Proxy toolbar firefox

Translate Selected text with Google Translate Bookmarklets

2009.10.02 16:59 coldpizza Translate Selected text with Google Translate Bookmarklets

[link]


2015.11.17 14:34 Build A PC Sales Meta

A place to discuss everything "meta" from /buildapcsales
[link]


2015.12.19 06:53 Реддит на русском: Приватность в сети и жизни (r/privacyRUS)

Саб посвящен защите личных данных и частной жизни от вмешательства извне. Приватность - включает в себя право на хранение, передачу, предоставление третьим лицам и показ информации кому-либо. Конфиденциальность сбора и распространения информации защищает нас от злоупотреблений власти, даже если мы не делаем ничего плохого.
[link]


2024.05.21 07:53 digitalsignalperson nested compositors that glue embedded clients together (e.g. wakefield) and other appplication-internal uses of wayland?

Imagine a toolkit to glue different applications together. Various things you could do: - the unix philosophy applied to GUIs: make lots of small GUI programs and glue them together in whatever windows and layouts you want - make a program that embeds your favorite pdf reader as a widget without needing to find a library or bindings for your application's language - make a wrapper around your web browser to change the colours of the toolbars, or even chop off toolbars and replace them with your own custom widgets - add custom GUI macros to any program (e.g. add a always on top button to cover over some exiting button, and have it do a sequence of keyboard/mouse inputs) - Embed mpv as widgets to display images/videos in your application
Wakefield is proof of concept compositor that can do some of this.
Wakefield's description:
A proof of concept of a GTK+ Wayland compositor for various situations
It is a compositor that is GTK class/container, and clients can be placed in a gtk window just like other widgets and arranged in containers like vbox, hbox, etc.
For the original repo I could do ./test-compositor and in another terminal WAYLAND_DISPLAY=wayland-1 ./test-client works. For the fork I couldn't get the embedding demos to work (I think gtk3 needs xdg-shell v6, but this is implemented with v5 so results in The Wayland compositor does not provide any supported shell interface, not using Wayland display when trying to connect with a client)
Are there any other projects that try something similar? Many compositors/libraries have wayland backends for nesting compositors, but I think their goal is to simply open one window to act as an output area to contain all the clients.
I'm interested in: - the ability to layout multiple top-level windows from different clients in a single window as seen from the outer wayland compositor (as described for Wakefield) - the ability to create a new window for each toplevel window (like a passthrough mode: from the outside it doesn't look like a nested compositor is in use) - the ability to post-process the texture from a given toplevel window
Ultimately, it could look like: each window (top-level or otherwise) rendering to a gpu texture, which you can then post process and render yourself in to one or more windows.
From https://wayland.freedesktop.org/
Wayland can even be used in application-internal communication as is done in some web browsers.
Are there any real examples of this?
More wayland proxies seem to be popping up, which I feel like could also be starting points in some ways: - https://github.com/talex5/wayland-proxy-virtwl - https://gitlab.freedesktop.org/mstoeckl/waypipe - https://github.com/wayland-transpositowprs - https://gitlab.freedesktop.org/jonleivent/waydapt
I wonder if wlroots can be used, but can the wlroots wayland backend create multiple output windows?
submitted by digitalsignalperson to wayland [link] [comments]


2024.05.21 05:47 Huge-Clerk-4597 Firefox doesn’t work

I’ve set up a VM Ubuntu for some programs I need to create. One of them is a server proxy cache and a webmail server. Both of them need to use Firefox at some point in order to test and download important things for the projects. However if I open Firefox it doesn’t really do anything and after some moment the VM always crashes and I have to shut it down. When creating the VM I almost gave al the memory and CPUs to the creation so ir should work well. Also de computer I’m using has some great specs so I don’t understand why this happens.
submitted by Huge-Clerk-4597 to OracleVMVirtualBox [link] [comments]


2024.05.20 23:17 Gameboyadvance64 OpSec basics 101 - stay anonymous while online

A few things you Should know Afore Begin: * Remmina is an RDP (Remote Desktop Protocol) Client / in case you run windows you could use other client. * VPN Is A Virtual Private Network that hides you traffic with your ISP (internet provider) the first layer of security you must have. Top noch could be a hardware VPN * VMWare is a Virtual Machine That Hosts The Operatin' System We'll be usin' (Ubuntu in this example) * Socks Proxy Checker is Proxy-client that will connect tae a remote Socks5 Proxy at the end stage where is your target 🎯
Socks5 Proxy Server is the server located within vicinity o' the victim. This is key to success it’s recommended a residential proxy ethically sourced
1.- Download, install an' start VMWare Workstation. 2.- Download Ubuntu an' start it wi' VMWare. This is a bit optional but it’s a recommended setup for this example, tailOS will be more private and windows will be the less private option and used as live in a USB stick.. 3.- In Ubuntu, download and install Firefox and Tor Browser 4.- Download & install "MullvadVPN" tae Ubuntu and PAY WI' BTC! / you can use other VPN like ProtonVPN that offers free services it’s quite ok for a free and they don’t save any logs. 5.- Start MullvadVPN or your preferred VPN Yer connection should then look like this: Your OS -> VMWare -> Ubuntu -> VPN 6.- Buy yersel' a RDP Server Frae. PAY WI' BTC! 7.- Install Remmina RDP client on the virtual machine in case for Windows you can use other client. 8.- Use Remmina tae open a "Remote Desktop" connection tae yer RDP server. Yer connection should then look like this: Yer OS -> VMWare -> Ubuntu -> VPN-> RDP Server. 9.- Download Socks Proxy Checker an' firefox tae the RDP Server, then install the plugin. You could use Foxy Proxy 10.- Buy a socks5 proxy server from @nightshade128 on telegram he can guide you too how to setup correctly for the area you’re working 11.- Connect tae the Socks5 Server wi' Socks Proxy Checker. You can also change your header in Firefox with a plugin so even you’re using other OS will match the desired device and OS. Note: always check yer location wi' an IP tae location service. You can validate in whoer.net and see your information Your connection should then look like this: Your OS -> VMWare -> Ubuntu -> VPN-> RDP Server -> Socks5 Proxy (victims location). Get the private socks from @nightshade128 on telegram he is very helpful with
This is one example of a op sec but there are many ways to have an efficient and successful opsec with different levels and flexibility according your needs and budget
Stay safe and be anonymous
Disclaimer The information provided is for educational and informational purposes only and solely as a self-help tool for your own use.
submitted by Gameboyadvance64 to darknetmoneycc [link] [comments]


2024.05.20 23:08 Frownhorse [GUIDE] Create PayPal Stealth Account for Privacy purporses.

[GUIDE] Create PayPal Stealth Account for Privacy purporses.
Virtual numbers provide a layer of privacy by allowing you to make and receive calls and messages without revealing your real phone number. Static residential proxies offer a stable IP address that appears as a legitimate residential connection, making it harder for websites to track your online activities. Firefox, known for its focus on privacy and security, offers numerous features and extensions to enhance anonymity. Together, these tools create a powerful strategy for maintaining anonymity while setting up and managing PayPal accounts.

Tool 1: Mac Address Changer


https://preview.redd.it/ejab0lwtbn1d1.png?width=621&format=png&auto=webp&s=983d69fa64b2e76061a1856eafa14e089699c9cb
The primary purpose of a MAC address changer is to provide anonymity and security. By changing the MAC address, users can prevent their original hardware address from being tracked.
Steps to use the Software:
  1. Open the MAC address changer software: Upon launching the application, it will display a list of all the network adapters available on your device.
  2. Choose the desired network adapter: Select the network adapter whose MAC address you wish to change. The application will then display the details of the selected adapter.
  3. Navigate to the Information tab: Look for the section labeled “Change MAC Address.”
  4. Enter the new MAC address: Type the new MAC address into the provided field. Then, click on the “Change Now!” button to apply the new address.
  5. Generate a random MAC address (optional): If you prefer, you can click on the “Random MAC Address” button to automatically generate a random MAC address from the available vendor list.

Tool 2: Static Residential Proxy (SOCKS5)

A static residential proxy (SOCKS5) is a type of proxy server that provides users with a static, or fixed, IP address sourced from a residential internet service provider (ISP). Unlike data center proxies, which use IP addresses assigned to data centers, residential proxies use IP addresses that are assigned to real residential locations. This makes them appear more legitimate and less likely to be blocked or flagged by websites and services.
One of the key advantages of using a static residential SOCKS5 proxy is enhanced anonymity and security. Since the IP address appears as a legitimate residential address, it is less likely to be detected and blocked by websites and services. This is crucial for activities that require a high level of privacy and security as Paypal creation account.
IPBurger is a provider of residential proxies known for reliability and high-quality services for create multiple PayPal accounts. Ideal for maintaining anonymity. While IPBurger is excellent for these purposes, there are also other reputable alternatives available like BrightData (Expensive).
If you live in the United States, you can avoid using proxies by simply using your smartphone as a hotspot. To change the IP and create a new account, just switch your phone to airplane mode and then turn it off.
However, if you already have a proxy and wish to use it, it is recommended that you first check its quality with services like ipinfo.io or iphub.info

How can i know if i’m using a Residential Proxy?


BAD IP

GOOD IP

BAD IP

GOOD IP

How to configure the proxy?

