Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. In the last article, we spent some time going over the concepts of onion routing and how it can be useful to you. Tor Hidden Services A Tor hidden service is simply a web server that runs locally and only takes requests from inside the Tor network. Due to the nature of hidden services being anonymous to a degree, the content can be extreme. Setting Up Your Own Hidden Service If you have gotten this far in my series, you are probably interested in setting up your own service. Step 1 Get the Tor Client In the previous article, we downloaded and used the Tor browser bundle. After we're finished, we have the Tor client running on a default port of 9050 and are ready to go! Step 2 Set Up Your Web Server $ sudo . Tip
Buy VPN | Private Internet Access VPN Service Buy Safe and Secure VPN Encrypted Anonymous Your PC 220.127.116.11 Montréal, Quebec Private Internet Access New IP: 18.104.22.168 Internet Hello 22.214.171.124Switzerland (Watch the Video) Committed to keeping your data private - $6.95 / month Choose a Payment Method Secure VPN Account Encrypted WiFi P2P and VoIP Support PPTP, OpenVPN and L2TP/IPSec 5 devices simultaneously Multiple VPN Gateways Unlimited Bandwidth SOCKS5 Proxy Included No traffic logs Instant Setup Buy VPN $39.95 / year (Only $3.33/month) $35.95 / 6 months (Only $5.99/month) Starbucks, Target, Macy’s, Walmart & 100’s of other gift cards accepted Private Internet Access VPN Service is powered by a state of the art, tier-1 multi-gigabit private network. Signup for our VPN service to protect your privacy and confidentiality with a hidden IP address and encrypted traffic. Secure your computer's Internet connection Why you should buy VPN Service Online security Encrypt all of your internet traffic and use a safe, protected IP.
Tor vs. I2P: The Great Onion Debate Tor vs. I2P: The Great Onion Debate In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and messages asking the technical differences between the two. With this article, I am going answer those questions and better explain the pros and cons of each, breaking down the networks, pitfalls, and things you should know to be safe. Back to Onions Tor and I2P are both anonymizing networks, allowing people to tunnel out of their open and non-secure environments. As a quick recap, onion routing involves wrapping your packets in multiple layers of encryption, in a system where each router that passes it along only has the key to decrypt its layer and none of the others. Tor Tor has been around quite a while longer then I2P. I2P was designed with the internal network in mind. See Also
KeePass Password Safe Anonymity, Darknets and Staying Out of Federal Custody, Part Four: The Invisible Internet Anonymity, Darknets and Staying Out of Federal Custody, Part Four: The Invisible Internet In the last article, we left off with the Tor network and its hidden services. As I mentioned, Tor is not the only option in the game, and I want to offer a general introduction to I2P. For a web browsing proxy and hidden services host, Tor gets the job done well. Invisible Internet and Onion Routing I2P initially began in 2003 as a proposed modification to Freenet. Content sent over I2P is encrypted through three-layer garlic encryption, used to verify the delivery of the message to the recipient. Step 1 Download I2P Let's start with a visit to the download page to grab the Windows binary or source code, if needed. $ sudo apt-add-repository ppa:i2p-maintainers/i2p$ sudo apt-get update$ sudo apt-get install i2p This downloads and installs the I2P router on your computer. Step 2 Start the I2P Router Now that we have the packages downloaded and installed, we must start the service. $ i2prouter start tl;dr
Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web You've probably seen those deep-web images floating around on the Internet. Usually, it goes something like this: There is a towering iceberg and the deeper the underwater portion extends, the more “hidden” and “exotic” the content is described to be. Sometimes these images are accurate to a point, but most are just making things up. So what exactly is 'deep web' then? In this series of articles, I am going to break down the idea of a deep web, what is it, how it got there, and most importantly, how we can use it for our security—maybe even for lulz. Anonymity and Darknets As it stands today, practical knowledge of how darknets (non-indexed portions of the Internet) function will allow you to make more informed decisions regarding risks when rooting a box, hiding files, or communicating securely. The idea is to have enough masking, while maintaining a level of usefulness. First though, we need to talk about Google.
Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then anywhere else on the 'clear' Internet. Enter Tor and Onion Routing Simple traffic analysis and deep packet inspection can give up what you are sending, where you are sending it, where it is coming from and who it is going to. Tor works on the idea of onion routing. When you wish to send some data on the network, your node calculates a path though all the running nodes, and wraps your data in that many layers of encryption. The figure below illustrates how each layer of the "test" packet is peeled away one at a time on its way to the web server. Exit Nodes and Escaping Content Filtering Firewalls Why Aren't We All Using Tor Then!? tl;dr
A Guide to Torrent Acronyms: How to Choose the Right Download for Your Damaged or Missing Media A Guide to Torrent Acronyms: How to Choose the Right Download for Your Damaged or Missing Media So, you scratched up your $500 Adobe CD and now it's unreadable. You could go buy a new one, but you already purchased it! Searching The Pirate Bay and downloading some Adobe software can usually be easy enough, but what should you watch out for? And what about your movies? A word of caution. It's Like Stealing a Car... Imagine someone boosted your brand new car overnight, but when you came out in the morning to head off to work, it was still there! Copyright infringement happens when you acquire or redistribute a protected work without the expressed consent of whoever might own it. However, you are allowed to backup your own legally purchased software for your own private use, so long as it is not distributed in any way. Null Byte's Super Quick Breakdown for New Friends Most of the time, files that are grouped and compressed will be in a .rar format. Movies DVD Region Codes Music Software
Editor Picks: The Top 10 Secret Resources Hiding in the Tor Network Editor Picks: The Top 10 Secret Resources Hiding in the Tor Network We've talked about the deep web before, but we never really covered the details of what's out there. It occurred to me that a nice list of resources would be very helpful to all of you anons out there. However, I should warn you—the deep web is a vast, often uncharted and unpoliced area. Getting Ready Okay, your Tor Bundle is all set up and your looking at the welcome screen (below). Now that we are all set up and current, where do we go? We've talked about the darknet, as well as Tor already, so it is assumed in this article that you have already gotten to the point where you can freely browse and use these services. Remember how this operates—any normal address you type in will work, and your IP address will show whatever appears above (I edited mine out to stave away the party van) in server logs and such. The Silk Road Tor Mail The Hidden Wiki TorDIR Core.Onion
Muse & Geek - [LEGISLATION] Directive Européenne sur les Cookies Depuis quelques temps, vous avez pu apercevoir sur vos divers sites web préférés un bandeau vous signalant l'utilisation des cookies et vous demandant, de manière plus ou moins tacite, votre consentement pour en déposer sur votre navigateur. Il s'agit en fait d'une obligation légale émise par la Commission Européenne sous la directive 2002/58/EC mise à jour par la directive 2009/136/EC et entrée en vigueur le 25 Mai 2011. L'article 5(3) de cette directive stipule (page 20) que : Les États membres garantissent que le stockage d’informations, ou l’obtention de l’accès à des informations déjà stockées, dans l’équipement terminal d’un abonné ou d’un utilisateur n’est permis qu’à condition que l’abonné ou l’utilisateur ait donné son accord, après avoir reçu, dans le respect de la directive 95/46/CE, une information claire et complète, entre autres sur les finalités du traitement. Consentement, d'accord. Mais avant de faire le tour de l'Europe, qu'est-ce qu'un cookie ?
Now you can legally edit your online history Google suffered a blow to their aim of owning each last morsel of information on the internet when the EU ruled that the tech behemoth must remove any personal data held on people that is deemed "inadequate, irrelevant, or no longer relevant". The decision means that individuals will be able to request that the search engine removes links about them which provide information that they do not want to be known – ensuring their "right to be forgotten". Google and free speech activists have reacted with outrage, claiming that this severely reduces freedom of speech, as well as allowing internet users to edit their history and restructure the digital footprint that they've left on the online world. The court's decision was made after a Spanish man requested that notice of his house being repossessed was removed from a major news website: he'd paid the debts, so why was the information relevant anymore? That news article about the time you drove into a supermarket while off your face?