anoniem   24

Na Snapchat komt Rumr: 'The anonymous messaging app teens will love until it makes them cry' #pesten #anoniem #prive
pesten  anoniem  prive 
november 2013 by jburkunk
Lekken naar Tweakers via Publeaks is nu mogelijk - IT Pro - Nieuws - Tweakers
Ze kunnen dit doen via de site Aangeraden wordt om het uploaden via de Tor-browser te laten verlopen om anonimiteit te garanderen.
cognitief  tweakers  anoniem  publeak  christian 
november 2013 by sustainitycoach
Vijf tips om anoniem te blijven in een politiestaat | Webwereld
m.n. de discussie is ook interessant hoewel iedereen eigen definitie politiestaat hanteert.
anoniem  privacy  web 
january 2011 by sustainitycoach
CCS - No Operator Email Action Form
E-Mail in Adresse kann beliebig angepasst werden
email  e-mail  mail  anoniem 
november 2010 by ritzmann
Hints and Tips for Whistleblowers
If you are leaking information to the press or broadcast media or to higher management in companies and organisations, or to external regulatory bodies, they all invariably need some documentary proof of what you are telling them, e.g. a document or memo or advance copy of a report, or photographic images or an email. etc.

Hopefully the following technical (and common sense) hints and tips will make you think about whether you are properly protecting yourself or your anonymous sources, given the complexity and power of modern communications and the means to snoop on them.
lek  klokkenluiders  tutorial  tips  lijst  lekken  anoniem  privacy  netwerk  klokkenluider 
august 2010 by thijsniks
5 Ways To Download Torrents Anonymously | TorrentFreak
With anti-piracy outfits and dubious law-firms policing BitTorrent swarms at an increasing rate, many Bittorrent users are looking for ways to hide their identities from the outside world. To accommodate this demand we’ll give an overview of 5 widely used privacy services.
torrentfreak  artikel  lijst  bittorrent  anoniem 
august 2010 by thijsniks
Conversations About The Internet #5: Anonymous Facebook Employee - The Rumpus
Afterwards, we went out for a drink at the Dutch Goose, a bar popular with techies and Stanford graduate students, where most of this conversation took place. Though forthcoming, my friend was anxious to preserve her anonymity; Facebook employees, after all, know better than most the value of privacy. As she is not permitted to divulge company secrets, and would like to remain employed, her name has been omitted from this interview. It provides an interesting snapshot of the inner workings and culture of Facebook in the summer of 2009.
the-rumpus  facebook  privacy  data  interview  anoniem 
january 2010 by thijsniks
tor2web: visit anonymous websites
Here's how it works: Imagine you've got something that you want to publish anonymously, like the Federalist Papers or leaked documents from a whistleblower. You publish them via HTTP using a Tor hidden service; that way your anonymity is protected. Then people access those documents through tor2web; that way anyone with a Web browser can see them.
tor  tor2web  webservice  privacy  anonimiteit  anoniem 
august 2009 by thijsniks
Help Protesters in Iran: Run a Tor Bridge or a Tor Relay | Electronic Frontier Foundation
As turmoil over the disputed election in Iran continues, many techs are trying to find ways to help Iranian citizens safely communicate and receive information despite the barriers being established by Iranian authorities. One tactic that even moderately tech-savvy Internet users can employ is to set up a Tor relay or a Tor bridge.
eff  tor  iran  demonstratie  anoniem  netwerk  internet 
june 2009 by thijsniks
Mixminion: a Type III anonymous remailer
Mixminion is the reference implementation of the Type III Anonymous Remailer protocol.
mixminion  e-mail  type3  remailer  privacy  anoniem  internet  netwerk 
june 2009 by thijsniks
Anonymity | Electronic Frontier Foundation
The tradition of anonymous speech is older than the United States. Founders Alexander Hamilton, James Madison, and John Jay wrote the Federalist Papers under the pseudonym "Publius," and "the Federal Farmer" spoke up in rebuttal. The US Supreme Court has repeatedly recognized rights to speak anonymously derived from the First Amendment.
anoniem  eff 
june 2009 by thijsniks
Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise
Egerstad says it wasn't just e-mail that was exposed but instant messages passed internally between workers and any other web traffic that crossed the network. Among the data he initially collected was e-mail from an Australian embassy worker with the subject line referring to an "Australian military plan."
tor  wired  artikel  anoniem  internet  e-mail  eff  cryptografie  beveiliging 
june 2009 by thijsniks
GNUnet - GNU’s framework for secure P2P networking
GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. A first service implemented on top of the networking layer allows anonymous censorship-resistant file-sharing. Anonymity is provided by making messages originating from a peer indistinguishable from messages that the peer is routing. -- GNUnet is (or at least will become) the best solution for (anonymous) file-sharing.
gnunet  gnu  p2p  anoniem  privacy  internet  netwerk  bestandsdeling 
june 2009 by thijsniks
Who uses Tor?
While it is thrilling to speculate about undesired effects of Tor, when it succeeds, nobody notices. This is great for users, but not so good for us, since publishing success stories about how people or organizations are staying anonymous could be counterproductive. For example, we talked to an FBI officer who explained that he uses Tor every day for his work — but he quickly followed up with a request not to provide details or mention his name.
tor  privacy  anoniem 
june 2009 by thijsniks

related tags

anonimisering  anonimiteit  anonym  anonymous  antispam  artikel  bestandsdeling  beveiliging  bittorrent  browser  christian  cognitief  criticism  cryptografie  data  demonstratie  disposable  download  e-mail  eff  email  enquete  facebook  free-haven  free  gnu  gnunet  had-to-say  hoaxmail  hosting  html  internet  interview  iran  klokkenluider  klokkenluiders  lek  lekken  lijst  mail  mening  mixminion  netwerk  p2p  paper  pdf  pesten  privacy  prive  proxy  publeak  publicatie  remailer  security  sent  spam  spoof  surfen  the-rumpus  tips  tomail  tools  tor  tor2web  torrentfreak  tutorial  tweakers  twitter  type3  veiligheid  veröffentlichen  web  webapp  webdesign  webservice  wired 

Copy this bookmark: