background preloader

TAILS & TOR

Facebook Twitter

Tails: the operating system that blew open the NSA. When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications.

Tails: the operating system that blew open the NSA

But this month, we learned that Snowden used another technology to keep his communications out of the NSA's prying eyes. It's called Tails. And naturally, nobody knows exactly who created it. Yes, Federal Agents Can Identify Anonymous Tor Users, Because Most People Don't Know How To Be Anonymous. For many, many years now, we keep hearing law enforcement whine about the "threats" of anonymity and how people would be able to get away with all sorts of criminal activity if they weren't given the ability to track, monitor and tap pretty much every communications technology that has come along.

Yes, Federal Agents Can Identify Anonymous Tor Users, Because Most People Don't Know How To Be Anonymous

A decade ago the fear was that free and open WiFi was going to be a major boon to criminals who could use it "with no trace. " As we pointed out, however, nothing about using an anonymous connection like that means you won't get caught, because criminals have to do a lot of things, many of which will expose them in other ways, without having to tap and track every technological interaction.

Attackers wield Firefox exploit to uncloak anonymous Tor users. Attackers exploited a recently patched vulnerability in the Firefox browser to uncloak users of the Tor anonymity service, and the attack code is now publicly circulating online.

Attackers wield Firefox exploit to uncloak anonymous Tor users

While the exploit was most likely designed to identify people alleged to have frequented a child porn forum recently targeted by the FBI, anonymity advocates say the code could be used against almost any Tor user. A piece of malicious JavaScript was found embedded in webpages delivered by Freedom Hosting, a provider of "hidden services" that are available only to people surfing anonymously through Tor. The attack code exploited a memory-management vulnerability, forcing Firefox to send a unique identifier to a third-party server using a public IP address that can be linked back to the person's ISP.

Discovery of the exploit came as the FBI reportedly sought the extradition of Freedom Host founder on child porn charges. Why we need Tor now more than ever. By Jillian C.

Why we need Tor now more than ever

York on September 28th, 2014 Since Edward Snowden leaked documents demonstrating the breadth of the National Security Agency’s digital surveillance last year, the global conversation around Internet freedom has shifted from censorship to surveillance. Where once the focus was on China’s Great Firewall or Iran’s vision of a “halal Internet,” now eyes are trained on the use of FinFisher for targeted surveillance or the NSA’s global dragnet. But censorship and surveillance go hand in hand. Just as censorship restricts individuals from accessing information and communicating freely, surveillance also chills speech, causing fear amongst a populace and hindering innovation, communications, and progress. Fortunately, there is one tool that addresses both problems: Tor. Snowden-approved: The ‘Citizenfour’ hacker’s toolkit.

One of the interesting reveals at the end of Citizenfour, the recent Academy Award-winning documentary about Edward Snowden, was the thanks it gives to various security software programs.

Snowden-approved: The ‘Citizenfour’ hacker’s toolkit

The information that Snowden leaked two years ago continues to reverberate today, and it kicked off renewed interest in data security, privacy, and anonymity. Based on the closing credits in the movie, we’ve put together a guide to some of the major security software programs and operating systems available. If you’ve wanted to take steps to secure your own information, but were uncertain where to start, this article should get you headed in the right direction. Browser Security: Tor The Tor Security Bundle is probably the best-known of the software products we’ll discuss today. Tor’s Skyrocketing Popularity in Russia.

Has Vladimir Putin's Internet crackdown spurred the explosion in Tor use in Russia?

Tor’s Skyrocketing Popularity in Russia

Images mixed by author. The Anonymous Tor Network Now Comes in a Box. Photo via Flickr I have the Tor browser running on my computer, and it took me about two minutes to download.

The Anonymous Tor Network Now Comes in a Box

Once you're surfing through the network there are plenty of daunting technical options to dig into, but accessing the onion network for basic, everyday web use was as easy as clicking download, opening the program, and then struggling to remember all my no-longer-stored passwords. Still, Tor is best known as a niche tool for hackers, whistleblowers, criminals, activists, or folks with otherwise something to hide. Tor Project: Anonymity Online. Tor Challenge. Relays and bridges qualify for the Tor Challenge if they are created on or after June 4th, 2014.

Tor Challenge

We will also give credit to relays that increase their RelayBandwidthRate and RelayBandwidthBurst by at least 128 KB/s (compared to the average bandwidth prior to June 4th, 2014). So you thought Tor was bad enough. Check out Tor’s Hidden Web Services. « WebCase WebLog. Recently and article appeared at NPR titled “Senators Target Internet Narcotics Trafficking Website Silk Road”.

So you thought Tor was bad enough. Check out Tor’s Hidden Web Services. « WebCase WebLog

I only bothered to hit the link because I saw it mentioned on the website Anit-forensics.com. The short article complained of drugs blatantly sold on the Internet and something needed to be done about it and Congress is going to solve that one for us. Although selling drugs on the Internet is nothing new, the place on the Internet “openly” selling drugs was on the Tor network through the use of Tor’s “Hidden Services” function.

The “Silk Road” is an online market open for the sale of goods and named after the ancient road used to bring goods from the orient to the west. L'anonymat sur Internet grâce à la technique du routage en oignon. Divers usages à l’anonymat Pour des rai­sons évidentes, des jour­na­lis­tes, des ONG, des blo­gueurs ou des grou­pes comme Rebellyon (au hasard, hein !) Ont sou­vent besoin de com­mu­ni­quer de manière ano­nyme. Confidentialité et anonymat, pour tous et partout. Tor. Download Tor. Want Tor to really work?

Download Tor

You need to change some of your habits, as some things won't work exactly as you are used to. Please read the full list of warnings for details. Tor Browser for Windows (64 bit) Version 8.0.3 - Windows 10, 8, and 7 Everything you need to safely browse the Internet. Not Using Windows? Tor Browser for Windows. List of Tor hidden services. From Wikipedia, the free encyclopedia Hidden services directories, portals, and information[edit] The Hidden Wiki Search engines[edit] Tor Browser Bundle. Download the file above, and save it somewhere, then double click on it. (1) Click "Run" then choose the installer's language and click OK (2).

Make sure you have at least 80MB of free disk space in the location you select. Installation sur une clé USB ou une carte SD. Tails comprend l'Installeur de Tails un installeur personnalisé pour clés USB et cartes SD. Installeur de Tails peut uniquement installer Tails sur une clé USB ou une carte SD d'au moins 4 Go. Afin d'utiliser l'Installeur de Tails , vous devez démarrer Tails depuis un autre support, puis le cloner sur la clé USB ou la carte SD que vous souhaitez installer. Vous pouvez, au choix : Utiliser l'Installeur de Tails vous permet de créer un volume persistant sur l'espace libre du périphérique.

L'intégralité des données du périphérique sera perdu durant l'opération.Cette opération ne copiera pas le volume persistant présent sur le périphérique servant de base au clonage. Tails 1.0 - La distrib sécurisée sort enfin en version stable. Il y a 2 ans, je vous présentais pour la première fois la distrib Tails qui permet de protéger son anonymat et sa vie privée sur le net. Tails – La distribution Linux qui protège votre anonymat et votre vie privée. Tails – La distribution Linux qui protège votre anonymat et votre vie privée Si vous cherchez une petite distrib linux sympathique bootable sur un CD/DVD ou une clé USB et qui permet de protéger votre anonymat et votre vie privée, je vous recommande de tester Tails (basée sur une Debian). Tails vient de sortir en version 0.10 et permet, je cite, de : Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA. Photo: Josh Valcarcel/WIRED When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications.

But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes. It’s called Tails. And naturally, nobody knows exactly who created it. Tails is a kind of computer-in-a-box. Tails - Confidentialité et anonymat, pour tous et partout. The Amnesic Incognito Live System.