background preloader

GNU's Framework for Secure Peer-to-Peer Networking

GNU's Framework for Secure Peer-to-Peer Networking
Related:  DeepWeb

phantom - System for generic, decentralized, unstoppable internet anonymity The Phantom protocol is a system for decentralized anonymization of generic network traffic. It has been designed with the following main goals in mind: 1. - No critical or weak points to attack or put (il)legal pressure on. 2. - Direct technical destructive attacks will practically be the only possible way to even attempt to stop it. 3. - Probabilistic methods (contrary to deterministic methods) must be used in a completely decentralized design like this, where no other peer can be trusted, so focus is put on optimizing these methods. 4. - This is simple in itself, but still important in the context of anonymization. 5. - No one should have to worry about crimes being perpetrated from their own IP address. 6. - You never know what the next draconian law might be. 7. - Most existing anonymization solutions are practically unusable for (or even prohibit) larger data volumes. 8. The latest version of the source release package can always be downloaded here. DEFCON presentation (audio only):

The Freenet Project - /index News is bad for you – and giving up reading it will make you happier In the past few decades, the fortunate among us have recognised the hazards of living with an overabundance of food (obesity, diabetes) and have started to change our diets. But most of us do not yet understand that news is to the mind what sugar is to the body. News is easy to digest. The media feeds us small bites of trivial matter, tidbits that don't really concern our lives and don't require thinking. That's why we experience almost no saturation. News misleads. We are not rational enough to be exposed to the press. News is irrelevant. News has no explanatory power. News is toxic to your body. News increases cognitive errors. News inhibits thinking. News works like a drug. News wastes time. News makes us passive. News kills creativity. Society needs journalism – but in a different way. I have now gone without news for four years, so I can see, feel and report the effects of this freedom first-hand: less disruption, less anxiety, deeper thinking, more time, more insights.

How to become anonymous online Online life is quickly eroding our usual feelings of personal anonymity. Services like Facebook mean that people are able to delve into our lives like never before. Stalking, whistle blowing, even watching TV programmes broadcast in other countries; these and other online activities all rely on some form of online anonymity – or lack of it. We humans don't generally like strangers knowing all about us, but we may be unwittingly providing people with details of our lives we'd rather were kept out of the public gaze. Keeping anonymous online is also a concern for a growing number of people in countries where speaking out has real consequences. Luckily, there are several steps you can take to stay incognito online, and even some that can reduce the amount of spam email messages you receive. Keep your email secret Your email address is a big part of your online identity. When an online business folds, the owner might also decide the list of registered users is an asset worth selling.

I2P rețea anonima Business-Class FREE web hosting at .Biz.nf - PHP, MySQL, No Ads How to be anonymous online with Incognito At first glance Incognito may seem suited only for the extremely paranoid, because of the totality of tools it offers to hide your online presence. But those tools, each designed to mask a certain aspect of your online activity, have been around for quite a while. This 430MB-ish live CD has many faithful users, but I can't quote any on its usefulness since their identities couldn't be confirmed. Yes, Incognito is that good. If you're looking for the ultimate way to encrypt absolutely all your internet communications and be untraceable on the internet, you're looking for Incognito. Whether you're an anarchist, a covert operative or just someone who wants to exercise their digital rights and hide your online activity, with Incognito you can encrypt your IM conversations and emails, browse securely without the fear of cookies and the browser history revealing your secrets, and best of all, the traffic doesn't reflect in your router logs. An aside: who wants to be anonymous? Buck the trend.

The Emulator Zone - Your Source for Emulation! Keimelion - revisão de textos: dicas muito úteis Autores e orientadores constroem e reconstroem sentidos a partir de diferentes exercícios de escrita que se realizam em gêneros específicos do domínio discursivo compreendido por monografias, dissertações, teses, artigos, resenhas, resumos. A cada fase da evolução do texto da dissertação o autor o submete ao orientador, a algum colega ou leitor crítico, ou o próprio autor relê sua produção e se estabelecem os objetivos, critérios e restrições para a tarefa de reescrita; o autor passa à avaliação de seu texto-rascunho. Revisão é procedimento posterior e envolve outro interventor no processo de produção do texto. O subprocesso de avaliação da produção é o momento da reescrita em que o autor ou seu orientador lê seu texto com três objetivos: compreender, avaliar e definir problemas. A leitura avaliativa é enfatizada, pois permite ao autor, na reescrita, de acordo com o problema representado no rascunho, determinar o procedimento na tarefa de reescrever. A estratégia de ignorar

Related: