Security and cryptography

How to create a VPN in 5 minutes with sshuttle?

shuttle allows you to create a transparent proxy over the SSH protocol that can be used as a VPN, you just need to have Python installed on both the server and the client and have root permissions on the client.

It is recommended to use sshuttle if:

  • Your client machine (or router) is Linux, FreeBSD, or MacOS.
  • You have access to a remote network via ssh.
  • You don’t necessarily have admin access on the remote network.

How to create a VPN in 5 minutes with sshuttle? Read More »

How to install SSL Let’s Encrypt using Lego?

SSL / TLS (Secure Socket Layer / Transport Layer Security) are cryptographic protocols designed to provide communications security over a computer network: web, email, instant messengers.

CA (Certificate Authoritative): worldwide recognized entity in charge of generating security certificates for third parties.

CSR (Certificate Signing Request): signing request sended to a CA.

How to install SSL Let’s Encrypt using Lego? Read More »

How to install Let’s Encrypt SSL in Debian?

Let’s Encrypt: Let’s Encrypt is a free, automated, and open certificate authority (CA), run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

It provides people with the digital certificates they need to enable HTTPS (SSL / TLS) on their websites, free of charge, in the most user-friendly way possible.

How to install Let’s Encrypt SSL in Debian? Read More »

Avoid Internet surveillance using TOR


The Tor network is a group of servers operated by volunteers that allows people to improve their privacy and security on the Internet. Tor users coonect to Internet through a series of virtual tunnels rather than making a direct connection, allowing both organizations and individuals to share information over public networks without compromising their privacy

Avoid Internet surveillance using TOR Read More »