(hackersnewsbulletin.com) After the revelation of NSA that they SPY, most of the internet users started to use TOR (The anonymity network) to keep their privacy secure and according to a report TOR users doubled after the NSA revelation by Snowden. But do you know one the CRYPTO using by TOR is still NSA crackable, it is revealed by Rob Graham, CEO of penetration testing firm Errata Security.
His conclusion says that TOR still uses 1024 RSA/DH keys for much of its crypto particularly because most people are still using older versions of the software. The older 2.3 versions of Tor uses keys the NSA can crack, but few have upgraded to the newer 2.4 version with better keys.
How Graham came to know about the Crypto (TOR is using):
He ran a ”hostile” exit node on TOR and started to record the encryption which was negotiated by the incoming connection (the external link encryption, not the internal circuits).About 76 percent of the 22,920 connections he polled used some form of 1024-bit Diffie-Hellman key. The analysis came a day after revelations the NSA can circumvent much of the encryption used on the Internet. While no one knows for sure exactly what the NSA is capable of cracking, educated speculation has long made a case that the keys Graham observed are within reach of the US spy agency.
(motherjones.com) JOSEPH BONICIOLI mostly uses the same internet you and I do. He pays a service provider a monthly fee to get him online. But to talk to his friends and neighbors in Athens, Greece, he’s also got something much weirder and more interesting: a private, parallel internet.
He and his fellow Athenians built it. They did so by linking up a set of rooftop wifi antennas to create a “mesh,” a sort of bucket brigade that can pass along data and signals. It’s actually faster than the Net we pay for: Data travels through the mesh at no less than 14 megabits a second, and up to 150 Mbs a second, about 30 times faster than the commercial pipeline I get at home. Bonicioli and the others can send messages, video chat, and trade huge files without ever appearing on the regular internet. And it’s a pretty big group of people: Their Athens Wireless Metropolitan Network has more than 1,000 members, from Athens proper to nearby islands. Anyone can join for free by installing some equipment. “It’s like a whole other web,” Bonicioli told me recently. “It’s our network, but it’s also a playground.”
Indeed, the mesh has become a major social hub. There are blogs, discussion forums, a Craigslist knockoff; they’ve held movie nights where one member streams a flick and hundreds tune in to watch. There’s so much local culture that they even programmed their own mini-Google to help meshers find stuff. “It changes attitudes,” Bonicioli says. “People start sharing a lot. They start getting to know someone next door—they find the same interests; they find someone to go out and talk with.” People have fallen in love after meeting on the mesh.
The python script which controls the LED’s can be found here: https://docs.google.com/file/d/0B1i26…
The two entries i made to the /etc/rc.local file are:
python /scripts/wardrivestatus.py &
Adding these entries will allow everything to start automatically on boot.
The model number of GPS receiver is BU-353.
The network card is an: Alfa networks AWUS036H
(newscientist.com) Worried about the NSA snooping on your email? Maybe you need to start creating your own personal internet
THE internet is neither neutral nor private, in case you were in any doubt. The US National Security Agency can reportedly collect nearly everything a user does on the net, while internet service providers (ISPs) move traffic according to business agreements, rather than what is best for its customers. So some people have decided to take matters into their own hands, and are building their own net from scratch.
Across the US, from Maryland to Seattle, work is underway to construct user-owned wireless networks that will permit secure communication without surveillance or any centralised organisation. They are known as meshnets and ultimately, if their designers get their way, they will span the country.
Dan Ryan is one of the leaders of the Seattle Meshnet project, where sparse coverage already exists thanks to radio links set up by fellow hackers. Those links mean that instead of communicating through commercial internet connections, meshnetters can talk to each other through a channel that they themselves control.
Each node in the mesh, consisting of a radio transceiver and a computer, relays messages from other parts of the network. If the data can’t be passed by one route, the meshnet finds an alternative way through to its destination. Ryan says the plan is for the Seattle meshnet to extend its coverage by linking up two wireless nodes across Lake Union in downtown Seattle. And over the country at the University of Maryland, Baltimore County, student Alexander Bauer is hoping to build a campus meshnet later this year. That will give his fellow students an alternative communications infrastructure to the internet.
> The first step is to recognize that constant monitoring and analysis are under way. The next step is not to panic or feel overwhelmed! Understand that there are tools and techniques available which can assist in anonymizing our use of various telecommunications technologies.