9 posts tagged with tor and privacy.
Displaying 1 through 9 of 9. Subscribe:

Tor’s Branding Pivot is Going to Get Someone Killed

Recently The Tor Project changed their mission statement and social contract, including language about explicitly supporting human rights. Virgil Griffith argues that this is dangerous for exactly those users whose human rights are threatened: “the ‘Human Rights Watch for Nerds’ branding gives decidedly-unfriendly-and-opportunistic-authorities full license to do as they please with Tor operators or anyone who uses Tor.” [more inside]
posted by Rangi on Sep 4, 2016 - 19 comments

ioerror may have errored

On June 4th it was announced that Jacob Appelbaum(previously) has stepped down from his role as an employee of the TOR foundation while they investigate charges of inappropriate behavior. The TOR project (previously) anonymizes Internet traffic and is seen as a key tool for dissidents and others who wish to avoid surveillance while using the Internet. Appelbaum has been a key contributor and passionate public advocate for TOR. It is not clear what impact his departure will have on the future of the project.
posted by humanfont on Jun 7, 2016 - 139 comments

Tor, libraries, and the Department of Homeland Security

First Library to Support Anonymous Internet Browsing Effort Stops After DHS Email
In July, the Kilton Public Library in Lebanon, New Hampshire, was the first library in the country to become part of the anonymous Web surfing service Tor. The library allowed Tor users around the world to bounce their Internet traffic through the library, thus masking users’ locations. ... After a meeting at which local police and city officials discussed how Tor could be exploited by criminals, the library pulled the plug on the project.
[more inside] posted by metaquarry on Sep 10, 2015 - 67 comments

click click, clickclick click

How the way you type can shatter anonymity—even on Tor [more inside]
posted by the man of twists and turns on Sep 6, 2015 - 64 comments

Deep Lab

Deep Lab is "a congress of cyberfeminist researchers, organized by STUDIO Fellow Addie Wagenknecht to examine how the themes of privacy, security, surveillance, anonymity, and large-scale data aggregation are problematized in the arts, culture and society."

The Documentary
The Lectures
The Book
posted by I-baLL on Jan 20, 2015 - 7 comments

"Nothing. You're screwed."

During their Freedom Hosting investigation and malware attack last year, the FBI unintentionally obtained the entire e-mail database of popular anonymous webmail service Tor Mail. And now, they've used it in an unrelated investigation to bust a Florida man accused of stealing credit card numbers. [more inside]
posted by zarq on Jan 27, 2014 - 39 comments

Possible FBI infiltration of TOR

In a crackdown that FBI claims to be about hunting down pedophiles, half of the onion sites in the TOR network has been compromised, including the e-mail counterpart of TOR deep web, TORmail. FreedomWeb, an Irish company known for providing hosting for Tor "hidden services" -- services reached over the Tor anonymized/encrypted network -- has shut down after its owner, Eric Eoin Marques, was arrested over allegations that he had facilitated the spread of child pornography. [more inside]
posted by whyareyouatriangle on Aug 4, 2013 - 126 comments

Challenging the Surveillance State

"If the government is able to learn what we speak about, and know who we're talking to, and know what it is that we're planning, it makes any kind of activism extremely difficult, because secrecy and privacy are prerequisites to effective activism. "
Glenn Greenwald on challenging the surveillance state: (1 - 2 - 3 - 4).
posted by dunkadunc on Jul 1, 2012 - 48 comments

Amazing discoveries in plain-text Tor exit traffic.

This is an ironic tale of the consequences of inept application of cryptographic tools. Or is it? Dan Egerstad, a Swedish hacker, gained access to hundreds of computer network accounts around the world, belonging to various embassies, corporations and other organizations. How did he do it? Very easily: by sniffing exit traffic on his Tor nodes. [more inside]
posted by Anything on Dec 4, 2007 - 27 comments

Page: 1