692
692
Nov 8, 2004
11/04
by
http://www.inetprivacy.com/a4proxy/
software
eye 692
favorite 2
comment 0
This is a personal anonymous proxy server and Web anonymizer for surfing the Internet with privacy. It provides tools to locate, test and log on to public anonymous proxy servers. There is a large pre-checked anonymous public proxy server list included, and you can import of your own lists. It supports FTP and Secure HTTP (HTTPS, SSL) checking/surfing. You can scan each server, test its speed, and confirm its anonymity and IP isolation factors. The interface supports English, German, Italian,...
Topics: Anonymity 4 Proxy, Internet, Servers, Proxy, Anonymity 4 Proxy, A4Proxy
Cloud computing is a drastically new enrolling point of view, which connects with flexible, on request, and straightforwardness utilization of figuring assets, anyway the information is given to some cloud workers, and assorted security concerns reach out of it. In this paper, a semi anonymous advantage control plot AnonyControl to address the information security, and the clients confirmation in current get the chance to control organizes. AnonyControl decentralizes the central master to...
Topics: Cloud computing, Anonycontrol, Access control, Privilege control, Semi anonymity, fully anonymity
0
0.0
web
eye 0
favorite 1
comment 0
Anonymity Avatars and Identity Wiki dumped with WikiTeam tools.
Topics: wiki, wikiteam, MediaWiki, Anonymity Avatars and Identity Wiki,...
1,049
1.0K
web
eye 1,049
favorite 0
comment 0
Topics: warcarchives, socks, internet, anonymity, proxies
490
490
web
eye 490
favorite 1
comment 0
The resources related to information security, privacy and anonymity.
Topic: Tor,privacy,anonymity,Qubes OS
75
75
texts
eye 75
favorite 1
comment 0
We present Loopix, a low-latency anonymous communication system that provides bi-directional ‘thirdparty’ sender and receiver anonymity and unobservability. Loopix leverages cover traffic and brief message delays to provide anonymity and achieve traffic analysis resistance, including against a global network adversary. Mixes and clients self-monitor the network via loops of traffic to provide protection against active attacks, and inject cover traffic to provide stronger anonymity and a...
Topics: paper, loopix, anonymity, privacy, messaging, tor
138
138
May 6, 2014
05/14
by
Vishakha S. Kulkarni ,M. S. Gayathri
texts
eye 138
favorite 0
comment 0
In field of IT sector to maintain privacy and confidentiality of data is very important for decision making. So there is requirement of certain data to be published and exchanging of the information is in demand. The data to be exchanged contains sensitive information which moves around various parties and this may violate individual's privacy. So to preserve information in its accurate form while moving among various parties, my aim is to provide mechanism known as k_anonymous technique that...
Topics: Anonymity, data management, privacy, secure computation.
The Internet is used in many situations like to send money to a friend or receive money or you might want to buy something, and were used to using our Visa cards or PayPal or different payment methods in order to transfer money and handle using these traditional methods to transfer money is not anonymous and not private. Therefore, well need different methods if we want to protect our privacy and anonymity. Youre probably already thinking now of using Cryptocurrencies and thats correct. Some of...
Topics: Cryptocurrencies, Anonymity, Privacy, Bitcoin, Tails, Electrum, Monero
3,308
3.3K
Oct 23, 2014
10/14
by
Riseup Collective
texts
eye 3,308
favorite 10
comment 0
This zine explores various issues related to computer security including basic principles for staying safe, a look at anonymity, picking passwords, the dangers of Google, etc. It's a good mix of "how to" type information and narratives that tell important stories about why digital security is important. It is published by the Riseup.net collective who provides Internet services for various anarchist and anti-authoritarian projects.
Topics: zine, zines, computers, technology, security, anonymity, privacy
A documentary on the Anonymous movement. I got this from YouTube-- https://www.youtube.com/watch?v=bC1ex2zRCYA
Topics: dec3199, anonymous, documentary, story, 4chan, anonymity, raid
31
31
web
eye 31
favorite 0
comment 0
Wiki - Whonix
Topics: MediaWiki, wiki, wikiteam, whonix, linux, tor, anonymity
4,444
4.4K
texts
eye 4,444
favorite 13
comment 0
An excellent introduction to computer security. Provides easy to follow step-by-step directions for people of all skill levels, looking specifically at how to be more anonymous and more secure. Crucial reading!
Topics: zine, zines, computers, technology, security, privacy, anonymity
From the bitsavers.org collection, a scanned-in computer-related document. mit :: lcs :: tr :: MIT-LCS-TR-1000
Topics: nodes, node, anonymity, source, sender, slices, anonymous, routing, attacker, destination,...
International Journal of Innovative Technology and Creative Engineering (ISSN:2045-8711) vol5no1001
Topics: K-Anonymity, Privacy Preserving, NSCBA, SPARCS, Sensitive data.
11
11
Apr 16, 2021
04/21
by
David Huerta (huertanix)
data
eye 11
favorite 0
comment 0
3D printable pieces used to build my Surveillance Sanitizer art pieces that I made for Yami-Ichi NYC 2015.
Topics: sanitizer, Sculptures, tails, thingiverse, tor, anonymity, stl, surveillance
From the bitsavers.org collection, a scanned-in computer-related document. mit :: lcs :: tm :: MIT-LCS-TM-541
Topics: nodes, node, anonymity, source, sender, slices, anonymous, routing, attacker, destination,...
56
56
Jul 31, 2017
07/17
by
© IASET
texts
eye 56
favorite 0
comment 0
The research on Location based networks is tremendously increasing now-a-days which focuses on the security and privacy issues. Also, the constraints or parameters affecting the performance of the network such as energy, bandwidth, and transmission time and so on, are also being considered. Still, there is a need for a lot of research that is to be carried out in this field, where many of the recent activities focus on the techniques of the Swarm Intelligence algorithms. Swarm Intelligence...
Topics: Anonymity, LBS, Nature Inspired Algorithms, Privacy, Swarm Intelligence
90
90
Mar 31, 2021
03/21
by
Haifaa Jassim Muhasin, Rodziah Atan, Marzanah A.Jabar, Salfarina Abdullah
texts
eye 90
favorite 0
comment 0
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect...
Topics: Cloud Computing, Identity Anonymity, Privacy, Security, Sensitive Data
The emerging of social networks, e.g., Face book, Twitter, and Instagram, has eventually changed the way in which we live. Social networks are acquiring and storing a significant amount of profile information and daily activities of over billions of active users. We describe the system which is avoiding the couplet (pair) to restrict another website. We propose the concept k(0) which are avoid the interlink between the websites. In existing they used the concept of k-couplet anonymity which are...
Topics: social networks, k-couplet anonymity, data sets, Computer Engineering
1,929
1.9K
texts
eye 1,929
favorite 1
comment 0
This zine is a basic primer to being more secure in your use of cellphones and the Internet. It offers both explanations of how surveillance technologies work and practical tips for lessening their impact.
Topics: zine, zines, computers, cell phones, phones, security, anonymity, privacy
A wireless sensor network (WSN) is a distributed network that facilitates wireless information gathering within a region of interest. For this reason, WSNs are relied upon by the Department of Defense for deployment in remote and hostile areas. The information collected by sensors is aggregated at a central point known as a sink node. Two challenges in the deployment of WSNs are limited battery power of each sensor node and sink node privacy/anonymity. The role played by the sink node raises...
Topics: Wireless Sensor Networks, WSN, Ad Hoc Network, ground sensor network, Cluster routing, Sink Node...
Interview and discussion between moot and Hiroyuki. Both admins/owners of anonymous messageboards.
Topics: moot, hiroyuki, 4chan, 2channel, anonymous, imageboards, bbs, message boards, anonymity
510
510
software
eye 510
favorite 4
comment 0
A collection of software that one can use to browse the Internet anonymously or hide their IP, I believe it says. This collection was originally uploaded on to MEGA .
Topics: mega, mega.co.nz, dec3199, anon, anonymous, anonymity, software, computer, computers, privacy
49
49
Feb 11, 2021
02/21
by
The Tor Project
software
eye 49
favorite 1
comment 0
====================================== Program Name ====================================== Tails 0.7.2 ====================================== Date ====================================== 13/06/2011 ====================================== Version ====================================== 0.7.2 ====================================== License ====================================== Open-source ====================================== Platform ====================================== OS Independent / Live CD...
Topics: TOR, Anonymous, Anonymity, Web, Browsing, Firefox, Linux, Live CD, Internet
Wireless Sensor Networks consists of sensor nodes that are capable of sensing the information and maintaining security. In this paper, an Anonymity and Trust Management Scheme applied to Clustered Wireless Sensor Networks (ATMC) is proposed which enhances the security level. It also provides a stable path for communication. It is observed that the performance of the network is better than existing schemes through simulation.
Topics: Anonymity, Cluster head, Trust value, subrange values, Wireless Sensor Networks
23
23
Mar 17, 2021
03/21
by
K. Vinayakan, M. V. Srinath
texts
eye 23
favorite 0
comment 0
There are a lot of speculations going on about the interests for privacy in mobile network. Many research works have been proposed in the aspect and these works concentrate more on the anonymity part and there are quite a few implementations of these research works on some applications. Ad hoc routing protocols must have provision for both anonymity providing nature and restriction of information collection from unauthorized nodes. Till recent times, there are a number of ad hoc routing...
Topics: Analytics, Anonymity, Authentication, Mobile Ad hoc network, Route Processing, Security
Anonymity data for multiple sensitive attributes in microdata publishing is a growing field at present. This field has several models for anonymizing such as k-anonymity and l-diversity. Generalization and suppression became a common technique in anonymize data. But, the real problem in multiple sensitive attributes is sensitive value distribution. If sensitive values do not distribute evenly to each quasi identifier group, it is potentially revealed to sensitive value holder. This research...
Topics: Diversity value, Extended systematic clustering, High-sensitive value, K-anonymity
Naval Postgraduate School
48
48
Aug 23, 2019
08/19
by
Richardson, Nathan J.; Burke, Lucas J.
texts
eye 48
favorite 1
comment 0
The power of anonymity on the internet is being leveraged by criminals, online trolls, and malicious hackers. Cyber criminals masquerade as legitimate users in order to steal valuable private data, commit fraud, and steal money from their victims. This thesis investigates security vulnerabilities that exist as a product of user anonymity and provides a biometric mitigation to one of the most common exploits against DoD personnel—social engineering. To strip anonymity from malicious users, we...
Topics: biometrics, DARPA, AI, anonymity, keystroke dynamics, social engineering, cyber, botnet
A wireless sensor network (WSN) collects and routes information from the environment to an aggregation point, known as a sink node. The sink node processes the information or acts as a gateway to forward information to another network. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a WSN. In this thesis, we focus on the mitigation of sink-node vulnerability in a WSN. Specifically, in this thesis we study the issue of...
Topics: Sink node anonymity, base station anonymity, Wireless Sensor Networks (WSN), Mobile Ad hoc Network...
62
62
Sep 7, 2019
09/19
by
The Guardian Project
software
eye 62
favorite 0
comment 0
This is the most recent release before the sunsetting of the project. This work is licensed to the Guardian Project under MPL-2.0, with the source code and executable included. Tor Browser for Android is dysfunctional and poorly designed. For this reason, the old browser must be kept, and all efforts to remove the old app must be met with resistance. Spread the word.
Topics: tor, orfox, apk, privacy, security, onion, guardian, project, android, apk, anonymity
0
0.0
web
eye 0
favorite 0
comment 0
Privacy and Anonymity on the Web Wiki dumped with WikiTeam tools.
Topics: wiki, wikiteam, MediaWiki, Privacy and Anonymity on the Web Wiki, fab5fandomcom
63
63
Feb 13, 2021
02/21
by
IT-Political Associtation of Denmark
software
eye 63
favorite 0
comment 0
====================================== Program Name ====================================== Polippix Live CD ====================================== Date ====================================== 23/06/2009 ====================================== Version ====================================== 2.1 ====================================== License ====================================== Open-source ====================================== Platform ====================================== OS Independent / x86...
Topics: Polippix, Security, Anonymity, Privacy, Denmark, Operating System, KDE, Linux, Kubuntu, Ubuntu, x86
https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Source: https://www.youtube.com/watch?v=6v0ga4f2myY...
Topics: Youtube, video, Education, Online Privacy, Anonymity, Tor (Software), Arabic, Surveillance,...
originally posted on https://www.youtube.com/watch?v=UhWhlm0SB-U by "Owasp Göteborg" Source: https://www.youtube.com/watch?v=vjSuOhTCOOU Uploader: The Tor Project
Topics: Youtube, video, Science & Technology, Tor (Software), Network, Anonymity (Field Of Study),...
https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Creative Commons License "CC-BY-SA"...
Topics: Youtube, video, Education, Tor (Software), Online Privacy, Anonymity, Privacy, Surveillance,...
https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Creative Commons License "CC-BY-SA"...
Topics: Youtube, video, Science & Technology, Anonymity, Security, Privacy, Encryption, Cybersecurity,...
As web users resort to adopting encrypted networks like Tor to protect their anonymity online, adversaries find new ways to collect their private information. Since videos over the internet are a major source of recruitment, training, incitement to commit acts of terrorism, and more, this project envisions developing a machine learning algorithm that can help the Department of Defense find terrorists who take advantage of the dark web to help promote extremist ideology. This thesis describes...
Topics: Tor, website fingerprinting, video fingerprinting, anonymity, machine learning classifier, deep...
https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Creative Commons License "CC-BY-SA"...
Topics: Youtube, video, Education, Tor (Software), Online Privacy, Anonymity, Privacy, Surveillance,...
Emergence of the growing Location Based Services has a potential barrier of insecurity of users to use it due to privacy concerns. As these services requires, to broadcast constantly the user’s locality from untrusted server to get their position based on several services. The user will have privacy issues. LBS require trusted third party server if it is not meant to have peer-peer architecture, limited user’s security and large number of interactions. The work presented here implements two...
Topics: Location based services (LBS), Moving object {MO}, Trusted Third Party server, k-anonymity
198
198
movies
eye 198
favorite 0
comment 0
Andrew and Spencer discuss a cam girl site called Chaturbate where there is a girl that does a mime act for tips. Sunkast calls in to lend an opinion. Sunkast also brings up a news story about a man in Florida that killed his wife and then posted a picture of her body on Facebook. Brian Monroe calls in to talk about anonymity on the internet. Is it impossible to be anonymous these days due to the internet? Joe from Staten Island calls with a question for Spencer about a doctor he was seeing...
Topics: news&information, talk&interview, chaturbate, facebook, healthy eating, hipaa law, iq,...
originally posted on https://www.youtube.com/watch?v=s7vb_mjJn2M by "Owasp Göteborg" Georg Koppen got interested in anonymity-related technologies because of the relationship between freedom and surveillance. Between 2009 and 2013 he was employed by the JonDos GmbH working mainly on a hardened browser profile for the JonDonym/AN.ON system. Since 2013 he works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's...
Topics: Youtube, video, Science & Technology, Tor (Software), Anonymity (Field Of Study), Relay, OWASP,...
We love onions so much, we can even eat a whole one. We said we'd release a video of our friend Alex eating an onion in the Tor office if we could raise $5,000 in 24 hours. We raised $20,000 (wow!!). Here is your reward. Thanks to everyone who contributed! Every donation we receive will be matched by Mozilla until Dec 31st, 2017. Power digital resistance with us: donate.torproject.org Source: https://www.youtube.com/watch?v=VEazxhwZyy8 Uploader: The Tor Project
Topics: Youtube, video, Comedy, tor project, tor, internet freedom, funny, nonprofit, onion, fundraiser,...
59
59
Feb 14, 2021
02/21
by
Privatix
software
eye 59
favorite 1
comment 0
====================================== Program Name ====================================== Privatix 10.02.0 ====================================== Date ====================================== 07/02/2010 ====================================== Version ====================================== 10.02.0 ====================================== License ====================================== Open-source ====================================== Platform ====================================== OS Independent /...
Topics: Linux, Debian, Operating System, OS, Open-source, Privacy, Security, Anonymity, Tor, Firefox,...
https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Creative Commons License "CC-BY-SA"...
Topics: Youtube, video, Education, Tor (Software), Spanish Language (Human Language), Online Privacy,...
357
357
Jan 24, 2012
01/12
by
linux.conf.au
movies
eye 357
favorite 1
comment 0
Linux Conference Australia 2012: Wide ranging speech on privacy delivered by Tor Project developer/cyber-security expert Jacob Appelbaum
Topics: Linux, GNU, Australia, Censorship, NSA, spy, Surveillance, DSD, hacking, Free Software, Tor...
110
110
Feb 26, 2019
02/19
by
Computerphile
movies
eye 110
favorite 0
comment 0
The Dark web allows users to hide services using TOR, but how? Dr Mike Pound explains. Onion Routing: https://youtu.be/QRYzre4bf7I The Perfect Code: https://youtu.be/WPoQfKQlOjg Max's Deep Web Video : https://youtu.be/oiR2mvep_nQ http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. More...
Topics: Youtube, video, Education, computers, computerphile, computer, science, TOR, TOR Hidden Services,...
The development and adoption of 5G technology is rapidly progressing worldwide, and users of this technology are expected to increase to three billion by 2026. Third generation Partnership Project (3GPP) has designed the specifications of this new network infrastructure with security in mind; however, ongoing research continues to verify and scrutinize the system to help keep the data traveling this network safe. This thesis evaluates the feasibility and performance of three different attacks...
Topics: 5G, anonymity, error correction coding, low-density parity-check, LDPC, physical downlink control...
originally posted on https://www.youtube.com/watch?v=bmmAFiqOgks by "Owasp Göteborg" Philipp Winter volunteers for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol used by Tor users to bypass censorship. Source: https://www.youtube.com/watch?v=WlV5emiCeog Uploader: The Tor Project
Topics: Youtube, video, Science & Technology, Tor (Software), Relay, OWASP, Attacks, Tor Network,...
تور چیه؟ چه جوری کار میکنه؟ https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw...
Topics: Youtube, video, Education, Online Privacy, Surveillance, Encryption, Tor (Software), Persian...
This research uses a grounded theory approach to study the phenomenon of hacktivism and seeks to understand how the Internet has evolved to become a disproportionate and significant platform for disruption. Technological advancements involving the Internet, such as social media, have provided a significant advantage for social activists to advance their causes and enables them to recruit large masses with little effort. This platform also provides the distinct advantage of anonymity and...
Topics: anonymity, cyber, Anonymous, Earth First!, Internet, Students for a Democratic Society (SDS),...