{"id":193727,"date":"2015-03-20T18:04:32","date_gmt":"2015-03-20T22:04:32","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/snowden-approved-the-citizenfour-hackers-toolkit.php"},"modified":"2015-03-20T18:04:32","modified_gmt":"2015-03-20T22:04:32","slug":"snowden-approved-the-citizenfour-hackers-toolkit","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/tor-browser\/snowden-approved-the-citizenfour-hackers-toolkit.php","title":{"rendered":"Snowden-approved: The Citizenfour hackers toolkit"},"content":{"rendered":"<p><p>    One of the interesting    reveals at the end of Citizenfour, the recent Academy    Award-winning documentary about Edward Snowden, was the thanks    it gives to various security software programs. The information    that Snowden leaked two years ago continues to reverberate    today, and it kicked off renewed interest in data security,    privacy, and anonymity. Based on the closing credits in the    movie, weve put together aguide tosome of the    major security software programs and operating systems    available. If youve wanted to take steps to secure your own    information, but were uncertain where to start, this    articleshould get you headed in the right    direction.  <\/p>\n<p>    The Tor    Security Bundle is probably the best-known of the software    products well discuss today. The Tor browser is easy to    install and set up; its based on Firefox 31.5.0, but as the    program warns, simply using Tor isnt enough to secure your    Internet browsing. If you want to remain anonymous on the Tor    network, youll need to also do the following:  <\/p>\n<p>    Configuring Tor is    relatively easy. Once youve begun the installation process,    youll be asked to choose whether you want to connect directly    to Tor or through a bridge relay, as shown below:  <\/p>\n<\/p>\n<p>    Make your choice, and    the system finishes installing what looks like a standard    version of Firefox with a few custom scripts and configuration    options.  <\/p>\n<\/p>\n<p>    One caveat about using    Tor for anonymous browsing is that the performance isnt going    to be what youre used to from a standard connection. Tor uses    multiple levels of encryption to hide destination IPs, and    routes the information randomly across its own network to    defeat spying. This helps prevent certain kinds of packet    tracking, but it also introduces some substantial performance    penalties.  <\/p>\n<p>    The fact that Tor    routing is randomized makes it tricky to estimate the    performance impact of using it, but we ran a series of webpage    loading tests anyway. Treat these as a useful ballpark rather    than the final word. Page caches were cleared before the load    tests for both standard Firefox (36.0.1) and the Tor Browsers    version (31.5.0).  <\/p>\n<\/p>\n<p>    As you can see, load    times for Tor are 3-4x higher than they are for other browsers.    Thats the price you pay for anonymity.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.extremetech.com\/extreme\/201636-snowden-approved-the-citizenfour-hackers-toolkit\/RK=0\/RS=4XgoCJqvy9wBaN8ODDkheAEQmpA-\" title=\"Snowden-approved: The Citizenfour hackers toolkit\">Snowden-approved: The Citizenfour hackers toolkit<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> One of the interesting reveals at the end of Citizenfour, the recent Academy Award-winning documentary about Edward Snowden, was the thanks it gives to various security software programs. The information that Snowden leaked two years ago continues to reverberate today, and it kicked off renewed interest in data security, privacy, and anonymity. Based on the closing credits in the movie, weve put together aguide tosome of the major security software programs and operating systems available <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/tor-browser\/snowden-approved-the-citizenfour-hackers-toolkit.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261457],"tags":[],"class_list":["post-193727","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/193727"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=193727"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/193727\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=193727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=193727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=193727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}