We envision a future were owning and administering your own personal server is simple and commonplace. This vision naturally arises as more and more people begin to use and advocate distributed and decentralized technologies like Bitcoin and our very own DNSChain. Instead of learning to drive, they’ll learn to administrate a server. 🙂

So, along a similar vein of our previous tutorial for How to update OpenSSL on Debian testing (Jessie) for #Heartbleed, today we’ll show you how to downgrade a Linux kernel so that you can get the patch for the recent deadly-dangerous privilege-escalation vulnerability CVE-2014-3153 if you’re running on a non-stable distribution (or are running one of the latest kernels). Continue reading

This post is about the OpenSSL Heartbleed vulnerability that’s affecting the internet right now and not directly related to the okTurtles project.

April 8, 2014 6PM EST: Looks like for this one the Debian team moved faster than their typical “minimum two-day migration” and got the fix into testing a couple of minutes ago. Good job! You can completely ignore this blog post now! I’ll leave it up in case it’s still a helpful illustration of how to get security fixes for testing when they’re not yet available. Continue reading

We’ve taken several important steps on the road to making “MITM-proof communication” on your favorite websites possible.

  1. We released the first version of DNSChain, the blockchain-based DNS resolver (fully compatible with canonical DNS).
  2. We launched the first public DNSChain server. Its 600 lines of CoffeeScript have been running flawlessly since February 6th.
  3. We launched the okTurtles forums and #dnschain IRC channel.
DNSChain is the first server to support the *.DNS metaTLD (see below for a detailed explanation of metaTLDs). Continue reading

Hello world!

Nothing much to see here yet. Check back later! […]