Net Privacy and Anonymity
psiphon.ca · delivering the net Psiphon is a circumvention tool from Psiphon Inc. that utilizes VPN, SSH and HTTP Proxy technology to provide you with uncensored access to Internet content. Your Psiphon client will automatically learn about new access points to maximize your chances of bypassing censorship. Psiphon is designed to provide you with open access to online content. Psiphon does not increase your online privacy, and should not be considered or used as an online security tool.
EXCLUSIVE: Owner of Snowden’s Email Service on Why He Closed Lavabit Rather Than Comply With Gov’t This is a rush transcript. Copy may not be in its final form. AARON MATÉ: We turn now to the news an encrypted email service believed to have been used by National Security Agency leaker Edward Snowden has abruptly shut down. The move came amidst a legal fight that appeared to involve U.S. government attempts to win access to customer information. The owner of Lavabit, Ladar Levison, wrote a message online saying, quote, "I have been forced to make a difficult decision: to become complicit in crimes against the American people, or walk away from nearly 10 years of hard work by shutting down Lavabit."
An image of Silent Circle’s Web page, ending its e-mail. A spokesman said the company’s customers included heads of state, members of royalty and government agencies. The company will continue its encrypted phone and text messaging service. The shutdown of two small e-mail providers on Thursday illustrates why it is so hard for Internet companies to challenge secret government surveillance: to protect their customers’ data from federal authorities, the two companies essentially committed suicide. 2 E-Mail Services Close and Destroy Data Rather Than Reveal Files
Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves. For the past two weeks, I have been working with the Guardian on NSA stories, and have read hundreds of top-secret NSA documents provided by whistleblower Edward Snowden. I wasn't part of today's story – it was in process well before I showed up – but everything I read confirms what the Guardian is reporting. At this point, I feel I can provide some advice for keeping secure against such an adversary. The primary way the NSA eavesdrops on internet communications is in the network. That's where their capabilities best scale.
I use AB+ and DNTMe—one to prevent unnecessary stuff coming in, the other to prevent my stuff from going out. Both are active in incognito mode as well. Also, I have blocked platform apps on FB, and only log in to web-based accounts when I need to use them.
Abine is a Boston-based privacy company. Led by consumer protection, privacy, and identity theft experts, we are passionate about making easy-to-use privacy solutions for everyday people. We strongly believe that these solutions must improve as online privacy becomes more difficult to get, and we work hard to stay ahead of the curve. We look forward to helping you navigate the complicated the world of online privacy. Do Not Track Plus
Do-Not-Track Movement Is Drawing Advertisers’ Fire Do Not Track mechanisms are features on browsers — like Mozilla’s Firefox — that give consumers the option of sending out digital signals asking companies to stop collecting information about their online activities for purposes of targeted advertising. First came a stern letter from nine members of the House of Representatives to the Federal Trade Commission, questioning its involvement with an international group called the World Wide Web Consortium, or W3C, which is trying to work out global standards for the don’t-track-me features. The legislators said they were concerned that these options for consumers might restrict “the flow of data at the heart of the Internet’s success.” Next came an incensed open letter from the board of the Association of National Advertisers to Steve Ballmer, the C.E.O. of , and two other company officials.
A Browser To Keep The NSA From Snooping On You | Co.Exist | ideas + impact Concern over personal privacy in the era of NSA spying revelations has reached something of a Code Orange. Earlier this summer, the Pew Research Center reported that for the first time since the 9/11 attacks on the World Trade Center, more Americans fear an assault on their civil liberties than terrorism. But where we might have been stocking up on duct tape and canned soup a decade ago, today we’re changing our online habits: The percentage of Americans who are disabling cookies and adjusting browser privacy settings jumped 12% and 7% in the wake of the Edward Snowden leaks. It’s in this climate of guardedness that a group of India-based developers has designed a new kind of browser for the privacy-conscious. Using Chromium, an open source browser project that provides the underpinnings for Google’s Chrome, the Epic browser features protections meant to keep out snooping governments, as well as private companies looking to make a buck off your data.
Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA | Enterprise | WIRED Photo: Josh Valcarcel/WIRED When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes.
Family & Friends People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet. Businesses Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability. Activists
Tor traffic disguised as Skype video calls to fool repressive governments Computer scientists have released a tool that disguises communications sent through the Tor anonymity service as Skype video calls, a cloak that's intended to prevent repressive governments from blocking the anonymous traffic. SkypeMorph, as the application is called, is designed to remedy a fundamental limitation of Tor: While the communications are cryptographically secured, unique characteristics of their individual data packets make them easy to identify as they travel over the networks. In the past, for example, the cryptographic key exchange was different in Tor transactions and the certificates used were typically valid for only a matter of hours, compared with as long as a year or two for certificates used by most Web servers. These fingerprints made it possible for government censors in Iran, China, and elsewhere to block data traveling over Tor while leaving the rest of the country's communications intact.
I am pleased to announce our first FreedomBox software release. The FreedomBox 0.1 image is available here (.torrent) (sha512sum: 867f5bf462102daef82a34165017b9e67ed8e09116fe46edd67730541bbfb731083850ab5e28ee40bdbc5054cb64e4d0e46a201797f27e0b8f0d2881ef083b40). This 0.1 version is primarily a developer release, which means that it focuses on architecture and infrastructure rather than finish work.
Presentation of the FreedomBox from James Vasile
PirateBox Takes File-Sharing Off The Radar and Offline, For Next To Nothing When confronted with a doomsday scenario where mainstream online file-sharing becomes a thing of the past, it's not uncommon for people to refer to days gone by, when files were swapped freely offline using discs and other mediums. Now, an interesting and compact system can deliver the [g]olden days of data swapping with a modern twist, by turning any open space into a wireless and anonymous file-sharing system at a rock-bottom price. With the advent of the personal computer and with it the ability to endlessly copy data, the human desire to share has skyrocketed.
‘Tribler’ software makes Internet piracy impossible to stop By Stephen C. WebsterWednesday, February 8, 2012 11:38 EDT Internet piracy has been a hot topic in recent weeks, but it’s about to heat up even more. With lawmakers all over the world struggling to agree upon copyright regimes that would disconnect people from the Internet, shut down websites simply for linking to infringing content and cut off whole advertising networks that support pirate domains, one might think the world was on the verge of plugging up the copied media loophole for good. But then, one would be wrong.
Protects Your Privacy! The only search engine that does not record your IP address. Every time you use a regular search engine, your search data is recorded. Major search engines capture your IP address and use tracking cookies to make a record of your search terms, the time of your visit, and the links you choose - then they store that information in a giant database.
home - help.riseup.net
occupy.here | distributed wifi occupation
This Cute Chat Site Could Save Your Life and Help Overthrow Your Government | Threat Level
Hide Secret Messages in Facebook Photos With This Chrome Extension
In Antipiracy Debate, Media Worlds (and Generations) Clash
Internet Pirates Will Always Win
SOPA Boycotts and the False Ideals of the Web
Google’s Spymasters Are Now Worried About Your Secrets