Como baixar o TOR BROWSER no Ubuntu(e derivados). – Video


Como baixar o TOR BROWSER no Ubuntu(e derivados).
Site do TOR: https://www.torproject.org/download/download-easy.html.en Obrigado por assistir o vdeo,gravei no meu notebook,por isso o audio ficou ruim,mas futuramente vou separar um HD pro...

By: LinuxFacilitado[Tutoriais e Gameplays]

Read more from the original source:

Como baixar o TOR BROWSER no Ubuntu(e derivados). - Video

Surfing safely over the Tor anonymity network – Part 2: Tor Browser, Georg Koppen – Video


Surfing safely over the Tor anonymity network - Part 2: Tor Browser, Georg Koppen
For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is...

By: Owasp Gteborg

See the original post here:

Surfing safely over the Tor anonymity network - Part 2: Tor Browser, Georg Koppen - Video

Snowden-approved: The Citizenfour hackers toolkit

One of the interesting reveals at the end of Citizenfour, the recent Academy Award-winning documentary about Edward Snowden, was the thanks it gives to various security software programs. The information that Snowden leaked two years ago continues to reverberate today, and it kicked off renewed interest in data security, privacy, and anonymity. Based on the closing credits in the movie, weve put together aguide tosome of the major security software programs and operating systems available. If youve wanted to take steps to secure your own information, but were uncertain where to start, this articleshould get you headed in the right direction.

The Tor Security Bundle is probably the best-known of the software products well discuss today. The Tor browser is easy to install and set up; its based on Firefox 31.5.0, but as the program warns, simply using Tor isnt enough to secure your Internet browsing. If you want to remain anonymous on the Tor network, youll need to also do the following:

Configuring Tor is relatively easy. Once youve begun the installation process, youll be asked to choose whether you want to connect directly to Tor or through a bridge relay, as shown below:

Make your choice, and the system finishes installing what looks like a standard version of Firefox with a few custom scripts and configuration options.

One caveat about using Tor for anonymous browsing is that the performance isnt going to be what youre used to from a standard connection. Tor uses multiple levels of encryption to hide destination IPs, and routes the information randomly across its own network to defeat spying. This helps prevent certain kinds of packet tracking, but it also introduces some substantial performance penalties.

The fact that Tor routing is randomized makes it tricky to estimate the performance impact of using it, but we ran a series of webpage loading tests anyway. Treat these as a useful ballpark rather than the final word. Page caches were cleared before the load tests for both standard Firefox (36.0.1) and the Tor Browsers version (31.5.0).

As you can see, load times for Tor are 3-4x higher than they are for other browsers. Thats the price you pay for anonymity.

Continued here:

Snowden-approved: The Citizenfour hackers toolkit

21 tips, tricks and shortcuts to help you stay anonymous online

Avoiding being tracked online is nearly impossible, but here are a few ways to reduce the risk.

Getty Images

Consider installing Mailvelope.

Mozilla Screenshot of Firefox private window. Mozilla This is perhaps one of the most basic privacy options that just about anyone can take advantage of. The top four most popular browsers - Google Chrome, Internet Explorer, Mozilla Firefox and Safari - have a private browsing mode, which can be found in their respective settings menus. With private browsing activated, your browser will not store cookies or internet history on your computer. This has very limited uses and is perhaps really only effective at hiding your browsing history from your significant other, siblings or parents. Private browsing does not securely hide your identity or browsing activities beyond your local machine as your IP address can still be tracked.

Dado Ruvic/Reuters A man is silhouetted against a video screen with a Twitter and a Facebook logo as he poses with a Dell laptop in this photo illustration taken in the central Bosnian town of Zenica, August 14, 2013. The amount of personal data that social networking sites like Facebook, Google Plus and Twitter have harvested from their billions of users is shocking. Head to facebook.com/settings and click Download a copy of your Facebook data and you might be surprised to see just how much information is on file. Everything from who you have poked, what events you have or have not attended and when and where you have logged into your account is logged and saved. Similar levels of data harvesting occurs on all major social media sites. This is the price you pay for using a free service. The only sure-fire way to avoid giving up this information is to delete your accounts entirely. A word of warning, deactivating your account is not the same as deleting it. Deactivating your account is sort of like putting it into hibernation - all your information is stored and can be re-activated if you have second thoughts. Always delete rather than deactivate an account if you wish to completely wipe it.

