Can you clarify what this does? Even after reading the readme it's not clear to me what it does or what the use case is. And the phrase "silence censorship, automate the effect" is confusing since censorship is an attempt to silence others. I am familiar with the Streisand effect, where an attempt to hide information serves to publicize it. Does this library propagate secure, encrypted servers? So if you feel in danger of being censored you can quickly spread your message to other servers? Something more than that?
I like the concept, but I am troubled by the idea of people running cookie-cutter scripts to set up systems which are then left in charge of real-world anonymity.<p>Could the suite of things installed by this software package be used as a profiling vector in the future? How could that be avoided if so? I know that your userbase is slim now and mass profiling probably doesn't apply yet, but it's something to consider.<p>Are the installed defaults known to be sane and secure? That's another huge worry when the configuration is taken out of my hands initially.<p>Sorry for the worrisome comments. I like the idea,
Awesome! Thanks! Might be great to kick off the readme with some anticipated use-cases, just so people can understand right away who the target audience is without reading through all the features. I mean, if I'm from a place being censored, all the bullet points will probably scream at me, but if I'm not, it takes a bit to determine that this product isn't particularly meant for me :)
Just a thought: in order to make these servers more undercover, you can bundle in a port-knocking daemon (knockd) and have all ports initially closed. This setting should be easily changeable, but it will also tremendously help impair a third party's possibilities of profiling and figuring out valuable info about the server.
This is similar to a project I worked on a while ago, Lahana[1] but on steroids.<p>I like the approach, although it requires a little more knowhow to set up. What would be really cool (if not already in) would be to ask the user which services they want to run on setup. Not everyone will want/need to run all the services, running extra services may make it easier to compromise an instance.<p>Jlund - if you feel like it, take a look at the lahana code[2] and if you feel like implementing a VPN-Tor routing bridge feel free to use what you like. Drop me a message if you get stuck. I don't have a lot of free time but will help where I can.<p>[1] - <a href="http://lahana.dreamcats.org/" rel="nofollow">http://lahana.dreamcats.org/</a><p>[2] - <a href="https://github.com/stevelord/lahana" rel="nofollow">https://github.com/stevelord/lahana</a>
Dockerized "pre-reqs" for streisand:<a href="https://github.com/gdoteof/docker-streisand" rel="nofollow">https://github.com/gdoteof/docker-streisand</a><p>so you can just do<p><pre><code> docker run -i -t streisand</code></pre>
Awesome. I'm actually building a company right now around an almost <i>identical</i> product. We aren't open sourcing it yet but we will eventually. Would love to talk about this with you (email in profile).<p>Any plans to integrate AAA with radius or similar? Any plans for squidproxy?<p>Also, I'm planning on working on a tool to easily deploy Tor hidden services as soon as I get some time. I think there's value in that aspect of your project alone -- maybe consider breaking it off on its own.
Probably worth pointing out that this wont anonymize your traffic — instead of coming from your home IP address, it will come from the IP address of a server registered against your name and payment details.<p>That's not to detract from the functionality it does offer; just making sure people don't get the wrong idea.
Nice work. Love that streisand leverages ansible.<p>One thought, you ask for AWS credentials. Mine are already stored in ~/.aws/config for use in the official aws cli which I think I recall wraps boto. It would be nice if the streisand setup could figure that out for me.
I hope that, besides Starcadian, you also listened to this: <a href="https://www.youtube.com/watch?v=9VQdVA2hjsA" rel="nofollow">https://www.youtube.com/watch?v=9VQdVA2hjsA</a>
I just walked through the live demo eof provided (thanks). It looks very promising and well thought out. How many users could the smallest Amazon box handle in a real world scenario?
Has anyone run this on an amazon micro instance? I'm wondering how much is needed for this to run, I'm guessing not much, hence the question :)
I made a long comment on the history of the right to be forgotten on another thread that just fell off the frontpage. Definitely relevant to this thread too!
<a href="https://news.ycombinator.com/item?id=8083211" rel="nofollow">https://news.ycombinator.com/item?id=8083211</a>