Article SOURCE as marked
Free VPN Providers
Got curious about masking online ID after downloading the WikiLeaks freebie book from Verso, and realising that my fake e-mail address and fake registration isn't much good when my online ID etc isn't masked. Didn't think to use Tor, though. Doh! But because the Tor communication would have maybe been linked to the e-mail used, maybe that option wasn't as secure as it could be? Not sure about that. But I'm guessing a freshie e-mail might have been better than the temp sort of partitioned one. LOL ... I'm not really good at hiding. Quick check indicates that VPNBook has been referred to in court discoveries and indictments against hactivist group members, by the look of this July 2013 article. I've not read comments. Reverted to Google search engine when I changed my OS (again) and stayed there because I was too lazy to find alternatives. Due to Google's provision of assistance to US-led multiple state actor aggression in the Middle East, I've ditched Google for https://duckduckgo.com/ (doesn't track), but I find myself hopping back onto Google frequently, as it's hard adjusting to being somewhere else and scrolling through search engine data, sort of feeling like you might be missing out on something vital (or missing what you think is quick and easy detection of key info). But in terms of the organisation overall, not too sure how reliable Google would actually be in that sense. With the US state being embedded in Google and Google being in bed with the US state, they're probably hiding info from us instead of helping us find it. ;) |
TOKYO MASTER BANNER
MINISTRY OF TOKYO
|
April 01, 2016
Free VPN Providers
TOR vs VPN | WHICH TO USE
Source
The Tin Hat ... lol https://thetinhat.com/tutorials/darknets/tor-vpn.html TOR vs VPN | WHICH TO USE Tor & VPN described as often conflated -- but Tor & VPN are different -- which is more suitable depends on context Essentially:
Tor: for activists & 'secret squirrels' / not for video downloads
[caution: not bullet-proof]
vs
VPN: for (not vital) everyday anonymity / good for downloads
VPNs -- take connection -- encrypt connection -- pass connection through server -- contact goes via VPN server to connection site sought -- ie: it provides encryption & diversion of your online traffic
A.
-- what you are doing & who you are connecting with not visible-- eg. public wifi: those watching get jumbled info sent to random server -- same applies to Internet Service Provider (ISP) B. -- site visited does not know your geolocation (privacy enhanced) -- this permits by-passing geographic restrictions on services Note: * what you do through VPN is know by operator of the VPN * VPN services claim not to log activity but this is only a representation that may be dishonoured * eg. if VPN provider is issued with a court order for info on your activities * VPN provider would likely find some way to link your activity back to you * So: VPN = good for low risk situations * BUT not so good for anonymity against a state actor Tor Browser -- works differently -- instead of connecting directly to server -- your connection is encrypted, bounced around x3 servers ('relays' or 'nodes') -- before being decrypted & sent to destination -- FIRST SERVER - knows your location -- SECOND SERVER - only knows data from FIRST SERVER -- THIRD SERVER - only knows that data from SECOND SERVER -- anonymity is provided as the third server cannot know origin of data -- majority of Tor servers not 'malicious' (do not log activity) -- nearly impossible to associate end-data of chain to origin -- very effective / takes significant state actor effort to de-anonymise -- bonus: encryption by Tor to prevent - eg. ISP from seeing your traffic -- caution: decryption at last server ('exit relay') = point of vulnerability -- it is at this point your data can be spied upon -- therefore regular HTTP unencrypted connection relay of data (a no-no) -- can be read in its entirety at the exit relay by the operator of the exit relay -- however, using an add-on like HTTPS-Everywhere -- equals safely encrypted data -- with HTTPS even malicious server could not de-anonymise * unless content contains personal info (email, name, address, etc) COMMENT: I'm confused. If HTTPS is supposed to be an encryption add-on -- how can a malicious server de-anonymise if personal data is included -- if encryption is supposed to be in place? -- makes no sense to me: that's not encryption TOR - HIGHER SECURITY PRIVACY BROWSING ANONYMITY vs SPEED -- much slower than VPN -- but far better re anonymity -- avoid watching videos or downloading torrents -- bad for entire network & extremely slow -- best for high level anonymity needs -- eg. high threat levels = law enforcement scenarios -- journalists dealing w. sensitive sources, whistleblowers, political activists -- those living under oppressive state surveillance etc [comment: all of us under US empire mass surveillance oppression ... LOL] -- use Tor if adversary is "more dangerous than a DMCA complaint" (copyright) -- promises provided by VPN companies = not enough. Use Tor. -- *do not treat Tor as if it were bullet-proof -- with enough time, de-anonymization is possible by agencies such eg. NSA -- using Tor = best bet, unless you are an NSA high-value target -- using tor for low bandwidth static sites helps 'populate' the Tor traffic -- & providing cover for those who need Tor for vital reasons -- note: Tor is only an ANONYMITY TOOL -- without operational security (see OPSEC), anonymity tools rendered useless -- watch bad habits - can reveal ID to the motivated adversary -- keep torrenting to VPN -- VPN - EVERYDAY BROWSING PRIVACY -- VPN good for low-risk/bandwidth-heavy purposes -- VPN's are good for VIDEOS & TORRENTS task OPSEC -- operational security https://grugq.github.io/ The Grugq -- teach operational security (OPSEC) -- ie good security habits http://grugq.tumblr.com/ Source: The Tin Hat https://thetinhat.com/tutorials/darknets/tor-vpn.html |
WikiLeaks: Google & Al-Jazeera Encouraged Civil War In Syria
Article SOURCE http://www.mintpressnews.com/wikileaks-google-al-jazeera-encouraged-civil-war-syria/215163/
It took the Western alliance 8 years to set up opposition in the Libya and to attack Libya in 2011, in the guise of 'protecting' the civilians: a population that was then pitched into civil war that still continues.
PS ... |
Actual Crimes vs. 'Theoretical' Crimes - USA: Free Viktor Bout
Article SOURCE as marked Actual Crimes vs. 'Theoretical' Crimes USA: Free Viktor Bout
The US makes sure that it is not held accountable for the crimes it commits -- crimes against entire countries (eg illegal bombing Serbia; illegal invasion Iraq; massive civilian casualties Afghanistan; 500,000 dead children Iraq; destruction of Libya; proxy attack on Syria; destabilising Africa and Middle East (plus loss of life, displaced persons etc) and so on. Actual crimes.
IRAQ - 500,000 Dead Children
'WORTH IT'
Check out their over 30 CIA agents kidnapping and illegal transfer for torture from what is supposed to be a sovereign state: Italy (above).
|
Ukraine Intelligence (SBU) and CIA - Plot to Seize Russian FSB Officer Uncovered
Article SOURCE http://www.upi.com/Top_News/World-News/2016/03/31/CIA-trained-Ukrainian-spy-arrested-in-Russia/1101459427710/ Ukraine Intelligence (SBU) and CIA - Plot to Seize Russian FSB Officer Uncovered
|
Book: THE WIKILEAKS FILES - 24-hr Freebie: e-book
1-DAY FREEBIE
|
The Kitchen - Scallopini
Chicken Scallopini
(Very overdone ... oops)
Click to Enlarge
Click to Enlarge
Click to Enlarge
|
Subscribe to:
Posts (Atom)