![]() |
News from da outaworlds |
mail files register groups login |
Message-ID: |
Subject | Author |
![]() | Marc Lewis |
![]() ![]() | Jakob Bohm |
1 |
Hello All,
Onion Number Station <number@station.invalid> wrote in news:uuarh9$qm1e$1
@paganini.bofh.team:
> The Onion Number Station is available for telnet access.
>
> User will not be able to access with a web browser.
>
> A Terminal emulator is required.
>
> TOR proxy is required. Use either [torify] or [torsocks].
>
> address: hzqsdtwalew6ykx5qs7qi4hrkjbtbs35e2l3pzbjt6224bt34rc3dhyd.onion
> port: 12345
>
> If you don't have telnet installed try netcat, ncat, or nc.
>
> Example: torify telnet [address.onion] [port]
Why is it that you do not accept standard Telnet instead of just TOR?
Many folks don't have access to TOR and have simple telnet terminal
programs.
--
All the best,
Marc
SysOp Sursum Corda! BBS
1:396/45
A: Because it disrupts the train of thought!
Q: Why is top-posting frowned upon?
---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus
On 2024-04-15 03:13, Marc Lewis wrote:
> Hello All,
>
> Onion Number Station <number@station.invalid> wrote in news:uuarh9$qm1e$1
> @paganini.bofh.team:
>
>> The Onion Number Station is available for telnet access.
>>
>> User will not be able to access with a web browser.
>>
>> A Terminal emulator is required.
>>
>> TOR proxy is required. Use either [torify] or [torsocks].
>>
>> address: hzqsdtwalew6ykx5qs7qi4hrkjbtbs35e2l3pzbjt6224bt34rc3dhyd.onion
>> port: 12345
>>
>> If you don't have telnet installed try netcat, ncat, or nc.
>>
>> Example: torify telnet [address.onion] [port]
>
> Why is it that you do not accept standard Telnet instead of just TOR?
> Many folks don't have access to TOR and have simple telnet terminal
> programs.
>
Real numbers stations are radio stations that broadcast encrypted data
in the form of endless sequences of digits read allowed by a robot
voice. The apparent use is that a few very select recipients, operating
undercover in enemy territory use widely available radio receivers to
listen at pre-arranged secret time, then decrypt the messages using
strong secret keys known only to the the intended recipient and their
spymasters, not even to the personnel at the numbers station, which
simply retransmit a sequence of numbers given them by their superiors.
Now if this server is supposed to do the same over the Internet, it is
important that watchful counterintelligence cannot distinguish the
recipients retrieving the messages from ordinary people just surfing
entertainment over the tor vpn . Hence the need to hide behind an
..onion address. However given the presumed use of decryption software,
there is no need for the encrypted messages to take the humanoid form
of digits being read aloud. A stream of bytes/bits marked with
broadcast timestamps would still allow deniability of the use of tor,
while also hiding which recipients care about which parts of the
broadcast. One recipient may be instructed to grab the 5152 bytes
starting 11113 bytes after 01:00 UTC, then feed it tp symmetric gpg
decryption using their password of the week.
Enjoy
Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
1 |