background preloader

GNU's Framework for Secure Peer-to-Peer Networking

GNU's Framework for Secure Peer-to-Peer Networking
Related:  DeepWeb

phantom - System for generic, decentralized, unstoppable internet anonymity The Phantom protocol is a system for decentralized anonymization of generic network traffic. It has been designed with the following main goals in mind: 1. - No critical or weak points to attack or put (il)legal pressure on. 2. - Direct technical destructive attacks will practically be the only possible way to even attempt to stop it. 3. - Probabilistic methods (contrary to deterministic methods) must be used in a completely decentralized design like this, where no other peer can be trusted, so focus is put on optimizing these methods. 4. - This is simple in itself, but still important in the context of anonymization. 5. - No one should have to worry about crimes being perpetrated from their own IP address. 6. - You never know what the next draconian law might be. 7. - Most existing anonymization solutions are practically unusable for (or even prohibit) larger data volumes. 8. The latest version of the source release package can always be downloaded here. DEFCON presentation (audio only):

The Freenet Project - /index FreedomBone If you want to have more control over how you interact on the web, and regain your freedom, privacy and autonomy from outside interference, you need to start moving towards using programs like GNU Social – Jason Self For a microblog you will need a separate domain/subdomain, so see Setting up a web site for details of how to create an Apache configuration for your microblog. Install some dependencies: apt-get install php5-xcache php-gettext php5-curl php5-gd php5-mysql Download GNU Social mkdir ~/build cd ~/build wget Verify it. sha256sum gnu-social.tar.gz 1f886241c7f1a175e7be3cccbcb944ab6c03617fb75aefa4d62d37abed87d2b4 Extract the files and set permissions on them, where mydomainname.com is your domain name. Edit the Apache access settings. editor /var/www/$HOSTNAME/htdocs/.htaccess Add the following: Save and exit, then create a database. Add the mailer script to the aliases file: editor /etc/aliases Save and exit. newaliases

GNUnet Framework for decentralized, peer-to-peer networking which is part of the GNU Project GNUnet is a software framework for decentralized, peer-to-peer networking and an official GNU package. The framework offers link encryption, peer discovery, resource allocation, communication over many transports (such as TCP, UDP, HTTP, HTTPS, WLAN and Bluetooth) and various basic peer-to-peer algorithms for routing, multicast and network size estimation.[6] GNUnet's basic network topology is that of a mesh network. GNUnet uses Uniform resource identifiers (not approved by IANA, although an application has been made). GNUnet consists of several subsystems, of which essential ones are Transport and Core subsystems. GNUnet includes various P2P applications in the main distribution of the framework, including filesharing, chat and VPN; additionally, a few external projects (such as secushare) are also extending the GNUnet infrastructure. GNUnet is unrelated to the older Gnutella P2P protocol. . Chat[edit]

How to become anonymous online Online life is quickly eroding our usual feelings of personal anonymity. Services like Facebook mean that people are able to delve into our lives like never before. Stalking, whistle blowing, even watching TV programmes broadcast in other countries; these and other online activities all rely on some form of online anonymity – or lack of it. We humans don't generally like strangers knowing all about us, but we may be unwittingly providing people with details of our lives we'd rather were kept out of the public gaze. Keeping anonymous online is also a concern for a growing number of people in countries where speaking out has real consequences. Luckily, there are several steps you can take to stay incognito online, and even some that can reduce the amount of spam email messages you receive. Keep your email secret Your email address is a big part of your online identity. When an online business folds, the owner might also decide the list of registered users is an asset worth selling.

I2P rețea anonima Sylpheed - lightweight and user-friendly e-mail client Synchronous conferencing Technologies informally known as online chat Synchronous conferencing is the formal term used in computing, in particular in computer-mediated communication, collaboration and learning, to describe technologies informally known as online chat. It is sometimes extended to include audio/video conferencing or instant messaging systems that provide a text-based multi-user chat function. The word synchronous is used to qualify the conferencing as real-time, as distinct from a system such as e-mail, where messages are left and answered later. Synchronous conferencing protocols include: Types[edit] According to the type of media used, synchronous conferencing can be divided into[1] audio conferencing: only audio is usedvideo conferencing: Both audio (voice) and video and picture are used. According to the number of access point used, synchronous conferencing can be divided into Synchronous vs asynchronous conferencing[edit] Methods[edit] Some of the methods used in synchronous conferencing are:

How to be anonymous online with Incognito At first glance Incognito may seem suited only for the extremely paranoid, because of the totality of tools it offers to hide your online presence. But those tools, each designed to mask a certain aspect of your online activity, have been around for quite a while. This 430MB-ish live CD has many faithful users, but I can't quote any on its usefulness since their identities couldn't be confirmed. Yes, Incognito is that good. If you're looking for the ultimate way to encrypt absolutely all your internet communications and be untraceable on the internet, you're looking for Incognito. Whether you're an anarchist, a covert operative or just someone who wants to exercise their digital rights and hide your online activity, with Incognito you can encrypt your IM conversations and emails, browse securely without the fear of cookies and the browser history revealing your secrets, and best of all, the traffic doesn't reflect in your router logs. An aside: who wants to be anonymous? Buck the trend.

Related: