Article SOURCE http://searchengineland.com/google-to-censor-worldwide-sorta-243938
The right to information trumps any 'right to be forgotten' nonsense, designed to cover up for crooks & crooked politicians in Europe -- and to keep prisoner of war Germans from seeing historical material or whatever it is they are blocking from examination, in the likes of POW Germany.
Europeans on VPNs & Tor should be able to bypass this nonsense to see what their politicians are *hiding* ... depending on where the exit node is (but you just keep at it until you get the country you need ... lol). On consideration, I expect that the *majority* of Europeans online will not be accessing VPNs or Tor, so this leaves the PUBLIC of INDIVIDUAL EUROPEAN STATES vulnerable to CENSORSHIP & MANIPULATION: ie POLITICAL SUPPRESSION by individual NATION STATES, as they see fit (ie. in favour of measures furthering the US-NATO & EU policy that's devastating Europe). Reason: Withholding information amounts to DENIAL OF INFORMED CONSENT. |
TOKYO MASTER BANNER
MINISTRY OF TOKYO
|
Showing posts with label Tor Browser. Show all posts
Showing posts with label Tor Browser. Show all posts
April 01, 2016
Google Agrees To “Right To Be Forgotten” Censorship Plan
Free VPN Providers
Article SOURCE as marked
Free VPN Providers
Got curious about masking online ID after downloading the WikiLeaks freebie book from Verso, and realising that my fake e-mail address and fake registration isn't much good when my online ID etc isn't masked. Didn't think to use Tor, though. Doh! But because the Tor communication would have maybe been linked to the e-mail used, maybe that option wasn't as secure as it could be? Not sure about that. But I'm guessing a freshie e-mail might have been better than the temp sort of partitioned one. LOL ... I'm not really good at hiding. Quick check indicates that VPNBook has been referred to in court discoveries and indictments against hactivist group members, by the look of this July 2013 article. I've not read comments. Reverted to Google search engine when I changed my OS (again) and stayed there because I was too lazy to find alternatives. Due to Google's provision of assistance to US-led multiple state actor aggression in the Middle East, I've ditched Google for https://duckduckgo.com/ (doesn't track), but I find myself hopping back onto Google frequently, as it's hard adjusting to being somewhere else and scrolling through search engine data, sort of feeling like you might be missing out on something vital (or missing what you think is quick and easy detection of key info). But in terms of the organisation overall, not too sure how reliable Google would actually be in that sense. With the US state being embedded in Google and Google being in bed with the US state, they're probably hiding info from us instead of helping us find it. ;) |
TOR vs VPN | WHICH TO USE
Source
The Tin Hat ... lol https://thetinhat.com/tutorials/darknets/tor-vpn.html TOR vs VPN | WHICH TO USE Tor & VPN described as often conflated -- but Tor & VPN are different -- which is more suitable depends on context Essentially:
Tor: for activists & 'secret squirrels' / not for video downloads
[caution: not bullet-proof]
vs
VPN: for (not vital) everyday anonymity / good for downloads
VPNs -- take connection -- encrypt connection -- pass connection through server -- contact goes via VPN server to connection site sought -- ie: it provides encryption & diversion of your online traffic
A.
-- what you are doing & who you are connecting with not visible-- eg. public wifi: those watching get jumbled info sent to random server -- same applies to Internet Service Provider (ISP) B. -- site visited does not know your geolocation (privacy enhanced) -- this permits by-passing geographic restrictions on services Note: * what you do through VPN is know by operator of the VPN * VPN services claim not to log activity but this is only a representation that may be dishonoured * eg. if VPN provider is issued with a court order for info on your activities * VPN provider would likely find some way to link your activity back to you * So: VPN = good for low risk situations * BUT not so good for anonymity against a state actor Tor Browser -- works differently -- instead of connecting directly to server -- your connection is encrypted, bounced around x3 servers ('relays' or 'nodes') -- before being decrypted & sent to destination -- FIRST SERVER - knows your location -- SECOND SERVER - only knows data from FIRST SERVER -- THIRD SERVER - only knows that data from SECOND SERVER -- anonymity is provided as the third server cannot know origin of data -- majority of Tor servers not 'malicious' (do not log activity) -- nearly impossible to associate end-data of chain to origin -- very effective / takes significant state actor effort to de-anonymise -- bonus: encryption by Tor to prevent - eg. ISP from seeing your traffic -- caution: decryption at last server ('exit relay') = point of vulnerability -- it is at this point your data can be spied upon -- therefore regular HTTP unencrypted connection relay of data (a no-no) -- can be read in its entirety at the exit relay by the operator of the exit relay -- however, using an add-on like HTTPS-Everywhere -- equals safely encrypted data -- with HTTPS even malicious server could not de-anonymise * unless content contains personal info (email, name, address, etc) COMMENT: I'm confused. If HTTPS is supposed to be an encryption add-on -- how can a malicious server de-anonymise if personal data is included -- if encryption is supposed to be in place? -- makes no sense to me: that's not encryption TOR - HIGHER SECURITY PRIVACY BROWSING ANONYMITY vs SPEED -- much slower than VPN -- but far better re anonymity -- avoid watching videos or downloading torrents -- bad for entire network & extremely slow -- best for high level anonymity needs -- eg. high threat levels = law enforcement scenarios -- journalists dealing w. sensitive sources, whistleblowers, political activists -- those living under oppressive state surveillance etc [comment: all of us under US empire mass surveillance oppression ... LOL] -- use Tor if adversary is "more dangerous than a DMCA complaint" (copyright) -- promises provided by VPN companies = not enough. Use Tor. -- *do not treat Tor as if it were bullet-proof -- with enough time, de-anonymization is possible by agencies such eg. NSA -- using Tor = best bet, unless you are an NSA high-value target -- using tor for low bandwidth static sites helps 'populate' the Tor traffic -- & providing cover for those who need Tor for vital reasons -- note: Tor is only an ANONYMITY TOOL -- without operational security (see OPSEC), anonymity tools rendered useless -- watch bad habits - can reveal ID to the motivated adversary -- keep torrenting to VPN -- VPN - EVERYDAY BROWSING PRIVACY -- VPN good for low-risk/bandwidth-heavy purposes -- VPN's are good for VIDEOS & TORRENTS task OPSEC -- operational security https://grugq.github.io/ The Grugq -- teach operational security (OPSEC) -- ie good security habits http://grugq.tumblr.com/ Source: The Tin Hat https://thetinhat.com/tutorials/darknets/tor-vpn.html |
January 11, 2016
Twitter Public Rape Policy - Extends to Tor Browser
ꕤ
TWITTER CENSORSHIP
Twitter Public Rape Policy Extends to Tor Browser
BY TWITTER TWATS
POLITICAL OPPRESSION TOR BROWSER BLOCK
The f*ckers at Twitter have BLACKLISTED TOR BROWSER IPs!!!
** Jesus, the text is really blurry looking at the display version of this.
Don't know if it's the colours I've chosen, or my eyesight is going. lol
ꕤ
|
December 14, 2015
NPD Germany - End Boomerang Economic Anti-Russia Sanctions
ꕤArticle SOURCE https://archive.is/00OSm
---------------------- ꕤ ----------------------
COMMENT NPD is the German nationalist-socialist party. The NPD is constantly harassed by the official German authorities, in attempts to shut down the political party. NPD has been (and probably currently is) infiltrated by government spies who have used entrapment in an attempt to shut down the party (which resulted in failure of the government's attempt to ban the party). Repeated attempts to ban the nationalist-socialist political party have been unsuccessfully so far, but there is a fresh 2015 attempt to ban the party. Note also that members are targeted by the extremist left and others (so anyone joining up might want to use an alias and an untraceable purpose-specific e-mail, I would guess). Check out the economic rebound to Germany. Sales to Russia stripped by almost 50% (if I'm reading that correctly ... I'm not really 'maths-y' ... lol). This article is directly off the NPD site, translated to English by Google.
https://npd.de/
via Firefox
Able to access via Tor Browser:*** Double checked to make sure I wasn't mistaken about the site. I'm not mistaken. The site must be blocked at my end.
Tor Browser NPD Site Access
But a Google Translate throws up this:
Tor Browser Google Translate Site (1)
Tor Browser Google Translate Site (2)
ꕤ
|
Subscribe to:
Posts (Atom)