Search My Notes
There are many pages of posts on many subjects, and only a few show on this main page. Search for the subjects that you are interested in.
Topics covered in here tend toward Gadgetry, Weapons, Books, Tools, and a lot of other things that have captured my interest.
Please note the "Linked From Here" tab on the results, which lists search results from sites I have linked to in my posts.
Topics covered in here tend toward Gadgetry, Weapons, Books, Tools, and a lot of other things that have captured my interest.
Please note the "Linked From Here" tab on the results, which lists search results from sites I have linked to in my posts.
TOR, for the Paranoid! (Totally anonymous web browsing)
Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're traveling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.
Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
(Me)
(Home)
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment