background preloader

GNU's Framework for Secure Peer-to-Peer Networking

GNU's Framework for Secure Peer-to-Peer Networking
Related:  DeepWeb

phantom - System for generic, decentralized, unstoppable internet anonymity The Phantom protocol is a system for decentralized anonymization of generic network traffic. It has been designed with the following main goals in mind: 1. - No critical or weak points to attack or put (il)legal pressure on. 2. - Direct technical destructive attacks will practically be the only possible way to even attempt to stop it. 3. - Probabilistic methods (contrary to deterministic methods) must be used in a completely decentralized design like this, where no other peer can be trusted, so focus is put on optimizing these methods. 4. - This is simple in itself, but still important in the context of anonymization. 5. - No one should have to worry about crimes being perpetrated from their own IP address. 6. - You never know what the next draconian law might be. 7. - Most existing anonymization solutions are practically unusable for (or even prohibit) larger data volumes. 8. The latest version of the source release package can always be downloaded here. DEFCON presentation (audio only):

The Freenet Project - /index FreedomBone If you want to have more control over how you interact on the web, and regain your freedom, privacy and autonomy from outside interference, you need to start moving towards using programs like GNU Social – Jason Self For a microblog you will need a separate domain/subdomain, so see Setting up a web site for details of how to create an Apache configuration for your microblog. Install some dependencies: apt-get install php5-xcache php-gettext php5-curl php5-gd php5-mysql Download GNU Social mkdir ~/build cd ~/build wget Verify it. sha256sum gnu-social.tar.gz 1f886241c7f1a175e7be3cccbcb944ab6c03617fb75aefa4d62d37abed87d2b4 Extract the files and set permissions on them, where mydomainname.com is your domain name. Edit the Apache access settings. editor /var/www/$HOSTNAME/htdocs/.htaccess Add the following: Save and exit, then create a database. Add the mailer script to the aliases file: editor /etc/aliases Save and exit. newaliases

How to become anonymous online Online life is quickly eroding our usual feelings of personal anonymity. Services like Facebook mean that people are able to delve into our lives like never before. Stalking, whistle blowing, even watching TV programmes broadcast in other countries; these and other online activities all rely on some form of online anonymity – or lack of it. We humans don't generally like strangers knowing all about us, but we may be unwittingly providing people with details of our lives we'd rather were kept out of the public gaze. Keeping anonymous online is also a concern for a growing number of people in countries where speaking out has real consequences. Luckily, there are several steps you can take to stay incognito online, and even some that can reduce the amount of spam email messages you receive. Keep your email secret Your email address is a big part of your online identity. When an online business folds, the owner might also decide the list of registered users is an asset worth selling.

I2P rețea anonima Sylpheed - lightweight and user-friendly e-mail client How to be anonymous online with Incognito At first glance Incognito may seem suited only for the extremely paranoid, because of the totality of tools it offers to hide your online presence. But those tools, each designed to mask a certain aspect of your online activity, have been around for quite a while. This 430MB-ish live CD has many faithful users, but I can't quote any on its usefulness since their identities couldn't be confirmed. Yes, Incognito is that good. If you're looking for the ultimate way to encrypt absolutely all your internet communications and be untraceable on the internet, you're looking for Incognito. Whether you're an anarchist, a covert operative or just someone who wants to exercise their digital rights and hide your online activity, with Incognito you can encrypt your IM conversations and emails, browse securely without the fear of cookies and the browser history revealing your secrets, and best of all, the traffic doesn't reflect in your router logs. An aside: who wants to be anonymous? Buck the trend.

The Emulator Zone - Your Source for Emulation! The Free Haven Project

Related: