What is a Tor Relay? We use Tor to access our website and to publish to our blog, which is blocked inside of our country. -- Iranian human rights activist Tor is a service that helps you to protect your anonymity while using the Internet. Tor is comprised of two parts: software you can download that allows you to use the Internet anonymously, and the volunteer network of computers that makes it possible for that software to work. When you use the Tor software, your IP address remains hidden and it appears that your connection is coming from the IP address of a Tor exit relay, which can be anywhere in the world. There are many reasons you might use Tor, including keeping websites from tracking you and your family members, using websites or services which are blocked in your country (for example, getting around the Great Firewall of China), and maintaining anonymity when communicating about socially sensitive information, such as health issues or whistleblowing.
the radical transparency of DAVID BRIN The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? was published in May 1998 by Perseus Press (formerly Addison Wesley). This large nonfiction work concerns threats to privacy and openness in the information age. It won the Obeler Freedom of Speech Award from the American Library Association and was a finalist for the McGannon Public Policy Prize, and is still in print. Our society has one great knack above all others -- one that no other ever managed -- that of holding the mighty accountable. torchat - messenger application on top of the Tor network and it's location hidden services To avoid any potential confusion: This product is produced independently from the Tor® anonymity software, I am not related with or sponsored by torproject.org. TorChat is making use of the Tor® client software and the Windows version comes bundled with original Tor binaries but TorChat itself is a completely separate project developed by different people. TorChat is released as Free Software (GPL). +++ Feb-05, 2012: This project has been moved to github +++
Android Instructions Tor on Android Tor is available for Android by installing our package named Orbot. Orbot is an application that allows mobile phone users to access the web, instant messaging and email without being monitored or blocked by their mobile internet service provider. Orbot brings the features and functionality of Tor to the Android mobile operating system.
DIVINA: Discovering Vulnerabilities of Internet Accounts#2 In 2012, Mat Honan found that his Twitter account had been hacked. When trying to figure out what happened, he found that not just his Twitter account was hacked, but also his Amazon account, his Gmail account, and his Apple account — meaning that all data in these accounts was lost. His iPhone was locked, and his Mac was wiped clean. All data was erased. As it turned out, Hackers were able to access his Amazon account. DNScat DNScat (pronounced "D-N-S cat") is a "swiss-army knife" tool to tunnel traffic through DNS servers. It provides a bi-directional communication through DNS servers, and in conjunction with PPP, can be used to set up a virtual private network (VPN). DNScat, like a swiss army knife can be used for a variety of purposes, including:
How to Become Anonymous on the Internet Using Tor The internet is a scary place, and if you're like me, you don't want anyone tracking you or learning your search habits. It's a blatant invasion of privacy for companies to do this, but at least we have methods of fighting back—one of which is Tor. Tor stands for The Onion Router. It operates by donated bandwidth from its users. How to conduct a security audit of your Google account February 18, 2014, 10:04 AM — Image credit: flickr/s2art The privacy dangers of Google go beyond what Google knows about you -- you may have given dozens of sites access to your Google account information without realizing it. Here's how to conduct a security audit of your Google account, and how to take action to keep it safe.
9 Tips to Stay Safe on Public Wi-Fi Your bank calls you to verify your recent $750 bill at an out-of-state Taco Bell, but you haven’t left town in weeks. You quickly contest the charge and request a new credit card, but when you check your wallet the compromised card is still there. You try to think of shady ATMs or recent cashiers, but nothing comes to mind. Nothing, except the online purchase you made while browsing the Internet at your local coffee shop.
ANONYMITY & PRIVACY [ English | German ] Protection of Privacy on the Internet JAP (called JonDo in the scope of the commercial JonDonym anonymous proxy servers - AN.ON remains free of charge) makes it possible to surf the internet anonymously and unobservably. Doxxing defense: Remove your personal info from data brokers Many women gamers and developers, as well as those who support them, have lately come under attack from online trolls. A common intimidation tactic that trolls use is "doxxing," or publicly exposing their targets' personal details, including home address, phone number and even financial records. Doxxing is often accompanied by threats of violence, sexual assault or murder. The message is clear: We're out to get you, and we know where you live. Some women in tech have left their chosen profession rather than deal with continued threats. But anyone is susceptible to doxxing, as game developer Phil Fish discovered this summer after speaking up in defense of a female developer.