If you are reading this but have no need for anonymity and really can’t see where it would fit into your Internet life, I at least hope you can imagine a situation where someone else might need it. Read more
If you are reading this but have no need for anonymity and really can’t see where it would fit into your Internet life, I at least hope you can imagine a situation where someone else might need it. Read more
My first step in looking at anonymity is making use of the TBB and the Tor network. Tor was released in 2002 and has since evolved into a tool that is used by millions of people worldwide. Read more
One of the other things you will have likely noticed me touching on is companies who are willing to share their PGP Key for customers so they can use email + PGP for communication to support. Read more
Getting back to the good stuff, I have talked in the above pages about a term called FOSS or open source, or the long form Free, Open Source Software. Read more
By now, the hope is that you have really begun to look at the services you are using on a day-to-day basis. Read more
The “5 Eyes” countries refer to 5 countries (United States, Canada, The United Kingdom, Australia, and New Zealand) that have an intelligence agreement known as the UKUSA Agreement to share information with one another. Read more
One of the other ways one can secure their connection to the Internet is to make sure that all incoming and outgoing connections are being passed through a Firewall. Read more
There are very few locations where I actually trust connecting directly to the Internet. Read more