Floriana

Floriana

IFF Tech&Tools Showcase 2017 – #12 Zifra

Zifra is a building a memory card with state-of-the-art encryption capabilities. Not only does it encrypt, but it also hides the files so that they become invisible to prying eyes. Two guiding principles in Zifra’s development are openness and user-friendliness. Verified open source code is used for crucial parts of the solution and Zifra’s technology […]
Read More

IFF Tech&Tools Showcase 2017 – #11 Z.cash

Freedom of expression comes in many forms. One of them is the ability to send value to another person or business regardless of location or intent. Current financial privacy models are based on centralized systems which historically limit inclusion to the global market and are susceptible to compromise and potentially unlawful subpoenas, as highlighted in […]
Read More

IFF Tech&Tools Showcase 2017 – #10 Wire

Wire is a secure, end-to-end encrypted messenger. It’s open source, works on phones, tablets and computers, supports up to 7 devices per account, and doesn’t require a phone number to register. Wire is headquartered in Switzerland with servers in the EU.Wire started with an idea that people need and deserve a privacy-focused messenger that wasn’t […]
Read More

IFF Tech&Tools Showcase 2017 – #8 pretty Easy privacy (p≡p)

p≡p stands for pretty Easy privacy. The idea is to make end-to-end cryptography accessible to everyone by automatizing all steps usually taught to users at CryptoPartys, starting from OpenPGP encryption for email and then including chat communication channels like XMPP+OTR. p≡p end user software comes along with a cloudless (peer-to-peer) synchronization protocol allowing users to […]
Read More

IFF Tech&Tools Showcase 2017 – #7 Passbolt

Passbolt is an open source password manager built for collaboration. It allows teams to securely share and store credentials – like the wifi password of their office, their organisation’s Twitter handle or the administrator password of their router. It’s 2017 and the most popular passwords are still “123456” and “azerty”. Most people still reuse passwords […]
Read More

IFF Tech&Tools Showcase 2017 – #6 Paskoocheh

Due to heavy information controls, Iranians face significant challenges when attempting to access the Internet. In addition, popular Iranian app markets such as Cafe Bazaar are not allowed to distribute any circumvention tools, and many tool developers over-comply with sanctions by not making their tools available to Iranians. Paskoocheh is a response to these problems. […]
Read More

IFF Tech&Tools Showcase 2017 – #5 Gridsync

Gridsync is an open source, cross-platform desktop application and graphical user interface for Tahoe-LAFS, the Least Authority File Store.   Tahoe-LAFS’s unique design offers a number of highly-desirable features for users that require secure and reliable cloud storage: its “provider-independent” security model ensures that storage service providers cannot read or alter the data of their […]
Read More

IFF Tech&Tools Showcase 2017 – #3 Certbot

In a nutshell, Certbot is a tool for getting certificates from the Let’s Encrypt certificate authority (CA) and configuring your web server to encrypt users’ connections to your website with Let’s Encrypt certificates. But there’s more to it: Certbot is an easy-to-use automatic client that fetches and deploys SSL/TLS certificates for your webserver. Developed by […]
Read More

Distributed Denial of Women – a general strike

It’s a well-known problem: the tech industry, be it proprietary or open source, hasn’t managed to tackle inequality in its ranks despite several proactive efforts and millions of dollars invested to diversify their staff. There are many explanations and critiques of these approaches, but in the end what counts is that technology is still developed […]
Read More

Who bytes your bits? – digital security training in Toronto

On the 9th February eQualit.ie’s director Dmitri Vitaliev will lead a digital security training for high-risk journalism hosted by journalist Susana Ferreira as part of #OffAssignment Toronto, a series of workshops and talks for freelance journalists and independent media-makers in Toronto, and organized with the support of CJFE at the DAIS Tkaronto Gallery in Toronto […]
Read More

Deflect in 2016 – an overview

In 2016, Deflect set some records and helped defend online voices against some record breaking attacks. Throughout the year, Deflect served a bit less than 2% of the population connected to the Internet in 2016, published 3 DDoS analytic reports, mitigated the strongest DDoS attack that ever targeted our network, renewed its funding and began […]
Read More

Deflect Stats December 2016

In December 2016 the Deflect network recorded a slight increase in the number of total hits as compared to the previous month, with a comparable number of unique visitors and banning events. Overall, our edges served 635.4 million pages to 9.6 million unique visitors and banned 36,681 bots.   The following pie charts offer some […]
Read More

Deflect Stats November 2016

In November the Deflect network served pages to many legitimate visitors interested in breaking news reported by deflected websites, and mitigated automatically some intense attacks. During the month, Deflect served 585 million pages to 9.8 million visitors, with a slight increase of unique IPs as compared to our October statistics, suggesting a rise in the […]
Read More

Deflect Stats October 2016

In October Deflect’s metrics kept following the trend we had seen in September, with comparable figures in terms of unique visitors (9.3 million) and a slight increase in total hits (632.8 million requests reaching our edge servers), but with almost twice as many bots identified and banned by Deflect’s banning system – 50,323 bots against […]
Read More

Deflect Stats September 2016

In September, Deflect metrics grew as new websites joined the service and a popular Syrian website rejoined Deflect to ensure an uninterrupted news stream on the regional conflict. In other news, the Internet witnessed the largest ever DDoS attacks, surpassing 600gbps and then 1 terabyte of traffic per second. These events followed the leaks of […]
Read More

Deflect Stats August 2016

“No news is good news” in the DDoS mitigation game, and this is what we were hoping for in August 2016. We decided to capitalize on this opportunity and focus the team on new developments supporting free Let’s Encrypt certificates for all Deflect clients, as part of the TLS/HTTPS system. Then, on the 29th everything […]
Read More

Deflecting cyber attacks against the Black Lives Matter website

Last week and throughout the weekend, Deflect helped mitigate several DDoS attack bursts against the official Black Lives Matter website. At current estimates over 12,000 bots pounded the website just over 35 million times in 24 hours. An unusual trait of this attack was the prevalence of  malicious connections originating from the US. An in-depth […]
Read More

Deflect Stats June 2016

If any conclusion can be drawn in comparing this month’s statistics with the rest of the year, it’s probably that hot weather is also discouraging to those bot controllers launching DDoS attacks! The month was rather uneventful on the malicious side of things, but the team worked in earnest to improve our mitigation mechanisms, including threat […]
Read More

Deflect Stats May 2016

May 2016 was an interesting month for Deflect. We began the month with two intense attacks that required our team’s intervention right in the middle of May Day. After this, the month unrolled with a series of smaller attacks against the same websites, which were by then automatically mitigated by the Deflect network without requiring […]
Read More

eQPress – secure hosting with Deflect

In the last few months, the Deflect team has set up a hosting platform that allows anybody to have an easy-to-manage, secure website (or even a multisite) that protects you not only from DDoS attacks, but also from other problems that may arise if your hosting provider is poorly resourced, unable to handle basic attacks […]
Read More

Deflect Labs Report #1

Botnet attack analysis covering reporting period February 1 – 29 2016 Deflect protected website – kotsubynske.com.ua This report covers attacks against the Kotsubynske independent media news site in Ukraine, in particular during the first two weeks of February 2016. It details the various methods used to bring down the website via distributed denial of service […]
Read More

IFF Tool Showcase: the winners!

During the Internet Freedom Festival in Valencia, eQualit.ie hosted a tool showcase on Thursday 3rd March. 15 awesome tools were presented, and the audience voted for their favourite projects for three different categories – “You did whaaaat?”, “Wish I’d thought of that!”, and “You get a biscuit”. We are now proud to announce the winners, […]
Read More

IFF Tool Showcase #14: CGIProxy

First created in 1996, CGIProxy is a clientless web proxy that supports Javascript and Flash, enabling access even to the most complex websites, and can be used to anonymize connections and circumvent censorship. Over the years, CGIProxy has been downloaded over 2 million times and has been a model for several other similar web proxies. […]
Read More

IFF Tool Showcase #15: SecurePost

SecurePost is an Android App that allows a group to share a Twitter account or Facebook page without sharing the account password. Every post published through SecurePost is cryptographically signed and can thus be verified through the app itself or with a Chrome plugin, that will clearly show if the post has been published by […]
Read More

IFF Tool Showcase #11: StoryMaker

StoryMaker is an open source app helping anyone learn to make great multimedia stories and safely produce and publish them with their mobile device, in a privacy-preserving fashion that ensures they can share and publish their stories where they wish, despite the threat of censorship. The final release out of beta comes with the inclusion […]
Read More

IFF Tool Showcase #13: uProxy

uProxy is an open source browser extension for Chrome and Firefox that lets users share their route to the Internet with each other. uProxy has been made for people in two situations: those who need to get safe and unrestricted access to the Internet and those who have an unrestricted connection that they would like […]
Read More

IFF Tool Showcase #6: OnionShare

OnionShare is a desktop application to share files anonymously and securely using the Tor network. It’s incredibly simple and uses the anonymity-protecting and firewall-slicing properties of hidden services. It supports a diversity of use cases such as sending a screenshot to a friend, or leaking classified documents to a journalist. As long as both the […]
Read More

IFF Tool Showcase #1: CENO

CENO (Censorship.NO!) is an innovative approach to censorship circumvention, based on P2P storage networks, and in particular on Freenet. CENO maintains strong privacy and anonymity features as well as offering users plausible deniability in an emergency situation. CENO is built in advance of aggressive Internet filtering and the establishment of national intranets to fence off […]
Read More

IFF Tool Showcase #5: NetAidKit

The NetAidKit is a pocket size, USB powered router that connects everything to everything, designed specifically for non-technical users. The easy to use web interface will allow you to connect the NetAidKit to a wireless or wired network and share that connection with your other devices, such as a phone, laptop or tablet. Once the […]
Read More

IFF Tool Showcase #12: Umbrella

Umbrella is a free and open source Android app to help journalists and activists manage their security on the move. Subdivided in several sections addressing not only digital and physical, but also psycho-social and operational security issues, Umbrella offers simple, practical advice on what to do and what tools to do it with – covering […]
Read More

IFF Tool Showcase #10: StingWatch

An IMSI-catcher is a telephony eavesdropping device used for intercepting mobile phone traffic and tracking movement of mobile phone users. Essentially a “fake” mobile tower acting between the target mobile phone and the service provider’s real towers, it is considered a man-in-the-middle (MITM) attack. Wikipedia article Employed, among others, by the US federal government and […]
Read More

IFF Tool Showcase #9: Qubes OS

Qubes OS is a free and open source security-oriented operating system that implements security by compartmentalization. Its architecture is built to enable a user to define different security environments on her computer and visually manage their interaction with each other. While the most common operating systems like Windows, Mac or Linux are “monolithic”, which means […]
Read More

IFF Tool Showcase #8: Psiphon

Psiphon is a free censorship circumvention tool. Its robust network is made of more than thousand active servers, which can provide you with quick access to any blocked content on the Internet. Psiphon is an open source tool that does not require installation and automatically selects the best performance settings. More than 15 million people […]
Read More

IFF Tool Showcase #4: FreedomBox

FreedomBox is a personal server that protects your privacy. It is a free software stack, a subset of the Debian universal operating system, that can be installed in many flavors of inexpensive and power-efficient hardware. FreedomBox runs in a physical computer and can route your traffic. It can sit between various devices at home such […]
Read More

IFF Tool Showcase #3: CoyIM

Despite the fact that one of the most efficient ways of encrypting communications is OTR with Jabber/XMPP, the clients that support these protocols are either flawed from a security point of view or excessively hard to use. This is the reason why CoyIM is being developed. Based on Adam Langley’s xmpp-client, and written in the […]
Read More

IFF Tool Showcase #7: Peerio

Until recently, if someone wanted to be sure that their communications could only be read by themselves and their addressees, they had to face the steep learning curve required by encryption tools like GPG or OTR. As efficient as they are in enabling an end-to-end encrypted communication, these tools are problematic for anyone who needs […]
Read More