background preloader

L'anonymat sur Internet grâce à la technique du routage en oignon.

Divers usages à l’anonymat Pour des rai­sons évidentes, des jour­na­lis­tes, des ONG, des blo­gueurs ou des grou­pes comme Rebellyon (au hasard, hein !) ont sou­vent besoin de com­mu­ni­quer de manière ano­nyme. Dans le cadre de com­mu­ni­ca­tions per­son­nel­les sen­si­bles (ser­vi­ces médi­caux, sites d’aide aux vic­ti­mes d’agres­sions), ou pour pro­té­ger leur liberté d’expres­sion (pou­voir dénon­cer les pra­ti­ques condam­na­bles de son entre­prise sans crain­dre pour son emploi), les par­ti­cu­liers peu­vent aussi avoir besoin de confi­den­tia­lité. De nom­breu­ses socié­tés com­mer­cia­les cher­chent à établir des pro­fils d’inter­nau­tes afin de réa­li­ser des études de marché. Il est légi­time qu’un par­ti­cu­lier cher­che à pro­té­ger son iden­tité pour éviter ce genre de sur­veillance. Les gou­ver­ne­ments qui met­tent en place le vote électronique ont aussi besoin d’un sys­tème d’ano­ny­mat. Effets fâcheux et effets vertueux Éléments d’explication technique de Tor En conclusion Related:  TAILS & TOR

Tor’s Skyrocketing Popularity in Russia Has Vladimir Putin's Internet crackdown spurred the explosion in Tor use in Russia? Images mixed by author. The two sharp spikes indicated in Tor's statistics suggest that Russian Internet users are responding to major censorship events, though it's not immediately clear what caused the August 2013 increase. Users in Russia connecting to the Tor anonymity network. While the growth of Tor's popularity in Russia is impressive, it is still the case that Russians make up less than 6 percent of the network's user base.

Wiki de l'internet libre Bienvenue ! L'objectif de ce wiki est d'établir une base de connaissances technique communes et vulgarisées qui nous permettra à tous de profiter d'Internet et de l'espace de liberté que ce formidable outil nous offre. Rédigez vos tutos ! Si vous souhaitez participer et publier/modifier/corriger des tutoriels et explications techniques sur les thèmes suivants, alors créez-vous un compte et éditez les pages de votre choix. Ne mettez rien d'illégal, SVP (fichiers piratés and Co), évitez les sujets politiques, religieux etc... et bien sûr si vous voyez des conneries, fautes d'orthographes, etc... faites par d'autres, corrigez-les ou revenez à une version précédente. Ensuite, vous pouvez donner la forme que vous voulez à ce wiki en créant de nouvelles pages, de nouvelles rubriques et en architecturant cela comme bon vous semble. Ah ! Merci à tous. Pour commencer Un chat est disponible pour discuter en direct entre lecteurs/contributeurs du wiki. !! MOBILISEZ VOUS!!

Tor Challenge Relays and bridges qualify for the Tor Challenge if they are created on or after June 4th, 2014. We will also give credit to relays that increase their RelayBandwidthRate and RelayBandwidthBurst by at least 128 KB/s (compared to the average bandwidth prior to June 4th, 2014). Before submitting your Tor relay, make sure you can find it on Globe by searching for the nickname you configured. You may need to wait up to one hour for the directories to publish the new server information. We encourage people to keep their Tor relays running for a long time. That's why we'll be giving you a limited-edition sticker if your Tor relay is still running 12 months after we launch this campaign.

France Wireless : wifi et liberté The Anonymous Tor Network Now Comes in a Box Photo via Flickr I have the Tor browser running on my computer, and it took me about two minutes to download. Once you're surfing through the network there are plenty of daunting technical options to dig into, but accessing the onion network for basic, everyday web use was as easy as clicking download, opening the program, and then struggling to remember all my no-longer-stored passwords. Still, Tor is best known as a niche tool for hackers, whistleblowers, criminals, activists, or folks with otherwise something to hide. So goes the thinking behind Safeplug, a new hardware adapter that basically puts Tor in a box. The adapter comes from hardware company Pogoplug, which announced its new product yesterday and hopes it will bring Tor to the mass market by offering more consumer-friendly access. Sure, more people using Tor would be great. Nor is the adapter necessarily easier to use than the downloadable Tor browser bundle.

GNU Privacy Guard Un article de Wikipédia, l'encyclopédie libre. GnuPG (ou GPG, de l'anglais GNU Privacy Guard) est l'implémentation GNU du standard OpenPGP défini dans la RFC 4880[3]. Il est distribué selon les termes de la GNU GPL. Il permet à ses utilisateurs de transmettre des messages signés et/ou chiffrés. Cela permet ainsi de garantir respectivement l'authenticité et la confidentialité du message. Historique[modifier | modifier le code] Caractéristiques[modifier | modifier le code] Depuis sa version 2.0, GnuPG peut être installé sur une carte à puce. Utilisation[modifier | modifier le code] GnuPG est un logiciel stable distribué dans tous les systèmes d'exploitation libres, notamment GNU/Linux. Articles connexes[modifier | modifier le code] Notes et références[modifier | modifier le code] Sur les autres projets Wikimedia : GPG, sur Wikibooks Liens externes[modifier | modifier le code]

The Amnesic Incognito Live System GNOME desktop Stream isolation Regular and obfsproxy bridges support The Vidalia graphical frontend Firefox (Iceweasel) preconfigured with: TorBrowser patches Torbutton for anonymity and protection against JavaScript HTTPS Everywhere a Firefox extension which transparently enables SSL-encrypted connections to a great number of major websites All cookies are treated as session cookies by default; the CS Lite extension provides more fine-grained cookie control for those who need it One may choose at boot time among a large number of languages. Tails might not erase all the system memory on shutdown On rare systems (non-PAE with big amounts of memory), Tails does not consistently erase all system memory, as it normally would. After using Tails Installer, the "emergency shutdown" does not work Tails Installer messes a little too much with the USB devices for the "emergency shutdown on media removal" feature to continue working after using it. Tails DVD eject failure

Amplificateur wifi : amplifier signal wifi - Wifilorraine Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA | Enterprise Photo: Josh Valcarcel/WIRED When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes. It’s called Tails. And naturally, nobody knows exactly who created it. Tails is a kind of computer-in-a-box. Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn’t store any data locally. “The installation and verification has a learning curve to make sure it is installed correctly,” Poitras told WIRED by e-mail. An Operating System for Anonymity Originally developed as a research project by the U.S. Tails makes it much easier to use Tor and other privacy tools. ‘The masters of today’s Internet… really want our lives to be more and more transparent online, and this is only for their own benefit.’ — The Tails Development Team

Related: