You do realise that exposing the illegal things your government has been doing is illegal?
Source: /r/privacytoolsIO or privacytools.io
ThatOnePrivacySite and Privacy Tools strongly recommend that you don't use any services, especially email or VPN, based in the US, UK, or the Five Eyes countries. A great resource for anyone interested.
Edit: check out the Privacy Tools page for recommendations on browsers and texting apps, those are very important too.
You can use privacy.com to generate disposable card details for each website you use, each with a custom spending limit or whatever and easy to revoke them altogether instead of go through the cancellation hassle.
Yes, there's an app called Privacy which allows you to create cards that have limits or can only be charged once. It's really nice if you want to use a service, but don't trust it with your actual details or only want it for 1 month. You also get notifications if there's an attempted charge after the card is closed, which is awesome.
*Adding link: https://privacy.com/
when subscribing to a renewing subscription, consider using privacy.com. This will allow you to create a "virtual" credit card, with a limit, the ability to set the limit as one-time or monthly, and you can close the card with a click.
I *love* this service, and use it frequently.
I visited the TOR website just now and while I have no current reason to download and use TOR, I chose to donate. Here is the link - I suggest everybody who cares about anonymity and the internet visit and contribute what you can.
Hushmail is not trustworthy for numerous reasons.
The sites: https://www.privacytools.io/ and https://prism-break.org/ provide a better, more thought out, and verifiable privacy enhancing tools. You should really read them all over, understand why they made the choices they did, the pros and cons of each tool, before trying to create your own privacy guide. /r/Privacy is also a good place to ask questions and get feedback on privacy related tools.
Hey, if you're going to be saying stuff like this online, you might want to consider getting set up with something like TOR if you're not already using it. Stay safe out there, Turkey needs thoughtful young people if it's going to get out of this mess.
Thanks! Tails is actually an official Tor project, and we are working with the developers to ensure that all traffic is safely routed through Tor and no trace is left on the system. I, personally, think Tails is a great distro and have used it a few times while traveling.
yup, I'm sure someone is already making a deepweb reddit as we speak.
everyone interested in finding a place in the deep web for uncensored chat, please download Tor.
https://www.torproject.org/download/download
remember Tor is not a fix all, you must change browsing habits if you want to use it for anonymity, use lesser known search engines and such with it.
Use https://privacy.com to create a credit card number you only use on each service. I love it! For instance, I created a credit card when I signed up to a local gym and If I ever want to cancel it, I can close the card or set the limit to 0 and not deal with jumping through cancellation hoops.
It also has an iPhone app
privacy.com lets you link your bank account and make different temporary digital cards with changeable max amounts, even single use burner cards are an option. This has saved me aton of time and money!
Generally don't plug third party services, but online services like this is exactly what I use privacy.com for. Spin up a new card, set 1 time purchase limit of the cost. If I want to renew for a year or two, then double or triple the limit. Once the limit is reached the card declines future transactions, so they can try and renew all they want but it's not gonna do them any good.
Someone else a few months ago posted that in answer to someone else saying they found it hard to explain why 'I have nothing to hide' isn't the right answer.
>Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer. Glenn Greenwald in Why privacy matters - TED Talk
Just because they are in positions of power doesn't magically make them immune to the corrupting influence of power.
I’ve used https://privacy.com in the past. You can create a virtual debit card instantly and set a limit.
So you create one with a $1 limit. If a company tries to charge it more than that it’s denied. I’ve used it for tons of free trials without issues.
Congratulations! Very good start towards improving your security and privacy. See here for a lot more guidance to help you along: https://www.privacytools.io/
​
It's not a paywall, it's the Privacy.com browser extension misbehaving. Usually that icon will appear on a checkout page for an online store, you can click it and it will autogenerate a virtual debit card number for you, I have no idea why it's appearing in a checkbox though.
As it states in the article it is also sponsored by the US Department of State, specifically the US Department of State Bureau of Democracy, Human Rights, and Labor and even Reddit.
Hyvä homma. Chromen ylivalta kuitenkin tarkoittaa, että valtaosa käyttäjistä on edelleen seurattavana. Voisi myös väittää, että iso osa Firefoxin käyttäjistä on tehokäyttäjiä, jotka asentavat joka tapauksessa vähintään adblockerin. Tähän voisikin taas listata ne välttämättömimmät selainlisäosat (joista osa päällekäisiä):
-uBlock Origin, mainosten estoon (mahdollista konfiguroida estämään mm. seuraimetkin)
-Privacy Badger, vaihtoehto seurainten estoon
-HTTPS Everywhere, pakottaa salatun yhteyden
-Decentraleyes, käyttäjää seuraavien 3. osapuolen jakeluverkkojen kiertämiseen
-Facebook/Google Container, sulkee kyseiset domainit omaan Firefox-containeriin, estäen kirjautuneen käyttäjän yhdistämisen muihin selaustietoihin (lienee tarpeeton, jos käyttää seurannan estoa erillisellä lisäosalla)
-NoScript/uMatrix edistyneemmälle käyttäjälle
Edit: tällä lisäksi hyviä vinkkejä Firefoxin muokkaamiseksi: https://www.privacytools.io/#about_config
You can also use /r/privacytoolsio's about:config tweaks if you're that concerned.
Cybersecurity is a lot like /r/Watches. It looks nice from outside the community but it's easy to get sucked in quick and you might go overkill if you don't check yourself.^^lol
Precisely, TOR was originally designed to protect government communications from others. Now it's being used to protect our communications from them, and they're not too happy about it
Think about the World Wide Web right now. You have tons of different domains (.com, .org, .net, etc), all of which are understood by the Domain Name System. The Domain Name System is what makes your browser understand the website and it magically appears before you.
Tor works a bit different. It utilizes something called "Onion layering". It' rather self explanatory. When you use Tor, you're linked through things called "non-exit nodes". Nodes are volunteers around the world who help transfer you through the Tor network. Anyone can be a node. When it hops you through the non-exit nodes, your traffic becomes encrypted, and no one can see your raw IP address. When you use the clearnet with Tor (AKA the world wide web), you also use an exit node for the final hop. The non-exit nodes are like the boats across an ocean. The exit node is like finally arriving at the shore. However, exit nodes can peer into your traffic if they get really curious. Most exit nodes are perfectly safe and governed by people just like you and me who want to help people browse in liberty.
However, the .onion domain is it's own little feature. The .onion isn't a part of the Domain Name System. It's only understood by the Tor network, so your normal browser doesn't understand it. Instead of using an exit node, it only requires non-exit nodes. Everyone on the "deepweb" appears as localhost, or the IP is 127.0.0.1. It is encrypted end-to-end.
The Tor Project started as a way to help oppressed citizens in different countries browse the Internet. Since then, it's been used across the globe in numerous ways. See how people use Tor here.
Saving this as my future copypasta whenever this question crops up. Be on the lookout for edits.
Just to add on to this great post, privacytools.io has a nice list of recommended Firefox tweaks for privacy. There's other settings they link to as well for more detailed user.js files.
I've made a post about this, but use TOR to circumvent the censorship and keep yourself safe! https://www.torproject.org/download/download-easy.html.en
If they block the TOR site use this guide to get it via email: https://www.torproject.org/projects/gettor
This is absolutely vital. Keep the information flowing. If you are in Turkey and reading this, download it now. TOR was designed for events like this.
I thought it was relatively common knowledge but: Tor was originally an ONR (Office of Naval Research) project and the NSF is currently a major sponsor as well.
This is why I use sites like SimpleLogin and Privacy.com so that is it is physically impossible to give me the run around and I can just delete the email address and credit card I gave them as soon as they try so that they don't have any information anymore (I also never give out any personal information unless it is necessary for the service I want, otherwise I just enter fake information or take my business elsewhere. Also use a PO box instead of home address, since I can change my PO easier than my address).
If you're worried, you could run a Tor relay and not an exit node. Relays only move encrypted traffic between users, relays, and exit nodes so there's no risk at all: https://www.torproject.org/docs/tor-doc-relay.html.en Tor always needs more relays as they're a key part of ensuring the security and anonymity of the network as well as improving network performance. Also, no one has ever been sued or prosecuted for running a relay - including an exit relay. And the EFF believes that running relays, including exit nodes, is legal under US law: https://www.torproject.org/eff/tor-legal-faq.html.en So if you do run an exit node, and you do get in trouble - that would be quite interesting as you'd be the first person ever to have that experience - you'd probably be quite famous for it!
Great LPT. I would add to this by recommending to use an email alias instead of this
https://simplelogin.io and https://anonaddy.com are brilliant options. They can also be self hosted!
Edit: typed anondaddy by mistake lol
Because of the way TOR works, it should be impossible for the government to block some sites on it but not others. You're probably unable to get to Wikileaks because of the DDOS attack.
Governments CAN find ways to block access to the TOR network ittself, but once you're on, you're golden. If you can't access TOR through the normal means, look into connecting through bridges. They are most commonly used for people trying to use TOR in China, but they may be useful for you.
Defaulting clients to run as nodes. It would result in a lot more nodes, making it a lot less feasible to crack.
Edit: this isn't without its own set of problems: there's an entry on the Tor FAQ page about why they don't currently do this.
In these cases, I personally use Privacy.com.
Heard about them from a youtuber. They haven't charged me anything that I didn't explicitly ask for, no fees for making new cards, you can even set daily/weekly/monthly/total limits on every single transaction. Never had one of their cards get declined, even ones that I've made seconds before making a purchase.
Anyone interested in hardening their browser for privacy should take a look at the privacytools.io list for Firefox: https://www.privacytools.io/browsers/#addons
Addons I'm using: NoScript, HTTPS Everywhere, uBlock Origin, uMatrix, Nano Defender, Privacy Badget, Privacy Possum, Decentraleyes, Cookie AutoDelete. They also list tons of config options to tweak along with a couple open source JS templates aimed at privacy configuration. Librefox is a new version of Firefox which includes a lot of these tweaks, but you'll have more leeway with customization if you just use a stock Firefox install and implement only the changes you want.
Also look into pi.hole if you really want to get paranoid.
/r/privacytoolsio is another great privacy-oriented sub.
If you are not already, please use TOR to post to any forums in the future. This service anonymizes and hides your traffic from surveillance. Saudi Arabia is a big user of web monitoring and filtering devices - they could easily pick keywords out of this post that could get you in real trouble.
Edit: please be aware that they are still likely to know you're using TOR, just not what you're saying/doing while you use it.
I've never bought drugs in my life, but I'm pretty sure I understand how you'd have to do it on the darknet.
Step 1 would be to get your hand on some bitcoin or another crypto-currency, this makes the transaction harder to tie to you (make sure you don't send BTC from the same address again if you want to stay really safe)
Step 2 would be to get the Tor browser bundle
https://www.torproject.org/projects/torbrowser.html.en
Step 3 is to go to /r/onions or /r/darknetmarkets and find out what market is hip with the kids
Step 4 and beyond I can't help you with since I've never actually bought something on one of those sites.
As a moderator of /r/DarkNetMarkets and a user and researcher of the dark web for more than ten years, you do not actually have any idea what you're talking about. You are repeating an entirely fabricated media myth. Those things may be advertised on the dark web, but they're literally all fake scams ("payment up front!") or law enforcement stings (except for CC#s - those are actually there, and maybe an occasional passport). You would do well not to repeat this nonsense - it makes you seem quite ignorant.
There are essentially zero transactions on the dark web for anything that doesn't fit inside a standard USPS shipping box, or a .zip file. Don't buy into the hype, it's ridiculous, and very costly to the activists, reporters, dissidents, and others who rely on anonymity technologies to make the world a better place.
Take this nonsense back to /r/NoSleep
I had been using Chrome for over a decade. Now I exclusively use Firefox for personal use. Check out privacytools.io for helpful settings and extensions to make your install more secure.
Do you really, really believe privacy can be attained by disabling few settings at the user end? If you're not paying, you're the product.
>Free Software Foundation accuses Microsoft for using "draconian laws" to keep users away from the core of the Windows operating system, stating that "Because it is fundamentally insecure and scoffs at privacy, Windows is an open window onto you." http://news.softpedia.com/news/reject-windows-10-and-embrace-free-software-says-fsf-488237.shtml
Some privacy focused OS alternatives https://www.privacytools.io/#os
I use privacy.com for shit like this. Free digital debit cards you can set limits on, like "lifetime $50 spend" or "3 charges total" etc etc.
I've gotten notices multiple times from food delivery companies trying to sneak in an extra charge or renew a membership they weren't supposed to.
Not an expert - but I'd imagine that a malicious extension could potentially be more likely detected, although I think even that could be quite a difficult problem. Check out this site for example: https://browserleaks.com/ of all the info that you leak, intentionally or no, via your browser.
FTA:
The bill would make it mandatory for telecom providers, ISPs and search engines to monitor, store, retain and not disclose e-mail, Internet and telephone communications at the request of law and security officials. **No warrant necessary.**
Welcome to 1984. Good thing we have options.
By inspecting the traffic into and out of a router, a malicious ISP or state-level firewall could identify that a computer is running I2P. As discussed above, I2P is not specifically designed to hide that a computer is running I2P. However, several design decisions made in the design of the transport layer and protocols make it somewhat difficult to identify I2P traffic:
In the near future, we plan to directly address traffic analysis issues by further obfuscation of I2P transport protocols, possibly including:
It's basically a credit card, but not a physical one (obviously)
Try here - https://privacy.com/
I believe you can make as many as you want, so you don't have to enter in your own details / your own card.
Anything is possible. But using a burner email address, one-time use CC number through Privacy.com and shipping to my office address will provide them with almost nothing.
Bought 5 before I realized they were 20 packs... LOL!
An allegation that's already been dismissed as 'ridiculously far-fetched' by the Swedish foreign ministry.
I'm inclined to agree. Sweden's been giving aid to Cambodia for a long time. This is pure confirmation-bias/post-hoc-ergo-propter-hoc. As much as that might clash with the world-view and interests of the Reddit hivemind, Svartholm-Warg is pretty far from being on anyone's most-wanted list. It's not like we're talking about getting Adolf Eichmann out of Argentina here.
Might also be worth mentioning that the Swedish government aid agency in question (SIDA) is a large and ongoing sponsor of Tor development. So if they're pursuing a secret agenda to stop internet piracy, they've chosen a rather odd way of going about it.
Also for anyone in the future not wanting to put their cc info in unknown places https://privacy.com is a great website. Let’s you create virtual cards with different numbers that you can deactivate easily and set limits for subscriptions
I can say a lot about how browsing with Tor is different from browsing without Tor, but I'll try to keep it short; when you are not browsing with Tor, you are allowing your ISP, anyone watching your network, and the websites you visit to learn what you are doing online, which sites you visit, what you searched for on Google, what you bought on Amazon, and so on. The article I wrote for ORGZine a few weeks ago has some more information about this.
Tor helps with a number of things, such as defending against traffic analysis, reducing your digital footprint, preventing your ISP from learning which websites you are visiting, and allowing you to access websites which have been blocked where you are currently located.
The tl;dr for how Tor anonymizes your traffic is that it wraps it in three layers of encryption and sends it through three random servers in the Tor network. The longer explanation, with detailed images, can be found on our overview page.
Everyone should download and install TOR browser. The more people using it the more difficult it is for political dissenters to be targeted.
It's really not difficult.
Go to this link and install it. Follow install instructions an voila. TOR browser is a fairly user friendly alternative to chrome, and since it's only intended purpose is to protect your anonymity it does almost everything for you. Spend a little time searching for a major marketplace and you'll be fine.
I've never actually had the cajones to purchase anything but I've done quite a bit of lurking. I actually found a guy who was advertising his ability to come to my work and steal things.
https://www.torproject.org/projects/torbrowser.html.en - Open away. The connection is routed through Tor, so you'll look like you're in the middle of Europe, or Kansas, or California, or Singapore. Wherever the exit node is.
I cant say for sure but if you use FF anti-tracking + uBlock Origin + Privacy Badger you will have a good chance of blocking MOST tracking attempts. uBlock has some quite sophisticated filters which you can rely on without worrying about using extra targeted addons for cookies.
One thing to be careful about if your thinking about adding more addons is fingerprinting because the more unique your browser is compared to the majority of the FF population, the more chance you have of becoming uniquely identifiable but you probably already know this.
One last thing I can recommend is follow the Firefox: Privacy Related "about:config" Tweaks which works well and tightens the security and privacy of firefox further.
I have PIA but just read on this site: https://thatoneprivacysite.net/vpn-comparison-chart/ That PIA shows being under surveillance by the "Five Eyes" (Five countries -- Australia, Canada, NZ, UK and USA) so it may not be as private as you may think? This is more of a heads up than anything. I still have it but may move to another service recommended on the site below --
Tor is designed to fight censorship... Unless France bans encryption altogether, France cannot block Tor.
Tor can use bridges that makes its traffic look like Google, Amazon or just about any other type of RUN-OF-THE-MILL encrypted traffic.
https://www.torproject.org/docs/bridges.html.en
Just one more case of politicians failing to understand how the internet works.
Privacy.com allows you to create virtual credit cards. You can set the maximum spend amount or maximum monthly spend amount, and you can close them at any time. You can create a separate card for every website you don't trust and not worry that if they are hacked or shady that they will leak your real CC#.
Well, you should donate to the TOR project becauase withtout it you would be getting ripped off by your local dealers who are being ripped off by thier suppliers etc and so on.
Some people consider Discord to be particularly bad spyware...
https://spyware.neocities.org/articles/discord.html
Personally, I wouldn't use it. I'd suggest using a website like www.privacytools.io to find safer, open-source software.
https://www.privacytools.io/software/im/
(The chat application mentioned on there called 'Riot' is probably the closest to Discord that you'll find.)
That said, convincing all your friends to change too is the hard part.
Your screen resolution and browser alone are enough to identify you pretty strongly.
Check this useful tool to see how easily you can be tracked. (And that's just info your browser gives out)
Regarding the usage of [email protected], in the event that your email leaks or the website you're using your email at is breached (and most of them if not all do no encrypt emails), it would be pretty easy to get your main email just by removing anything between the + and the @.
Some websites, when sending emails or when signing up, straight up don't accept or ignore the plus sign when submitting it to their database.
I would highly recommend, as I have made the switch a few days ago, to use real alias emails through SimpleLogin.io or AnonAddy.com (both open-source and can be self-hosted) where you create aliases there either through your own domain name (easier if you decide to switch services later) or theirs. If the email ever leaks or starts getting spammed, you would easily disable it.
There are other services similar to those two but most are not open source, cannot be self hosted (Firefox Relay for example) and with limitations.
I suggest you take a look at services like that and see what may fit your needs in additions to other features that may be interesting.
Of course they are. Windows 10 is the ultimate surveillance tool (https). Best defense is still TOR and/or a VPN - see guide (https).
Why not just use the already-existing anonymous BitTorrent that's integrated into I2P? I2P is like Tor but is almost completely decentralized and self-scaling, and has numerous features that Tor does not (support for UDP traffic, customizable and more obfuscated tunnels, integrated anonymous email and secure messaging with I2P-Bote, a highly resilient distributed data store with the Tahoe-LAFS plugin, and more).
I got you fam.
Follow this Link:
https://www.facebook.com/help/224562897555674/
Open one of the standard browsers your computer came with. For some reason when it gets fucky when you use a third party one. DL the data crap it wants you to and then delete it forever. And now that you will have so much free time! Begin to study up on using third party email providers, the importance of a VPN and why you should switch to duck duck go and get off everything g00lag!
All those addons/extension above increase privacy protection. If you don't care about your privacy, then no need to install those addons.
If you care about privacy, try visit this website https://www.privacytools.io/
Bless up, sign up for a Privacy account. All you need to do is link it to your checking account to make an account. you can create digital cards and set a limit. So like use the card to sign up for a Hulu trail, but go in the card settings and set the card limit to $5 per charge. So even if you forget to cancel the trail, you don’t get charged.
Edit: damn. Reading this comment just realized how much of a cheap ass I am.
I mean there are a lot of default things in firefox that aren't too great for privacy, like the new tab page and arguably telemetry. The PrivacyTools page explains some things
Sure.
tl;dr: Tor is more centralized and designed to visit regular Internet websites anonymously, while I2P is fully distributed/self-organized and designed for P2P apps/hidden services.
I've been using SimpleLogin for this which is great. I've long wanted this for 1P, but I'm kinda annoyed that it requires a $3/month subscription with Fastmail to work. The integration with Privacy.com at least had a free option.
I would consider dumping SimpleLogin for Fastmail just to take advantage of this integration, but I'm also not so sure I want to be so dependent on 1Password if further improvements are going to be in the form of paid integrations.
Fastmail costs as much as 1Password. Bummer.
Say it with me: "I will always use virtual credit cards with spending limits from Privacy.com when buying things from businesses I've never purchased from in the past."
Seriously. So many headaches averted. This is not an advertisement. Just a happy customer.
> You could run a full node over Tor, but even with one megabyte blocks that would be over 100 megabytes of encrypted Tor traffic every day. The risk of jack-booted thugs breaking down your door and demanding to know what you are doing far outweigh the benefits of running a fully validating node.
Tor has developed a huge number of very successful steganographic techniques to hide Tor traffic in other innocuous traffic. obfsproxy is quite successful and used in production all the time; hiding a few hundred MB of data from censors is quite easy and tens of thousands of Tor users in countries like China use it every day.
edit: And lets just be clear here: Gavin expects it to become impossible to fully participate in the Bitcoin system anonymously. With FinCEN forcing Ripple to make changes to their core protocol to implement AML, this isn't something we should take lightly.
Privacy? I don't have anything to hide.
Glenn Greenwald: Why privacy matters Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide."
I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting.
After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.
Glenn Greenwald in Why privacy matters - TED Talk
Direct link to delete your Facebook account without being able to reactivate it again. List of decentralized social networks: https://www.privacytools.io/#social
That frontpage banner is trying to convey the essential idea behind Tor as quickly as possible. Before you can actually download and use Tor, you have to browse past an orange warning box that links you to this cautionary list
You are not being accurate when you say: > No asterisks, no disclaimers, just boom, instant securification.
It's hard to know for sure, but it's not a good sign that they will respect your privacy, especially with the lack of a privacy policy. There's definitely stuff linking to Google, but other companies as well.
They are probably tracking your entire activity on the site. They are probably also tracking information about your browser, device, ect. They could be placing malicious cookies into your browser which can track stuff you are doing on other sites. They can use information from your browser to build up a fingerprint of you and link that to other sites. If you are using Chrome, it's even worse since your browser is already owned by Google.
https://www.privacytools.io/browsers has a bunch of information about browser tracking and advice to help you stay private online.
Why on earth would you use a VPN owned by an American corporation? They're called "London Trust Media, Inc." but are based in the US.
At least use something like Mullvad or another VPN not in the Five Eyes Alliance: https://www.privacytools.io/providers/
>Why is it not recommended to choose a US-based service?
>Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
>An example of this is Lavabit – a secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
>Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order.
>The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory
>Onion routing was further developed by DARPA in 1997.
Both agencies are listed on Tor's "sponsors" page... https://www.torproject.org/about/sponsors.html.en
I'm pretty sure with DARPA involved the feds have a pretty good idea of how to mitigate Tor if/when they want to.
Calling it the "deep web" isn't really accurate. What they really mean is the dark web, which usually means TOR. You can download the browser and access web domains that are usually a mixture of letters and numbers ending with .onion. So you can check out /r/onions to find some websites to visit. There's no search engine on TOR, you need to know the exact URL to get to some places. This is actually kind of interesting because that means there could be some really fucked up stuff out there, but you'll never ever know about it unless somebody gives you the exact URL.
If you do decide to check it out, just be careful. Disable Javascript and pictures, just in case you stumble across something you wouldn't want to see.
>DDG requires some free time, because the quality of results is worse (no matter what the evangelists are trying to say, there is real merit to the amount of learning Google does, they can rank more readily what you actually want to know in the situation).
Absolutely agree. I want to love DDG so badly, but the quality of the search results are not great.
If you can't leave Google but want a bit more privacy, you can use StartPage which acts as a proxy to Google.
https://www.privacytools.io/ has more privacy tips for people who are interested.
Your VPN only masks your real IP. Your precise location can be determined by other means; through the geolocation API, through a WebRTC leak, or through an IPv6 leak. You should run a browser test to determine where your leak is coming from. https://tenta.com/test or https://browserleaks.com are both good.
For ransomware you may be out of luck. Especially if it's the guys that encrypt your pictures and files. In the future you can prevent being a target. You can pay them, they will unlock it, but you're just feeding them what they need to justify attacking more people.
To prevent this in the first place I highly recommend reading this site and doing as much or as little as you feel comfortable doing: https://www.privacytools.io/
This really breaks it down. The easiest thing is to disable Flash, use FireFox, and use the extension NoScript. If you must use flash, still use NoScript and firefox.
The reason for this is that Flash and some other languages have big exploits that allow attackers to place malicious commands (scripts) into your browser. After a couple of hidden steps your computer could be installing programs without your knowledge, and running those programs with your 'permission'.
