torjail - update & rework

tor_screen_small

I had to redesign and recode some of this project due to firejail removing 'private-home'.
I changed the way it works to now create a home within a ramdisk (tmpfs).

I also added some new variables for configuration.

torbrowser.sh
 @@ -30,9 +30,10 @@ TORJAIL_DISPLAY=":6"
 #   you probably don't need to change anything below this line
 #*****************************************************************
 TORJAIL="torbrowser"
-TORJAIL_HOME="${TORJAIL_BASE}/tor-browser_en-US/Browser"
 TORJAIL_XAUTH="/tmp/.Xauthority-$TORJAIL"
 TORJAIL_TMP="/tmp/.torxephyr"
+TORJAIL_RAM="/tmp/torjail"
+TORJAIL_HOME="${TORJAIL_RAM}/tor-browser_en-US/Browser"
 

The main features are still as before (GPG verification, auto-update etc).
You can download the updated version from github

Continue Reading

Running Neverware Cloudready on Virtualbox

neverware provide a raw image of their chromiumos build free on their website

vbox_cloudready

download the bin.zip (eg: cloudready-free-45.3.39.bin.zip) & extract the bin.

convert the raw image to vdi

 vboxmanage convertdd chromiumos_image.bin chromiumos_image.vdi

optional: copy or move chromiumos_image.vdi to virtualbox machines folder

create a vm in virtualbox

  • name it whatever you want
  • select linux > other linux (64-bit)
  • set the memory (eg: 1024mb)
  • use existing virtual hard disk
  • browse to chromiumos_image.vdi

configure virtual machine

  • go to settings > system
  • change pointing device to PS/2 Mouse
  • tick Enable EFI (special OSes only)

That's all, now boot the machine.

Note: Enabling 3D Acceleration does nothing

Continue Reading

eBlocker - anonabox style magicbox - with added MITM

I'm going to start by saying this project came to my attention when they followed me on twitter.

eblocker_header

I was astounded to find they have been backed on kickstarter with a huge sum of money.
The product has so many similarities with Anonabox (a flawed product which was pulled by kickstarter).

At a Glance

Here are some glaringly obvious things you will find on the eblocker kickstarter page.

Actively using MITM to inject content into client sessions

After checking a page, eBlocker inserts the eBlocker activity icon indicating how many URLs were eblocked. This icon provides 1-click access to the eBlocker Controlbar.

Attempts to route everything via tor

Let eBlocker hide your real IP-address by routing the traffic through the Tor network

In practice

eBlocker does not work with HTTPS / TLS Websites (currently).
It will never be able to safely work with TLS (https) due to actively using a proxy

Continue Reading

BlackWidow Macro Keys In Linux

bwidow_header

This is a C program which sends the init code from Razer windows proprietary drivers to initialize the 'macro' keys on Razer BlackWidow keyboards on Linux.
Linux users can then use the keys for macros using tools like xmacro or even just bind the keys to functions, scripts or programs using the window manager.
If you really wanted you could also rebind keys to existing keyboard functions using xmodmap.

The init code was taken from the windows drivers using wireshark usb capture.

The source code is available on github under MIT license.

Razer BlackWidow Macro Keys v1
Razer BlackWidow Device Found
Sending data:
 00 00 00 00 00 02 00 04
 02 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00
Continue Reading
Javascript is turned off or your browser does not support it. The appearance of this site will be affected without javascript.