background preloader

Privacy: Tools

Facebook Twitter

Digital Identity, Privacy, and the Internet's Missing Identity Layer. The third party commissioned by Google to review the software used in its Street View WiFi cars has completed its report, called Source Code Analysis of ‘Gstumbler’. I will resist commenting on the name, since Google did the right thing in publishing the report: there will no longer be any ambiguity about what was being collected. As we have discussed over the last week, two issues are of importance – collection of device identity data, and collection of payload data.

One thing I like about te report is that it has a begins with a a number of technical “descriptions and definitions”. For example, in paragraph 7 it explains enveloping: “Each packet is comprised of a packet header which contains network administrative information and the addressing information (or “envelope” information) necessary to transmit the data packet from one device to another along the path to its final destination. In paragraph 19, the report provides an overview of its findings: How to Blog Safely (About Work or Anything Else) Published April 6, 2005 Updated May 31, 2005 Blogs are like personal telephone calls crossed with newspapers. They're the perfect tool for sharing your favorite chocolate mousse recipe with friends--or for upholding the basic tenets of democracy by letting the public know that a corrupt government official has been paying off your boss.

If you blog, there are no guarantees you'll attract a readership of thousands. But at least a few readers will find your blog, and they may be the people you'd least want or expect. The point is that anyone can eventually find your blog if your real identity is tied to it in some way. Here we offer a few simple precautions to help you maintain control of your personal privacy so that you can express yourself without facing unjust retaliation. Blog Anonymously The best way to blog and still preserve some privacy is to do it anonymously. 1. Also, if you are concerned about your colleagues finding out about your blog, do not blog while you are at work. 2. 3. Takedown Hall of Shame. New FOIA Documents Reveal DHS Social Media Monitoring During Obama Inauguration. Free Product Demo, Tools and Sample Databases | IP2Location.com.

CaptivePortalBypassHowto - Personal Telco Project. As described in CaptivePortalInsecurities, you can bypass a captive portal by tunneling IP over UDP/53 which almost always is open. This page will give you step-by-step instructions on how to do this using OpenVPN. First, some assumptions: You want to use 10.11.254.0/24 as your "tunnel network" Your server runs some sort of sane *nix variant and is accessible from the internet and isn't using UDP/53 for something else Your client has the "ip route" command You know how to get openvpn mostly working (I'm not going to walk you through creating certificates, for instance) The captive portal you are bypassing has UDP/53 open (check by doing: $ dig google.com @4.2.2.2) OpenVPN Server You need a *nix box somewhere that is internet accessible and is running OpenVPN.

Create your keys with ids like client100, client101, ..., client199. Then some configuration like the following should work. You'll need to make the tap0 interface. /etc/openvpn/server.conf /etc/openvpn/route.up OpenVPN Client $ ip route. Using SSH Tunnel with PuTTY to browse internet hiding your IP address. Thursday, December 11th, 2008 If you have access to SSH on a remote server (dedicated server, vps or shell account), you can browse the internet over the IP address hiding your original IP address. This can be useful for many scenarios like - IP based authentication over dynamic IP: In many cases for security reasons we use restrict access only to some selected IP addresses. For example, admin area of a blog, forum, billing system or help desk can be protected with IP based authentication. But what if you are on dynamic IP? You can allow your users (or yourself) first to ssh to a server with static ip and then access your restricted web app over the ssh tunnel.

Your restricted web app will get the remote server IP as the user IP. Technical limitations related to shared/dynamic IP: In many places (specially in Bangladesh) ISPs provide the clients only with dynamic or shared IP address. Anyways… enough of possible “usage”. Now to get straight into the tutorial. What you need? Congrats! Done!

Proxy

12 Free Products You Need to Protect Your Privacy. Identity theft has impacted nearly 8.4 million US adults in 2007. It is also estimated that 750,000 laptops were stolen last year alone. Your data can be stolen in a number of ways, from phishing scams, trojan programs, spyware, stolen hardware, to unsecured internet traffic. With these alarming numbers the least you can do is try keeping your computer use safe and private. The resources listed here are some of the best free programs and services available. Bug Me Not Bugmenot.com alleviates the need for pointless registrations to sites that only wish to collect your data.

You can search bugmenot.com for login information on thousands of sites. PeerGuardian 2 PeerGuardian 2 is Phoenix Labs’ premier IP blocker for Windows. McAfee SiteAdvisor McAfee SiteAdvisor warns you before you interact with a dangerous Web site. File Shredder 2 File Shredder deletes the unwanted files on your computer past the point of recovery. ProxyWay anonymous surfing 2.6 TrueCrypt 4.3 SpyBot KeePass Password Safe. 12 Free Products You Need to Protect Your Privacy.