May 302013
 

Today I propose you an interesting topic based on an article by   first published on https://citizenweb.is/

Over the past few years, a handful of different encrypted messaging systems have cropped up and gained prominence, notably Cryptocat and the OTR specification. Now a newcomer to the scene proposes a different way of thinking about encrypted communication, one that borrows from its more well-known older brother, BitCoin.

A project has been started that intends to recreate BitCoin’s decentralized P2P model for seamless message encryption and transmission.
BitMessage was started by Jonathan Warr en late last year and has now made it up to version 0.2.4. One of the most prominent strengths of the BitMessage system is how it enforces anonymity. Similar to how BitCoin allows one to send money to anonymous recipients without advertising metadata to others, BitMessage communicates via simple addresses generated from public keys, which need not be tied to a specific user’s identity.

Continue reading »

Flattr this!

Jan 282013
 

In the past I’ve posted an article about Anonymous browsing with Tor that can be useful when you use your favorite browser and you wish to stay anonymous thanks to the Tor software.

Tor (short for The Onion Router) is a system intended to enable online anonymity. Tor client software directs internet traffic through a worldwide volunteer network of servers to conceal a user’s location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity, including “visits to Web sites, online posts, instant messages and other communication forms”, back to the user and is intended to protect users’ personal freedom, privacy, and ability to conduct confidential business by keeping their internet activities from being monitored.

Today I want to show some simple uses of the command torify that can be used from the Linux terminal.
Continue reading »

Flattr this!

Jan 282012
 

SOCKet Secure (SOCKS) is an Internet protocol that routes network packets between a client and server through a proxy server. SOCKS5 additionally provides authentication so only authorized users may access a server. Practically, a SOCKS server will proxy TCP connections to an arbitrary IP address as well as providing a means for UDP packets to be forwarded.

As SOCKS (as it was already marked above) transfers all data from a client to a server, nothing adding from itself, from the point of view of a web-server, a socks proxy is a client. Therefore anonymity of this type of proxy servers is really always absolute.

In this article we’ll see how to use redsocks to achieve a SOCKS proxy.
Continue reading »

Flattr this!