anonymity   7065

« earlier    

Contribute to anonymouth development by creating an account on GitHub.
anonymity  github  analysis  privacy  writing  tools  anonymous 
8 days ago by nununo
nada - temporary email
You want to play with that weird website toy and it's just asking fro your email address to do it. This disposable email address service had decent 1-click ux and a really clean interface. Nice one.
email  Anonymity 
12 days ago by aiefel blog: Private VPN Endpoints for Family & Teams
Finally, a VPN has been built for the professionals or the (justifiably) paranoid. The team at is excited to introduce our Private VPN Endpoints for Family & Teams (and soon, all accounts!). Private Endpoints are hosted on AWS Compute instances and are available in most of the AWS regions worldwide. We’ve made much of the Private Endpoint code open-source, and you’re able to host your endpoint in your home, office, or datacenter. You will find the open-source code on GitHub.
Why did we build Private Endpoints?
We have always focused on privacy. Our goal is not only to provide anonymity and shield you from any criminal activity but also to offer you privacy when you are on public Wi-Fi. To achieve complete privacy, having your very own endpoint is a must. private endpoints are based on our public endpoint code and have been adapted to be built on Docker images.
vpn  privacy  security  anonymity  wi-fi  encryption 
14 days ago by rgl7194
DeepSound -> Overview |
Hide secret data in music files ; encrypt inside burned CD's
privacy  anonymity  anonymous  encryption  cryptography  music  tools  toolstouse 
22 days ago by tribbles
Trolls like those involved in Gamergate are even more hostile when they're using their real names on social media networks like Twitter (TWTR) and Facebook (FB) — Quartz
In research published this June in the journal PLoS One, Stahel studied comments on online petitions published on a German social media platform between 2010 and 2013. The data included 532,197 comments on about 1,600 online petitions. Commentators could choose to be public or anonymous. Contrary to expectations, the commentators with the harshest words during mass public attacks were more likely to be the name-identified ones than the anonymous ones (less than a third of commentators kept their names private).

That suggests we may need to rethink our efforts to encourage or enforce civility online. “Our results also do not support claims that prohibiting online anonymity will make the online world a better world,” Stahel explained by email. “The main point is that prohibiting anonymity online will not settle this ‘problem’ of firestorms.”
internet  anonymity  censorship 
5 weeks ago by juliusbeezer
Sets up a new server running L2TP/IPsec, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, a Tor bridge, and WireGuard. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
privacy  anonymity  tor  github  via:hanyu 
8 weeks ago by tribbles

« earlier    

related tags

access  activism  addon  address  advertising  against  altc2017  amazon  analysis  anonymous  app  apple  apps  article  audio  bitcoin  bittorrent  blockchain  business  captcha  catalonia  cdjns  censorship  china  chrome  circumvention  civil-liberty  cloud_services  cloudflare  code  communication  comparo  conferences  cookies  corporation  crime  crypto-anarchy  crypto  cryptocurrency  cryptography  curators  customer-support  daring_fireball  data  db  dc:creator=baynesian  dctagged  debian  dece  decentralized  desktop  digitalidentity  discovery  disposable  distribution  distro  dns  do_not_track  education  eff  email  encryption  ethereum  ethics  extension  facebook  facialrecognition  fbi  file_sharing  filesharing  firefox  forum  freespeech  github  google  gov2.0  hacker  hatespeech  hci  highereducation  hosting  howto  id  ideas  identity  ifttt  info-dynamics  infosec  internet  intimacy  ipfs  ipv6  journalism  jvm  language  lazyweb_tools  leak  leakage  linux  listening  machine-learning  machinelearning  madisonian  mail  map  market-power  mathematics  media  media_art  mediax  memes  mesh-networking  mlfairness  mobile  moral  morality  multi  music  namecoin  netflow  network  networking  networks  new_york  news  nlp  opensource  operating_systems  opsec  org:mag  os  oss  otf  p2p  paper  papers  paymentchannels  payments  pdf  peppercoin  personaldata  pewpew  pewpewmap  photography  piracy  platformcapitalism  platforms  plugin  pocket  podcasts  politics  power  prediction  privacy  protest  psychology  repo  review  roskomnadzor  routing  russia  saas  safari  scale  science  secure  security  seriousness  service  sexism  shielded  sleuthin  smartphones  social  socialmedia  software  sousveillance  spain  spam  speech  students  study  style  stylometry  subcultures  surveillance  surveillancecapitalism  sv  switzerland  sysadmin  tech  technology  technologyreview  techtariat  ted  test  the-transparent-citizen  tools  toolstouse  tor  trackers  tracking  tradecraft  traffic  trends  trolling  trust  tv  universities  usa  vampire-squid  volatile_file_sharing  vpn  web  web_security  whonix  wi-fi  wikipedia  winner-take-all  writing  yikyak  zcash 

Copy this bookmark: