Foundation for applied privacy что это
На самом деле Foundation – лишь одна из десятка крупных веб-площадок в сети, где коллекционеры цифрового искусства могут выбрать и купить произведения за криптовалюту – как у начинающих, так и у известных художников.
Вообще вся эта история выглядит весьма волнительно – наконец-то авторы, занимающиеся созданием креативного цифрового искусства, получили площадку для признания и популяризации своих работ наравне с традиционными галереями.
Сам я не состою в крипто-сообществах, не слежу за курсом цифровых валют и не являюсь прямой целевой аудиторией таких площадок, поскольку моя творческая деятельность находится скорее на стыке рекламной фотографии, ретуши и CG. Однако, несмотря на это, мне недавно удалось оказаться в Foundation.app и заявить несколько своих работ, одна из которых уже была продана за 0.3 ETH.
Что было до NFT-аукционов?
Долгое время произведения искусства продавались на аукционах в традиционном виде – картины, принты, стритарт, инсталляции (и так далее), созданные ограниченным тиражом, физически переходили в частное владение коллекционеров за большие деньги.
Попасть на такие аукционы автору было непросто – вы долго и сложно занимались творческими проектами, пока в какой-то момент не получали всеобщее признание, либо не были замечены избирательным взглядом галерейного куратора.
Однако если ваши произведения искусства были сугубо нематериальными – созданы в 3D- или 2D-редакторах, их было невозможно продать в частные коллекции в таком виде, поскольку как минимум было сложно обеспечить их ограниченную тиражность и уникальность. Коллекционеру нужно понимать, во что он вкладывает свои деньги.
Блокчейн изменил всё
Однако теперь это стало возможным благодаря NFT-токенам – привязке уникальной цифровой подписи к конкретному цифровому файлу, которую нельзя подделать. Это и оказалось переломным моментом – коллекционеры начали вкладывать цифровую валюту в цифровое искусство, а художники, долгие годы находившиеся в ожидании всеобщего признания, наконец-то получили оценку своего творчества.
Для того, чтобы ограничить выборку и постараться привлечь к аукционам проверенных художников, большинство площадок ввели верификацию и инвайты.
Почему именно Foundation?
Foundation.app в этом плане стал особым лакомым кусочком: попасть туда можно только через инвайт – персональное приглашению от участника, который уже сам находится внутри площадки и, кроме того, имеет успешные продажи, то есть является востребованным художником.
Мне самому удалось найти инвайт за два месяца – периодически, но не очень настойчиво, я спрашивал у знакомых художников возможность доступа. В итоге мне повезло, и моим пропуском в мир аукционов оказался русский художник из Нью-Йорка.
Как подать свою работу на аукцион и сколько это стоит
Механизм подачи довольно прост. Для начала вы выбираете своё произведение – это может быть статичная картинка, видео, (музыка и AR/VR на Foundation пока в разработке) – главное, чтобы вы являлись автором. Затем добавляете описание работы, минимальную цену продажи и подаете свою работу в лист продаж.
Стоит отметить, что каждое ваше действие стоит денег – будь это привязка токена (mint), выставление работы на торги (list), трансфер, изменение цены или снятие с торгов. Свой первый дроп я выставил на аукцион, потратив 140$. Остальные дропы суммарно обошлись не дороже 100$, поскольку я мониторил стоимость – в часы стоимость действий снижается.
Продажи и коллекционеры
Дальше всё зависит лишь от вашей удачи, известности, поддержке комьюнити, а так же насколько хорошо вы подготовили свою аудиторию перед стартом аукциона – многие художники знакомятся с коллекционерами и оповещают их о старте продаж в Twitter заранее.
Подробнее о терминах, механиках и цифрах можно почитать на специальных ресурсах. На русском языке доступнее всего это можно сделать в телеграм-канале NFT Bastards – первом обширном русском сообществе, где ребята написали много полезной информации.
When interpreting the number of LEA (Law Enforcement Agency) requests, keep in mind that we are forwarding multiple Gbit/s of Tor bandwidth, and this report covers an extended time period during which over 60 Petabytes of Tor traffic got routed through our infrastructure. As of today, we are the 3rd largest Tor exit relay operator globally, accounting for about 5% of Tor's total exit capacity.
Tor Exit Relay IP Address Requests
The following list shows the total law enforcement agency requests we received, grouped by the country in which the requesting authority is located (which is not necessarily the same country from where the request actually originated):
- Austria: 5 (3 of them were foreign requests received via Austrian authorities)
- Germany: 2
- Russia: 2
- India: 2
- Norway: 1
- Poland: 1
- USA: 1
As a side note: It is not always trivial to tell whether an email comes from an authentic law enforcement agency due to the international nature of these requests, but we can answer all requests equally since we do not have any data anyway (no matter whether the LEA request is authentic or not).
We answer these requests by explaining what Tor is, and that we do not have any data or logs that would help to identify the actual user of the IP address at the time. No lawyers were involved or needed.
All requests reached us via email with one exception.
In October 2020, two law enforcement officers visited our office in Vienna and handed us an investigation order (not a search warrant - see below), from the public prosecution office which requested information related to one of our Tor exit relay IP addresses. Since none of our authorized persons were on-site to answer the request directly at the time, we had a phone call with them on the same day and after explaining that the IP address on the investigation order is used for an anonymity service (Tor) the situation was quickly clarified since they knew what Tor is already.
Since we had contact with the cybercrime competence center, acting on a national level in the past (they even were present at one of our past presentations about our Tor exits) and our IP addresses were known to them as Tor exit IPs already, we were a bit surprised by this visit. But the local law enforcement officers were professional, friendly and also so kind to explain the difference: In this case it was an European investigation order. A public prosecution office in another EU country contacted the public prosecution office responsible for Vienna, which then tasked the local law enforcement agency to investigate (unlike in the other international requests from outside the EU where the national cybercrime competence center handled the requests).
Investigation Order
DNS Privacy Services (DoT and DoH)
To meet Mozilla's policy requirements for DoH resolvers, we also publish the following numbers related to our DNS privacy service:
- Total law enforcement requests received: 0
- Total amount of censorship demands received: 0
Announcing AS 208323!
Foundation for Applied Privacy
We are excited to literally announce our own Autonomous System :)
One week ago we started announcing AS 208323. On the same day we migrated our main Tor server to it. Here are some of the factors that motivated us to apply for our own ASN:
Bandwidth: Having your own Autonomous System Number is one of the technical requirements to join Community-IX. Community-IX provides non-profit organizations that meet their requirements with free IP transit capacity.
Routing Security: Running our own BGP routers allows us to define our own policies and RPKI based Route Origin Validation has been part of our AS from the very first second it went online.
Redundancy: Until we moved into our own ASN we had only a single fiber connecting us to the world which basically never was a real issue but now we got two which allows us to keep running even when our upstream needs to do maintainance.
Abuse Management. Due to our limited Tor exit policy we never had much abuse emails but running our own AS gives us the freedom to choose a more open Tor exit policy in the future should we want to.
Anycast. Having our own ASN will come handy should we ever run our DNS privacy resolvers in multiple Anycast locations, which is not something we can do currently due to the additional required IP prefixes but having that option in the future is nice.
From a technical point of view we run BIRD 2 and Routinator 3000, but we are not entirely happy with the setup since BIRD on BSD apparently has some limitations (no support for privilege dropping, worse syncing with kernel table, no ECMP) so we might change OS or BGP daemon in the future.
Our ASN shows up on the Tor network top 10 ASNs already:
In the next few weeks we will deploy a RIPE Atlas probe and we are planning to join the MANRS initiative.
Thank you to everyone who made this possible!
Информация о IP-адресах ISP провайдера
Раздел Информация о IP-адресах ISP (интернет провайдера) содержит отфильтрованную информацию по IP-адресам, принадлежащим заданному ISP (провайдеру). Раздел станет полезен для поиска и составления полного списка публичных IP-адресов, используемых тем или иным ISP (интернет-провайдером), в случае, если известен только ASN или IP-адрес сайта, делегированного на сервер искомого провайдера.
Для удобства пользователей, IP-адреса могут быть им сгруппированы как по дате добавления, так и по ASN, кроме того, активна фильтрация как по названию провайдера и по дате добавления данного IP-адреса в каталог IP WHOIS UANIC.
ISP (англ.: Internet Service Provider) - это организация, предоставляющая пользователям доступ к сети Интернет и, возможно, другие услуги, такие как хостинг, регистрация доменов, корпоративная e-mail почта и др. Провайдеры, которые обеспечивают корпоративный доступ в Интернет, часто предлагают выделенные высокоскоростные линии связи, в том числе оптоволокно, радиодоступ и др., аренду выделенных и физических серверов, их настройку и сопровождение. Доступны и другие смежные услуги, какие как администрирование серверов, защита серверов и сайтов клиентов от DDoS атак и т.д.
Encrypt all the things, DNS included!
Foundation for Applied Privacy
DNS traffic is revealing
There have been multiple efforts to protect DNS traffic and in the last few years these efforts also included protocols that got specified in RFCs.
DNS-over-TLS
In 2016 DNS-over-TLS also known as DoT got published but its adoption remained relatively low and some implementations still have some significant deficiencies like establishing a new TLS connection for every single DNS query instead of reusing a connection for multiple queries to reduce the connection setup overhead. Luckily this is slowly changing, as an example Android 9 ships with DoT enabled by default. Even the default opportunistic mode that does not authenticate the TLS connection to the resolver is still positive progress. We hope to see DoT software evolve in particular with regards to connection handling and TLS authentication.
And there is a small but important implementation-specific dependency: Firefox unfortunately requires using DoH for DNS to make use of encrypted SNI. You can not use ESNI while using a system wide DoT resolver because Firefox needs to retrieve the keys for ESNI via DNS and it only supports DoH for that (no DoT). ESNI (an active Internet-Draft) will close another loophole disclosing the visited sites at the TLS layer. The dependency to use DoH for DNS is not a requirement by ESNI but a shortcoming of Firefox and we are not sure whether this will change anytime (soon).
