background preloader

JonDonym - the anonymisation service

JonDonym - the anonymisation service

Cosmos (C# Open Source Managed Operating System) Buy VPN accounts at ibVPN. VPN service mainly in US, Canada & UK waste :: home Glasnost: Test if your ISP is shaping your traffic The goal of the Glasnost project is to make ISPs' traffic shaping policies transparent to their customers. To this end, we designed Glasnost tests that enable you to check whether traffic from your applications is being rate-limited (i.e., throttled) or blocked. Glasnost tests work by measuring and comparing the performance of different application flows between your host and our measurement servers. The tests can detect traffic shaping in both upstream and downstream directions separately. The tests can also detect whether application flows are shaped based on their port numbers or their packets' payload. As of Feburary 2017 Glasnost is no longer available. Who are we? We are researchers at the Max Planck Institute for Software Systems.

Fabfi - FabLab Global Telecomix Crypto Munitions Bureau Le blog de la sécurité de l'information HowToMake - fabfi - Top level How-To page - An open-source, city-scale wireless mesh networking system with access control and monitoring This page is a table of contents for all of the HowTo documentation on this site. Follow the links below for what you want to build. Note: We STRONGLY recommend using linux for working with fabfi. If you don't want to change your OS, run Ubuntu from a LiveCD. The most common use of a FabFi system is to extend or expand a high speed internet connection and charge users so as to recover cost of the leased bandwidth. The fabfi wireless system consists of three major components which are all open source: FabFolk's FabFi Cloud Services (or make your own Fabfi Server). Administrators configure Users and Groups to control access to the network. In addition to the basic configuration instructions, we also have a section on Advanced Development that explains how to build images from scratch and perform other custom tasks: Build your own FabFi Image

PROTECT IP Act Breaks the Internet I am writing to you as a voter in your district. I urge you to vote "no" on cloture for S. 968, the PROTECT IP Act, on Jan. 24th. The PROTECT IP Act is dangerous, ineffective, and short-sighted. It does not deserve floor consideration. The video above discusses the Senate version of the House's Stop Online Piracy Act (SOPA). PIPA would give the government new powers to block Americans' access websites that corporations don't like. 99 Resources to Research & Mine the Invisible Web College researchers often need more than Google and Wikipedia to get the job done. To find what you're looking for, it may be necessary to tap into the invisible web, the sites that don't get indexed by broad search engines. The following resources were designed to help you do just that, offering specialized search engines, directories, and more places to find the complex and obscure. Search Engines Whether you're looking for specific science research or business data, these search engines will point you in the right direction. Turbo10: On Turbo10, you'll be able to search more than 800 deep web search engines at a time. Databases Tap into these databases to access government information, business data, demographics, and beyond. GPOAccess: If you're looking for US government information, tap into this tool that searches multiple databases at a time. Catalogs If you're looking for something specific, but just don't know where to find it, these catalogs will offer some assistance. Directories

Les armes scalaires - Le secret de l'antigravité Chiffrement et Stéganographie Le chiffrement consiste à protéger par cryptographie ses fichiers ou une partition de son disque dur, ou sa communication numérique (courriel, messagerie instantanée, téléphonie). Citation de Philip Zimmermann, l'inventeur de PGP : "If privacy is outlawed, only outlaws will have privacy". En français: "Si l'intimité est déclarée hors-la-loi, seuls les hors-la-loi auront une intimité". Dans un environnement post-orwellien où de nombreux États jusqu'ici qualifiés de démocratiques cèdent à la tentation d'une surveillance des échanges privés, la cryptographie est appelée à prendre une importance croissante. Un exemple en Belgique : Vos emails conservés deux ans (pour la justice et la police). Voyez aussi l'article Mots de passe statiques. Il est important d'avoir des notions en cryptographie quantique. La plupart des proxies anonymes brouillent les URL avant de les transmettre, les soustrayant ainsi à un filtrage simple. Outils Chiffrer vos URL GPG (GnuPG) permet de chiffrer des fichiers. Source.