background preloader

TAILS & TOR

Facebook Twitter

Tails: the operating system that blew open the NSA. When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications.

Tails: the operating system that blew open the NSA

But this month, we learned that Snowden used another technology to keep his communications out of the NSA's prying eyes. It's called Tails. And naturally, nobody knows exactly who created it. Tails is a kind of computer-in-a-box. You install it on a DVD or USB drive, boot up the computer from the drive and, voila, you're pretty close to anonymous on the internet. Yes, Federal Agents Can Identify Anonymous Tor Users, Because Most People Don't Know How To Be Anonymous. For many, many years now, we keep hearing law enforcement whine about the "threats" of anonymity and how people would be able to get away with all sorts of criminal activity if they weren't given the ability to track, monitor and tap pretty much every communications technology that has come along.

Yes, Federal Agents Can Identify Anonymous Tor Users, Because Most People Don't Know How To Be Anonymous

A decade ago the fear was that free and open WiFi was going to be a major boon to criminals who could use it "with no trace. " As we pointed out, however, nothing about using an anonymous connection like that means you won't get caught, because criminals have to do a lot of things, many of which will expose them in other ways, without having to tap and track every technological interaction. Attackers wield Firefox exploit to uncloak anonymous Tor users. Attackers exploited a recently patched vulnerability in the Firefox browser to uncloak users of the Tor anonymity service, and the attack code is now publicly circulating online.

Attackers wield Firefox exploit to uncloak anonymous Tor users

Why we need Tor now more than ever. By Jillian C.

Why we need Tor now more than ever

York on September 28th, 2014 Since Edward Snowden leaked documents demonstrating the breadth of the National Security Agency’s digital surveillance last year, the global conversation around Internet freedom has shifted from censorship to surveillance. Where once the focus was on China’s Great Firewall or Iran’s vision of a “halal Internet,” now eyes are trained on the use of FinFisher for targeted surveillance or the NSA’s global dragnet. But censorship and surveillance go hand in hand. Snowden-approved: The ‘Citizenfour’ hacker’s toolkit. One of the interesting reveals at the end of Citizenfour, the recent Academy Award-winning documentary about Edward Snowden, was the thanks it gives to various security software programs.

Snowden-approved: The ‘Citizenfour’ hacker’s toolkit

The information that Snowden leaked two years ago continues to reverberate today, and it kicked off renewed interest in data security, privacy, and anonymity. Based on the closing credits in the movie, we’ve put together a guide to some of the major security software programs and operating systems available. If you’ve wanted to take steps to secure your own information, but were uncertain where to start, this article should get you headed in the right direction. Browser Security: Tor The Tor Security Bundle is probably the best-known of the software products we’ll discuss today. Tor’s Skyrocketing Popularity in Russia. Has Vladimir Putin's Internet crackdown spurred the explosion in Tor use in Russia?

Tor’s Skyrocketing Popularity in Russia

Images mixed by author. The Anonymous Tor Network Now Comes in a Box. Photo via Flickr I have the Tor browser running on my computer, and it took me about two minutes to download.

The Anonymous Tor Network Now Comes in a Box

Once you're surfing through the network there are plenty of daunting technical options to dig into, but accessing the onion network for basic, everyday web use was as easy as clicking download, opening the program, and then struggling to remember all my no-longer-stored passwords. Still, Tor is best known as a niche tool for hackers, whistleblowers, criminals, activists, or folks with otherwise something to hide. To your average internet user, the covert network of relays and whatchamacallits can come off as too complex and intimidating to bother with—even as people are increasingly concerned with their online privacy in light of the NSA scandal. Tor Project: Anonymity Online.

Tor Challenge. So you thought Tor was bad enough. Check out Tor’s Hidden Web Services. « WebCase WebLog. Recently and article appeared at NPR titled “Senators Target Internet Narcotics Trafficking Website Silk Road”.

So you thought Tor was bad enough. Check out Tor’s Hidden Web Services. « WebCase WebLog

I only bothered to hit the link because I saw it mentioned on the website Anit-forensics.com. The short article complained of drugs blatantly sold on the Internet and something needed to be done about it and Congress is going to solve that one for us. Although selling drugs on the Internet is nothing new, the place on the Internet “openly” selling drugs was on the Tor network through the use of Tor’s “Hidden Services” function. The “Silk Road” is an online market open for the sale of goods and named after the ancient road used to bring goods from the orient to the west. For the power user of the Tor network Hidden Services is probably nothing new. L'anonymat sur Internet grâce à la technique du routage en oignon. Confidentialité et anonymat, pour tous et partout. Tails est un système d'exploitation live, que vous pouvez démarrer, sur quasiment n'importe quel ordinateur, depuis un DVD, une clé USB, ou une carte SD.

Confidentialité et anonymat, pour tous et partout

Son but est de préserver votre vie privée et votre anonymat, et de vous aider à : utiliser Internet de manière anonyme et contourner la censure ; toutes les connexions sortantes vers Internet sont obligées de passer par le réseau Tor ; ne pas laisser de traces sur l'ordinateur que vous utilisez sauf si vous le demandez explicitement ; utiliser des outils de cryptographie reconnus pour chiffrer vos fichiers, emails et messagerie instantanée. En savoir plus sur Tails. Tails fait passer son trafic par le réseau Tor. Tor. Download Tor. Want Tor to really work?

Download Tor

You need to change some of your habits, as some things won't work exactly as you are used to. Please read the full list of warnings for details. Tor Browser for Windows Version 6.0.5 - Windows 10, 8, 7, Vista, and XP Everything you need to safely browse the Internet. Not Using Windows? Tor Browser for Linux (64-Bit) Version 6.0.5 - Linux (64-Bit)Read the release announcements! List of Tor hidden services. From Wikipedia, the free encyclopedia Hidden services directories, portals, and information[edit] The Hidden Wiki Search engines[edit] File storage[edit] Tor Browser Bundle. Download the file above, and save it somewhere, then double click on it. (1) Click "Run" then choose the installer's language and click OK (2). Make sure you have at least 80MB of free disk space in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice.

Installation sur une clé USB ou une carte SD. Tails comprend l'Installeur de Tails un installeur personnalisé pour clés USB et cartes SD. Installeur de Tails peut uniquement installer Tails sur une clé USB ou une carte SD d'au moins 4 Go. Tails 1.0 - La distrib sécurisée sort enfin en version stable. Il y a 2 ans, je vous présentais pour la première fois la distrib Tails qui permet de protéger son anonymat et sa vie privée sur le net. Tails – La distribution Linux qui protège votre anonymat et votre vie privée. Tails – La distribution Linux qui protège votre anonymat et votre vie privée Si vous cherchez une petite distrib linux sympathique bootable sur un CD/DVD ou une clé USB et qui permet de protéger votre anonymat et votre vie privée, je vous recommande de tester Tails (basée sur une Debian).

Tails vient de sortir en version 0.10 et permet, je cite, de : Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA. Photo: Josh Valcarcel/WIRED When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes. It’s called Tails. And naturally, nobody knows exactly who created it. Tails - Confidentialité et anonymat, pour tous et partout.

The Amnesic Incognito Live System. GNOME desktop Stream isolation.