background preloader


The software is free and open source and is published under multiple licenses. The name I2P is derived from Invisible Internet Project, which, in pseudo-mathematical notation, is represented as I²P. Technical design[edit] I2P is beta software since 2003.[3] Developers emphasize that there are likely to be bugs in the software and that there has been insufficient peer review to date.[4] However, they believe the code is now reasonably stable and well-developed, and more exposure can help development of I2P. Many developers of I2P are known only under pseudonyms. While the previous main developer, jrandom, is currently on hiatus, others, such as zzz and Complication have continued to lead development efforts, and are assisted by numerous contributors.[6] Software[edit] I2P router console iMule Since I2P is an anonymous network layer, it is designed so other software can use it for anonymous communication. General networking[edit] Chat[edit] File sharing[edit] E-mail[edit] Instant messaging[edit]

Related:  ProgramGeneral

Freenet History[edit] The origin of Freenet can be traced to Ian Clarke's student project at the University of Edinburgh, which he completed as a graduation requirement in the Summer of 1999.[9][10][11] Ian Clarke's resulting unpublished report "A distributed decentralized information storage and retrieval system" (1999) provided foundation for the seminal paper written in collaboration with other researchers, "Freenet: A Distributed Anonymous Information Storage and Retrieval System" (2001).[12][13] According to CiteSeer, it became one of the most frequently cited computer science articles in 2002.[14] The distributed data store of Freenet is used by many third-party programs and plugins to provide microblogging and media sharing,[16] anonymous, decentralised version tracking,[17] blogging,[18] a generic web of trust for decentralized spam resistance,[19] Shoeshop for using Freenet over Sneakernet,[20] and many more. Features and user interface of the Freenet[edit] Content[edit] Network[edit]

How Was Your Credit Card Stolen? Almost once a week, I receive an email from a reader who has suffered credit card fraud and is seeking help figuring out which hacked merchant was responsible. I generally reply that this is a fruitless pursuit, and instead encourage readers to keep a close eye on their card statements and report any fraud. But it occurred to me recently that I’ve never published a primer on the types of card fraud and the likelihood with each of the cardholder ever learning how their account was compromised. Cipherspace According to its advocates, it should be impossible to know the actual identity of anyone in cipherspace. Therefore, it would be impossible to impose any censorship and to enforce any law. Because of that, they assert that concepts like copyright would be unenforceable inside cipherspace. Some doubt the possibility of complete anonymity, citing that real networks, even virtual private networks, need access to external resources, which tend to be trackable.

Introducing I2P I2P is a scalable, self organizing, resilient packet switched anonymous network layer, upon which any number of different anonymity or security conscious applications can operate. Each of these applications may make their own anonymity, latency, and throughput tradeoffs without worrying about the proper implementation of a free route mixnet, allowing them to blend their activity with the larger anonymity set of users already running on top of I2P. Applications available already provide the full range of typical Internet activities - anonymous web browsing, web hosting, chat, file sharing, e-mail, blogging and content syndication, newsgroups, as well as several other applications under development. Web browsing: using any existing browser that supports using a proxy. Chat: IRC, Jabber, I2P-Messenger.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Cowards Attack Sony PlayStation, Microsoft xBox Networks A gaggle of young misfits that has long tried to silence this Web site now is taking credit for preventing millions of users from playing Sony Playstation and Microsoft Xbox Live games this holiday season. The group, which calls itself LizardSquad, started attacking the gaming networks on or around Christmas Day. Various statements posted by self-described LizardSquad members on their open online chat forum — — suggest that these misguided individuals launched the attack for no other reason than because they thought it would be amusing to annoy and disappoint people who received new Xbox and Playstation consoles as holiday gifts. Such assaults, known as distributed denial-of-service (DDoS) attacks — harness the Internet connectivity of many hacked or misconfigured systems so that those systems are forced to simultaneously flood a target network with junk internet traffic. LizardSquad wannabes trying to prove their “skills” by knocking my site offline.

Top 5: Best countries to host your website for data privacy This site is about the idea of thinking beyond borders and challenging pre-conceived notions. When it comes to data privacy and the best countries to host your website, you have to think outside of the box. That means that a country that has high taxes and a high cost of living may be valuable for other reasons, such as protecting your data privacy. Code & Conquer Most Important: Have Fun. And earn some badges. See how your strategy works out in different scenarios, challenge other players, receive points, earn badges and climb your way to the top of the leaderboard. Boost your coding skills. Do it playing. This game provides the perfect setting to introduce the key concepts employers ask you to know. Op AURORAGOLD - NSA hacks cellphone networks worldwide The Intercept has uncovered details of the operation AURORAGOLD, another massive surveillance program operated by the US Intelligence . The new program is ambitious, the NSA has developed AURORAGOLD with the intent to spy on every cellphone network in the world. The AURORAGOLD operation is mentioned in one of the archive disclosed by Edward Snowden, which revealed that the NSA intercepted thousands of emails sent between companies in a bid to identify security weaknesses in cellphone technology. Operation AURORAGOLD allowed the NSA to monitor the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators.