Anonymous VPN Providers? 2016 Edition (Page 2) ~ TorrentFreak
You can read the introduction (page 1) here. 1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, what information and for how long?
Public-key cryptography
An unpredictable (typically large and random) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm. In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of the private key. In the Diffie–Hellman key exchange scheme, each party generates a public/private key pair and distributes the public key.
Slashdot
The Guardian has released new documents from Edward Snowden showing how the U.S. National Security Agency targets internet anonymity tool Tor to gather intelligence. One of the documents, a presentation titled "Tor Stinks," bluntly acknowledges how effective the tool is: "We will never be able to de-anonymize all Tor users all the time. With manual analysis we can de-anonymize a very small fraction of Tor users, however, no success de-anonymizing a user in response to a TOPI request/on demand." (Other documents: presentation 1, presentation 2.)
Enabling Communications, Anywhere, Anytime: Arduino Yun as a possible Mesh Extender Platform
Regular readers of this blog will know that we have been looking at a variety of hardware options for the Serval Mesh Extender. The Serval Mesh Extender is a device that combines ad-hoc WiFi meshing with long-range license-free UHF packet radio to allow the easy formation of mesh networks spanning useful distances. Typically the UHF packet radio has a range about ten times greater than WiFi.
Librem 5 – A Security and Privacy Focused Phone – Purism
Freedom of Choice We believe phones should not track you nor exploit your digital life. We are in the middle of a digital rights revolution where you get to decide the future. We at Purism are building a phone that does not run Android nor iOS, but runs PureOS or any GNU/Linux distribution where all the source code is available. Note that the visual design of the phone is a work in progress and is subject to evolve based on technical requirements and people’s feedback. Peace of Mind
Voluntary - Bitpost
Bitpost private decentralized messaging Source Download 0.9.8.3 for OSX Every love letter, political opinion or personal confession you share with someone using services such as email or Facebook is recorded and can be read by curious employees, malicious government agencies, exposed by hackers or shared with advertisers.
iMessage Privacy
iMessage is probably one of the most trendy instant messaging systems. Apple presents it as very secure, with high cryptographic standards, including end-to-end encryption preventing even Apple from reading the messages. Is this true?
Multipeer Connectivity
As consumer web technologies and enterprises race towards cloud infrastructure, there is a curious and significant counter-movement towards connected devices. In this age of mobile computing, the possibilities of collaboration, whether in work or play, have never been greater. In this age of privacy concerns and mass surveillance, the need for secure, ad hoc communications has never been more prescient. In this age of connected devices, the promise of mastery over the everyday objects of our lives has never been closer at hand. The Multipeer Connectivity APIs, introduced in iOS 7, therefore may well be the most significant for the platform. It allows developers to completely reimagine how mobile apps are built, and to redefine what is possible.