📝 New article: Why We Choose Static HTML/CSS: A Digital Resistance Manifesto
Learn why Virebent.art chooses static HTML/CSS as a deliberate stance for digital freedom and privacy in an age of surveillance.
📝 New article: Why We Choose Static HTML/CSS: A Digital Resistance Manifesto
Learn why Virebent.art chooses static HTML/CSS as a deliberate stance for digital freedom and privacy in an age of surveillance.
📝 New article: m2usenet - Privacy-Focused Usenet Posting Gateway
m2usenet is a privacy-focused web interface for posting to Usenet newsgroups with Hashcash proof-of-work and Ed25519 digital signatures.
📝 New article: YAMN Tor Integration Project
We have developed an enhanced version of YAMN (Yet Another Mixmaster Network) with native Tor network integration. This project significantly improves the anonymity and security of the mixmaster remailer network by leveraging Tor's onion routing capabilities
📝 New article: Giving a Face to a Naked Key: The Identicon Approach
How deterministic identicons give a visual face to naked Ed25519 keys — binding username, email, and public key into a cryptographically verifiable visual identity for pseudonymous environments like Usenet.
📝 New article: Security Theater: Why "Easy Crypto for Foolish People" is Killing PGP
How 'easy crypto' tools like FlowCrypt and Thunderbird's built-in PGP are fracturing OpenPGP standards, forcing security downgrades, and why NeoMutt with GnuPG remains the only sane choice.
🔗 https://www.virebent.art/blog/EasyCryptoforFoolishPeople.html
📝 New article: Enforcing TLS 1.3 on INN2: A Security Hardening Guide
Deep dive into securing NNTP with TLS 1.3, systemd isolation, and automated PKI management on Debian 12.
📝 New article: Tor Hardening: Randomized Circuit Lengths
Technical analysis on mitigating correlation attacks in Tor by implementing variable hop counts for latency-tolerant protocols like SMTP and NNTP.
📝 New article: Tor Extended Hop Risks: The Paradox of Choice
Technical analysis of why increasing Tor circuit length can lead to statistical unique identification and higher node compromise probability.
🔗 https://www.virebent.art/blog/tor-extended-hops-risks.html
📝 New article: NSA, Espionage, and Cryptographic Backdoors: An In-Depth Analysis
Examining the intricate relationship between the NSA, espionage, and potential backdoors in NIST cryptographic standards.
🔗 https://www.virebent.art/blog/the-vulnerability-of-the-RNG-ecosystem.html
📝 New article: AnonMesh - Rethinking Anonymous Networks | Part 1
Building True Digital Privacy in the Post-Quantum Era. An article from the Virebent.art blog.