Some of the concerns voiced around DoH are not directly about the protocol itself but rather about the way how applications (mainly browsers) might select the DNS resolver since Mozilla partnered with Cloudflare to provide the DoH server capacity. Some other big players might simply fear loosing access to lots of DNS data that they got for free until now.
We share concerns about centralization but that should not be used as an argument against the protocol. It is important that DoH client sofware offers users an option to select their preferred DoH server and that more resolver operators offer DoH and DoT support, which brings us to the next point.
With browsers implementing DoH, the client portion is well covered, but for resolver operators the DoH software options are currently still looking dire. At the time of writing no major resolver software ships a released version with DoH support yet which makes it harder to offer and operate DoH servers but we like to hope that this will change within the next few months.
The actual goal behind all of this
Users should be able to browse the web privately without an observer learning all the sites they visit. Even with encrypted DNS this goal is not met yet. Observer can still learn visited domain names after a user enabled DoH or DoT due to information disclosed in TLS (SNI) but encrypted DNS is nonetheless a requirement towards protecting that information until the specification for encrypted SNI is completed and implementations are made available.
Our DNS Privacy Services
We operate public DNS Privacy resolvers in the following flavors:
- two DoT endpoints
- an experimental DoH endpoint
- an experimental DNS-over-Onion endpoint
(we do not offer plain DNS over UDP endpoints)
More details can be found on our service page.
If you'd like to know what we log and for how long you should have a look at our privacy policy.
A few months ago when we decided to offer DNS privacy services for the general public as our next privacy enhancing service we didn't anticipate the attention this topic is getting these days. We are glad DNS privacy is gaining traction.
If you would like to learn more about these DNS privacy protocols come to our talk "DoH, DoT, what? - An Introduction to DNS Privacy Protocols." at easterhegg 2019 in Vienna (19.04.2019).
Our First Donation Stats
Foundation for Applied Privacy
Since we are collecting donations to help cover our costs for the privacy infrastructure we operate for you - the general public, we want to give you some insides on how much we collected and how much we spent. We would also like to encourage other similar organizations to publish comparable numbers.
So far we collected a total of 776 Euro since we launched until the end of November 2018. This includes donations and membership fees (excluding "internal" donations from the core team itself).
On the spending side we had a total of 2451 Euro of expenses.
This money was primarily used for our infrastructure providing privacy enhancing services to the general public free of charge.
With that money we routed a total of over 5800 TiB of Tor traffic (rx+tx).
So statistically speaking we pushed more than 2.3 TiB of privacy enhancing traffic for every Euro spent. This should give you an idea on how efficiently your donation is transformed into privacy enhancing services like Tor bandwidth and since our monthly throughput is still growing our cost efficiency is also expected to get even better next year.
Until the end of next year we are aiming to collect a total of 3000 Euros via donations and membership fees to help cover some of our costs.
Thanks for supporting the operation of privacy enhancing technology services!
The Foundation for Applied Privacy says: Hello World!
Foundation for Applied Privacy
After preparing this day behind the curtains during the past few months, we are glad to officially launch the Foundation for Applied Privacy today! We are a non-profit privacy infrastructure provider based in Vienna, Austria and we are passionate about privacy-enhancing technologies.
Our goals are to:
- help protect privacy, freedom of expression and digital rights
- thwart commercial tracking
- thwart mass surveilance
- help circumvent censorship
- promote secure communication
- further and promote free software that helps with achieving above goals
- further, promote and research IT security of said free software
- increase the dissemination and availability of privacy-enhancing tools
To achieve these goals we
- operate privacy-enhancing services for the general public free of charge
- share our operational experience as privacy infrastructure provider
- encourage and help others to also operate privacy-enhancing services
With the launch of our organization we are also launching our first Tor Exit relay today. In the coming weeks and months we will scale up our capacity and look into additional privacy-enhancing services.
We will also be present at the PrivacyWeek, taking place in Vienna at the end of October 2018.
Stay tuned for additional exciting news that we will announce soon on this blog and via our Twitter and Mastodon channels.
Foundation for applied privacy что это
Информация о ISP (провайдере) - Foundation for Applied Privacy
К сожалению, в данный момент, отсутствует информация о ISP (провайдере) - Foundation for Applied Privacy, или объем собранной нами информации недостаточен для корректного отображения необходимых данных.
При желании, Вы можете принять участие в наполнении базы данных ISP UANIC DB, предоставив нам информацию (сведения) о ISP (провайдере) Foundation for Applied Privacy путем заполнения формы .
AS208323
Autonomous System Numbers (ASNs) are assigned to entities such as Internet Service Providers and other large organizations that control blocks of IP addresses. This network page, and the organization field that's shown on the main IP address information page and also returned in the geolocation API are based on the ASN.
The ASN details will often correspond to the IP address owner, but for smaller organizations it may be that organization's parent, or their ISP.
Читайте также: