Zola's Blog Where I share everything that Im interested in

How Governments Detect and Block your Internet traffic

If you have ever lived in a country with advanced internet censorship, such as China or Iran, you would know how challenging it is to bypass these restrictions. In this post, I want to discuss the methods by which these firewalls block and detect your traffic, as well as the...


Creating an Encrypted Portable Container for ZeroNet

I have two Linux machines that I constantly switch between, and I had a problem syncing my ZeroNet1 data between my machines. Additionally, I didn’t want to share my data with a third-party server. So, I decided to make a portable USB stick for my ZeroNet that could not only...


Hacking a CTF: Do not use ECB mode for encryption

I recently started doing CTF challenges. A few days ago, I was working on a challenge from 247CTF.com. I found a challenge that, in my opinion, shows why using ECB(Electronic Codebook) mode for encrypting with block ciphers like AES or Twofish isn’t a good idea. So, I decided to write...


A Guide to Security, Privacy, and Anonymity on ZeroNet

In my previous post, I took a technical look at ZeroNet, explaining how it works and the technologies it uses to create a peer-to-peer web-like network. In this post, I want to discuss how you can maintain privacy and security in this network, explore the potential threats, and provide some...


A Very Technical Look at ZeroNet

ZeroNet has always been a project that I’m very passionate about, and I enjoy contributing to it. It is a Peer-to-Peer Web-Like Network that cannot be censored or taken down, thanks to its decentralized nature. When I first started exploring ZeroNet, I struggled to find comprehensive documents or blog posts...


Bypassing Internet Censorship Using SSH

As censorship systems like GFW(Great Firewall of China) and Roskomnadzor(Russia’s Federal Service for Supervision of Communications, Information Technology) have evolved, people have fought back and developed numerous tools, methods, and protocols to bypass these firewalls and connect to the open and free internet that most people know. Among these protocols,...


Creating a BlackHole Shell with 16 Lines of Rust Code

I have been using rbash to restrict users’ shell access for the past year, and there have been some problems with it that finally led me to write my own shell. The biggest problem was that users could run bash, dash, or zsh, or any other shell, allowing them to...


VerusCoin, Everything that Ethereum Isn't

A few months ago, I accidentally came across a highly underrated cryptocurrency named VerusCoin, and I immediately fell in love with it because of its unique features and the techniques that VerusCoin’s developers used to provide those features. And in this post, I wanted to highlight the features and technologies...


Making A Tor BridgeDB CLI interface with Rust

If you care about privacy and anonymity, or if you live in a country with very restricted internet access, you might have used Tor (The Onion Router) for anonymity or to bypass censorship. In both cases, you might need to use Bridges to connect to the Tor network or to...


Few simple things that can increase your privacy significantly

After years of dedication to privacy and anonymity in the online world, I have come across a few simple things that can put you above average in terms of privacy and security. Think before share What you share online can stay out there forever, so it’s best to think about...


The crypto anarchist manifesto (Timothy C. May)

A specter is haunting the modern world, the specter of crypto anarchy. Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without...