📝 New article: Why We Choose Static HTML/CSS: A Digital Resistance Manifesto

Learn why Virebent.art chooses static HTML/CSS as a deliberate stance for digital freedom and privacy in an age of surveillance.

🔗 https://www.virebent.art/blog/statichtmlcss3.html

#privacy #security #opensource #virebent

Why We Choose Static HTML/CSS: A Digital Resistance Manifesto - Virebent.art

Learn why Virebent.art chooses static HTML/CSS as a deliberate stance for digital freedom and privacy in an age of surveillance.

📝 New article: m2usenet - Privacy-Focused Usenet Posting Gateway

m2usenet is a privacy-focused web interface for posting to Usenet newsgroups with Hashcash proof-of-work and Ed25519 digital signatures.

🔗 https://www.virebent.art/blog/usenet-posting-gateway.html

#privacy #security #opensource #virebent

m2usenet - Privacy-Focused Usenet Posting Gateway - Virebent.art

m2usenet is a privacy-focused web interface for posting to Usenet newsgroups with Hashcash proof-of-work and Ed25519 digital signatures.

📝 New article: YAMN Tor Integration Project

We have developed an enhanced version of YAMN (Yet Another Mixmaster Network) with native Tor network integration. This project significantly improves the anonymity and security of the mixmaster remailer network by leveraging Tor's onion routing capabilities

🔗 https://www.virebent.art/blog/yamn_tor.html

#privacy #security #opensource #virebent

YAMN Tor Integration Project

We have developed an enhanced version of YAMN (Yet Another Mixmaster Network) with native Tor network integration. This project significantly improves the anonymity and security of the mixmaster remailer network by leveraging Tor's onion routing capabilities

📝 New article: Giving a Face to a Naked Key: The Identicon Approach

How deterministic identicons give a visual face to naked Ed25519 keys — binding username, email, and public key into a cryptographically verifiable visual identity for pseudonymous environments like Usenet.

🔗 https://www.virebent.art/blog/identicons.html

#privacy #security #opensource #virebent

Giving a Face to a Naked Key: The Identicon Approach

How deterministic identicons give a visual face to naked Ed25519 keys — binding username, email, and public key into a cryptographically verifiable visual identity for pseudonymous environments like Usenet.

📝 New article: Security Theater: Why "Easy Crypto for Foolish People" is Killing PGP

How 'easy crypto' tools like FlowCrypt and Thunderbird's built-in PGP are fracturing OpenPGP standards, forcing security downgrades, and why NeoMutt with GnuPG remains the only sane choice.

🔗 https://www.virebent.art/blog/EasyCryptoforFoolishPeople.html

#privacy #security #opensource #virebent

Security Theater: Why "Easy Crypto for Foolish People" is Killing PGP

How 'easy crypto' tools like FlowCrypt and Thunderbird's built-in PGP are fracturing OpenPGP standards, forcing security downgrades, and why NeoMutt with GnuPG remains the only sane choice.

📝 New article: Enforcing TLS 1.3 on INN2: A Security Hardening Guide

Deep dive into securing NNTP with TLS 1.3, systemd isolation, and automated PKI management on Debian 12.

🔗 https://www.virebent.art/blog/nnrpd-tls.html

#privacy #security #opensource #virebent

Enforcing TLS 1.3 on INN2: A Security Hardening Guide | Virebent.art

Deep dive into securing NNTP with TLS 1.3, systemd isolation, and automated PKI management on Debian 12.

📝 New article: Tor Hardening: Randomized Circuit Lengths

Technical analysis on mitigating correlation attacks in Tor by implementing variable hop counts for latency-tolerant protocols like SMTP and NNTP.

🔗 https://www.virebent.art/blog/tor-circuits.html

#privacy #security #opensource #virebent

Tor Hardening: Randomized Circuit Lengths | Virebent.art

Technical analysis on mitigating correlation attacks in Tor by implementing variable hop counts for latency-tolerant protocols like SMTP and NNTP.

📝 New article: Tor Extended Hop Risks: The Paradox of Choice

Technical analysis of why increasing Tor circuit length can lead to statistical unique identification and higher node compromise probability.

🔗 https://www.virebent.art/blog/tor-extended-hops-risks.html

#privacy #security #opensource #virebent

Tor Extended Hop Risks: The Paradox of Choice | Virebent.art

Technical analysis of why increasing Tor circuit length can lead to statistical unique identification and higher node compromise probability.

📝 New article: NSA, Espionage, and Cryptographic Backdoors: An In-Depth Analysis

Examining the intricate relationship between the NSA, espionage, and potential backdoors in NIST cryptographic standards.

🔗 https://www.virebent.art/blog/the-vulnerability-of-the-RNG-ecosystem.html

#privacy #security #opensource #virebent

NSA, Espionage, and Cryptographic Backdoors: An In-Depth Analysis - Virebent.art

Examining the intricate relationship between the NSA, espionage, and potential backdoors in NIST cryptographic standards.

📝 New article: AnonMesh - Rethinking Anonymous Networks | Part 1

Building True Digital Privacy in the Post-Quantum Era. An article from the Virebent.art blog.

🔗 https://www.virebent.art/blog/anonmesh-part1.html

#privacy #security #opensource #virebent

AnonMesh - Rethinking Anonymous Networks | Part 1 - Virebent.art

Building True Digital Privacy in the Post-Quantum Era. An article from the Virebent.art blog.