background preloader

Tor Project: Anonymity Online

Tor Project: Anonymity Online
Family & Friends People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet. Businesses Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability. Activists Activists use Tor to anonymously report abuses from danger zones.

https://www.torproject.org/

Related:  DownloadssafetyOnline PrivacyTAILS & TORVie privée - Empreinte numérique

PhotoGPSEditor - MMISoftware - Makers of software for Mac OS X, the iPhone and the iPod Touch Do you want to edit meta-data (latitude and longitude, location, description, and notes) of photo (JPEG, RAW or Tiff) files? Do you wish to change all the names of your photo files at once? Do you have GPS track-data (gpx of NMEA) for trips on which you took photos? If you do then PhotoGPSEditor from MMISoftware may be the answer. PhotoGPSEditor is an easy to use meta-data editor for photo files, plus it can match data from GPS (gpx or NMEA) files.

Free VPN Software: Virtual Networking with LogMeIn Hamachi Centralized Software Deployment Save yourself onsite visits. Quickly and easily dispatch virtual network client software to new computers remotely. 5 ways to easily increase your internet security - Seattle Political Buzz In this age of technology nothing is private. In fact, NSA whistleblower William Binney recently stated that literally every email sent in the US is recorded by the FBI. For those living in reality, it has been know that since the 90's under President Clinton, programs such as Echelon monitored nearly every phone call, fax, and email in the United States. Sites like Facebook have been known to record users web history even when they are logged out. Google has had to pay out millions for its privacy violations such as disabling privacy settings on Internet browsers to allow them to track you.

The Amnesic Incognito Live System GNOME desktop Stream isolation Regular and obfsproxy bridges support The Vidalia graphical frontend Firefox (Iceweasel) preconfigured with: TorBrowser patches On 6/5, 65 Things We Know About NSA Surveillance That We Didn’t Know a Year Ago It’s been one year since the Guardian first published the Foreign Intelligence Surveillance Court order, leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting dragnet surveillance on millions of innocent people. Since then, the onslaught of disturbing revelations, from disclosures, admissions from government officials, Freedom of Information Act requests, and lawsuits, has been nonstop. On the anniversary of that first leak, here are 65 things we know about NSA spying that we did not know a year ago:

"La-Mulana" English Patch Project Info Game Name ›› La-Mulana Published on ›› June 27th, '05 Published by ›› GR3 Project Platform ›› Win Anti Spam - Antispam fights spam and is free a tool that's easy to use Anti Spam, the best way to fight spam bots! The purpose of this page is to make it so spammers who attempt to collect email addresses off the web, via programs, will not have real email addresses in their database. Anti-Spam causes problems because they will have to clean out their list. It also makes their database worthless for reselling purposes because the company purchasing their spam database will have worthless email address. This page has fifty randomly generated email addresses (refresh and new ones will appear). At the bottom of the page is a link to this page again, essentially reloading it for programs to collect more fake email addresses.

Facebook privacy and kids: Don’t post photos of your kids online Photo by Hemera/Thinkstock I vividly remember the Facebook post. It was my friend’s 5-year-old daughter “Kate,” (a pseudonym) standing outside of her house in a bright yellow bikini, the street address clearly visible behind her on the front door.

Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA Photo: Josh Valcarcel/WIRED When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes. It’s called Tails. And naturally, nobody knows exactly who created it. Tails is a kind of computer-in-a-box. EU's right to be forgotten: Guardian articles have been hidden by Google When you Google someone from within the EU, you no longer see what the search giant thinks is the most important and relevant information about an individual. You see the most important information the target of your search is not trying to hide. Stark evidence of this fact, the result of a European court ruling that individuals had the right to remove material about themselves from search engine results, arrived in the Guardian's inbox this morning, in the form of an automated notification that six Guardian articles have been scrubbed from search results. The first six articles down the memory hole – there will likely be many more as the rich and powerful look to scrub up their online images, doubtless with the help of a new wave of "reputation management" firms – are a strange bunch.

Download La-Mulana - Enter a world where anything is possible and be a hero - Softpedia La-Mulana is a free-roaming platformer game designed to look, sound, and play like a classic MSX game. You play the whip-wielding Indiana Jones-esque archaeologist Lemeza Kosugi as he investigates the ancient ruins of La-Mulana in an attempt to find its treasure and one-up his father, who is trying to get the same treasure as well. The game is huge, with many different areas to explore and dozens of items and weapons to find. Each area has a large variety of puzzles and traps (many of them quite fiendish) and you need to solve the puzzles in each area to discover the Ankhs and Ankh Jewels, which allow you to fight the eight Guardians of the ruins. In order to solve the puzzles you will need to be able to read the tablets scattered throughout the ruins, which will require a Hand Scanner and translation software for the portable MSX that Lemeza has brought along on the adventure. Your Hand Scanner will also allow you to find items and search the bones of less fortunate adventurers.

 ShieldsUP! — Internet Vulnerability Profiling Your Internet connection's IP address is uniquely associated with the following "machine name": The string of text above is known as your Internet connection's "reverse DNS." The end of the string is probably a domain name related to your ISP. This will be common to all customers of this ISP. But the beginning of the string uniquely identifies your Internet connection. The question is: Is the beginning of the string an "account ID" that is uniquely and permanently tied to you, or is it merely related to your current public IP address and thus subject to change?

How to foil NSA sabotage: use a dead man's switch The more we learn about the breadth and depth of the NSA and GCHQ's programmes of spying on the general public, the more alarming it all becomes. The most recent stories about the deliberate sabotage of security technology are the full stop at the end of a sentence that started on 8 August, when the founder of Lavabit (the privacy oriented email provider used by whistleblower Edward Snowden) abruptly shut down, with its founder, Ladar Levison, obliquely implying that he'd been ordered to secretly subvert his own system to compromise his users' privacy. It doesn't really matter if you trust the "good" spies of America and the UK not to abuse their powers (though even the NSA now admits to routine abuse), you should still be wary of deliberately weakened security. It is laughable to suppose that the back doors that the NSA has secretly inserted into common technologies will only be exploited by the NSA. One important check against the NSA's war on security is transparency.

Tails: the operating system that blew open the NSA When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA's prying eyes. It's called Tails. And naturally, nobody knows exactly who created it. Tails is a kind of computer-in-a-box.

Related:  AnonymityWeb tools/APIs 2réseaux anonymes / anonymous networksToolboxSecurity/hacking relatedComputer Science