To configure a proxy with Proxifier, follow these steps:
  1. Open Proxifier and go to “Profile” > “Proxy Servers”.
  2. Click “Add” to enter your proxy details (address, port, protocol).
  3. Test the connection and click “OK”.
  4. Set rules under “Profile” > “Proxification Rules” to apply the proxy to specific applications.
Tutorial in Video:
https://www.youtube.com/watch?v=57RlHRF-oAE&ab_channel=Smartproxy

Tool 3: Firefox + Addons

Using Firefox for anonymity is ideal due to its strong privacy features, such as Enhanced Tracking Protection and extensive customization options. It supports numerous privacy-focused extensions, like NoScript and Canva Defender, and does not track user activity by default, unlike some other browsers.
Important: Use the US version of Firefox
Strict Security: To set privacy to strict in Firefox, follow these steps
  1. Open Firefox and click the three-line menu in the top right corner.
  2. Select “Settings” (or “Preferences”).
  3. Go to the “Privacy & Security” section in the left menu.
  4. Under “Enhanced Tracking Protection,” select “Strict.”
This will configure your privacy settings to strict mode.

https://preview.redd.it/ppdpn652cn1d1.png?width=800&format=png&auto=webp&s=a6b3cb3cd6ecb452bf2c90184586710887bd4b77

Media.peerconnection: To disable media.peerconnection.enabled in Firefox, follow these steps:
  1. Open Firefox and type about:config in the address bar, then press Enter.
  2. Click the “Accept the Risk and Continue” button.
  3. In the search bar at the top, type media.peerconnection.enabled.
  4. Double-click the media.peerconnection.enabled entry to set its value to false.

https://preview.redd.it/838rix93cn1d1.png?width=800&format=png&auto=webp&s=19775dd2e12987c444608ff3853cffb768b8eb62
Canvas Defender: Canvas Defender is a privacy-focused extension designed to protect against canvas fingerprinting. Canvas fingerprinting is a technique used by websites to track users by generating a unique digital fingerprint based on their browser and device’s canvas rendering capabilities. Canvas Defender works by adding subtle, random noise to the canvas data, making it more difficult for trackers to create a consistent and unique fingerprint of your device, thus enhancing your online privacy.
Click here to download the extension.

Tool 4: CCleaner

CCleaner enhances anonymity by clearing browser history, cookies, and cache, which can track your online activities. It also removes temporary files and unused data from your system, reducing traces of your browsing habits and improving privacy. This helps maintain anonymity and can reduce the risk of being detected by PayPal algorithm.
CCleaner oficial Website

Tool 5: SMS Provider

A temporary non-VOIP number is a valuable tool for creating multiple PayPal accounts. These numbers allow you to receive verification messages without using traditional phone lines, protecting your privacy. They are ideal for managing multiple accounts, maintaining anonymity, and avoiding duplication blocks.
Among the most recommended sites is Major Phones due to the quality of the services they offer.
  1. Middle and Long-term numbers: These features allow you to purchase non-VOIP numbers and receive multiple text messages on the same number at a low cost.
  2. Short-term numbers: If you are looking to receive a single text message, they also offer this feature for less than a dollar. The best part is that they indicate the probability of successfully receiving the text message.
Short-term numbers
Moreover, you can check an article of how to bypass PayPal SMS verification proccess in this article

Once we have all the tools, we just need to follow these steps:

  1. Change the MAC address of your PC.
  2. Configure your residential proxy (SOCKS5) with Proxifier and check your IP address in ipinfo/iphub
  3. Configure Firefox with strict security and disable media.peerconnection
  4. Install Canva Defender addons + WebRTC block
  5. Register a new Gmail account (you can use a non voip number for bypass Gmail sms verification).
  6. Get a non voip number from Major Phones (Short/Middle/Long) depends of your needs.
  7. Go to PayPal and proccess to register your account.
submitted by Frownhorse to Hacking_Tutorials [link] [comments]


2024.05.20 19:20 silly-reddit-burner For people having issues with search suggestions covering the address bar on Linux

Here's a quick way to fix it if you have a ton of css files that all link together like I do:
  1. Open your terminal
  2. Go to your profile directory, should be something like ~/.mozilla/firefox/{something}
  3. cd chrome
  4. run find . -name \*.css -exec sed -i "s/--urlbar-toolbar-height/--urlbar-container-height/g" {} \;. This will go through every file in your chrome directory, check for --url-toolbar-height, and change it to --urlbar-container-height.
Not sure if there's any side effects to this but I've been using firefox for a bit after doing this and it seems to be working fine :)
submitted by silly-reddit-burner to FirefoxCSS [link] [comments]


2024.05.20 11:54 Teylen Windscribe not working (With YouTube)

I downloaded and installed Windscribe to watch various YouTube Videos.
I tried logging off from youtube, rebooting and having the windscribe app as well as the browser plugin activated. Yet, so far it did not work. That is it didn't play, noting the region/country restriction and the amount of data I can use it did not change.
The closest I got was using Firefox and Edge. It convinced youtube to play some videos that are region restricted yet didn't work for the newest video from the same channel.
I did notice that when I used the proxy I used before getting Windscribe, youtube got stuck on a message of "Using YouTube optimally ... ",
My system is: Windows 10 The browsers I tried are: Brave (1.66.110) Chrome (124.0.6367.208) Firefox (126.0) Edge (124.0.2478.105)
submitted by Teylen to Windscribe [link] [comments]


2024.05.20 05:41 amca01 Wordpress and Caddy? - currently unable to provide secure connection

I'm trying to install wordpress.org, using docker and docker compose, and with Caddy as my reverse proxy. There seem to be at least two github repos for this, here (svenakela) and here (andrewheiss). They both say much the same thing, but with a few differences. Anyway, upshot of my work so far: can't access my site, with Chrome I get "This site can’t provide a secure connection"; on Firefox I get "Secure Connection Failed".
I've added WordPress in mydocker-compose.yml file to my Caddy network, so that Caddy should see it.
I already have MariaDB running for use with another container - can I use this one with a new (WordPress) database, or is it better to spin up a new MariaDB container simply for WordPress?
So - I've copied the docker-compose.yml file given at the above sites into my own one, added appropriate environment variables in my .env file, and edited my Caddyfile appropriately. I've also set up an A record with my domain name provider.
How do I debug what's going on? Thanks!
submitted by amca01 to selfhosted [link] [comments]


2024.05.19 23:21 Select_Idea_9898 Partially impaired mouse (interact only with 1 program)

I've got a problem that is complete mystery to me and i don't even know where to look to find out what it is. My mouse can click only on one window (detailed explanation below in example section), all other things become non-intractable. To clear what i mean i will write example of some situation.
Example of using HP300 wireless mouse:
Let's say I have Firefox and File explorer open. If pointer points at firefox at the moment i turn on mouse, then i can use firefox normally but anything else like File explorer, any toolbar, some context menus, start toolbar can't be clicked. In fact i can click though them to interact with firefox.
In order to interact with File explorer i need to point pointer at File explorer, turn off and turn on mouse so everything else become inactive but i can use file explorer.
Important things to mention:
-Problem isn't in the OS because i have dual boot Ubuntu/Windows 10 and both experience same issue.
-I tried using different USB port for Bluetooth receiver and it doesn't seem to have any effect.
Some observations:
-Touchpad works much better. While using touchpad problem only appears sometimes instead of always.
-Using mouse connected via Bluetooth directly works almost as good as touchpad compared to connected via bluetooth receiver that comes with mouse.
Might be useful to know:
I have old Dell 3543 laptop with Nvidia g820m graphic card. Problem appeared next day after i had issues with driver on linux and some forum recommended to downgrade kernel to kernel 5.15 (it did help). So this day i installed 5.15 and removed 6.5 and its headers. rebooted PC, installed nvidia driver and everything was fine. Next day (technically next reboot) this problem appeared. I did remove driver just in case and i did install kernel 6.5 back (it didn't help so i deleted again).
submitted by Select_Idea_9898 to pchelp [link] [comments]


2024.05.19 09:31 ClickOrnery8417 How can I scrape pages with Cloudflare protection when encountering a 403 block?

Hello, how can I avoid Cloudflare protection while scraping?
When I use the same proxy on Firefox with the FoxyProxy extension, I also get a 403 block.
I am using an Amazon or Azure server and IP.
submitted by ClickOrnery8417 to scrapy [link] [comments]


2024.05.19 09:31 ClickOrnery8417 How can I scrape pages with Cloudflare protection when encountering a 403 block?

Hello, how can I avoid Cloudflare protection while scraping? When I use the same proxy on Firefox with the FoxyProxy extension, I also get a 403 block. I am using an Amazon or Azure server and IP.
submitted by ClickOrnery8417 to learnpython [link] [comments]


2024.05.19 09:31 ClickOrnery8417 How can I scrape pages with Cloudflare protection when encountering a 403 block?

Hello, how can I avoid Cloudflare protection while scraping?
When I use the same proxy on Firefox with the FoxyProxy extension, I also get a 403 block.
I am using an Amazon or Azure server and IP.
submitted by ClickOrnery8417 to webscraping [link] [comments]


2024.05.19 07:53 scidsg Principles of a Tip Line Platform: A research-based way to evaluate whistleblower systems

Principles of a Tip Line Platform: A research-based way to evaluate whistleblower systems
Article Cover Showing List of Principles and Names of Researchers
Thanks to the good work of academic researchers across the globe, we have a data-driven way to evaluate the quality of whistleblower software. The papers we’ve looked to for this article include:
The authors lists the characteristics of a whistleblower submission system. They include:
  1. Usability of the Software
  2. Authenticity of the Receiver
  3. Plausible Deniability of the Whistleblower
  4. Availability of the System
  5. Anonymity of the Whistleblower
  6. Confidentiality and Integrity of the Disclosures

1. Usability of the Software

Managed Service
Usability is the linchpin of any good software system. No matter what your value proposition is — the most private, secure, or whatever — if your targeted audience cannot use the software, no amount of engineering genius will make a difference. As researcher Joakim Uddholm puts it:
“The system must be usable for both whistleblowers and journalists. Whistleblowers must be able to use the system without the protection features getting too much in the way, and journalists must be able to use the system without it interfering too much with their work routines.”
A key differentiator for Hush Line is that we’re a managed service, meaning you don’t have to host core infrastructure, operate dedicated networks, or hire specialists to start using the service. All a user needs to do to have an anonymous tip line is register an account.
UI for Hush Line Registration page
By providing a centralized service, we significantly reduce the risk of user error, making the service more consistent, predictable, and trustworthy.

Email Delivery

Hush Line can deliver messages directly to your email inbox. Users may enter their preferred SMTP information from Gmail or Riseup, for example, and any message submitted to their tip line will be delivered to their email account. Enabling users to set it and forget it makes using Hush Line effortless and integrates into the systems they’re already using.
SMTP Hush Line Settings

Clearnet and Tor Addresses

Hush Line is also available on both Clearnet and Tor Onion addresses. This approach is critical for users where Tor might be blocked or having anonymizing software on their device could be incriminating, like in the case of Ola Bini in Ecuador.
Screenshot of Ola Bini’s tweet about his conviction.
Since Hush Line can be accessed over a Clearnet address with the default browser already on your phone, your fingerprint will be the same as everyone else who just bought a new phone.

Making PGP Easy

Before, using PGP meant adopting cumbersome workflows that even stumped journalists at the heart of the Snowden disclosures. Journalist Glenn Greenwald didn’t have PGP set up, and didn’t have the time to learn how to do it, resulting in Snowden not being able to securely contact him. Even Snowden forgot to send his PGP key to journalists when initially contacting them.
Inbox view with Mailvelope browser extension.
Hush Line attempts to solve this problem through our integration of Mailvelope, a powerful open-source browser extension for Chrome and Firefox that enables users to create keys, decrypt and encrypt message directly in their browser, and export their public PGP key. For tip line owners, once adding their PGP key to Hush Line, all messages are end-to-end encrypted by default and when a tip comes in, they can read it within the Hush Line app. For whistleblowers, this means they don’t need to do anything to send a secure, anonymous message.

2. Authenticity of the Receiver

Verification System

Hush Line has a verification system for journalists, organizations, activists, or other public figures. Verified accounts receive a special badge on their message submission page so that people submitting messages know they’re contacting the right person. To be verified, users must submit proper information to prove their identity or approval to represent a company.
Submit Message page with a “Verified Account” badge.

Opt-In User Directory

Users may opt-in to a public directory where others can find their address. The default tab is prioritized to make it easy to find verified users. The directory is searchable, and a whistleblower can have confidence of the validity of an address.
Hush Line User Directory page

Account Reporting

The verification system and user directories are two ways to help ensure the authenticity of the receiver, but to help ensure the platform’s health, we enable users who have logged in to report spam or abuse accounts. We will address reported accounts immediately to determine the best next steps, whether deleting the account, sending a warning message, or other appropriate methods.

3. Plausible Deniability of the Whistleblower

No Downloads

Hush Line is accessible over a Clearnet address, so a user doesn’t have to download any new software to send an anonymous message. If someone wants to use a Tor-only tip line service on their mobile device, they must sign in to the Apple App Store or Google Play Store. To download Tor Browser, you need to provide a valid email address or phone number and possibly payment information, all considered personally identifiable information. Now that you’ve downloaded new software on your phone, your “fingerprint” has become unique to who you are. If you only have Robinhood, Tor Browser, Mastodon, Chrome, and Slack on your phone, the likelihood of someone else having only those same apps becomes less likely. If you have even 50 apps, your fingerprint will be more associated with you, possibly entirely unique. The more unique your fingerprint is, the less realistic a plausible deniability claim is.

One-Way Messaging

Most people fail to report information because they fear retaliation and the significant risks of whistleblowing. Hush Line is a one-way messenger explicitly designed to protect the individual submitting the message. If the person submitting a message feels comfortable enough to leave a contact method, they may or can submit a message without any further involvement.

Account-Free for Whistleblowers

Someone submitting a message does not need to create an account to use the app. This crucial feature allows a whistleblower to reduce the trail of information they leave behind. No credentials can be found if you have no username or password to save. And since Hush Line requires no special software, a message can be submitted from any phone or computer, from a pubic library or internet cafe, for example.
Success message after sending a message without an account.

