anonyminity   35

Death Note: L, Anonymity & Eluding Entropy -
Contains an amazing list of ways to identify an anonymous individual.
via:HackerNews  anonyminity  security 
april 2018 by mcherm
The Darknet: A Quick Introduction for Business Leaders
via Pocket - The Darknet: A Quick Introduction for Business Leaders - Added December 09, 2016 at 10:05PM
IFTTT  Pocket  anonyminity  corporate  darknet  huge  tor  from twitter_favs
december 2016 by lgalli
Building a new Tor that can resist next-generation state surveillance | Ars Technica UK
A survey of the current state of items that are being built to replace or complement TOR.
anonyminity  privacy  via:HackerNews  ArsTechnica  tor 
september 2016 by mcherm
Jonathan Ive and the Future of Apple - The New Yorker
via Pocket - The Shape of Things to Come - Added January 04, 2016 at 03:29PM
IFTTT  Pocket  alan  dye  ammunition  anonyminity  apple  best  brunner  brutto  car  design  esslinger  frog  gagosian  history  ive  jewellery  lunar  luxury  magazine  marc  newson  new  yorker  orologi 
january 2016 by lgalli
How imageboard culture shaped Gamergate - Boing Boing
via Pocket - How imageboard culture shaped Gamergate - Added December 31, 2014 at 11:38PM
IFTTT  Pocket  4chan  anon  anonyminity  controversy  culture  gaming  identity  pseudonimity 
january 2015 by lgalli
Hot or Not: Revealing Hidden Services by their Clock Skew
An astounding side channel attack to locate a TOR server. Close observation can detect even tiny clock drifts. Quartz clocks change speed with temperature. CPU load changes temperature. Use this to probe even TOR hidden services to find if they are on a target machine and if they share space with another TOR service.
security  blogworthy  privacy  tor  anonyminity  sidechannelattack  via:reddit 
may 2014 by mcherm
Introducing Strongbox, a Tool for Anonymous Document-Sharing : The New Yorker
The New Yorker sets up a mechanism for accepting fully anonymous documents without being able to tell where they are coming from.
journalism  anonyminity  via:HackerNews  cryptography 
may 2013 by mcherm
How the Great Firewall of China Blocks Tor | threatpost
China can detect and block Tor. They send probes to the machines to which users are making encrypted connections and begin the Tor exchange protocol until they get far enough to get some identifying behavior. This is phenomenally difficult to defend against.
security  china  tor  anonyminity 
january 2012 by mcherm
Pipl - People Search
A people search site that gathers information from many other places and is surprisingly effective.
useful  privacy  via:HackerNews  identity  identitytheft  anonyminity 
december 2011 by mcherm
Google Rejects 2-Step Plan to End Nymwars
Apparently Larry Page said "no" to the idea of solving it by just not insisting on real names. I really wish I knew what reasons he gave... this is only hearsay.
nymwars  google  anonyminity  via:boingboing 
october 2011 by mcherm
Iran blocks Tor; Tor releases same-day fix | The Tor Blog
Iran looked at expiration times on SSL certs and the ones TOR uses were unusual. So they made them look normal, but if Iran is sufficiently motivated they can probably block TOR. Worse yet, they could try to DETECT the use of TOR.
security  tor  internet  anonyminity  via:HackerNews  from delicious
september 2011 by mcherm
“Real Names” Policies Are an Abuse of Power « Social Media Collective
A well-written explanation of why a "real names only" policy is harmful to women and minorities.
via:HackerNews  anonyminity  googleplus  facebook  privacy  from delicious
august 2011 by mcherm
Why Real ID is a Really Bad Idea | Hellmode
This is a horrible idea. Forcing people to sign real life name to a forum post is problematic on a basic level. The internet is largely what it is because of its anonymity–for better and for worse. Many great discussions have been had solely because someone could submit their words without worry of being judged. While it’s unavoidable that some people use anonymity to grief others, they aren’t as large factor on forums as heavily moderated as Blizzard’s. When Blizzard offers that requiring the inclusion of real life names will make gamers more civil and promote polite discussion, I must wonder if they’ve seen most gamers. The ones who played by the rules–who will sign at the dotted x on every forum post–were never the ones who were meant to be civilized. In fact, they are the ones being punished by this new system.
blizzard  social  anonyminity 
july 2010 by enne
TOR for Android: anonymize your phone's data-connection - Boing Boing
An article on Boing Boing says they have TOR for android. I haven't been able to navigate to the site itself.
android  security  anonyminity  via:boingboing 
april 2010 by mcherm
Court case shows limits of anonymous blogging - Ars Technica
You have a right to be anonymous on the internet, but there are limits to that right and in extreme cases (like this) a court may decide to unmask you. Or if it's a big corporation asking. (That last bit is just sarcasm from me.)
anonyminity  via:ArsTechnica  ArsTechnica  law 
october 2009 by mcherm

related tags

4chan  advice  alan  ammunition  android  anon  anonymous  apple  arstechnica  articles  best  bigbrother  bigbusiness  bittorrent  blizzard  blog  blogworthy  bruceschneier  brunner  brutto  car  china  communication  controversy  corporate  cryptography  culture  darknet  design  development  doubleclick  dye  eff  email  essay  esslinger  facebook  frog  gagosian  gaming  google  googleplus  history  howto  huge  identity  identitytheft  ifttt  internet  ive  jewellery  journalism  law  lunar  luxury  magazine  marc  materials  monitoring  mypostings  netflix  new  newson  newspapers  nymwars  orologi  p2p  personal_net  phone  pocket  privacy-internet  privacy  pseudonimity  rights  ruby  science  security  sidechannelattack  social  surveillance  technology  the-onion-router  tips  tor  tutorial  useful  web  yorker 

Copy this bookmark: