To stay ahead of new and evolving threats, cryptostorm has always looked out past standard network security tools. Here, we discuss and fine-tune our work in bringing newly-created capabilities and newly-discovered knowledge to bear as we keep cryptostorm in the forefront of tomorrow's network security landscape.
Posts: 2
Joined: Sat Jan 16, 2016 12:24 pm


Post by subatomic » Sat Jan 16, 2016 2:12 pm

I mentioned this in a request to CStorm support but also thought I would post it here to see what the rest of yous thought.

For a long time I used [redacted] as a VPN service, but I've come to believe their service is likely compromised and my online activity was being linked to their IPs (hence my departure). [Redacted] offered, in addition to VPN, CGI proxies on all it's exit nodes. This allowed one to both make an additional hop with additional encryption and to allow varying levels of filtering on the web service/content (cookies, scripts, ads, referrer) before it ever got to your browser. It also allowed on-the-fly tunneling from foreign machines where installing a VPN client might not be feasible (libraries, hotels, etc.) This I loved. It wasn't perfect, and it broke some pages, but it made for an (idealistically) more secure and anonymous (and sometimes faster) session. One could, of course, use any number of free proxy servers or use one of the proxies Torguard offers, but the whole point here is trust, both technically and philosophically.

I want cryptostorm to do the same thing, only better. Imagine a firewall, of sorts, that could (also) actively examine and filter out web traffic for cutting-edge attacks and/or malware -- things the CS team deemed 'the most dangerous' for it's users at any given time-frame.

I'd use it.