CYBER-RESISTANCE : COMMENT SURFER ANONYME EN DEUX MINUTES Une petite piqure de rappel grand public, ça ne fait pas de mal… Merci à l’équipe de Linux Manua pour ce travail de vulgarisation indispensable ! [Linux Manua - 17/03/2009] En ces temps obscurs de surveillance généralisée et de répression, être anonyme sur le Net devient essentiel – Alors voilà la méthode pour avoir temporairement une adresse IP du Canada, de Russie, des Seychelles et même de Chine (un comble) puis, par exemple : dénoncer les lois liberticides visant à surveiller le Web et réprimer les internautes,critiquer les puissants sans retenue et sans risquer la répression,riposter aux satrapes qui traitent les internautes de terroristes ou de criminelstélécharger des fichiers interdits par des législations locales dictées par des lobbys mercantiles, Bien entendu, ces fictions invraisemblables ne concernent pas la France, pays de la Liberté. 1) Se connecter à un serveur proxy anonyme étranger gratuit : hostip.fr ip-adress.com utrace.de 4) TOR : L’artillerie lourde Like this:
Freenet Da Wikipedia, l'enciclopedia libera. Freenet è una rete decentralizzata, creata per resistere alla censura, che sfrutta le risorse (banda passante, spazio su disco) dei suoi utenti per permettere la pubblicazione e la fruizione di qualsiasi tipo di informazione. Freenet è stata costruita pensando ad anonimato e sicurezza, non alla velocità di trasmissione. Questa caratteristica la rende poco indicata per lo scambio di file di grosse dimensioni (come filmati e file audio). Freenet è software libero distribuito con GNU General Public License; essendo scritto in Java può funzionare su Microsoft Windows, GNU/Linux, Mac OS X e su tutti i sistemi operativi dotati di Java Virtual Machine. Sebbene molte nazioni censurino le comunicazioni per motivi diversi, hanno tutte una caratteristica comune: qualcuno deve decidere cosa tagliare e cosa mantenere, cosa considerare offensivo e cosa no. All'interno di Freenet è possibile utilizzare servizi simili al Web e alle BBS. Ian Clarke et al.
UUCP UUCP is an abbreviation of Unix-to-Unix Copy.[1] The term generally refers to a suite of computer programs and protocols allowing remote execution of commands and transfer of files, email and netnews between computers. Specifically, a command named uucp is one of the programs in the suite; it provides a user interface for requesting file copy operations. The UUCP suite also includes uux (user interface for remote command execution), uucico (the communication program that performs the file transfers), uustat (reports statistics on recent activity), uuxqt (execute commands sent from remote machines), and uuname (reports the UUCP name of the local system). Some versions of the suite include uuencode/uudecode (convert 8-bit binary files to 7-bit text format and vice versa). Technology[edit] UUCP can use several different types of physical connections and link layer protocols, but was most commonly used over dial-up connections. History[edit] Mail routing[edit] User barbox! Bang path[edit]
The Freenet Project - /index Mix network Simple decryption mix net. Messages are encrypted under a sequence of public keys. Each mix node removes a layer of encryption using its own private key. Mix networks[1] are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as mixes which take in messages from multiple senders, shuffle them, and send them back out in random order to the next destination (possibly another mix node). Each message is encrypted to each proxy using public key cryptography; the resulting encryption is layered like a Russian doll (except that each "doll" is of the same size) with the message as the innermost layer. How it works[edit] Participant A prepares a message for delivery to participant B by appending a random value R to the message, sealing it with the addressee's public key , appending B’s address, and then sealing the result with the mix's public key . to B. Message format[edit] To accomplish this, the sender takes the mix’s public key ( ) is discarded. . .
How to Crack WPA2 WPS WiFi password Wifi Protected Setup or WPS is a 802.11 certified standard for delivering security over your Wireless network. Wi-Fi Protected Setup enables typical users who possess little understanding of traditional Wi-Fi configuration and security settings to automatically configure new wireless networks, add new devices and enable security. WPS has been accompanying WPA2 since 2007, with over 200 wireless routers that support WPS with WPA2. Warning: This guide is to showcase weaknesses in Wifi security standards & is purely for educational purposes only. All vendors (including Cisco/Linksys, Netgear, D-Link, Belkin, Buffalo, ZyXEL, TP-Link and Technicolor) have WPS-enabled devices. Although WPS is marketed as being a secure way of configuring a wireless device, there are design and implementation flaws which enable an attacker to gain access to an otherwise sufficiently secured wireless network. How the WPA2 WPS Crack works Further details are available at Google code page and PDF whitepaper. Step 1.
The Freenet Project - /faq Additional information sources General / Philosophical questions Technical questions Publisher questions Contribution questions Security questions Philosophical answers What is Freenet? How is Freenet different to Tor? Freenet is a self-contained network, while Tor allows accessing the web anonymously, as well as using "hidden services" (anonymous web servers). Freenet is a distributed datastore, so once content is uploaded to Freenet, it will remain on Freenet forever, as long as it remains popular, without fear of censorship or denial of service attacks, and without needing to run your own web server and keep it online constantly. The other big difference is that Freenet has the "darknet" or Friend to Friend mode, where your Freenet node (software on your computer) only connects to the Freenet nodes run by your friends, i.e. people you know (and maybe to their friends, to speed things up). Freenet has many unsolved problems, and is still experimental. Summary: Tor (or I2P): Freenet in general:
Alternative DNS root The Internet uses the Domain Name System (DNS) to associate numeric computer IP addresses with human readable names. The top level of the domain name hierarchy, the DNS root, contains the top-level domains that appear as the suffixes of all Internet domain names. The official DNS root is administered by the Internet Corporation for Assigned Names and Numbers (ICANN). In addition, several organizations operate alternative DNS roots, often referred to as alt roots. The Internet Architecture Board (IAB) has spoken out strongly against alternate roots in RFC 2826.[1] Description[edit] The DNS root zone consists of pointers to the authoritative domain name servers for all TLDs (top-level domains). Alternative DNS roots may be characterized broadly as those run for idealistic or ideological reasons, run as profit-making enterprises, and those run internally by an organization for its own use. List of alternative roots[edit] This section lists the known alternate DNS roots. NameCoin P2P DNS[edit]
Usenet A diagram of Usenet servers and clients. The blue, green, and red dots on the servers represent the groups they carry. Arrows between servers indicate newsgroup group exchanges (feeds). Arrows between clients and servers indicate that a user is subscribed to a certain group and reads or submits articles. One notable difference between a BBS or web forum and Usenet is the absence of a central server and dedicated administrator. Introduction[edit] The articles that users post to Usenet are organized into topical categories called newsgroups, which are themselves logically organized into hierarchies of subjects. In most newsgroups, the majority of the articles are responses to some other article. When a user posts an article, it is initially only available on that user's news server. The format and transmission of Usenet articles is similar to that of Internet e-mail messages. Today, Usenet has diminished in importance with respect to Internet forums, blogs and mailing lists. History[edit]
Preuve à divulgation nulle de connaissance Un article de Wikipédia, l'encyclopédie libre. Une preuve à divulgation nulle de connaissance est un concept utilisé en cryptologie dans le cadre de l'authentification et de l'identification. Cette expression désigne un protocole sécurisé dans lequel une entité nommée « fournisseur de preuve », prouve mathématiquement à une autre entité, le « vérificateur », qu'une proposition est vraie sans toutefois révéler une autre information que la véracité de la proposition. En pratique, ce schéma se présente souvent sous la forme d'un protocole de type « stimulation/réponse » (challenge-response). Les anglophones utilisent l'abréviation ZKIP pour Zero Knowledge Interactive proof. Propriétés[modifier | modifier le code] Trois propriétés doivent être satisfaites : Les deux premières propriétés sont les mêmes qui servent à définir un système de preuve interactive, qui est un concept plus général. Preuves calculatoires et parfaites[modifier | modifier le code] Exemple[modifier | modifier le code]