Article SOURCE as marked
Free VPN Providers
Got curious about masking online ID after downloading the WikiLeaks freebie book from Verso, and realising that my fake e-mail address and fake registration isn't much good when my online ID etc isn't masked. Didn't think to use Tor, though. Doh! But because the Tor communication would have maybe been linked to the e-mail used, maybe that option wasn't as secure as it could be? Not sure about that. But I'm guessing a freshie e-mail might have been better than the temp sort of partitioned one. LOL ... I'm not really good at hiding. Quick check indicates that VPNBook has been referred to in court discoveries and indictments against hactivist group members, by the look of this July 2013 article. I've not read comments. Reverted to Google search engine when I changed my OS (again) and stayed there because I was too lazy to find alternatives. Due to Google's provision of assistance to US-led multiple state actor aggression in the Middle East, I've ditched Google for https://duckduckgo.com/ (doesn't track), but I find myself hopping back onto Google frequently, as it's hard adjusting to being somewhere else and scrolling through search engine data, sort of feeling like you might be missing out on something vital (or missing what you think is quick and easy detection of key info). But in terms of the organisation overall, not too sure how reliable Google would actually be in that sense. With the US state being embedded in Google and Google being in bed with the US state, they're probably hiding info from us instead of helping us find it. ;) |
TOKYO MASTER BANNER
MINISTRY OF TOKYO
|
Showing posts with label Anonymising. Show all posts
Showing posts with label Anonymising. Show all posts
April 01, 2016
Free VPN Providers
TOR vs VPN | WHICH TO USE
Source
The Tin Hat ... lol https://thetinhat.com/tutorials/darknets/tor-vpn.html TOR vs VPN | WHICH TO USE Tor & VPN described as often conflated -- but Tor & VPN are different -- which is more suitable depends on context Essentially:
Tor: for activists & 'secret squirrels' / not for video downloads
[caution: not bullet-proof]
vs
VPN: for (not vital) everyday anonymity / good for downloads
VPNs -- take connection -- encrypt connection -- pass connection through server -- contact goes via VPN server to connection site sought -- ie: it provides encryption & diversion of your online traffic
A.
-- what you are doing & who you are connecting with not visible-- eg. public wifi: those watching get jumbled info sent to random server -- same applies to Internet Service Provider (ISP) B. -- site visited does not know your geolocation (privacy enhanced) -- this permits by-passing geographic restrictions on services Note: * what you do through VPN is know by operator of the VPN * VPN services claim not to log activity but this is only a representation that may be dishonoured * eg. if VPN provider is issued with a court order for info on your activities * VPN provider would likely find some way to link your activity back to you * So: VPN = good for low risk situations * BUT not so good for anonymity against a state actor Tor Browser -- works differently -- instead of connecting directly to server -- your connection is encrypted, bounced around x3 servers ('relays' or 'nodes') -- before being decrypted & sent to destination -- FIRST SERVER - knows your location -- SECOND SERVER - only knows data from FIRST SERVER -- THIRD SERVER - only knows that data from SECOND SERVER -- anonymity is provided as the third server cannot know origin of data -- majority of Tor servers not 'malicious' (do not log activity) -- nearly impossible to associate end-data of chain to origin -- very effective / takes significant state actor effort to de-anonymise -- bonus: encryption by Tor to prevent - eg. ISP from seeing your traffic -- caution: decryption at last server ('exit relay') = point of vulnerability -- it is at this point your data can be spied upon -- therefore regular HTTP unencrypted connection relay of data (a no-no) -- can be read in its entirety at the exit relay by the operator of the exit relay -- however, using an add-on like HTTPS-Everywhere -- equals safely encrypted data -- with HTTPS even malicious server could not de-anonymise * unless content contains personal info (email, name, address, etc) COMMENT: I'm confused. If HTTPS is supposed to be an encryption add-on -- how can a malicious server de-anonymise if personal data is included -- if encryption is supposed to be in place? -- makes no sense to me: that's not encryption TOR - HIGHER SECURITY PRIVACY BROWSING ANONYMITY vs SPEED -- much slower than VPN -- but far better re anonymity -- avoid watching videos or downloading torrents -- bad for entire network & extremely slow -- best for high level anonymity needs -- eg. high threat levels = law enforcement scenarios -- journalists dealing w. sensitive sources, whistleblowers, political activists -- those living under oppressive state surveillance etc [comment: all of us under US empire mass surveillance oppression ... LOL] -- use Tor if adversary is "more dangerous than a DMCA complaint" (copyright) -- promises provided by VPN companies = not enough. Use Tor. -- *do not treat Tor as if it were bullet-proof -- with enough time, de-anonymization is possible by agencies such eg. NSA -- using Tor = best bet, unless you are an NSA high-value target -- using tor for low bandwidth static sites helps 'populate' the Tor traffic -- & providing cover for those who need Tor for vital reasons -- note: Tor is only an ANONYMITY TOOL -- without operational security (see OPSEC), anonymity tools rendered useless -- watch bad habits - can reveal ID to the motivated adversary -- keep torrenting to VPN -- VPN - EVERYDAY BROWSING PRIVACY -- VPN good for low-risk/bandwidth-heavy purposes -- VPN's are good for VIDEOS & TORRENTS task OPSEC -- operational security https://grugq.github.io/ The Grugq -- teach operational security (OPSEC) -- ie good security habits http://grugq.tumblr.com/ Source: The Tin Hat https://thetinhat.com/tutorials/darknets/tor-vpn.html |
July 31, 2015
Tor Vulnerability - Traffic Analysis Identifies Guard Servers
SOURCE http://fusion.net/story/175068/sorry-the-way-you-type-is-exposing-your-identity-online-even-if-youre-browsing-anonymously/--------------------- COMMENT
So:
Imagine the Tor people are adapting to the fake packet fix, whatever that is.My reference to 'server' should probably read 'node' in the Tor network, I would think.
------- ------- -------
Data transferred by computer is sent via 'packets'. Due to size constraints, data sent out is broken up and reassembled at the destination.These are just notes for my benefit. Hoping I have the info. straight. LOL --------------------- MORE MIT researchers figure out how to break Tor anonymity without cracking encryption |
April 01, 2015
Don't Get Angry: Encrypt
AUSTRALIAN DIGITAL RAPE BY BRADIS & CO Why people ignore data retentions many perils REMEDY
Encryption https://www.gnupg.org/ http://en.wikipedia.org/wiki/GNU_Privacy_Guard
Anonymising https://www.torproject.org/ Tor - Explained
..........................................................................
...........................................................................
Photo: Alex Ellinghausen COPYRIGHT DISCLAIMER Regarding the SMH article, 'rape by Bradis & Co' is my take rather than SMH's ... just so there's no confusion. ;) The snail-mail version of this would have been going on back in the 50s and 60s, when the Australian govt was in full surveillance and political suppression and sabotage mode, to blot out the 'evil' of communism. But it isn't Russians and communists looking evil now; it's the totalitarian West. Instead of getting angry but then just accepting the inevitable prison population living conditions: Intend to keep at it until I get some kind of feel and overview for privacy tech basics, from a consumer perspective. Only I'm rather lazy ... VIDEO GPG for Journalists - Windows edition | Encryption for Journalists | Anonymous 2013 from anon108 on Vimeo. |
Subscribe to:
Posts (Atom)