Safer Internet: Browsing: Anonymity

Quotes | Summary |
References: General | Censorship, Journalism, Wikileaks |
Dark Web / Deep Net | NSA, CIA | Tails | Tor


Quotes

Summary

  • [3] Use Tor "The Onion Router" and Tails OS "The Amnesic Incognito Live System"
  • Advantages: more anonymity for targeted users, e.g., political dissidents, investigative journalists, whistleblowers, criminals, trolls, hate groups
  • minimizes associating your actual IP with routing/server activities
  • more encryption (like VPN); random routing via multiple nodes
  • how tor worksDisadvantages: difficult to guarantee 100% anonymity, and likely to attract unwanted attention
  • difficult to setup; slow; government monitoring / filtering / blocking / censoring
  • network {Figure 14: TCYOP-4: 104; TCYOP-3: 87}
  • configuration {Figure 15: TCYOP-4: 105; TCYOP-3: 88;}

References

Censorship, Journalism, Wikileaks

Dark Web / Deep Net

National Security Agency (NSA); CIA

Tails

torTor