<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Tor on Jesse's Blog</title><link>https://chillbruh.rocks/tags/tor/</link><description>Recent content in Tor on Jesse's Blog</description><generator>Hugo</generator><language>en</language><managingEditor>jesse@chillbruh.rocks (chillbruh)</managingEditor><webMaster>jesse@chillbruh.rocks (chillbruh)</webMaster><copyright>&lt;a href="https://creativecommons.org/licenses/by-nc/4.0/" target="_blank" rel="noopener">CC BY-NC 4.0&lt;/a></copyright><lastBuildDate>Wed, 22 Apr 2026 19:52:46 -0400</lastBuildDate><atom:link href="https://chillbruh.rocks/tags/tor/index.xml" rel="self" type="application/rss+xml"/><item><title>Private Communication System Developer Writeup — JCTF VI</title><link>https://chillbruh.rocks/posts/private-communication-system-jctf-vi/</link><pubDate>Wed, 22 Apr 2026 19:52:46 -0400</pubDate><author>jesse@chillbruh.rocks (chillbruh)</author><guid>https://chillbruh.rocks/posts/private-communication-system-jctf-vi/</guid><description>&lt;ul>
&lt;li>&lt;strong>Challenge Category:&lt;/strong> Miscellaneous&lt;/li>
&lt;li>&lt;strong>Difficulty:&lt;/strong> Hard&lt;/li>
&lt;li>&lt;strong>Developer:&lt;/strong> Me (chillbruh)&lt;/li>
&lt;/ul>
&lt;h1 id="tldr">TL;DR&lt;/h1>
&lt;p>I created a miscellaneous challenge composed of three mini-challenges involving steganography, cryptography, and open-source intelligence. The site was hosted as a hidden service on &lt;a href="https://www.torproject.org/">Tor&lt;/a>. On the front page, you had to identify zero-width characters hidden at the end of the subtitle and convert their pattern from zero-width characters to binary, then to ASCII. This revealed the location of our target&amp;rsquo;s Russian-language personal blog. In one post, the next URL appeared encrypted with the VIC cipher. The information needed to decrypt it was available in the same post and in a public PGP key in another post. Decryption revealed the final URL: an archived chatroom. Our target communicates with an older family member who instructs him to contact a server using a token found in his Telegram bio.&lt;/p></description></item></channel></rss>