NoScript makes it so that every site, and even every advertisement on every site, must ask your permission before running their scripts. It's easy enough to deny all that until the site itself runs into a problem.
The "Five Eyes" refer to an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are bound by the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence. Source
privacy.com (https://privacy.com/join/8AVCD)
I can have 100 credit cards rolled up in 5 minutes each with a 1 cent lifetime limit.
Free trials are amazing now, and I cackle like a madman the next month when I get the inevitable emails about further charges being declined.
Just 1 data point from a tor exit node that did online advertising click fraud - No-one's door. A letter's sent mentioning suspicious activity and a security concern. Reply with the response from the Tor Legal and Abuse FAQs.
https://www.torproject.org/eff/tor-legal-faq.html.en > Has anyone ever been sued for running Tor? > > No. > > Further, we believe that running a Tor node, including a Tor exit node that allows people to anonymously send and receive traffic, is lawful under U.S. law. > > ... > >If I receive a request from law enforcement or anyone else for my Tor relay's logs, what should I do? > >Educate them about Tor. In most instances, properly configured Tor relays will have no useful data for inquiring parties, and you should feel free to educate them on this point. To the extent you do maintain logs, however, you should not disclose them to any third party without first consulting a lawyer. In the U.S., such a disclosure may violate the Electronic Communications Privacy Act, and relay operators outside of the U.S. may be subject to similar data protection laws.... EFF is currently working on informational materials to help you respond to the most likely types of legal requests or notices, so watch this space.
And specific responses the EFF provided can be found here:
https://www.torproject.org/docs/faq-abuse.html.en#TypicalAbuses
Please don't run torrents over Tor, the network wasn't designed for that sort of load. Besides, UDP packets don't run over Tor anyway.
Get a paid torrent-friendly VPN that doesn't log.
In my opinion the best thing for the individual user would be free or libre software. You can find a lot of open source alternatives when you look for them. For starters look here and here. Also there is a point to be made that it would be beneficial to change to decentralised services where the individual is in control of their data and not google, apple, microsoft or whatever other hosting server provider.
Of course it is a real challenge to make a 180 and go only with open source and free software but instead of thinking like that just balance your use and spending of money in a way that benefits those user-friendly software tools. Make it a weighting game when you spend money on proprietary software or services match it in donations or contributions to open source alternatives.
And maybe most importantly get informed, advocate free software and call out bullshit like "encryption is bad". There is much more FUD flying around.
dont know for sure but you could try with the free month
also a little tip: use privacy.com so you can essentially create a new credit card every month to get that juicy free hifi
I have been using anonaddy.com ( r/AnonAddy) successfully precisely for these objective now for about a year and a half. I create a new email address using a variety of domains (I have a couple of domains I own personally linked to the account too, as well as the native domains) which are available. I have found it to be exceptionally reliable.
Each time I create a new account at some website or another I create a unique email address and a unique password. If I notice that a company starts to spam me, or it appears that they've sold my email address, or the site becomes compromised, then I just switch off the email address and that is the end of the matter. I am not bothered by it any longer.
It works well, I'd recommend it.
Sorgligt att det ens är uppe för diskussion i Sverige. Trodde att man i Sverige har lite mer kunskap om hur internet fungerar, Att blockera IP adresser är ju fullständigt meningslöst med alla VPN/Proxy tjänster. Men det kanske blir ett uppsving för Tor i Sverige.
Ublock origin and adblock plus is redundant. Just as u/vipereddit said, ghostery sells data. What you should do instead is get https everywhere, decentraleyes, ublock ORIGIN and noscript or umatrix if you are determined. Also get hardened user.js fromhere, disable pocket and modify(at your own disclosure) about:config with these settings(again, some might disable features you use, so read and check).
The simplified explanation is that you can think of Tor like using three VPNs in a row. The goal is to hide your IP address, giving you complete anonymity online. Tor routes Internet traffic through three relays: an entry node, a middle node, and an exit. Each relay has it's own layer of encryption and the exit node is the one that contacts the web server, fetches the webpage, and gives it back to you yet doesn't know your actual IP address.
This page explains things pretty well: https://www.torproject.org/about/overview.html.en If you still don't understand I can try to further clarify terms for you.
What can we do to help? Donate to the Tor project monthly.
The fbi in conjunction with universities is trying to ddos and hack the network. Every one dollar spent on Tor takes ten dollars in computing power by the fbi and state sanctuned hackers. With this approach the fbi can't handle the computatiinal power to hack tor.
Tor is not (presently) financed by the US military. It has previously been funded by DARPA and the US Naval Research Lab. It has also received funding in part by foreign governments and institutions. The core Tor development team also includes individuals who are not US citizens or residing in the US.
For everyone else -- Whoogle anonymizes google searches as much as possible while still leaving the interface mostly intact. The author has put a lot of work into making it as seamless as possible. It even has search suggestion autocomplete working for all browsers. I use it as my default search engine now.
Why are you people upset about the title? He's referencing the Palmetto State Armory deal that is up as well... Many people say that the credit cards they use with PSA get stolen...
​
It happened twice to me. I ordered from PSA twice, and both times my card information was stolen and used about a month or two after. Something shady is going on with them giving away or selling customer information. I don't trust PSA. Use a website like Privacy.com if you order form PSA.
1) préparer vous a changer votre liste de serveurs DNS
2) préparer vous a vous procurer un VPN. Avec l’espionnage de nos gouvernements c'est malheureusement rendu nécessaire. En voici une liste: https://www.privacytools.io/#vpn
Y'a pas vraiment de différence. Le deepweb c'est tout ce qui n'est pas accessible par les robots des moteurs de recherche classiques. Donc un subreddit privé par exemple fait techniquement partie du deepweb, de même que tes messages Facebook.
Après tu as le darknet, qui est le réseau Internet auquel les navigateurs classiques n'ont pas accès, c'est une sorte de web séparé du net normal. Tu peux utiliser le navigateur Tor pour accéder au darknet, ce sont des adresses qui se terminent en .onion. Il y a aussi i2p dans le même style, mais je m'en suis jamais servi.
A noter que comme Tor est un navigateur, tu peux aussi bien accéder au net normal qu'au darknet avec.
Le truc c'est que le deepweb et le darknet sont fantasmés comme des trucs horribles et trash alors que non. Plein de sites normaux sont sur le darknet, comme Wikileaks, pour protéger leurs utilisateurs. Et tu as plein de sites horribles sur le web normal, rien que sur Reddit il y a plein de subreddits immondes.
Article mirror without tracking: https://outline.com/LwZ6D9
The title is a bit confusing as it could suggest that Firefox is just a leaky browser. A more accurate title would be "Use new Firefox content blocking tools to thwart standard web tracking techniques."
Nevertheless, the article itself is a decent recap of Firefox privacy options. For those who are tech savvy and don't mind potentially breaking website functionality to further enhance privacy, I'd also recommend looking into tweaking certain about:config settings.
Thoughts from someone who used to work in financial fraud... If you were impacted by this you need to:
​
Edit: Sorry about the weird spacing.
Consider checking out https://Privacy.com (or if you care to use my referral link: https://privacy.com/join/4XC9A) You can create new card numbers at the drop of a hat for any reason... One time use, multiple use, amount limits. Super convenient.
O melhor AV é: bom senso.
Evitar software pirata, cracks, patches manhosas e todo o software de origem duvidosa.
Evitar sites manhosos que abram 1001 janelas e tentem minar o teu pc.
Ter noção da privacidade online e usar browsers como o Firefox e as extensões sugeridas aqui.
Muitas empresas de AV estão sob suspeita de lançarem vírus para prejudicar a concorrência. Avast e outras analisam e recolhem dados sobre tudo o que tens no PC. O utilizador permite isso ao aceitar o contrato.
O melhor é ter o AV do windows pelo menos é leve e não vai fazer pior do que os outros.
If you're getting a non-chromium based browser it's almost certainly going to be based on Firefox.
If you're just looking for an alternative to Google's Chrome, default settings should be fine. If you're looking for enhanced privacy as well you'll probably want to do some modification. I think PrivacyTools.io has some pretty good advice as far as that goes.
Obviously do your own research as far as that goes, since what might be enough privacy for me might not be enough for you or vise-versa.
From https://www.torproject.org:
>Who Uses Tor?
>Normal People
>People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.
>Businesses
>Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.
>Activists & Whistleblowers
>Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report on corruption.
>Journalists and the Media
>Journalists and the media use Tor to protect their research and sources online.
>Military and Law Enforcement
>Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.