About V2Ray is a versatile network utility that provides a platform for building proxies to bypass network restrictions—enabling users to access the internet safely and privately in restricted contexts where surveillance and censorship are prevalent. In addition to being open source, V2Ray is designed with encryption and obfuscation functions that make it harder for surveillance forces …
bypass restrictions, cybersecurity, digital privacy, internet censorship, Network Security, online privacy, open source, OTF, Penetration Testing, Security Audit, Security News, V2Ray, Vulnerability Assessment
About CoverDrop Whistleblowers need a secure method to initiate contact and build trust with journalists. Existing tools often cater to later-stage correspondence, leaving crucial, early touch-points vulnerable to surveillance. In addition, many of these tools are difficult to find on newspaper websites, hard to use securely, and offer insufficient user guidance. After conducting workshops with …
Android Security, CoverDrop, iOS Security, Journalism Security, Mobile Security, Open Source Security, OTF, Penetration Testing, Pentest, pentesting, Secure Communication, Security Audit, Security Awareness, Security News, Signal Protocol, Whistleblower Protection, White Box Testing
About Opaque Opaque is a JavaScript package to allow secure password-based, client-server authentication without the server ever obtaining knowledge of the password. Audit Description Through OTF’s Red Team Lab, 7ASecurity conducted a penetration test and whitebox security review of Opaque. A whitebox review is a form of application testing that provides the tester with complete knowledge of the application …
cybersecurity, JavaScript, Opaque, Open-source, OTF, Password authentication, Penetration Testing, privacy, Security, Security Audit, Security News, Web development
About Disguiser Disguiser is a novel framework that enables end-to-end measurement for accurately and comprehensively investigating global internet censorship practices. It’s challenging to conduct large-scale internet censorship measurement, as it involves triggering censors through artificial requests and identifying abnormalities from corresponding responses. Due to the lack of “ground truth” on the expected responses from legitimate services, …