background preloader

Anonymity Online

Anonymity Online
Family & Friends People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet. Businesses Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability. Activists Activists use Tor to anonymously report abuses from danger zones. Media Journalists and the media use Tor to protect their research and sources online. Military & Law Enforcement Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.

https://www.torproject.org/index.html.en

Related:  Anonymous Surfing / Proxyslinux / libre / open source / hackingPrivacy

Silk Road (anonymous marketplace) For the historical trade routes, see Silk Road. In 2013, the Federal Bureau of Investigation (FBI) shut down the website[12] and arrested Ross William Ulbricht under charges of being the site's pseudonymous founder "Dread Pirate Roberts".[4] On 6 November 2013, Silk Road 2.0 came online, run by former administrators of Silk Road.[13] It too was shut down and the alleged operator was arrested on 6 November 2014 as part of the so-called "Operation Onymous”. Ulbricht was convicted of all seven charges in U.S.

Blogs Jacob Appelbaum says that a number of Tor's development projects are inspired by the needs of the people that Tor works with around the world. Many of these people are working on the front lines of human rights and political activism. “When working with Laura Poitras it became clear that there were key areas where improving her ability to use anonymity and encryption software would greatly strengthen her ability to continue her work. How To Permanently Delete Your Account on Popular Websites - Smashing Magazine Advertisement We all have an increasing number of sites and online services we’re members of, and sometimes it all gets a little overwhelming. At times, we just need to delete our memberships to some sites, either in an effort to simplify our lives or just because we’ve grown tired of a particular site or service. What we often don’t realize when signing up for all these accounts, though, is how difficult it can be to permanently delete our accounts when we’ve had enough. Some require complicated, multi-step processes that can stretch over the course of days (or weeks).

Privacy for anyone anywhere Tails is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Learn more about Tails. Tails sends its traffic through Tor.

Cross-browser fingerprinting test 2.0 While we browse the web, most web pages have an interest in observing our behaviour in order to achieve certain business benefits. Read more » For example, they would like to know what kind of content the visitor is interested in, and, more specifically, what to recommend to a user who has already downloaded certain page(s) (e.g. article(s)). Therefore, vaguely knowing users’ areas of interest is often insufficient; most web pages will be interested in the entire course of a visit, and, in the case of returning visitors, they want to know the whole browsing history, too. Anonymouse.org AnonWWW Many mice surf the web under the illusion that their actions are private and anonymous. Unfortunately, this is not the way it is. Every time you visit a site for a piece of cheese, you leave a calling card that reveals where you are coming from, what kind of computer you use, and other details.

Mitch Altman: The Hacker Lifestyle Mitch Altman at Chaos Communication Camp, Berlin, August 2011 When he was young, Mitch Altman didn’t like himself. Too much of an introverted geek, too ugly, too queer, in every sense of that word. Today, the first thing that strikes you when you meet him in person is the serenity that emanates from the man. These days Mitch is a respected figure in the hacker community.

A directory of urls to delete your account from web services Can't find what you're looking for? Help make justdelete.me better. easy No Info Available Login to your account, go to parameters, click Delete my account. Confirm by clicking I want to delete my account. Metasploitable 2 Exploitability Guide The shortlink for this article is: The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities. Version 2 of this virtual machine is available for download and ships with even more vulnerabilities than the original image. This virtual machine is compatible with VMWare, VirtualBox, and other common virtualization platforms. By default, Metasploitable's network interfaces are bound to the NAT and Host-only network adapters, and the image should never be exposed to a hostile network. (Note: A video tutorial on installing Metasploitable 2 is available at the link Tutorial on installing Metasploitable 2.0 on a Virtual Box Host Only network.)

How to Detect Apps Leaking Your Data One reason that smartphones and smartphone apps are so useful is that they can integrate intimately with our personal lives. But that also puts our personal data at risk. A new service called Mobilescope hopes to change that by letting a smartphone user examine all the data that apps transfer, and alerting him when sensitive information, such as his name or e-mail address, is transferred. “It’s a platform-agnostic interception tool that you can use on your Android, iOS, Blackberry, or Windows device,” says Ashkan Soltani, an independent privacy researcher who created Mobilescope with fellow researchers David Campbell and Aldo Cortesi. How to Completely Anonymize Using Anomos How to Completely Mask & Anonymize Your BitTorrent Traffic Using Anomos A couple times a year, I hear about someone I know receiving that oh-so-scary letter from their ISP telling them to stop torrenting. ISPs will go as far as throttling your bandwidth (without lowering your bill), and sometimes even reporting you to authorities. The next thing you know, you're being summoned to court for copyright violations. You don't even have to be torrenting anything illegal!

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. How To Erase Yourself From The Internet Who knew a page full of links could be so useful? JustDelete.me is a page full of links -- not ugly blue hyperlinks but links disguised as buttons. Each button represents an online service; anything from LinkedIn to Skype to Wikipedia. Click a button and JustDelete.me will take you to the page on that online service that allows you to delete your account. If you click the "show info" link under each button, meanwhile, JustDelete.me will tell you, in plain English, how to delete your account from that site. Buttons are color-coded: a green button means deleting your account is easy, a yellow button means it's moderately difficult, red means it's hard and black (uh-oh) means "it's impossible to delete your account on this site."

Access Any Website Or Forum Without Registering Visit any forum or website to find something useful and they will ask you to register. Every time a forum asks me to register, I simply close the site. You would probably do the same. But this time, lets face it.

Related:  spel565La Tribu GrandeWeb Design TechnologiesData Privacy & SecurityTech Stuffslhappy10Net NeutralityWebaurealis