Category: Security

  • Enhancing Your Website’s Security: The Importance of a .well-known/security.txt

    Enhancing Your Website’s Security: The Importance of a .well-known/security.txt

    In today’s digital age, website security is paramount. One often overlooked yet highly effective method to bolster your site’s defenses is by implementing a .well-known/security.txt file. This file serves as a beacon for security researchers, allowing them to report vulnerabilities directly to you in a standardized and secure manner. In this article, we’ll explore the…

  • Secure SOCKS Proxy Over SSH

    Secure SOCKS Proxy Over SSH

    Tunneling traffic encrypted through a VPN tunnel is not always necessary. If endpoint anonymity is not an issue, or if its just a matter of carrier/LAN distrust. A Socks Proxy SSH Tunnel will be just fine. Initiate the tunnel like so: Where [ssh.endpoint.tld] is your server of choice. Once the connection is active, point your…

  • How To: Redirect HTTP Traffic to Proxy Using iptables

    Proxy Madness Using Squid or any other proxy for transparent caching/filtering of HTTP traffic has many benefits, being for logging purposes or the aforementioned use-cases, keeping every client configured can be a nuance. Networking equipment from Cisco and Juniper has the ability to redirect all passing HTTP traffic, in IOS and JunOS respectively, to the…

  • Client side Security, How’s My SSL? (.com)

    Years ago, Moxie Marlinspike taught us that web-browser hints such as a “lock icon” in the address bar, didn’t guarantee ciphered communication. Since the website you are visiting still happily falls back to plain http since you, the user, made an effort to not be redirected from a clear to ciphered session… Not really. Man-In-The-Middle…

  • iPhone App: Privacy PGP Messenger – Sending GPG/PGP Signed Email

    Ever since I first dove down into the many protocol specifications of a typical email-setup. I noticed that there is very little (no) privacy, and (absolutely) no security. Sure, most protocols can be “tunneled” through SSL/TLS in the Session and Presentation Layer. But how can you guarantee message integrity when it relays off to another…