Page 40«..1020..39404142..50..»

Category Archives: Tor Browser

Como baixar o TOR BROWSER no Ubuntu(e derivados). – Video

Posted: March 27, 2015 at 12:48 pm


Como baixar o TOR BROWSER no Ubuntu(e derivados).
Site do TOR: https://www.torproject.org/download/download-easy.html.en Obrigado por assistir o vdeo,gravei no meu notebook,por isso o audio ficou ruim,mas futuramente vou separar um HD pro...

By: LinuxFacilitado[Tutoriais e Gameplays]

Read more from the original source:
Como baixar o TOR BROWSER no Ubuntu(e derivados). - Video

Posted in Tor Browser | Comments Off on Como baixar o TOR BROWSER no Ubuntu(e derivados). – Video

How To Get Past Your School’s Web Filter! – Video

Posted: at 12:47 pm


How To Get Past Your School #39;s Web Filter!
Share this video with your friends if you find it useful. Psiphon 3: https://psiphon.ca/az.html Tor Browser: https://www.torproject.org/ Thanks for watching!

By: Mystic Boltz

View original post here:
How To Get Past Your School's Web Filter! - Video

Posted in Tor Browser | Comments Off on How To Get Past Your School’s Web Filter! – Video

Tor Browser-Anonimowa przegldarka – Video

Posted: March 26, 2015 at 10:51 am


Tor Browser-Anonimowa przegldarka
Pobieranie Tor Browser: https://www.torproject.org/projects/torbrowser.html.en.

By: Pan Mydeko

Read the original here:
Tor Browser-Anonimowa przegldarka - Video

Posted in Tor Browser | Comments Off on Tor Browser-Anonimowa przegldarka – Video

how to install and set up tor browser – Video

Posted: March 24, 2015 at 5:48 am


how to install and set up tor browser
to download go to http://www.torproject.org/download an fallow the video steps.

By: Miss Informer

Read the rest here:
how to install and set up tor browser - Video

Posted in Tor Browser | Comments Off on how to install and set up tor browser – Video

Surfing safely over the Tor anonymity network – Part 2: Tor Browser, Georg Koppen – Video

Posted: at 5:48 am


Surfing safely over the Tor anonymity network - Part 2: Tor Browser, Georg Koppen
For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is...

By: Owasp Gteborg

More:
Surfing safely over the Tor anonymity network - Part 2: Tor Browser, Georg Koppen - Video

Posted in Tor Browser | Comments Off on Surfing safely over the Tor anonymity network – Part 2: Tor Browser, Georg Koppen – Video

Snowden-approved: The Citizenfour hackers toolkit

Posted: March 20, 2015 at 3:50 pm

One of the interesting reveals at the end of Citizenfour, the recent Academy Award-winning documentary about Edward Snowden, was the thanks it gives to various security software programs. The information that Snowden leaked two years ago continues to reverberate today, and it kicked off renewed interest in data security, privacy, and anonymity. Based on the closing credits in the movie, weve put together aguide tosome of the major security software programs and operating systems available. If youve wanted to take steps to secure your own information, but were uncertain where to start, this articleshould get you headed in the right direction.

The Tor Security Bundle is probably the best-known of the software products well discuss today. The Tor browser is easy to install and set up; its based on Firefox 31.5.0, but as the program warns, simply using Tor isnt enough to secure your Internet browsing. If you want to remain anonymous on the Tor network, youll need to also do the following:

Configuring Tor is relatively easy. Once youve begun the installation process, youll be asked to choose whether you want to connect directly to Tor or through a bridge relay, as shown below:

Make your choice, and the system finishes installing what looks like a standard version of Firefox with a few custom scripts and configuration options.

One caveat about using Tor for anonymous browsing is that the performance isnt going to be what youre used to from a standard connection. Tor uses multiple levels of encryption to hide destination IPs, and routes the information randomly across its own network to defeat spying. This helps prevent certain kinds of packet tracking, but it also introduces some substantial performance penalties.

The fact that Tor routing is randomized makes it tricky to estimate the performance impact of using it, but we ran a series of webpage loading tests anyway. Treat these as a useful ballpark rather than the final word. Page caches were cleared before the load tests for both standard Firefox (36.0.1) and the Tor Browsers version (31.5.0).

As you can see, load times for Tor are 3-4x higher than they are for other browsers. Thats the price you pay for anonymity.

More here:
Snowden-approved: The Citizenfour hackers toolkit

Posted in Tor Browser | Comments Off on Snowden-approved: The Citizenfour hackers toolkit

21 tips, tricks and shortcuts to help you stay anonymous online

Posted: March 18, 2015 at 4:48 am

Avoiding being tracked online is nearly impossible, but here are a few ways to reduce the risk.

Getty Images

Consider installing Mailvelope.

Mozilla Screenshot of Firefox private window. Mozilla This is perhaps one of the most basic privacy options that just about anyone can take advantage of. The top four most popular browsers - Google Chrome, Internet Explorer, Mozilla Firefox and Safari - have a private browsing mode, which can be found in their respective settings menus. With private browsing activated, your browser will not store cookies or internet history on your computer. This has very limited uses and is perhaps really only effective at hiding your browsing history from your significant other, siblings or parents. Private browsing does not securely hide your identity or browsing activities beyond your local machine as your IP address can still be tracked.

Dado Ruvic/Reuters A man is silhouetted against a video screen with a Twitter and a Facebook logo as he poses with a Dell laptop in this photo illustration taken in the central Bosnian town of Zenica, August 14, 2013. The amount of personal data that social networking sites like Facebook, Google Plus and Twitter have harvested from their billions of users is shocking. Head to facebook.com/settings and click Download a copy of your Facebook data and you might be surprised to see just how much information is on file. Everything from who you have poked, what events you have or have not attended and when and where you have logged into your account is logged and saved. Similar levels of data harvesting occurs on all major social media sites. This is the price you pay for using a free service. The only sure-fire way to avoid giving up this information is to delete your accounts entirely. A word of warning, deactivating your account is not the same as deleting it. Deactivating your account is sort of like putting it into hibernation - all your information is stored and can be re-activated if you have second thoughts. Always delete rather than deactivate an account if you wish to completely wipe it.

A large amount of websites track and collect the browsing habits of the users that visit them. These trackers are invisible and most people arent aware that theyre being tracked. Ghostery is a free browser extension - available on all major web browsers - that will reveal these trackers, also known as web bugs. You can then decide which web bugs youre comfortable with tracking you and which ones youd like to block. In total, Ghostery keeps track of over 1,900 companies. Each company has a profile in the Ghostery Knowledge Library, allowing you to better understand who and why someone is keeping tabs on you and what action you would like to take.

Getty Images Hushmail is currently very popular, it provides a private email account with no ads. Most of the well known and popular email services - Gmail, Hotmail, Yahoo Mail, Outlook - are not particularly privacy-friendly. For full Pretty Good Privacy (PGP) encrypted emails, consider signing up to a more secure provider. Hushmail is currently very popular, it provides a private email account with no ads, built-in encryption and unlimited email aliases. A limited free service is offered, with more features available for a monthly subscription fee. However, Hushmail is not above the law and in the past it has been forced to reveal user data to U.S. authorities following a court order. The company also logs user IP addresses. MyKolab is a similar service that has not revealed any user information in the past, however, they are also obliged to provide access to lawful interception requests so this still remains a possibility.

Arda Guldogan/Getty Images Keeping your real email address away from spammers is crucial to protecting your identity online. Disposable Email Addresses (DEAs) are anonymous and temporary. They allow users to quickly create new email addresses as-and-when theyre needed, which can then be disposed of after use. This is particularly useful for avoiding spam when filling in forms on websites that require an email address to proceed. Keeping your real email address away from spammers is crucial to protecting your identity online and DEAs are a great solution. Popular providers of this service include Guerrilla Mail and Mailinator, although there are hundreds out there to choose from. Most DEAs are not particularly secure, so it is not advised to use these services to send sensitive information - rather, use them as a way to avoid giving away your own information in situations where you are obliged to do so.

Virtual Private Networks (VPNs) are one of the most effective ways to protect your privacy online. A VPN essentially hides your IP address - your unique online identifier - and runs all your online data via a secure and encrypted virtual tunnel, which can keep websites from tracking your online activity or even knowing which country youre browsing from. These days, there are many VPNs to choose from. Hotspot Shield, TorGuard, CyberGhost and HideMyAss are some of the more popular ones that are currently available. Most of them require a small monthly subscription fee and they dont all provide the same list of features, so its worth shopping around for a VPN that suits you.

Tor Tors anonymity network allows access to the deep or hidden web. Originally developed with the U.S. Navy in mind as a way to protect government communications, Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Tors anonymity network allows access to the deep or hidden web, where websites can be created anonymously and individuals can communicate privately with each other. When using the Tor browser - which can be downloaded for free from torproject.org - it is very difficult for websites or individuals to track your online activity and location. However, while Tor is quite effective at protecting your online anonymity, it can be slow, complicated and restricting. Its also worth noting that while the network can and has been used for good, it has also been used for illicit purposes, such as selling drugs and distributing images of child abuse.

Follow this link:
21 tips, tricks and shortcuts to help you stay anonymous online

Posted in Tor Browser | Comments Off on 21 tips, tricks and shortcuts to help you stay anonymous online

Tor Browser Video Almama Sorunu [ZM] – Video

Posted: March 16, 2015 at 4:47 pm


Tor Browser Video Almama Sorunu [ZM]

By: PC Gerekler

More here:
Tor Browser Video Almama Sorunu [ZM] - Video

Posted in Tor Browser | Comments Off on Tor Browser Video Almama Sorunu [ZM] – Video

What 'dark net' drug buyers say about their dealers

Posted: March 12, 2015 at 7:47 pm

The now-defunct Silk Road site, with drugs for sale (AP)

But what is actually on the dark net? Despite all this noise, relatively little is known. It is, of course, incredibly difficult to research. What we do know is that 2.5 million people use the Tor Browser each day. Tor can be used to browse anything online, and is much-used by civil liberties activists, journalists, and suprisise surprise law enforcement themselves. A decent fraction use Tor to get into the dark net, where there are an estimated 60 thousand or so websites an uncensored blend of the good, the bad, and the very very ugly.

The busiest sites on the dark net are probably the notorious and numerous anonymous markets. Here, anything can be bought and sold: class A narcotics ordered with a click, paid for with the crypto-currency Bitcoin, and delivered direct to your home. For my book, The Dark Net, I spent a lot of time on these sites, trying to work out how and why they worked and even going through the process of buying a small amount of cannabis from one known as Silk Road 2.0.

It turns out the key to their success is not clever encryption, or Bitcoin, or even Tor. It's good old-fashioned customer service. Every visitor to the site, after using his or her drug, leaves a piece of written feedback about the gear and gives a score out of 5. It's a little surreal, but users take it pretty seriously, because it creates the genuinely informed competition and choice which keeps the market ticking over:

Decent coke at a reasonable price. Stealthy packaging. 5/5

First order was lost...I got a reship and now im very happy...Heaven is one of the best dealers on the road!!! Very friendly and good communication too. I will be back soon 😉 5/5

Excerpt from:
What 'dark net' drug buyers say about their dealers

Posted in Tor Browser | Comments Off on What 'dark net' drug buyers say about their dealers

Cebit 2015: Saarland computer scientists present guarantees for online anonymity

Posted: at 7:47 pm

IMAGE:Sebastian Meiser and Esfandiar Mohammadi provide guarantees of users' anonymity within the Tor network. view more

Credit: Oliver Dietze

This news release is available in German.

Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain disease, for example. Seeing that this kind of private information can be linked to their identity, users will often resort to special online anonymization services. One of the most popular tools is Tor. Since the beginning of the year, alone more than two million users have used it to anonymize their Internet connection data. These services will not only conceal browsing behavior, but also the identity of the user, and that of any other recipients. These will usually be other websites, but could also be another person. Tor works in a way that allows users to establish a connection that is then upheld through its own network. The Tor network comprises up to 6,000 servers, mostly run by volunteers, which computer scientists refer to as "nodes". And since every node only receives the minimal amount of data necessary to relay the information in question, it becomes far more difficult to de-anonymize both the transmitter and the recipient of the data.

"The Tor network isn't perfect, however," says Esfandiar Mohammadi, a researcher at the Research Center for IT Security, CISPA, and a doctoral candidate at the Graduate School for Computer Science in Saarbrcken. "For one, unanticipated attacks at a network level can endanger anonymity. Also, the degree of anonymity the network achieves is highly variable, since volunteers don't necessarily operate their nodes continually or regularly," says Mohammadi.

In collaboration with CISPA researcher Sebastian Meiser, who is also a postgraduate at the Saarbrcken Graduate School for Computer Science, Mohammadi developed a program that can provide an accurate assessment of the level of anonymity an individual user achieves, even while basing the estimate on the fluctuations of the Tor network. According to the researchers, this feature is a worldwide first.

"An attacker that compromises Tor servers can derive the identity of a user with a certain probability. This is exactly what our system calculates," Sebastian Meiser explains. The two Saarbrcken researchers based their technique, which they named "MATor", on a mathematical model that they extended to include different categories of possible attacks. "In order to indicate the probability of de-anonymization, our program performs its calculations using data that is aggregated once an hour and published on the network immediately. MATor also takes the specifics of the respective Internet connection into account, as well as the individual configurations of the Tor software," Meiser says. This feature is also intended as a basis for a so-called plugin, a small extension program for the software "Tor Browser" that the researchers now want to develop. Integrated into the Tor software, this could run in the background and simply notify users as soon as their connection became too unsafe.

Computer science and informatics at Saarland University

The Department of Computer Science forms the core of the informatics landscape at Saarland University. A further seven internationally renowned research institutes are located in the immediate vicinity on campus. As well as the two Max Planck Institutes for Informatics and for Software Systems, the Saarbrcken campus is also home to the German Research Center for Artificial Intelligence, the Intel Visual Computing Institute, the Center for IT Security, Privacy and Accountability (CISPA) and the Cluster of Excellence 'Multimodal Computing and Interaction'.

###

Read more:
Cebit 2015: Saarland computer scientists present guarantees for online anonymity

Posted in Tor Browser | Comments Off on Cebit 2015: Saarland computer scientists present guarantees for online anonymity

Page 40«..1020..39404142..50..»