background preloader

L'anonymat sur Internet grâce à la technique du routage en oignon.

Divers usages à l’anonymat Pour des rai­sons évidentes, des jour­na­lis­tes, des ONG, des blo­gueurs ou des grou­pes comme Rebellyon (au hasard, hein !) ont sou­vent besoin de com­mu­ni­quer de manière ano­nyme. Dans le cadre de com­mu­ni­ca­tions per­son­nel­les sen­si­bles (ser­vi­ces médi­caux, sites d’aide aux vic­ti­mes d’agres­sions), ou pour pro­té­ger leur liberté d’expres­sion (pou­voir dénon­cer les pra­ti­ques condam­na­bles de son entre­prise sans crain­dre pour son emploi), les par­ti­cu­liers peu­vent aussi avoir besoin de confi­den­tia­lité. De nom­breu­ses socié­tés com­mer­cia­les cher­chent à établir des pro­fils d’inter­nau­tes afin de réa­li­ser des études de marché. Il est légi­time qu’un par­ti­cu­lier cher­che à pro­té­ger son iden­tité pour éviter ce genre de sur­veillance. Les gou­ver­ne­ments qui met­tent en place le vote électronique ont aussi besoin d’un sys­tème d’ano­ny­mat. Effets fâcheux et effets vertueux Éléments d’explication technique de Tor En conclusion Related:  TAILS & TOR

Projects Overview The Tor community of software and services aims to make your Internet experience safer and better. Tor Browser contains everything you need to safely browse the Internet. This package requires no installation. Arm is a terminal status monitor for Tor, intended for command-line aficionados and ssh connections. Analytics for the Tor network, including graphs of its available bandwidth and estimated userbase. Tor Messenger is a cross-platform chat program that aims to be secure by default and sends all of its traffic over Tor. Pluggable Transports (PT) transform the Tor traffic flow between the client and the bridge. Web-based protocol to learn about currently running Tor relays and bridges. In collaboration with The Guardian Project, we're developing Tor on the Google Android mobile operating system. Shadow is a discrete-event network simulator that runs the real Tor software as a plug-in. Python library for applications and scripts that interact with Tor.

Tor’s Skyrocketing Popularity in Russia Has Vladimir Putin's Internet crackdown spurred the explosion in Tor use in Russia? Images mixed by author. The two sharp spikes indicated in Tor's statistics suggest that Russian Internet users are responding to major censorship events, though it's not immediately clear what caused the August 2013 increase. Users in Russia connecting to the Tor anonymity network. While the growth of Tor's popularity in Russia is impressive, it is still the case that Russians make up less than 6 percent of the network's user base.

MAJ : Freenet 0.7.5: le très gros tuto ! - Les forums de Numerama On va télécharger FMS ! cliquez sur "Download" puis récupérez les binaires pour Windows ici: cliquez simplement dessus .... on arrive sur cette page: cliquez sur "télécharger en arriêre plan et enregistrez dans le dossier download" (voir la capture d'écran) vous arriverez dans l'endroit où sont mis tous les téléchargements en cours .... intéressant mais on ne va pas contempler tous les téléchargements en cours ! donc on clique sur "page précédente" dans firefox pour revenir à cette page puis on clique sur "revenir à la page précédente" et on peut bouquiner le site de fms à loisir en attendant que le téléchargement se termine .... pour revenir à la page d'accueil de freenet, tapez cette adresse dans votre navigateur: AH , Bonne nouvelle ! sur la page d'accueil freenet nous apprend qu'il a finit de télécharger FMS ! on peut accèder à ce fichier en cliquant directement sur "Téléchargement réussi :" fastoche ! cliquez sur "téléchargement" c . cliquez dessus:

Tor Challenge Relays and bridges qualify for the Tor Challenge if they are created on or after June 4th, 2014. We will also give credit to relays that increase their RelayBandwidthRate and RelayBandwidthBurst by at least 128 KB/s (compared to the average bandwidth prior to June 4th, 2014). Before submitting your Tor relay, make sure you can find it on Globe by searching for the nickname you configured. You may need to wait up to one hour for the directories to publish the new server information. We encourage people to keep their Tor relays running for a long time. That's why we'll be giving you a limited-edition sticker if your Tor relay is still running 12 months after we launch this campaign.

I2P The software is free and open source and is published under multiple licenses. The name I2P is derived from Invisible Internet Project, which, in pseudo-mathematical notation, is represented as I²P. Technical design[edit] I2P is beta software since 2003.[3] Developers emphasize that there are likely to be bugs in the software and that there has been insufficient peer review to date.[4] However, they believe the code is now reasonably stable and well-developed, and more exposure can help development of I2P. Many developers of I2P are known only under pseudonyms. While the previous main developer, jrandom, is currently on hiatus, others, such as zzz and Complication have continued to lead development efforts, and are assisted by numerous contributors.[6] Software[edit] I2P router console iMule Since I2P is an anonymous network layer, it is designed so other software can use it for anonymous communication. General networking[edit] Chat[edit] File sharing[edit] E-mail[edit] Instant messaging[edit]

The Anonymous Tor Network Now Comes in a Box Photo via Flickr I have the Tor browser running on my computer, and it took me about two minutes to download. Once you're surfing through the network there are plenty of daunting technical options to dig into, but accessing the onion network for basic, everyday web use was as easy as clicking download, opening the program, and then struggling to remember all my no-longer-stored passwords. Still, Tor is best known as a niche tool for hackers, whistleblowers, criminals, activists, or folks with otherwise something to hide. So goes the thinking behind Safeplug, a new hardware adapter that basically puts Tor in a box. The adapter comes from hardware company Pogoplug, which announced its new product yesterday and hopes it will bring Tor to the mass market by offering more consumer-friendly access. Sure, more people using Tor would be great. Nor is the adapter necessarily easier to use than the downloadable Tor browser bundle.

Introducing I2P I2P is a scalable, self organizing, resilient packet switched anonymous network layer, upon which any number of different anonymity or security conscious applications can operate. Each of these applications may make their own anonymity, latency, and throughput tradeoffs without worrying about the proper implementation of a free route mixnet, allowing them to blend their activity with the larger anonymity set of users already running on top of I2P. Applications available already provide the full range of typical Internet activities - anonymous web browsing, web hosting, chat, file sharing, e-mail, blogging and content syndication, newsgroups, as well as several other applications under development. Web browsing: using any existing browser that supports using a proxy. I2P is not a research project - academic, commercial, or governmental, but is instead an engineering effort aimed at doing whatever is necessary to provide a sufficient level of anonymity to those who need it. Overview Tunnels

The Amnesic Incognito Live System GNOME desktop Stream isolation Regular and obfsproxy bridges support The Vidalia graphical frontend Firefox (Iceweasel) preconfigured with: TorBrowser patches Torbutton for anonymity and protection against JavaScript HTTPS Everywhere a Firefox extension which transparently enables SSL-encrypted connections to a great number of major websites All cookies are treated as session cookies by default; the CS Lite extension provides more fine-grained cookie control for those who need it One may choose at boot time among a large number of languages. Tails might not erase all the system memory on shutdown On rare systems (non-PAE with big amounts of memory), Tails does not consistently erase all system memory, as it normally would. After using Tails Installer, the "emergency shutdown" does not work Tails Installer messes a little too much with the USB devices for the "emergency shutdown on media removal" feature to continue working after using it. Tails DVD eject failure

Freenet Un article de Wikipédia, l'encyclopédie libre. Freenet a été créé suite à une inquiétude croissante à propos des libertés sur internet. Cette citation de Mike Godwin datant de 1996 résume cette inquiétude : « Je suis tout le temps soucieux au sujet de mon enfant et d'Internet, bien qu'elle soit encore trop jeune pour se connecter. Voilà ce qui m'inquiète. Principe de fonctionnement[modifier | modifier le code] De par sa conception, Freenet permet d'exploiter une topologie de type Mixnet c'est-à-dire combinant un réseau pair à pair de type DarkNet (dans lequel tous les pairs sont des personne de confiance) et OpenNet (dans lequel des pairs peuvent être des inconnus). La conception acentrée (car sous forme d'architecture distribuée) du réseau interdit à quiconque — même à ses concepteurs — d’interrompre son fonctionnement. Logiciels[modifier | modifier le code] Freesites Insertion Wizard[modifier | modifier le code] Son interface est complexe et son développement est arrêté. mais aussi :