XB Browser

Last updated

xB Browser
Developer(s) Xero Networks AG [1] & Steve Topletz [2]
Initial releasev.1.5.0.7, 19 September 2006 (2006-09-19)
Final release
v3.9.10.24 [3] / 24 October 2009;14 years ago (2009-10-24)
Engine Gecko
Operating system Windows [3]
Available in30 [4]
Type Web browser
License GPLv3 [2]
Website xerobank.com

xB Browser (formerly known as TorPark and Xerobank browser [5] ) was a web browser designed to run on both the Tor and XeroBank anonymity networks, and is available as component of the xB Machine and the xB Installer.

Contents

It is designed for use on portable media such as a USB flash drive, [6] but it can also be used on any hard disk drive. [7] As such, a secure and encrypted connection to any of the Tor or XeroBank routers can be created from any computer with a suitable Internet connection, [7] and the browser clears all data that was created on the portable drive upon exit or on demand. [6]

In March 2007 it was reported that the xB Browser was downloaded 4 million times [6] and in February 2008 over 6.5 million downloads making xB Browser the most popular anonymous browser on the Internet. [8]

History

Steve Topletz co-released Torpark v.1.5.0.7 with CULT OF THE DEAD COW/Hacktivismo on 19 September 2006 [9] [10] after more than one year of development based on Portable Firefox web browser with built in support for Tor [1] [4] and using the Nullsoft Scriptable Install System.[ citation needed ] In 2007 it was redesigned from scratch.[ citation needed ]

A cross-compatible version for Mac OS X and Linux was being developed based on xB Machine, due to be available in August 2008, [11] but the development seems now abandoned.

So far in 2024 it seems that the service is still active on some app sites available to be installed for anonymous web browsing [12]

Network usage

Tor network

xB Browser routes Internet traffic through several onion servers, obscuring the originating IP address and encrypting the data. [6] Other applications such as Pidgin can be routed through the Tor network via xB Browser by directing the applications' traffic to a SOCKS proxy at localhost, port 9050. This port can be changed via xB Config, an INI generator for xB Browser.

XeroBank network

xB Browser is optimized for use on the XeroBank anonymity network, which is a private and commercial broadband network operated by Xero Networks AG. [11] The XeroBank network routes traffic through at least two multi-jurisdictional hops.In contrast to Tor, the XeroBank network supports both TCP and UDP protocols, performs channel multiplexing for low observability, is run by a single entity and costs money to use. The XeroBank network is accessible via SSH and OpenVPN protocols. xB Browser internally manages a SSH connection to XeroBank, but will recognize and submit to OpenVPN connections.

Features

Besides the anonymous networks, xB Browser uses following add-ons:

Related Research Articles

The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a plain-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).

<span class="mw-page-title-main">Proxy server</span> Computer server that makes and receives requests on behalf of a user

In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. It improves privacy, security, and possibly performance in the process.

OpenVPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It implements both client and server applications.

A darknet or dark net is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social networks, and anonymity proxy networks such as Tor via an anonymized series of connections.

Hacktivismo is an offshoot of Cult of the Dead Cow (cDc), whose beliefs include access to information as a basic human right. It was founded in 1999.

<span class="mw-page-title-main">Cult of the Dead Cow</span> Hacker organization

Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 in Lubbock, Texas. The group maintains a weblog on its site, also titled "[Cult of the Dead Cow]". New media are released first through the blog, which also features thoughts and opinions of the group's members.

<span class="mw-page-title-main">Tribler</span> Peer-to-peer filesharing software and protocol

Tribler is an open source decentralized BitTorrent client which allows anonymous peer-to-peer by default. Tribler is based on the BitTorrent protocol and uses an overlay network for content searching. Due to this overlay network, Tribler does not require an external website or indexing service to discover content. The user interface of Tribler is very basic and focused on ease of use instead of diversity of features. Tribler is available for Linux, Windows, and OS X.

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's identifying information such as IP addresses. Anonymous proxy is the opposite of transparent proxy, which sends user information in the connection request header. Commercial anonymous proxies are usually sold as VPN services.

xB Machine is a discontinued virtual operating system that is small enough to fit on a USB drive. The last version seems to have been 0.9.1.5 in mid-2008. It brought a secure computing environment that anonymized all internet activity, and had portable encrypted file storage. It had been developed and offered by XeroBank and based on a modified Gentoo Linux distribution. It could be executed as a virtual machine through a QEMU hypervisor, VMWare, VirtualBox, and any other major virtualization system. It could also be booted from on USB or burned to CD for booting. Virtualization, along with the native implementation of a Tor onion routing for internet connectivity and other encryption and privacy tools, had been utilized to increase the security and anonymity of the user. The developers claimed that it is the most secure operating system in the world and that the technology involved is highly resistant to hacking and spying, even in the most hostile environments. The details and transactions inside each xB Machine account were protected with 256-bit AES encryption. The software also had a self-destruct sequence for eliminating any traces that a user may have left behind on the drivespace after using xB Machine. Meanwhile, Xerobank offers a modular package with xB Browser, xB Mail, and xB VPN, parts of it running only for customers of the bank.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.

<span class="mw-page-title-main">Digital privacy</span>

Digital privacy is often used in contexts that promote advocacy on behalf of individual and consumer privacy rights in e-services and is typically used in opposition to the business practices of many e-marketers, businesses, and companies to collect and use such information and data. Digital privacy, a crucial aspect of modern online interactions and services, can be defined under three sub-related categories: information privacy, communication privacy, and individual privacy.

Internet censorship circumvention, also referred to as going over the wall or scientific browsing in China, is the use of various methods and tools to bypass internet censorship.

<span class="mw-page-title-main">Orbot</span> Free software project to provide anonymity on the Internet from an Android smartphone

Orbot is a free proxy app that provides anonymity on the Internet for users of the Android and iOS operating systems. It allows traffic from apps such as web browsers, email clients, map programs, and others to be routed via the Tor network.

Hotspot Shield is a public VPN service operated by AnchorFree, Inc. Hotspot Shield was used to bypass government censorship during the Arab Spring protests in Egypt, Tunisia, and Libya.

<span class="mw-page-title-main">The Tor Project</span> Free and open-source software project for enabling anonymous communication

The Tor Project, Inc. is a 501(c)(3) research-education nonprofit organization based in Winchester, Massachusetts. It is founded by computer scientists Roger Dingledine, Nick Mathewson, and five others. The Tor Project is primarily responsible for maintaining software for the Tor anonymity network.

A wireless onion router is a router that uses Tor to connect securely to a network. The onion router allows the user to connect to the internet anonymously creating an anonymous connection. Tor works using an overlaid network which is free throughout the world, this overlay network is created by using numerous relay points created using volunteer which helps the user hide personal information behind layers of encrypted data like layers of an onion. Routers are being created using Raspberry Pi adding a wireless module or using its own inbuilt wireless module in the later versions.

Outline VPN is a free and open-source tool that deploys Shadowsocks servers on multiple cloud service providers. The software suite also includes client software for multiple platforms. Outline was developed by Jigsaw, a technology incubator created by Google.[3]

A virtual private network (VPN) service provides a proxy server to help users bypass Internet censorship such as geo-blocking and users who want to protect their communications against data profiling or MitM attacks on hostile networks.

<span class="mw-page-title-main">Snowflake (software)</span> Anti-censorship software

Snowflake is a software package for assisting others in circumventing internet censorship by relaying data requests. Snowflake relay nodes are meant to be created by people in countries where Tor and Snowflake are not blocked. People under censorship then use a Snowflake client, packaged with the Tor Browser or Onion Browser, to access the Tor network, using Snowflake relays as proxy servers. Access to the Tor network can in turn give access to other blocked services. A Snowflake node can be created by either installing a browser extension, installing a stand-alone program, or browsing a webpage with an embedded Snowflake relay. The node runs whenever the browser or program is connected to the internet.

References

  1. 1 2 Pluta, Werner (28 June 2010). "Reporter ohne Grenzen eröffnet Schutzraum gegen Zensur" (in German). golem.de. Retrieved 16 April 2012.
  2. 1 2 Jardin, Xeni (19 September 2006). "Torpark is out, offering "anonymous, portable web browsing"". Boing Boing . Retrieved 17 April 2012.
  3. 1 2 "XeroBank Installer". Xerobank. Retrieved 16 April 2012.
  4. 1 2 Broersma, Matthew (22 September 2006). "Activists unveil stealth browser". CNET . Retrieved 17 April 2012.
  5. "Download xB Browser". softpedia. 12 April 2010. Retrieved 19 June 2024.
  6. 1 2 3 4 5 6 Zoica, Remus (3 August 2007). "Rebranding of the Updated Anonymous Web Browser, xB Browser, Formerly Known as Torpark to Eliminate Visitor Confusion". Security Software Zone. Archived from the original on 2 February 2009. Retrieved 17 April 2012.
  7. 1 2 Brinkmann, Martin (17 September 2007). "XeroBank Browser". Ghacks . Retrieved 16 April 2012.
  8. 1 2 Herpel, Mark (22 February 2008). "XeroBank Interview With Steve Topletz". American Chronicle . Ultio, LLC. Archived from the original on 18 April 2012. Retrieved 17 April 2012.
  9. "Free anonymising browser debuts". BBC News. 20 September 2006. Retrieved 18 April 2007.
  10. Broersma, Mathew (22 September 2006). "Activists unveil stealth browser". ZDNet. Archived from the original on 12 March 2007. Retrieved 18 April 2007.
  11. 1 2 Pash, Adam (16 June 2008). "XB Browser Provides Anonymous Web Browsing". Lifehacker . Retrieved 16 April 2012.
  12. "xB Browser Free Download". apponic. Retrieved 19 June 2024.
  13. Trapani, Gina (25 September 2006). "Download of the Day: TorPark 1.5 (Windows)". Lifehacker. Retrieved 17 April 2012.