recentpopularlog in


« earlier   
The road not taken: Secure asymmetry and deployabilityfor decoy routing systems #research
From the abstract: "Censorship circumvention is often characterized as an arms race between a nation-state censor and the developers of censorship resistance systems. Decoy routing systems offer a solution to censorship resistance that has the potential to tilt this arms race in the favour of the censorship resistor...Although decoy routing systems that lessen the burden on participating routers and accommodate asymmetric flows have been proposed, these arguably more deployable systems suffer from security vulnerabilities that put their users at risk of discovery. In this paper, we propose two different techniques for supporting route asymmetry in previously symmetric decoy routing systems. The resulting asymmetric solutions are more secure than previous asymmetric proposals and provide an option for tiered deployment, allowing more cautious ASes to deploy a lightweight, non-blocking relay station that aids in defending against routing-capable adversaries. We also provide an experimental evaluation of relay station performance on off-the-shelf hardware and additional security improvements to recently proposed systems." - Cecylia Bocovich and Ian Goldberg, University of Waterloo
otf  research  router  decoy  censorship  circumvention 
2 days ago by dmcdev
marcosscriven/galeforce: GaleForce is a project to customise the Google Wifi router
Tools to root/customize a Google WiFi router, which is running ChromeOS under the hood.
google  wifi  ChromeOS  root  hack  bypass  opensource  software  networking  router 
3 days ago by asteroza
router  SSH 
5 days ago by alivelee
[2017-7-1]改华硕[N14U N54U]5G 2G的7620老毛子Padavan固件(私人云储存 aria2 QOS) - Padavan - 恩山无线论坛 - Powered by Discuz!
[2017-7-1]改华硕[N14U N54U]5G 2G的7620老毛子Padavan固件(私人云储存 aria2 QOS) ,恩山无线论坛
5 days ago by alivelee
WikiLeaks rivela Cherry Blossom, il malware della Cia per compromettere i router
Sono operativi che conducono missioni in tutto il mondo con licenza di uccidere, supportati anche da cyber armi create nei loro laboratori, ma tra killer e nerd, sembrano avere anche slanci romantici, tanto da chiamare uno dei loro programmi Cherry Blossom, ovvero fior di ciliegio. Cherry Blossom, in realtà, di poetico e gentile ha ben poco: è un micidiale programma segreto messo a punto dalla Cia nel 2004, ma che è andato avanti almeno fino al 2012 e non è escluso che sia ancora in corso, considerato quanto longevo e ambizioso.
malware  router  security  WikiLeaks  from pocket
6 days ago by aldolat
Knowledge Base Search
Article ID: 624

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers
router  cisco  vpn 
8 days ago by erinfinnegan
Knowledge Base Search
Article ID: 3043

Deploy a Quick VPN Alternative for Mac OS on RV016, RV042, RV042G and RV082 VPN Routers
router  vpn  cisco 
8 days ago by erinfinnegan
GitHub - vedetta-com/vedetta: OpenBSD Router Boilerplate
"an opinionated, best practice, vanilla OpenBSD base configuration for bare-metal, or cloud routers. What would an OpenBSD router configured using examples from the OpenBSD FAQ and Manual pages look like?"
openbsd  router  config  repo:github  networking 
9 days ago by mechazoidal
Ask HN: Best current model routers for OpenWRT, DD-WRT, Tomato, etc.? (2016)
mostly agreement: "An [Ubiquiti] EdgeRouter X + UniFI Pro dual-band AP is on the order of $200 from Amazon"
router  hardware  wifi  networking  hn  discussion 
10 days ago by mechazoidal

Copy this bookmark:

to read