Frontrunner + tor   11

How to Encrypt Your Entire Life in Less Than an Hour
Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately lead the personal computer revolution as the CEO of Intel. He died earlier this year in Silicon Valley after a long fight with Parkinson’s disease.

When one of the most powerful people in the world encourages us to be paranoid, maybe we should listen.

And Grove isn’t the only powerful person urging caution. Even the director of the FBI — the same official who recently paid hackers a million dollars to unlock a shooter’s iPhone — is encouraging everyone to cover their webcams.

But you obey the law. What do you have to worry about? As the motto of the United Kingdom’s surveillance program reminds us, “If you’ve got nothing to hide, you’ve got nothing to fear.”

Well, law-abiding citizens do have reason to fear. They do have reasons to secure their devices, their files, and their communications with loved ones.

“If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.” — Cardinal Richelieu in 1641

In this article, I will show you how you can protect yourself by leveraging state-of-the-art encryption. In a single sitting, you can make great strides toward securing your privacy.
encryption  tools  tor  signal  privacy  security  2016 
november 2016 by Frontrunner
Tor Users Might Soon Have a Way to Avoid Those Annoying CAPTCHAs
If you’ve ever used the Tor anonymity software to browse the web, there’s a good chance you’re very familiar with CAPTCHAs, the prove-you’re-a-human puzzles that have you select images containing street signs, storefronts, or bodies of water before accessing a site.

Tor users have to solve these puzzles constantly, and privacy advocates have complained that it dramatically degrades the experience of people who want to browse the web anonymously. CloudFlare, a content delivery network that has widely implemented CAPTCHAs, has staunchly defended its use against Tor-associated IP addresses, saying the tests are necessary to defend sites against bots and spammers since a the large amount of malicious traffic originates from the Tor network.

But a new repository on CloudFlare’s Github page shows that the company is developing an alternative method for anonymous users to access sites without having to repeatedly solve annoying CAPTCHA puzzles—something privacy advocates will likely see as a step in the right direction.
tor  captcha  cloudflare  bypass  2016 
october 2016 by Frontrunner
How Tor Works
01. Introduction
02. Threat Model and Goals
03. Onion Routing 101
04. Circuits and Connection Pooling
05. Directory System
06. How does a relay join the Tor cluster?
07. Conclusion
08. Resources
tor  howstuffworks  security  privacy  cryptography  network  learning  2016 
september 2016 by Frontrunner
NSA Classifies Linux Journal Readers, Tor and Tails Linux Users as "Extremists"
Are you a Linux Journal reader or use software such as Tor and Tails Linux? If so, you've probably been flagged as an "extremist" by the NSA. Leaked documents related to the XKeyscore snooping program reveal that the agency is targeting anyone who is interested in online privacy, specifically those who use the aforementioned software and visit the Linux user community website.
nsa  xkeyscore  linux  tor  tails  extremists  surveillance  privacy  2014 
july 2016 by Frontrunner
Mozilla Awards $385,000 to Open Source Projects as part of MOSS “Mission Partners” Program
Tor: $152,500
Tails: $77,000
Caddy: $50,000
Mio: $30,000
DNSSEC/DANE Chain Stapling: $25,000
Godot Engine: $20,000
PeARS: $15,500
NVDA: $15,000
mozilla  opensource  awards  donations  tor  tails  caddy  mio  dnssecdane  godot  engine  pears  nvda  2016 
june 2016 by Frontrunner
Going Dark: Online Privacy and Anonymity for Normal People
Last week we got news of the Rosebutt data breach. This is a very particular class of site and like many others we've recently seen compromised, it's highly likely that members would have preferred to keep their identities secret. It doesn't matter if you don't agree with the lifestyle choice of those on the site and certainly I myself am not one to look around the house at everyday items and think "I wonder if that could...". That's entirely beside the point though which is that a bunch of consenting adults now have their identities in the hands of an untold number of people who are willingly sharing the data around web. But it didn't have to be that way.
privacy  security  anonymize  internet  scams  tor  email  bestpractices  2016 
may 2016 by Frontrunner
Developer of Anonymous Tor Software Dodges FBI, Leaves US
The FBI's attempts to break into Tor are starting to manifest in strange ways.

FBI agents are currently trying to subpoena one of Tor's core software developers to testify in a criminal hacking investigation, CNNMoney has learned.

But the developer, who goes by the name Isis Agora Lovecruft, fears that federal agents will coerce her to undermine the Tor system -- and expose Tor users around the world to potential spying.

That's why, when FBI agents approached her and her family over Thanksgiving break last year, she immediately packed her suitcase and left the United States for Germany.
tor  fbi  developer  lawenforcement  privacy  security  2016 
may 2016 by Frontrunner
1 Million People Use Facebook Over Tor
People who choose to communicate over Tor do so for a variety of reasons related to privacy, security and safety. As we've written previously it's important to us to provide methods for people to use our services securely – particularly if they lack reliable methods to do so.
This is why in the last two years we built the Facebook onion site and onion-mobile, helped standardise the ".onion" domain name, and implemented Tor connectivity for our Android mobile app by enabling connections through Orbot.
facebook  tor  privacy  security  android  2016 
april 2016 by Frontrunner
Judge Who Authorized Police Search of Seattle Privacy Activists Wasn't Told They Operate Tor Network
One week after Seattle police searched the home of two well-known privacy activists for child porn and found nothing, critics are questioning why the department failed to include a key piece of information in its application for a warrant—the fact that the activists operated a Tor node out of their apartment, in order to help internet users all over the world surf the web anonymously.
privacy  lawenforcement  tor  police  2016 
april 2016 by Frontrunner
OnionShare lets you securely and anonymously share files of any size. It works by starting a web server, making it accessible as a Tor hidden service, and generating an unguessable URL to access and download the files. It doesn't require setting up a server on the internet somewhere or using a third party filesharing service. You host the file on your own computer and use a Tor hidden service to make it temporarily accessible over the internet. The other user just needs to use Tor Browser to download the file from you.
privacy  security  filesharing  anonymous  anonymize  tool  opensource  free  tor 
april 2016 by Frontrunner
Inline Onion Pi
This is a shell script to create an onion router proxy for your Raspberry Pi with a USB Ethernet adapter from a stock Moebius Linux image. This will allow you to plug your Pi directly into your network and force all TCP traffic to be directed through tor, and force all UDP traffic to be dropped.
raspberrypi  tor  linux  filters  privacy  security 
march 2016 by Frontrunner

Copy this bookmark: