterMail is a good service with good intentions but it has failed to adapt and keep up with the market. The issue is that it seems like something that may have been revolutionary years ago but now, with the plethora of options available, appears a little outdated. However, to be fair, even though they lack many features and I wish they had more control over their infrastructure, they still offer many good security features that other email services do not. I also appreciate that they have remained online for this long, which give me some confidence in their service.
&lt;/p>
&lt;p>To really conclude, I think that the only matter is that you can&amp;rsquo;t see the server code nor config for all of the services of this type. So you need to trust someone and this choice is personnal. I can understand why someone would trust countermail more than for example ProtonMail but I don&amp;rsquo;t.&lt;/p></description></item><item><title>Best "Offshore" hosting providers</title><link>https://sy.st/blog/offshore-hosting-test/</link><pubDate>Tue, 24 Oct 2023 13:00:37 +0200</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/offshore-hosting-test/</guid><description>&lt;h2 id="introduction">Introduction&lt;/h2>
&lt;p class="pFirst">
After many years of interest in self-proclaimed "offshore", "resilient", "privacy" and "free speech" hosting providers and some disappointments along the way, I figured out I should conduct some final tests and publish my findings and research. This article is meant to help people who don't have the technical knowledge or the time to research such hosts for their projects but need them.
&lt;/p>
&lt;p>If you want to skip my rambling you can go directy to the results &lt;a href="https://sy.st/blog/offshore-hosting-test/#results">here&lt;/a>.&lt;/p>
&lt;h2 id="philosphy">Philosphy&lt;/h2>
&lt;p class="pFirst">
If you are reading this, you have probably already thought about the question "What should or shouldn't be on the internet?" The things most people would not accept are Terrorism, Child Pornography, incitement of violence, far-right websites, etc. Most of them are debatable, but I think we can all agree that Terrorism and Child Pornography should be disallowed.
&lt;/p>
&lt;p>I will not even talk about how some governments use the word &amp;ldquo;Terrorism&amp;rdquo; to ban and surveil activists. Just think about a far-left or right association with some members who engage in &amp;ldquo;violent&amp;rdquo; actions (attacking opposing groups, puncturing tires, etc.) which can be seen as terrorism as their goal are to create fear. Should the people who have done these actions be named terrorists? Should the websites of these associations be removed from the internet?&lt;/p>
&lt;p>And now, the content: Should the videos of the Christchurch or Annecy terrorist attacks be deleted from the internet? These attacks were labeled as terrorist attacks, but if someone wants to see them or their manifestos, it is not as if it will make them terrorists, right? Should all the content about these attacks be deleted so we can &amp;lsquo;forget&amp;rsquo; and not learn anything?&lt;/p>
&lt;p>We can also use the example of the Christchurch terrorist attack to raise another question. Who should govern the internet? New Zealand banned the attack video and started contacting websites hosting the video to require its deletion. New Zealand&amp;rsquo;s police have no right to declare this content illegal in other territories, but it hasn&amp;rsquo;t deterred them from contacting the providers and administrators of websites hosted abroad. When this is New Zealand, you may get lucky, and your hosting provider may not require you to do anything. But now, imagine the same from the US? The US successfully prosecuted The Pirate Bay administrators in Sweden for a small bit of text called magnets while what they were doing was totally okay in Sweden. The hosting provider of TPB was also prosecuted, so with this example, we can imagine why most hosting providers will not bother to defend the laws of their land for their customers.&lt;/p>
&lt;p>I may have raised more questions than answers, but my point is that hosting providers should not act as judges and executioners when it comes to what content is allowed on the internet. I think that a good hosting provider should let the benefit of the doubt to his client in the case that an infration is not clear (of course if this is some public Al Qaida recruitement website or a forum to distribute CSAM it is different). Furthermore, I believe that the law should protect these providers, especially in Europe, rather than prosecute them.&lt;/p>
&lt;h2 id="results">Results&lt;/h2>
&lt;p class="pFirst">
As stated in the introduction, this article was created to assist people with limited knowledge of the discussed topics. If you only want the raw information, here is a comparison I have made for each hosting provider (the requirements for each category are listed below):
&lt;/p>
&lt;table>
&lt;thead>
&lt;tr>
&lt;th>Providers&lt;/th>
&lt;th>free speech&lt;/th>
&lt;th>&amp;ldquo;hate&amp;rdquo; speech&lt;/th>
&lt;th>Countries&lt;/th>
&lt;th>Cryptocurrency&lt;/th>
&lt;th>NO-KYC&lt;/th>
&lt;th>Pornography&lt;/th>
&lt;th>Abortion&lt;/th>
&lt;th>Communism&lt;/th>
&lt;th>Tor Exit Allowed&lt;/th>
&lt;th>Not WHMCS&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>&lt;a href="https://bahnhof.cloud/">Banhof&lt;/a>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>&lt;/td>
&lt;td>SE&lt;/td>
&lt;td>❌&lt;/td>
&lt;td>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;a href="https://prq.se/">Prq.se&lt;/a>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>SE&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>⭐&lt;a href="https://nicevps.net/">Nicevps&lt;/a>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>CH, NL&lt;/td>
&lt;td>✔️ (XMR accepted)&lt;/td>
&lt;td>✔️ (no email)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;a href="https://flokinet.is/">FlokiNET&lt;/a>&lt;/td>
&lt;td>&lt;a href="https://twitter.com/FlokiNETehf/status/1434829702842171395">❌&lt;/a>&lt;/td>
&lt;td>&lt;a href="https://flokinet.is/user-policy/">❌&lt;/a>&lt;/td>
&lt;td>RO, IS, NL, FI&lt;/td>
&lt;td>✔️ (XMR accepted)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>&lt;a href="https://flokinet.is/user-policy/">✔️&lt;/a>(but not in all locations)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>&lt;/td>
&lt;td>❌&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>⭐&lt;a href="https://www.privex.io/">Privex&lt;/a>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>NL, SE, FI, US&lt;/td>
&lt;td>✔️ (XMR accepted)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>&lt;a href="https://www.privex.io/faq/#which-regions-are-autonomous-regions">✔️&lt;/a>(but not in all locations)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;a href="https://buyvm.net/">BuyVM&lt;/a>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>US, LU&lt;/td>
&lt;td>✔️ (XMR accepted)&lt;/td>
&lt;td>❌ (kyc requiered on non crypto payments)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>❌&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;a href="https://1984.is/">1984.is&lt;/a>&lt;/td>
&lt;td>&lt;/td>
&lt;td>❌&lt;/td>
&lt;td>IS&lt;/td>
&lt;td>✔️ (XMR accepted)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>❌&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>❌&lt;/td>
&lt;td>✔️&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;a href="https://cockbox.org/">Cockbox&lt;/a>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>RO&lt;/td>
&lt;td>✔️ (XMR accepted)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>⭐ &lt;a href="https://www.urdn.com.ua/">URDN&lt;/a>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>&lt;/td>
&lt;td>UA&lt;/td>
&lt;td>✔️ (XMR accepted)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>❌&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;a href="https://hostslick.com/">Hostlick&lt;/a>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>NL&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>❌ (don&amp;rsquo;t even accept VPN)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>❌&lt;/td>
&lt;td>❌&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;a href="https://www.shinjiru.com/">Shinjiru&lt;/a>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>MY, BG, NL, &amp;hellip;&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>&lt;/td>
&lt;td>❌&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>⭐&lt;a href="https://svea.net/">Svea&lt;/a>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>SE&lt;/td>
&lt;td>✔️ (XMR accepted)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>⭐&lt;a href="https://vps.keff.org/">Keff&lt;/a>&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>SE&lt;/td>
&lt;td>✔️ (XMR accepted)&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;td>✔️&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table>
&lt;h3 id="requierements">Requierements&lt;/h3>
&lt;p>So first, I made a list of requirements I had to label an &amp;ldquo;offshore&amp;rdquo; hosting provider as a good one.&lt;/p>
&lt;ul>
&lt;li>&amp;ldquo;Free speech&amp;rdquo; content:
&lt;ul>
&lt;li>The hosting provider shouldn&amp;rsquo;t censor the customer because they don&amp;rsquo;t think the same way as the customer does.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&amp;ldquo;Hate speech&amp;rdquo; content:
&lt;ul>
&lt;li>Hosting providers should accept to host any content labeled as &amp;lsquo;hate speech&amp;rsquo; (Nazi, racist, offensive speech).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Countries:
&lt;ul>
&lt;li>This one is not really a criterion as all of these hosts are in countries that respect, to some extent, freedom. You may still want to choose a different hosting country for your domain name and CDN to be more resilient and one not too far from your user base for low latency.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Cryptocurrency:
&lt;ul>
&lt;li>The hosting provider should accept popular cryptocurrencies. It is better if they accept XMR (it should be the norm for a so-called &amp;lsquo;anonymous&amp;rsquo; provider).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>NO-KYC:
&lt;ul>
&lt;li>The host shouldn&amp;rsquo;t require/verify any PII or KYC data (address, name, phone&amp;hellip;). The best would be to not even ask for an email or a username.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Pornographic:
&lt;ul>
&lt;li>The host should accept pornographic content (half of the internet is porn, so anyone will probably end up with some on their site if there is user-generated content).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Abortion:
&lt;ul>
&lt;li>The host should accept to host content promoting abortion up to the point of birth.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Communism:
&lt;ul>
&lt;li>The host should accept to host content promoting communist ideologies.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Tor Exit Allowed:
&lt;ul>
&lt;li>The host should accept to host Tor exit nodes (I find this a good indicator of whether they are really fighting for privacy or just doing marketing).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Not WHMCS:
&lt;ul>
&lt;li>WHMCS is a CMS for hosting providers that requires PII on every signup, doesn&amp;rsquo;t natively support 2FA, has proprietary code and plugins. If a hosting provider doesn&amp;rsquo;t have its own panels, I don&amp;rsquo;t think they are really fighting for the privacy, security, and sovereignty of their services and clients.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Bonus: Should give a second chance
&lt;ul>
&lt;li>The hosting provider should try to find a way to resolve issues with the customer before ending their contract.&amp;quot;&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="conclusions">Conclusions&lt;/h2>
&lt;p>Top &lt;del>3&lt;/del> 5 hosting providers with their issues:&lt;/p>
&lt;ol>
&lt;li>NiceVPS
&lt;ul>
&lt;li>Email requiered and not cheap.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Privex
&lt;ul>
&lt;li>Email requiered and pretty bad panel but good prices.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>URDN
&lt;ul>
&lt;li>Need to contact them via telegram or mail.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Svea
&lt;ul>
&lt;li>Need to contact them via telegram or mail.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Keff
&lt;ul>
&lt;li>Need to contact them via telegram or mail.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ol></description></item><item><title>How a secure and resilient website should be hosted</title><link>https://sy.st/blog/how-a-secure-and-resilient-website-should-be-hosted/</link><pubDate>Sat, 25 Mar 2023 18:00:35 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/how-a-secure-and-resilient-website-should-be-hosted/</guid><description>&lt;h2 id="introduction">Introduction&lt;/h2>
&lt;p class="pFirst">
Hello, following my last article on the opsec of the breached funder pompompurin who lead to his arrest and the fake news about it I wanted to do a new one on how a website may host itself for resiliency and security.
&lt;/p>
&lt;p>For that I have two pretty simple setups that I can think of with one of them being more easy to implement and probably a lot more stable while not being as secure as the second one.&lt;/p>
&lt;h2 id="waf---rproxy-1---rproxy-2---vpn---backend">WAF -&amp;gt; RPROXY 1 -&amp;gt; RPROXY 2 -&amp;gt; VPN -&amp;gt; BACKEND&lt;/h2>
&lt;figure>
&lt;img src="https://sy.st/img/diagram1.png"
alt="Diagram of what this first setup may looks like"
loading="lazy">
&lt;/figure>
&lt;p class="pFirst">
So this first setup is pretty simple. First, for the waf I think the two main possible choices would be cloudflare or ddos-guard. For security and resiliency I would use ddos-guard but cloudflare also have a lot of others features and configurations option while being free which may make it a better choice for a smaller less important forum.
&lt;/p>
&lt;p>Then, the second and third protections would be reverse proxies, they are useful for multiple reasons. First, if you use cloudflare even if they do not suspend sites following legal orders they do forward all the account records they have linked to your domain. It mean that they would have all of the dns records on your account and so have the ip of your server. It may seems pretty obvious but I have seen a lot of websites thinking an &amp;ldquo;offshore host&amp;rdquo; behind cloudflare is sufficient. These reverse proxy would also protect any dmca/abuse forwarded by cloudflare to the website hosting provider (which would be the reverse proxy in this case). These two reverse proxies would have to be on two different hosts known for their respect to privacy and ignorance of most things (like nicevps.net, svea.net, privex.io, buyvm.net, etc).&lt;/p>
&lt;p>Then, after the waf and the two reverse proxies as a measure to protect the server in the occasion of the backend ip leaking we would have a reputable vpn on the backend server itself. For that we would need a vpn with port forwarding possibilities (I would use ovpn.net, ivpn.net or mullvad.net). This would shield your server in case the 3 proxies that there is before are somewhat compromised. It would also permits to hide the backend ip in other cases like if your server ip was leaking cause of a vulnerability in your website.&lt;/p>
&lt;p>This is also important to know that for this setup to work you would have at any stage of your setup to make web ports only be accessible by the service before it. This would look like RPROXY 1 only allow WAF ips to contact him on port 80 and 443, RPROXY 2 allow only RPROXY 1 ips and your backend server only allow connections from RPROXY 2 ip. If you do not do that your backend ip will end up on indexing websites like censys.io or shodan.io wich is something you do not want to happen.&lt;/p>
&lt;p>I never tried to add that to the chain but I&amp;rsquo;m pretty sure to obscure the traffic coming in and off of your different proxies you could have multiple &amp;ldquo;fake&amp;rdquo; servers behind where you would send a copy of the packets you send to the next server on the chain, it would not be that helpful unless you have a lot of servers but I wanted to mention it.&lt;/p>
&lt;p>To conclude, this setup is pretty bulletproof but still rest on the normal internet. What I mean by that is that if your adversary is the fbi like for breached they could just subpoena every step of your setup and end up finding your backend. It shouldn&amp;rsquo;t arrive without you noticing anything if you choose good hosts, countries to host and VPNs but still, this is technically not bulletproof.&lt;/p>
&lt;h2 id="waf---clearnet-proxy---tor">WAF -&amp;gt; Clearnet PROXY -&amp;gt; tor&lt;/h2>
&lt;figure>
&lt;img src="https://sy.st/img/diagram2.png"
alt="Diagram of what this second setup may looks like"
loading="lazy">
&lt;/figure>
&lt;p class="pFirst">
You probably heard of Tor2web proxies haven't you ? These proxies which are most of the time setup to perform mitm attacks are proxies which permit for example to enter something like dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion.sy.st and basically to visit tor domains on the clearnet.
&lt;/p>
&lt;p>Now, the idea of this setup would be to host your website securely on tor (I will not explain how to do it here as there is already some good articles on that) and to setup your clearnet domain only to proxy the requests to your tor website by installing a Tor2web like proxy on your proxies servers.&lt;/p>
&lt;p>I haven&amp;rsquo;t much experience with this setup but I have still done some tests using this setup in the past and everything worked fine for days without me noticing any issues.&lt;/p>
&lt;p>Now, I must also talk about the principal problem that this setup imply. The biggest problem is that it would be pretty instable, websites on tor are already instable but add a proxy before that which tor haven&amp;rsquo;t been designed for and you get something experimental. Add to that a forum software which have probably been made for far more simples environments and you get something which would probably not work for a forum.&lt;/p>
&lt;p>However, I find this setup interesting as even if it is not really useful for a forum where user need to stay logged in and where you do not want connections to time out while doing a post it may be useful for other sites. Pretty much any site which haven&amp;rsquo;t any user generated content and which doesn&amp;rsquo;t need a good uptime could benefit from this setup. Imagine for that your small torrent tracker, your private forum, your blog that everyone want down, your leak that you want to share on the Clearnet securely (but it would better not be to big with tor speeds), etc.&lt;/p>
&lt;h2 id="conclusion">Conclusion&lt;/h2>
&lt;p class="pFirst">
To conclude, the first setup would probably be fine if setup and monitored well. If more security is needed nothing prevent you from adding more proxies on different countries to the setup to try to play on local laws. The second setup however, is more what I would consider a proof of concept and at this point you would probably be better of just educating your users on how to use tor and host your website there.
&lt;/p>
&lt;p>Thanks for reading all of that and I hope you learnt something today, if you have questions or corrections about what I wrote do not hesitate to send me an email to the email address bellow.&lt;/p></description></item><item><title>FUD news in cybersecurity and pompompurin arrest</title><link>https://sy.st/blog/fud-news-in-cybersecurity-and-pompompurin-arrest/</link><pubDate>Thu, 23 Mar 2023 11:00:55 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/fud-news-in-cybersecurity-and-pompompurin-arrest/</guid><description>&lt;h2 id="introduction">Introduction&lt;/h2>
&lt;p class="pFirst">
Everyone who has some interests in cybersecurity should know that there is a lot of news sites in the cybersecurity space that are just reposting each others content without any research except on how they could turn the news into the biggest news possible. I will discuss here the two most prevalent fake news about the pompompurim arrest with evidence in an effort on how not to fall into such fake news.
&lt;/p>
&lt;h2 id="pompompurin-arrest">Pompompurin arrest&lt;/h2>
&lt;p class="pFirst">
Pompompurin was the funder of the now defunct forum breached. Pompompurin founded breached right after the arrest of omnipotent, the funder of raidforums. Breached gained in popularity pretty fast spurred by the good reputation of pompompurin on raidforums and how semblable the forum was to raidforums.
&lt;/p>
&lt;p>From what I saw and from talking to him, I can say that pompompurin was really doing everything he could to satisfy peoples and to make the best out of breached. However, breached was still a forum made mostly for trading illicit products and services, and what had to happen happened and pompompurin got arrested and then the other admin Baphonet decided it was better to close the forum.&lt;/p>
&lt;figure>
&lt;img src="https://sy.st/img/pompompurin1.png"
alt="Pompompurin criminal case"
loading="lazy">
&lt;figcaption>Criminal case&lt;/figcaption>
&lt;/figure>
&lt;h2 id="the-media-problem">The media problem&lt;/h2>
&lt;h3 id="intelx">Intelx&lt;/h3>
&lt;p class="pFirst">
So there is one news that was on 99% if not all articles I read. This news was that if pompompurin was arrested it was in fact cause of intelx.io, an osint and search service founded by Peter Kleissner. The history starts before breached came to life, Pompompurin had attacked intelx by indexing most of their subscription only viewable indexed files and leaking them to the public. He, with other community members also doxed Peter Kleissner and published personal information on him and his family. At the time pompompurin told that if he was doing that it was cause intelx was also indexing all of his doxbin-like paste site skidbin.net without asking permission.
&lt;/p>
&lt;p>Peter Kleissner also has an history of doxing in public and sharing information to law enforcement even on childrens attacking his service. This is why when pompompurin created a new account on intelx and started doing indexing the results Peter Kleissner leaked all of his account information and logs on intelx twitter and telegram and shared them with authorities. It was found that the ip used to register on intelx was a residential ip.&lt;/p>
&lt;p>This is now that the problem start, when pompompurin got arrested Peter Kleissner went to twitter and told the public that it was the information he provided to the fbi that permitted pompompurin arrest. Media outlets not verifying information as always went on to write that if pompompurin has been arrested it was cause of a revolutionary osint service that helped law enforcement, intelx.&lt;/p>
&lt;p>Now, what is the problem you may ask ? This ip was a residential ip so pompompurin must have forgotten to turn on his 7 proxychain right ? No. It was in fact a residential ip proxy sold by the service nsocks which mean that it was not in fact his residential ip but just an exit proxy he used.&lt;/p>
&lt;figure>
&lt;img src="https://sy.st/img/intelx.png"
alt="pompompurin *residential* ip"
loading="lazy">
&lt;figcaption>Source: &lt;a href="https://twitter.com/kayte">https://twitter.com/kayte&lt;/a>&lt;/figcaption>
&lt;/figure>
&lt;h3 id="hydramarket">Hydramarket&lt;/h3>
&lt;p class="pFirst">
Here is another community/service pompompurin had flighted with. Hydramarket is a forum that also tried replacing raidforums but unlike breached it was founded on lies. Hydramarket funder usurped omnipotent (the now arrested raidforums funder) and lied about raidforums staff being members of his forum. He also made the forum with the only goal to make money by selling VIP subscriptions for people to access the leaked databases downloads which contains only already leaked databases. Hydramarket only power when breached was alive were ddos attacks as it is hard and costly for breached, a forum with a big infrastructure, in different countries and with not cheap hosts to handle these attacks.
&lt;/p>
&lt;p>When pompompurin was arrested, in intelx fashion, hydramarket went to telegram and told everyone that they were the ones that got the fbi on breached servers by sending them the backend ip of breached database server.&lt;/p>
&lt;p>The problem ? Same as the one mentioned above, media outlets haven&amp;rsquo;t verified any information as if the leaked ip was really the one of breached and haven&amp;rsquo;t even verified the history of Hydramarket lying. Here is an example of a french article on the subject published by zataz.com, a media funded by Damien Bancal and known for writing dubious articles.&lt;/p>
&lt;blockquote>
&lt;p>Direct link: &lt;a href="https://www.zataz.com/dans-les-petits-secrets-de-la-fin-du-forum-pirate-breached/">https://www.zataz.com/dans-les-petits-secrets-de-la-fin-du-forum-pirate-breached/&lt;/a>&lt;/p>
&lt;p>Archive: &lt;a href="https://archive.is/syzXS">https://archive.is/syzXS&lt;/a>&lt;/p>
&lt;/blockquote>
&lt;h2 id="conclusion">Conclusion&lt;/h2>
&lt;p class="pFirst">
To conclude, we see more and more peoples trying to educate themselves into cybersecurity for themselves but also to work on this beautiful field that is computer science. The problem however, is that if you do not know where to search and are not able to be critic towards the articles you read by fear of being in these "scarry" communities you loose most of the information and learn mostly fud.
&lt;/p>
&lt;p>So my advice would be to get into these communities, even if you are fully against what they do it will make you understand how they work in the real world and not only in the headlines.&lt;/p>
&lt;h3 id="edit-made-on-the-24032022">Edit made on the 24/03/2022&lt;/h3>
&lt;p class="pFirst">
As planed, the trial for pompompurin was today. The trial just gave us more element as how pompompurin was arrested and as expected nor intelx nor hydramarket were the cause of his arrest.
&lt;/p>
&lt;p>The cause of his arrest was just a bunch of stupid OPSEC mistakes:&lt;/p>
&lt;ol>
&lt;li>When he messaged omnipotent, the old raidforums owner, about a leaked database which did not contain his personal email (which it should have if the database was real as he had an account). To prove his point he just sent out his personal email to omnipotent.&lt;/li>
&lt;/ol>
&lt;figure>
&lt;img src="https://sy.st/img/pompompurin.jpg"
alt="pompompurin leaking his email"
loading="lazy">
&lt;/figure>
&lt;ol start="2">
&lt;li>When he connected to raidforums with multiple mobile ips associated with his phone.&lt;/li>
&lt;/ol>
&lt;figure>
&lt;img src="https://sy.st/img/pompompurin2.png"
alt="raidforums on residential ip"
loading="lazy">
&lt;/figure>
&lt;ol start="3">
&lt;li>He connected with VPNS to his personal google account at the same time as for his criminals activities.&lt;/li>
&lt;/ol>
&lt;figure>
&lt;img src="https://sy.st/img/pompompurin3.png"
alt="not sandboxing accounts is bad"
loading="lazy">
&lt;/figure>
&lt;ol start="4">
&lt;li>He accessed breached on a home residential ip linked to his father name (probably his home).&lt;/li>
&lt;/ol>
&lt;figure>
&lt;img src="https://sy.st/img/pompompurin4.png"
alt="breached on residential ip"
loading="lazy">
&lt;/figure>
&lt;p>And probably a lot more that I didn&amp;rsquo;t bother to include here. If you are interested to know more you should definitely read the section &amp;ldquo;Attribution of Conor Fitzpatrick as “pompompurin”&amp;rdquo; of the pompompurin affidavit.&lt;/p>
&lt;blockquote>
&lt;p>&lt;a href="https://sy.st/doc/gov.uscourts.vaed.535542.2.0.pdf">https://sy.st/doc/gov.uscourts.vaed.535542.2.0.pdf&lt;/a>&lt;/p>
&lt;/blockquote>
&lt;h2 id="adding-to-the-conclusion">Adding to the conclusion&lt;/h2>
&lt;p class="pFirst">
What we can learn from that ? It is important to maintain a good OPSEC since the creation of your online identity and not when it is too late. You should practice your OPSEC like if your life was depending on it, because it might. You should also never trust anyone with your data and security on the internet even if they seems to be hardened OPSEC masters on the outside.
&lt;/p></description></item><item><title>First</title><link>https://sy.st/blog/first/</link><pubDate>Thu, 17 Mar 2022 22:44:54 +0100</pubDate><author>i[a]sy.st (Leet)</author><guid>https://sy.st/blog/first/</guid><description>&lt;p>First post and probably the last.&lt;/p></description></item></channel></rss>