FAQ

What would you like to know?

You'll find some frequently asked questions below, some less frequently asked ones further down and if you still haven't found an answer feel free to get in touch.


Are you providing these services for free?

Yes, whilst we may offer sponsored options (e.g. your donation allows you to specify the name of a Relay or Exit) the Tor network has no concept of 'Pay for Access' and we've no intention of adding one.

What sort of education do you provide?

At the moment we're only providing access or links to existing on-line information about how to use existing software such as GPG, Tor, I2P etc.

We're hoping that by Summer 2016 we'll be at various conferences, hackathons etc showing people how to protect themselves or providing printed materials to hackspaces etc.

Aren't you helping $BogeyMen by providing these services?

The Government has been using the threat of $BogeyMen for too long, more people die from bee stings than $BogeyMen. Granted there are some nasty people in the world who prey on the weak and vulnerable but we could solve that with warrantless house searches, mass arrest and DNA swabbing just as easily as mass surveillance but the Government couldn't get away with that.


Occasionally Asked Questions

Yes, we accept bitcoin donations in the same way we would accept cash.
You can send dontations to 16DryUfwH7gF9cVhLuwjkgrxzrBuit5A4D or contact us via email (preferably GPG encrypted) for a unique one time use address.

Critical infrastructure servers (MTA, Web, Hidden Services, Bitcoind, MUAs, BGPd routers etc) are physical dedicated servers in trusted colocation facilities with encrypted disks and anti-tamper software/hardware. Login is dual factor secured with Yubikeys. Backups are done via GPG encrypted tarballs SCP'd to a hidden service based server outside the country.

Non critical servers such as general purpose middle relays etc can be based on a variety of virtual and physical servers from a variety of providers.

The first thing you can do is contact your MP via WriteToThem.com and protest mass surveillance.

With that done you can run your own Tor relay or bridge by grabbing a cheap VM from lowendbox.com, start using GPG in your day to day email, choose an ISP that doesn't filter or just tell your friends about these things.

Whilst we provide our services for the betterment of everyone there's always a few bad apples that'll misuse anything. Apologies about that.

Welsh legend has it that Britain was plagued by the Coraniaid who could not be injured because their hearing was so sharp that they could hear any sound that the wind carried. It was by using a Brass Horn that Llefelys was able to securely communicate to his brother Lludd how to defeat the Coraniaid.

In the world of today it is the Surveillance State that wishes to hear any sound the wind carries, any message sent over the Internet and any web page viewed.

Brass Horn Communications endevours to provide UK centric Tor Relays, Bridges & Exits as well as education in how to use Tor and other tools to secure your communication.

That's a choice for you to make, popular Linux distributions such as Arch, Fedora, Debian, Mint and Ubuntu are just as good as the popular BSDs such as FreeBSD, OpenBSD and DragonFlyBSD.

They are all free to download, install and use so why not try them all and see which one sticks?

Contact Questions

Yes, for the moment you can use; brasshornzxr2yb6.onion
We are working on generating a more memorable .onion address.

Our official GPG fingerprint is;
ED9E BC7C 3FA7 F9B1 4284 8678 4470 55F3 6F6D 60C1
The public key for this fingerprint can be found here.

You can send email in plain text to hello@brasshorncommunications.uk but we'd prefer you use PGP / GPG to encrypt the contents.

We can be contacted on Twitter at @BrassHornComms. We don't use any other social media providers. See below for details.

Facebook, Google and others have had toxic "real name" policies in place and they perform a lot more tracking / user profiling than Twitter does.

Our email servers are very strict, they enforce lots of the various SMTP/MTA RFCs but also (ironically) break RFC 3207 in so far as it refuses to accept email over a plaintext (non TLS secured) connection. Check you logs for the exact reason.