Phantom - System for generic, decentralized, unstoppable internet anonymity The Phantom protocol is a system for decentralized anonymization of generic network traffic. It has been designed with the following main goals in mind: 1. 100 Useful Tips and Tools to Research the Deep Web By Alisa Miller Experts say that typical search engines like Yahoo! and Google only pick up about 1% of the information available on the Internet. The rest of that information is considered to be hidden in the deep web, also referred to as the invisible web. So how can you find all the rest of this information?
Hacker News | System for generic, decentralized, unstoppable Internet anonymity Alternatively, the people who wax lyrical for 60 or so pages don't understand much either, and are compelled to pad out their document. I remember seeing this a while ago, but I didn't pay much attention to it then, because punishing those who understand the problems with a lengthy verbose soliloquy isn't a good strategy for disseminating information. The other problem is that something 60 pages long without any references or citations beyond an occasional casual link to wikipedia, smacks of reinventing the wheel. This would be why he can go for 60 pages without mentioning known terms like "Cybil Attack", or "Onion Routing".
99 Resources to Research & Mine the Invisible Web College researchers often need more than Google and Wikipedia to get the job done. To find what you're looking for, it may be necessary to tap into the invisible web, the sites that don't get indexed by broad search engines. The following resources were designed to help you do just that, offering specialized search engines, directories, and more places to find the complex and obscure. Search Engines Whether you're looking for specific science research or business data, these search engines will point you in the right direction.
DE(E)SU - Liberté Linux Summary Liberté Linux is a secure, reliable, lightweight and easy to use Gentoo-based LiveUSB/SD/CD Linux distribution with the primary purpose of enabling anyone to communicate safely and covertly in hostile environments. Whether you are a privacy advocate, a dissident, or a sleeper agent, you are equally likely to find Liberté Linux useful as a mission-critical communication aid. Download Liberté Linux 2012.3, released on 2012‑09‑01 (pick binary image for full functionality): Why should you choose Liberté over alternative open-source, commercial, or military systems? Unobtrusiveness
I2P Anonymous Network Anonymat – Acte 1 : VPN et HADOPI… et vous vous pensez anonymes ? Ce billet est le premier d’une petite série sur le thème de l’anonymat, des VPNs, et par extension, des attaques possibles. Pour un plus grand confort de lecture, ce qui ne devait faire qu’un seul billet va du coup en faire plusieurs, ils auront un caractère plus ou moins technique. Le premier est une (longue) introduction aux bases de l’anonymisation IP… bonne lecture. /Greetz wizasys /-) Fallait pas me chercher…
Tor Project: Anonymity Online Anonymat – Acte 2 : Les solutions d’anonymat tiennent-elles réellement leurs promesses ? Anonymat sur le Net L’anonymat sur le Net est quelque chose de bien trop sérieux pour laisser une place au hasard. Dans certain pays, il est le garant de la liberté de certaines personnes (journalistes, opposants politiques…), pour certaines personnes, une erreur et leur vie peut être mise en danger. Dans le premier billet de cette petite série, nous avons fait la différence entre la protection du contenu et du contexte. Nous avons vu que la protection des contenus passait par le chiffrement des données et que la protection du contexte, bien plus complexe, nécessitait un ensemble de mesures adaptées à des problématiques variées et qu’il existait une forte interdépendance entre ces mesures. Ce que l’on souhaite quand on parle d’anonymat, c’est bien évidemment une solution capable de protéger tant le contenu que le contexte.
Denmark Police Wants to Ban Anonymous Internet Use Should using the internet Anonymously be a thing of the past? That’s what police in Denmark are hoping. They are currently recommending that identities be verified before someone is able to log on to the internet. But is it one thing to hope that internet anonymity be abolished and quite another to make it happen? Zuckers! Facebook Has Secretly Been Giving User Info to Cops - Technology We've told you before that Facebook treats its users like products. That companies now exist to search for your Facebook account and tell your bosses your secrets. That people are quitting Facebook en masse. Now, there's yet another reason you might want to make the switch to Google+: Facebook has gotten into the habit of allowing police to scour users' profiles without their consent. According to a new report from Reuters and Westlaw, federal judges have granted at least 24 search warrants since 2008 allowing law enforcement officials to snoop around people's Facebook accounts. Some of the warrants sought things as innocuous as status updates, but others gave access to friend requests, photos, event calendars and personal messages.
Tor Metrics Portal: Users Direct users by country: Download graph as PDF or SVG. Top-10 countries by directly connecting users: How to stop DNS leakage while using a VPN | Privacy Lover The DNS leakage problem explained Whenever you type a domain name, your Internet browser contacts a DNS server and makes a DNS Query. Most Virtual Private Network providers fail to mention that while your connexion is encrypted using a VPN there is a high chance that a DNS leak will occur and your ISP will still be able to see what you are doing over the internet. The problem occurs primarily when routers and computers are set to use automatic DHCP, this can force name lookups to bypass the name server supplied by the active VPN connection and instead use the one supplied by your ISP which allows them to see the websites you visit.
The real you: Say goodbye to online anonymity - science-in-society - 03 November 2011 Read full article Continue reading page |1|2|3 Online anonymity may be a luxury we can no longer afford – and it's disappearing fast anyway.