A large amount of websites track and collect the browsing habits of the users that visit them. These trackers are invisible and most people arent aware that theyre being tracked. Ghostery is a free browser extension - available on all major web browsers - that will reveal these trackers, also known as web bugs. You can then decide which web bugs youre comfortable with tracking you and which ones youd like to block. In total, Ghostery keeps track of over 1,900 companies. Each company has a profile in the Ghostery Knowledge Library, allowing you to better understand who and why someone is keeping tabs on you and what action you would like to take.

Getty Images Hushmail is currently very popular, it provides a private email account with no ads. Most of the well known and popular email services - Gmail, Hotmail, Yahoo Mail, Outlook - are not particularly privacy-friendly. For full Pretty Good Privacy (PGP) encrypted emails, consider signing up to a more secure provider. Hushmail is currently very popular, it provides a private email account with no ads, built-in encryption and unlimited email aliases. A limited free service is offered, with more features available for a monthly subscription fee. However, Hushmail is not above the law and in the past it has been forced to reveal user data to U.S. authorities following a court order. The company also logs user IP addresses. MyKolab is a similar service that has not revealed any user information in the past, however, they are also obliged to provide access to lawful interception requests so this still remains a possibility.

Arda Guldogan/Getty Images Keeping your real email address away from spammers is crucial to protecting your identity online. Disposable Email Addresses (DEAs) are anonymous and temporary. They allow users to quickly create new email addresses as-and-when theyre needed, which can then be disposed of after use. This is particularly useful for avoiding spam when filling in forms on websites that require an email address to proceed. Keeping your real email address away from spammers is crucial to protecting your identity online and DEAs are a great solution. Popular providers of this service include Guerrilla Mail and Mailinator, although there are hundreds out there to choose from. Most DEAs are not particularly secure, so it is not advised to use these services to send sensitive information - rather, use them as a way to avoid giving away your own information in situations where you are obliged to do so.

Virtual Private Networks (VPNs) are one of the most effective ways to protect your privacy online. A VPN essentially hides your IP address - your unique online identifier - and runs all your online data via a secure and encrypted virtual tunnel, which can keep websites from tracking your online activity or even knowing which country youre browsing from. These days, there are many VPNs to choose from. Hotspot Shield, TorGuard, CyberGhost and HideMyAss are some of the more popular ones that are currently available. Most of them require a small monthly subscription fee and they dont all provide the same list of features, so its worth shopping around for a VPN that suits you.

Tor Tors anonymity network allows access to the deep or hidden web. Originally developed with the U.S. Navy in mind as a way to protect government communications, Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Tors anonymity network allows access to the deep or hidden web, where websites can be created anonymously and individuals can communicate privately with each other. When using the Tor browser - which can be downloaded for free from torproject.org - it is very difficult for websites or individuals to track your online activity and location. However, while Tor is quite effective at protecting your online anonymity, it can be slow, complicated and restricting. Its also worth noting that while the network can and has been used for good, it has also been used for illicit purposes, such as selling drugs and distributing images of child abuse.

See the original post:

21 tips, tricks and shortcuts to help you stay anonymous online

What 'dark net' drug buyers say about their dealers

The now-defunct Silk Road site, with drugs for sale (AP)

But what is actually on the dark net? Despite all this noise, relatively little is known. It is, of course, incredibly difficult to research. What we do know is that 2.5 million people use the Tor Browser each day. Tor can be used to browse anything online, and is much-used by civil liberties activists, journalists, and suprisise surprise law enforcement themselves. A decent fraction use Tor to get into the dark net, where there are an estimated 60 thousand or so websites an uncensored blend of the good, the bad, and the very very ugly.

The busiest sites on the dark net are probably the notorious and numerous anonymous markets. Here, anything can be bought and sold: class A narcotics ordered with a click, paid for with the crypto-currency Bitcoin, and delivered direct to your home. For my book, The Dark Net, I spent a lot of time on these sites, trying to work out how and why they worked and even going through the process of buying a small amount of cannabis from one known as Silk Road 2.0.

It turns out the key to their success is not clever encryption, or Bitcoin, or even Tor. It's good old-fashioned customer service. Every visitor to the site, after using his or her drug, leaves a piece of written feedback about the gear and gives a score out of 5. It's a little surreal, but users take it pretty seriously, because it creates the genuinely informed competition and choice which keeps the market ticking over:

Decent coke at a reasonable price. Stealthy packaging. 5/5

First order was lost...I got a reship and now im very happy...Heaven is one of the best dealers on the road!!! Very friendly and good communication too. I will be back soon 😉 5/5

More here:

What 'dark net' drug buyers say about their dealers

Cebit 2015: Saarland computer scientists present guarantees for online anonymity

IMAGE:Sebastian Meiser and Esfandiar Mohammadi provide guarantees of users' anonymity within the Tor network. view more

Credit: Oliver Dietze

This news release is available in German.

Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain disease, for example. Seeing that this kind of private information can be linked to their identity, users will often resort to special online anonymization services. One of the most popular tools is Tor. Since the beginning of the year, alone more than two million users have used it to anonymize their Internet connection data. These services will not only conceal browsing behavior, but also the identity of the user, and that of any other recipients. These will usually be other websites, but could also be another person. Tor works in a way that allows users to establish a connection that is then upheld through its own network. The Tor network comprises up to 6,000 servers, mostly run by volunteers, which computer scientists refer to as "nodes". And since every node only receives the minimal amount of data necessary to relay the information in question, it becomes far more difficult to de-anonymize both the transmitter and the recipient of the data.

"The Tor network isn't perfect, however," says Esfandiar Mohammadi, a researcher at the Research Center for IT Security, CISPA, and a doctoral candidate at the Graduate School for Computer Science in Saarbrcken. "For one, unanticipated attacks at a network level can endanger anonymity. Also, the degree of anonymity the network achieves is highly variable, since volunteers don't necessarily operate their nodes continually or regularly," says Mohammadi.

In collaboration with CISPA researcher Sebastian Meiser, who is also a postgraduate at the Saarbrcken Graduate School for Computer Science, Mohammadi developed a program that can provide an accurate assessment of the level of anonymity an individual user achieves, even while basing the estimate on the fluctuations of the Tor network. According to the researchers, this feature is a worldwide first.

"An attacker that compromises Tor servers can derive the identity of a user with a certain probability. This is exactly what our system calculates," Sebastian Meiser explains. The two Saarbrcken researchers based their technique, which they named "MATor", on a mathematical model that they extended to include different categories of possible attacks. "In order to indicate the probability of de-anonymization, our program performs its calculations using data that is aggregated once an hour and published on the network immediately. MATor also takes the specifics of the respective Internet connection into account, as well as the individual configurations of the Tor software," Meiser says. This feature is also intended as a basis for a so-called plugin, a small extension program for the software "Tor Browser" that the researchers now want to develop. Integrated into the Tor software, this could run in the background and simply notify users as soon as their connection became too unsafe.

Computer science and informatics at Saarland University

The Department of Computer Science forms the core of the informatics landscape at Saarland University. A further seven internationally renowned research institutes are located in the immediate vicinity on campus. As well as the two Max Planck Institutes for Informatics and for Software Systems, the Saarbrcken campus is also home to the German Research Center for Artificial Intelligence, the Intel Visual Computing Institute, the Center for IT Security, Privacy and Accountability (CISPA) and the Cluster of Excellence 'Multimodal Computing and Interaction'.

###

Excerpt from:

Cebit 2015: Saarland computer scientists present guarantees for online anonymity

Guarantees for online anonymity?

Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain disease, for example. Seeing that this kind of private information can be linked to their identity, users will often resort to special online anonymization services.

One of the most popular tools is Tor. Since the beginning of the year, alone more than two million users have used it to anonymize their Internet connection data. These services will not only conceal browsing behavior, but also the identity of the user, and that of any other recipients. These will usually be other websites, but could also be another person. Tor works in a way that allows users to establish a connection that is then upheld through its own network. The Tor network comprises up to 6,000 servers, mostly run by volunteers, which computer scientists refer to as "nodes." And since every node only receives the minimal amount of data necessary to relay the information in question, it becomes far more difficult to de-anonymize both the transmitter and the recipient of the data.

"The Tor network isn't perfect, however," says Esfandiar Mohammadi, a researcher at the Research Center for IT Security, CISPA, and a doctoral candidate at the Graduate School for Computer Science in Saarbrcken. "For one, unanticipated attacks at a network level can endanger anonymity. Also, the degree of anonymity the network achieves is highly variable, since volunteers don't necessarily operate their nodes continually or regularly," says Mohammadi.

In collaboration with CISPA researcher Sebastian Meiser, who is also a postgraduate at the Saarbrcken Graduate School for Computer Science, Mohammadi developed a program that can provide an accurate assessment of the level of anonymity an individual user achieves, even while basing the estimate on the fluctuations of the Tor network. According to the researchers, this feature is a worldwide first.

"An attacker that compromises Tor servers can derive the identity of a user with a certain probability. This is exactly what our system calculates," Sebastian Meiser explains. The two Saarbrcken researchers based their technique, which they named "MATor," on a mathematical model that they extended to include different categories of possible attacks. "In order to indicate the probability of de-anonymization, our program performs its calculations using data that is aggregated once an hour and published on the network immediately. MATor also takes the specifics of the respective Internet connection into account, as well as the individual configurations of the Tor software," Meiser says. This feature is also intended as a basis for a so-called plugin, a small extension program for the software "Tor Browser" that the researchers now want to develop. Integrated into the Tor software, this could run in the background and simply notify users as soon as their connection became too unsafe.

Story Source:

The above story is based on materials provided by University Saarland. Note: Materials may be edited for content and length.

Read more here:

Guarantees for online anonymity?

Find hidden data on your computer with PCFerret

How well do you know your PC, the data it holds, how its really being used by others? PCFerret is a freeware tool for Windows Vista and later which claims it can help you find out.

Despite the intriguing pitch, PCFerret opens with a relatively ordinary system information report. It covers the core details youd expect -- hardware, network, drive statistics, user accounts etc -- and can be saved to HTML for easy sharing, but it cant compete with the more specialist competition.

The "Browser Media" tool is more interesting, scanning your browser caches (Firefox, Chrome, IE, Opera. Safari, Sea Monkey) for images or movies, then displaying thumbnails of the results. Could be useful for checking what others are viewing online.

A similar "Cached URLs" module checks your browser caches, and raises alerts for any URLs which contain suspect keywords. We found this raised lots of false alarms (hint: "pov" isnt just used in porn) but you can at least customize the keyword list, hopefully making it more accurate.

The Find Files By Type function is a highlight, scanning your PC and reporting on files whose content doesnt match their file extension. If someone has downloaded videos and renamed them to have a ZIP or ISO extension, say, this module should raise the alert. You could use it to detect encrypted containers, and for many other purposes, for example detecting malicious executable code which has been disguised as something else.

Theres a similar security tool in the programs "ADS Selection" feature, which scans your system to report on files with alternate data streams.

Bonus extras include a secure password creator, a file hash generator, a Tor Browser detector, and a module for managing Windows reboot operations (deleting, moving or renaming files when your system restarts).

PCFerret is an odd mix of features. It feels like the developer knows most of the individual modules arent quite as good as the best of the freeware competition, but instead of improving them, hes just bolted on something else.

But, we still think its worth downloading for the "Find Files By Type" module alone. This gives you much more control than similar programs, and makes it easy to find archives, images, hidden scripts, Registry files and more.

More:

Find hidden data on your computer with PCFerret

Tor Users Must Now Provide A Phone Number To Open A New Twitter Account

Twitter last week announced plans to begin tracking troublesome users via their mobile phone number. Along those lines, it has begunforcing users of anonymous web browser Torto providea number in order to open a new account.

Update:A Twitter representative told TechCrunch that the companyhas notmade specific changes to the registration process for Tor browser users.

Twitter does not block or force Tor users to phone verify in order to sign up. Occasionally, signups and logins may be asked to phone verify as they may exhibit behavior similar to spam. This is applicable to all IPs and not just Tor IPs.

However, we repeated the sign-up process more than a dozen time and each time a phone number was required, while many on Twitter also found the same. The exception, it seems, is for browsers like Mozilla which can runTor. In the latter case, Twitter does not appear to be requiring phone verification. At the least, it seems that more connections via Tor are being flagged as potentially spam accounts and thus require phone verification.

The U.S. company doesnt mandateits users to associate their account with a mobile number thats optional but its new security system will use short-term suspensions to get the digits of serial trolls. The idea here is to find something identifiable that can be used to trace them if they open new accounts, as many serial abuses do.

Those who open a new account via Tor, however, will have their number added to Twitters database right away, following this apparent new change in the sign-up process.

The issue was first flagged on Twitter, and we confirmed itwith our own testing.

I was able to open a new Twitter account using Googles Chrome browser by just providing an email address. The same process done withinTor leftme needing to submit a phone number for SMS verification.

We contacted Twitter for comment, but the company had not responded at the time of writing.

Read the original:

Tor Users Must Now Provide A Phone Number To Open A New Twitter Account