4. Availability of the System

Centralized Services

By providing a centralized service, Hush Line is more reliably available by only requiring a single system to be maintained and secured. Centralizing our services protects users by removing the responsibility of managing specialized infrastructure and following complex workflows, which, if done incorrectly, could have real-world implications.
Decentralized systems help with censorship resistance (and Hush Line can also be self-hosted), but when there are tens, hundreds, or thousands of separate instances all disconnected from each other, there is no way to ensure the quality of those systems. What other software is on the server? Is it updated? Are any ports open? Who currently has or has had access? What hardware are they using? It’s impossible and foolhardy to assume that everyone will follow best practices consistently.
An analogous example of the inherent risks of decentralization is from the Mastodon network — a decentralized version of Twitter where anyone can run an instance. The database for Kolektiva.social, a service tailored to anarchist users, was compromised. In 2023, the home of its admin was raided for an unrelated event, and the FBI seized an unencrypted database backup.
Snippet from the Kolektiva admin account’s post after the raid.

5. Anonymity of the Whistleblower

Leaking IP Addresses

To make Hush Line accessible to as many people as possible, the app is available on a publicly accessible URL, which is what you might expect from any web service. However, when using a Clearnet URL, leaking a user’s IP address is a real possibility.
To help defend against this, we scrub IP addresses from our access logs to minimize the risk of this happening when you use our app. To remove the possibility of IP leaks in high-threat scenarios, we deploy Hush Line as a Tor Onion service.

Tor Support

Tor is a network that anonymizes your internet browsing activity. It acts as a proxy by randomly routing your request through its network of relays, hiding who is making the request. Tor also has a feature called Onion Services. An Onion service makes a website or application accessible through a special .onion address that is only available through the Tor Browser.
Message submission onion site.
When using a regular browser like Chrome or Firefox, when you enter an address like hushline.app the browser needs to know the server address for that URL. A long chain of services helps make it possible, from your ISP to DNS services, the server running the app, and more to make it possible to type something memorable like hushline.app instead of remembering and entering 64.23.155.36. Just as the browser needs to know the IP address of the target web server, your IP address is also necessary to know where to send the information.
Your IP address is essentially your customer ID for your internet service provider. All someone with the necessary authority needs to do is request the information of the owner of that IP, and your real identity is exposed.
Onion services defeat this kind of threat because they don’t operate using the same DNS and IP protocols. Tor Browser is connected to the Tor anonymizing network, and so are the Onion services that exist within it. When someone uses a .onion address, the request from the browser to the server and back never leaves the Tor network, completely sidestepping IP leakage.
To access Hush Line’s information site using our Onion address, enter `http://w25rxxn62dgix7qdbw4ot37m2y4ty7kxfrinspw4ce7jzse7pb6rhaqd.onion/\`, or to access the app’s Onion site, enter `http://ghj4vviaoccj4tj2r3ss52arbnchkfvs7uft4sgtrkuvdha5zjgo6yqd.onion\` in Tor Browser.

Timing Correlation

To know that two people are talking to each other, you don’t need to know the contents of their messages if you have enough metadata about the conversation. One such way to reveal important context about who might be talking to each other is to learn when the messages were sent. If there’s a flurry of activity from two accounts — one after the other, repeatedly, pausing at similar times, being active at similar times— someone analyzing the logs might assume those accounts are talking to each other.
To address this, we do not timestamp messages or relate accounts in any way. An attacker with access to the server cannot relate two messages on the platform, which is largely irrelevant as Hush Line is designed as a one-way messenger.

6. Confidentiality and Integrity of the Disclosures

Message Encryption

Hush Line uses PGP for message encryption, making the key owner the only one technically able to read the decrypted messages. Messages are end-to-end encrypted using OpenPGP.js, meaning our server will never see the decrypted contents.
Hush Line Inbox with an encrypted message.
We’re proactive about communicating with senders and receivers about the importance of the tip line owner adding their public PGP key, and we discourage sharing sensitive information if the receiver doesn’t encrypt their messages.
Unencrypted warning on a message submission page.

HTTPS

We use Let’s Encrypt for HTTPS certificates. When a site uses HTTPS, requests use the TLS protocol to encrypt data in transit from the browser to the server and back. This protects your activity from being monitored or tampered with while using the app.
For an attacker who can monitor network connections, instead of seeing which page you’re on or who you’re submitting a message to, the primary URL is only visible. So if a message submitter is on https://hushline.app/submit_message/artvandelay the recipient remains unobservable, and the only thing visible to a network snoop is https://hushline.app/.

Conclusion

There are many tip-line solutions on the market, and it can be intimidating to choose the right one for you. We hope this article gives you a data-driven way to evaluate the software that fits your needs.

Additional Research

Do you have any questions, comments, or feedback? Follow us on Mastodon at @scidsg@fosstodon.org.
Originally posted on Medium: https://medium.com/p/51beb8b05eb1
submitted by scidsg to HushLine [link] [comments]


2024.05.19 00:21 oushima7391 How to Hide Extension Icons and Buttons in Firefox Toolbar?

SOLUTION:
/* Hide the "List all tabs" button */ #alltabs-button { display: none !important; } /* Hide the Tracking Protection icon */ #tracking-protection-icon-container { display: none !important; } /* Hide the identity icon box for extension pages */ #identity-box .extensionPage #identity-icon-box { display: none !important; } /* Hide the identity icon (lock icon) */ #identity-box #identity-icon { display: none !important; } /* Hide the Tracking Protection icon box */ #tracking-protection-icon-box { display: none !important; } /* Hide images in the page action buttons */ #page-action-buttons image { display: none !important; } /* Hide the entire identity box (includes lock icon) */ #identity-box { display: none !important; } /* Hide the permissions icon (cross-site cookies icon) */ #permission-icon-container { display: none !important; } /* Add left padding to the address bar text */ #urlbar { padding-left: 8px !important; }/* Hide the "List all tabs" button */ #alltabs-button { display: none !important; } /* Hide the Tracking Protection icon */ #tracking-protection-icon-container { display: none !important; } /* Hide the identity icon box for extension pages */ #identity-box .extensionPage #identity-icon-box { display: none !important; } /* Hide the identity icon (lock icon) */ #identity-box #identity-icon { display: none !important; } /* Hide the Tracking Protection icon box */ #tracking-protection-icon-box { display: none !important; } /* Hide images in the page action buttons */ #page-action-buttons image { display: none !important; } /* Hide the entire identity box (includes lock icon) */ #identity-box { display: none !important; } /* Hide the permissions icon (cross-site cookies icon) */ #permission-icon-container { display: none !important; } /* Add left padding to the address bar text */ #urlbar { padding-left: 8px !important; } 
  1. Type `about:support` in the address bar.
  2. Go to the Profile folder.
  3. Click the `9tcxagdd.default-release` folder.
  4. Click the `chrome` folder, create it if it doesn't exist yet.
  5. Create a userChrome.css file and paste the code above in it.
  6. Go to `about:config` and search for `toolkit.legacyUserProfileCustomizations.stylesheets`, set it to `true`, if it isn't already.
  7. Completely shut down Firefox and restart it.
I'm looking for a way to hide certain elements in the Firefox toolbar. Specifically, I want to hide the following icons and buttons:
  1. The "Extension (Tabliss)" icon.
  2. The icon that appears to manage extensions.
  3. The shield icon and the lock icon.
I've attached screenshots to show the specific icons I want to hide. Could someone guide me on how to do this? I'm open to using custom CSS or any Firefox extensions that might help with this task.
Could I do it in about:config perhaps?
Thank you! Screenshots: https://imgur.com/a/hUBN3sT
submitted by oushima7391 to FirefoxCSS [link] [comments]


2024.05.18 22:45 oushima7391 How to Hide Extension Icons and Buttons in Firefox Toolbar?

I'm looking for a way to hide certain elements in the Firefox toolbar. Specifically, I want to hide the following icons and buttons:
  1. The "Extension (Tabliss)" icon.
  2. The icon that appears to manage extensions.
  3. The shield icon and the lock icon.
I've attached screenshots to show the specific icons I want to hide. Could someone guide me on how to do this? I'm open to using custom CSS or any Firefox extensions that might help with this task.
Could I do it in about:config perhaps?
Thank you! Screenshots: https://imgur.com/a/hUBN3sT
submitted by oushima7391 to firefox [link] [comments]


2024.05.18 20:32 m3lv1lle Why is everything so slow?

Form time to time all of websites just stop working when I try to reach them over the Internet (everything works if I accsess them locally) I can ping the sites and I can also see some requests finish with 200 when looking at the networkanalysis tool in firefox. Everything is behind NPM und proxied through cloudflare, What could be my problem? How would you troubleshoot this? My Internet connection is really slow but it worked fine for months now so I dont think thats the whole problem.
submitted by m3lv1lle to homelab [link] [comments]


2024.05.18 18:57 JanePoe87 Having trouble enabling the button in the burp suite tool. Somebody help please "The /lucky.php page has a button that appears to be disabled. Try to enable the button, and then click it to get the flag. "https://academy.hackthebox.com/module/110/section/1055

Having trouble enabling the button in the burp suite tool. Somebody help please submitted by JanePoe87 to hackthebox [link] [comments]


2024.05.18 14:42 ohmahgawd Audio drops when focusing on another program or window

SOLVED: The issue was Voicemeeter. I was using voicemeeter to do some additional audio routing for other programs, but it was causing audio to drop out as I tabbed between Premiere and Firefox. Removing Voicemeeter from the loop fixed the issue. I guess I will only run Voicemeeter when I need it in the moment. I'll leave this up for anyone that might run into a similar issue in the future.
Hey there. I'm trying to figure out how to fix a recurring issue I'm having with audio dropouts. To preface this, here are my specs:
Ryzen 9 5950x 128GB ram @ 3200MHz RTX 4080
The content being edited is on an nvme drive, plenty fast.
If it helps, I am on Win11 23H2, and Premiere version 24.3.0
My sequence is a two cam podcast, roughly two hours long, with some light graphics work in the timeline. Nothing major. I'm using ProRes proxies at quarter resolution. Audio setup is ASIO with an Apollo Twin interface. IO Buffer size 512, Sample Rate 48kHz.
My issues is that, during playback, if I click a different program or window on my computer (firefox, for instance, if I'm searching for something while also listening to playback) the audio will cut out for a few seconds and then return. It doesn't happen if I stay in the Premiere window, and playback is generally pretty smooth given my specs and proxy workflow. Any idea why these audio dropouts occur when window focus changes? Is there anything I can do to fix that?
submitted by ohmahgawd to premiere [link] [comments]


2024.05.18 10:44 SiSRT admin.ch takes cybercrime seriously!

admin.ch takes cybercrime seriously!
https://preview.redd.it/8bqk5aswc51d1.jpg?width=1009&format=pjpg&auto=webp&s=f7a12074fa1a1bc50182518ad158a40a605e7890
being told to type "https" for web addresses, humble me types:
https://www.cybercrime.admin.ch
and I get:
unable to connect
only http works - duh!
http://www.cybercrime.admin.ch
guess me blindly following IT security adivces w/o having proper knowledge makes me a future cyber crime victime!
EDIT: strange, on some smartphones the web address "www.cybercrime.admin.ch" does not redirect to https://www.ncsc.admin.ch/ncsc/de/home.html
submitted by SiSRT to Switzerland [link] [comments]


2024.05.17 20:45 Telope I think the new Firefox update 126.0 broke my workaround for seeing the bookmarks toolbar in full screen mode. Can you help please?

Edit: FIXED
I am having this same problem again. The bookmarks toolbar does not show in full screen mode.
I have not changed the settings in about.config, and the code in userChrome.css are the same.
How can I get it to show please?
submitted by Telope to firefox [link] [comments]


2024.05.17 12:14 q2vdn1xt Reverting UI changes in latest firefox release

I don't like the new UI changes in firefox 126.0, so I removed them using some userchrome CSS.
Specifically the way fullscreen works:

/* disable close button in fullscreen */ hbox.titlebar-buttonbox-container { display: none; } /* disable current tab be visible in fullscreen */ tab.tabbrowser-tab:where([visuallyselected]) { z-index: 0 !important; } /* disable fullscreen transition */ toolbox#navigator-toolbox { transition: none !important; } /* disable fullscreen toggle */ div#fullscr-toggler { display: none !important; } 
submitted by q2vdn1xt to FirefoxCSS [link] [comments]


2024.05.16 23:18 jacobf_139 rounded toolbar

rounded toolbar
https://preview.redd.it/75t2ud79uu0d1.png?width=180&format=png&auto=webp&s=c42f5f0aa4e7301130659aaeb528981a8f41ae16
could anyone help me achieve this rounded toolbar effect?
pictured on the left is google chrome which has the look i would like to achieve, and pictured on the right is my firefox.
sorry if this is a stupid question, i am not very experienced with CSS.
submitted by jacobf_139 to FirefoxCSS [link] [comments]


2024.05.16 06:18 mr_bigmouth_502 Can we get a feature to quickly toggle addons on and off?

Apparently Reddit's removing the ability to set Old Reddit as your default view, so this means I'm likely going to have to go back to using Old Reddit Redirect. source
The problem with that is that sometimes I need to access New Reddit for certain features, and normally I do this through a bookmarklet that toggles between www.reddit.com and new.reddit.com in the URL. Without the ability to make Old Reddit the default on my account, this breaks the bookmarklet I use.
I suppose one solution would be for Old Reddit Redirect's author to add a quick toggle to the extension itself, that you could use through a toolbar button. This would be nice to have, but having this feature in Firefox itself would be even better since I could use it for other addons too.
Thoughts?
EDIT: OK, so it turns out Old Reddit Redirect allows you to access New Reddit through new.reddit.com. I just had to edit the bookmarklet I was using. I still think this could be a useful feature to add to Firefox.
submitted by mr_bigmouth_502 to firefox [link] [comments]


http://rodzice.org/