You might as well start by looking in the data of your machine. Did you fill in your real name and address anywhere? Remove it. And don’t keep any of your passwords on your machine. A piece of paper will do.
KeePassX is very useful if you make more identities, keeping the database on a USB stick that you take out of your machine when you walk away from it, and keep that stick in a location only known to you.
The greatest threats to your safety are A) social engineering and your behaviour and B) revealing your IP address.
Political activists, dissidents, and even nonpartisan bystanders caught in social instability are often fearful for their protection and protection of their families. Citizens may face harsh and even violent opposition by authorities and security forces in such situations. This guide is designed to introduce the reader to the mentality needed to stay safe during unrest and protests – both online and offline. It furthermore aims to assist in continued communications during periods of internet and phone line restrictions.
OrangeMesh is a simple, open source network management dashboard for ROBIN based networks. It helps communities, individuals, and business create and manage wireless mesh networks without any reliance on third parties.
http://orangemesh.sourceforge.net/
Freenet is free software which lets you anonymously share files, browse and publish “freesites” (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in “darknet” mode, where users only connect to their friends, is very difficult to detect. For Linux and Unix.
Osiris portals are serverless, so they spread through the P2P network members. This allows the portals to be independent of central servers, free and indestructibles since they are supported by every portal member.
Moreover, all the sent contents are anonymous, enabling a strong privacy protection and ensuring that no one can overwhelm this experiment of free thought and knowledge distribution.
Osiris can also build monarchic portals for a traditional moderation.
This is a free and open-source P2P Social Virtual Private Network (VPN) that seamlessly networks your computer with the computers of your friends so that:
http://socialvpn.wordpress.com
How-To's will follow. Want me to investigate a specific tool (first), or have FOSS suggestions for more tools, please let me know.
Comment
This is just a first article. Help if you will to spread the notion of securit.
My "colleague" Zwadderneel wrote articles about Tor and I2P:
http://zwadderneel.wordpress.com/2011/02/25/a-clever-request-can-cl... (Tor)
http://zwadderneel.wordpress.com/2011/03/15/i2p-does-not-trust-part... (I2P)
http://zwadderneel.wordpress.com/2011/03/24/anonymous-irc-suits/ (IRC)
Hey Anonymiss, thanks for that article i was aware hacks like that existed but had never read a professional writeup on them. I'm still confident in truecrypt as i don't leave my machine running and as that article says the ram image only last at room temp for seconds to minutes, lets say 5min and be generous. Thats not an issue to me and all os encryption programs use ram to store a key so there is no immune program. The only way someone can use this technique is to ether catch my machine running or seconds after I shut it off. Thats not likely and I don't have anything that would make a team with this tech come after me or anything that would make a physical attack worth it. All you need is AES 256 and SHA 512 hash combo that TC has if the attacker can break that theres no defense thats going to stop them. TC is as good if not better due to being much more popular than those on your list for the reason that its been tested extensively by experts world wide.
Also you don't have TOR or I2P on that list above, If you know their short comings they are very effective. All one has to remember is that unencrypted data can be seen by the exit node.
"Destroying the New World Order"
THANK YOU FOR SUPPORTING THE SITE!
© 2024 Created by truth. Powered by
You need to be a member of 12160 Social Network to add comments!
Join 12160 Social Network