#HumanRightsTech

2025-06-29

Current status: Setting up a #Tor Onion Service for the new #HardenedBSD pkgbase repos.

#FreeBSD #HumanRightsTech

2025-06-20

I've added some basic instructions on accessing #HardenedBSD resources (package repos and OS binary updates) over #Tor here: git.hardenedbsd.org/hardenedbs

I think some refinements could be made, but this is at least an initial draft. If anyone has any ideas for further refinement, please let me know.

#HumanRightsTech

ClaritrieClaritrie
2025-06-05

Claritrie just launched! 🌍✨

Site: claritrie.com

It is a debate platform where an AI curator organizes discussions using Argument Maps—ensuring transparency, fairness, and deeper conversations.

This isn't just another forum—it's a step toward structured, meaningful discourse where ideas, not algorithms, shape the conversation.

Join me in shaping the future of debate and human rights online!

2024-10-12

Getting the lab side of my home office organized for mesh network R&D. Here we see four Protectli FW4B devices that will serve as the reference implementation.

#HardenedBSD #HumanRightsTech

Four Protectli FW4B devices, neatly arranged.
2024-09-24

This is where the @radicle project gets it right.

The #Radicle development team has done a fantastic job at supporting different methods of network access, including explicit support for the ways #Tor might be configured in the operating environment.

I can rest assured that Radicle can be safely deployed in any environment.

#infosec #HumanRightsTech

2024-09-24

Forcing all public Internet traffic to go through #Tor via a transparent proxy, certain open source projects will need to remove their prohibition on resolving .onion names.

Transparent proxying opens up the possibility of completely oblivious Tor Onion Service support.

Open source libraries and applications need to permit .onion domain queries by default.

For projects that want to prohibit .onion by default, I would suggest this:

Don't. Provide a facility wherein the end user can optionally block resolution of any TLD or hostname.

For example, one could envision a user wamtomg tp block the .zip TLD. Or another user desiring to block the .onion TLD.

The decision should be left by the user as to what to permit or prohibit.

#infosec #HumanRightsTech #HardenedBSD

2024-09-23

The #HardenedBSD Foundation and The HardenedBSD Project are happy to announce a collaboration with #Protectli to research and develop a censorship- and surveillance-resistant mesh network: hardenedbsd.org/article/shawn-

#infosec #HumanRights #HumanRightsTech

2024-09-10

Here we see a hardware donation from the fine folks at #Protectli. They have donated 4xFW4B devices to support our next foray into #HumanRightsTech.

Early in 2025, the #HardenedBSD project plans to put in a concerted effort at developing a censorship- and surveillance-resistant mesh network.

More details will come in a future official announcement from the HardenedBSD project.

#infosec

Four boxes of Protectli FW4B devices, with one device outside the box. Dinosaur dog toy for scale.
2024-09-10

The #Radicle project is a shining example of how to properly support #Tor. They even have a guide on how to use Radicle within a fully Tor-ified network: radicle.xyz/guides/user/#4-emb

#HumanRightsTech

2024-04-24

Here we see two #Radicle seed nodes, running behind my fully Tor-fied network.

This is a test of exposing a Radicle seed node as a Tor Onion Service endpoint.

These two Radicle nodes are deployed on a #HardenedBSD 14-STABLE VM.

Huge step forward for #HumanRightsTech.

For more information on Radicle (a sovereign {code forge} built on Git): radicle.xyz/

Huge shout-out to the Radicle dev team for this collaboration. It has been a blast working with them.

#Tor #HumanRights #Git #SelfHosting #infosec

Screenshot showing two Radicle seed nodes on HardenedBSD communicating with each other.Screenshot showing `rad clone` working.
2024-04-07

Current status: Deploying a test #Radicle node on #HardenedBSD. Going to seed the HardenedBSD src and ports repos.

I'm hoping to continue expanding alternative forms of access to our resources (both code and infrastructure).

If this test proves successful, we may have another official method of getting HardenedBSD-related stuffs.

#HumanRights #HumanRightsTech

2024-03-23

I'll be giving a presentation on #HardenedBSD today in Denver, Colorado at 6:30pm. If you're interested in #FreeBSD, #infosec, and/or #HumanRightsTech, I'd love for you to come join me.

meetu.ps/e/MNbpb/ck83q/i

#HumanRights #DenverCO #denhac

2023-09-11

Initial work on removing the prohibition of .onion in #libcurl in favor of a user-provided DNS blocklist approach: git.hardenedbsd.org/shawn.webb

Some follow-up work to be done, but this initial commit works.

#HumanRights #HumanRightsTech #Tor

2023-08-29

I've now applied the patch to the ftp/libcurl port in the #HardenedBSD ports tree: git.hardenedbsd.org/hardenedbs

To developers working in networking code: please just do the right thing: do not treat any TLD as special. Do not violate the principle of least astonishment, especially when it comes to DNS.

Perhaps we can convince the #curl #libcurl community to revert the patch on their end.

#infosec #FreeBSD #HumanRights #HumanRightsTech

2023-08-28

Got my fully Tor-ified home network set up again. Now I can fully test the #HardenedBSD #Tor Onion Service endpoints.

#HumanRights #HumanRightsTech #infosec #opsec

2023-08-11

The question I have about #Veilid:

Can I serve the #HardenedBSD package repos and binary update artifacts over Veilid like I can (and do) via #Tor onion service?

#defcon #defcon31 #infosec #HumanRights #HumanRightsTech

2023-07-02

My next #HardenedBSD infrastructure goal is to provide a #Tor Onion Service endpoint for this #Vaultwarden instance.

I'm unsure how well, if at all, websockets work behind Tor.

#TorProject #HumanRightsTech #SelfHosting #infosec

2023-07-02

The core #HardenedBSD dev/build infrastructure is now back online!

The next task is to get our #Tor Onion Service nodes back online. That'll be a task either for later tonight or tomorrow.

#TorProject #infosec #HumanRightsTech

2023-01-27

I've now updated the #HardenedBSD #Tor Onion Service endpoints to
point to the new build infrastructure bits. Users can now deploy
HardenedBSD completely through Tor, including git clone, the
installation media, packages, etc.

Users can go from zero to dev to prod and everything inbetween
completely through Tor.

#TorProject #HumanRights #HumanRightsTech #HumanRightsInfrastructure
#infosec #FreeBSD

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst