Jim Lawrence
accessd at shaw.ca
Thu Jun 20 22:08:09 CDT 2013
Hi Hans: You are right. Just obscuring your IP address does not provide any real protection against the details or content of your communications over the web. There are a few other products that may help in that area. One extension, like TorBirdy might help by configuring Thunderbird to make connections over the Tor anonymity network. https://addons.mozilla.org/en-us/thunderbird/addon/torbirdy/ Another product called HTTPS Anywhere, can be used to encrypt communications between multiple parties. It is also compatible with the Tor network. https://www.eff.org/https-everywhere Then there is the Enigmail extension, which is also compatible with Firefox and can be used to encrypt emails and messages. http://www.enigmail.net/home/index.php There are products like Bittorrent sync which can be used to obscure web and/or large file transfers as it uses torrents (file fragmentation through multiple nodes) to transfer files. http://labs.bittorrent.com/experiments/sync/get-started.html For a secure social media site maybe a torrent based product like Diaspora* might be a valid option. https://joindiaspora.com/ I think in the near future we will see many such applications being developed as the prospect of being continually spied on may be unpalatable to many individuals, organizations and companies. The podcast was very informative...really enjoyed it. Just remember; if you have nothing to hide you have nothing to fear. Jim -----Original Message----- From: dba-tech-bounces at databaseadvisors.com [mailto:dba-tech-bounces at databaseadvisors.com] On Behalf Of Hans-Christian Andersen Sent: Wednesday, June 19, 2013 12:05 PM To: Discussion of Hardware and Software issues Subject: Re: [dba-Tech] Personal security Eh, unfortunately, if Steve Gibson is right, it might not possibly matter, because he theorises that the NSA is splitting the optical cables (hence PRISM) right from the ISP at a location close to these companies data centres and just sucking up all the packets - the idea being that by being at a close proximity of the data centres, there is a higher probability that the packet is destined for these companies services. Basically, they are wiretapping Google, Microsoft, Apple, etc. The reason this matters is that this now means that these companies are completely right in denying claims that they are giving backdoor access to their data to the NSA. Anyways, I recommend listening to Steve Gibsons recent Security Now podcast episode 408 (the state of surveillance): https://www.grc.com/securitynow.htm - Hans On 2013-06-19, at 11:33 AM, "Jim Lawrence" <accessd at shaw.ca> wrote: > Right after the NSA scare and the realization that not only the US but all > countries now have or will soon have similar systems in place, to monitor > their citizens, personal privacy, there is a move towards concealing your > surfing identity. > > Enter the Tor Browser: http://tor-browser.com/index.html > > When the package has been installed on your system your roaming IP address > randomly changes per session or can be changed at any time. This product > does not encrypt your data but just makes it difficult for businesses to > reap your personal information, easily cross-index your search pretences, > limit your access to regional content and stops their continually monitor > your location. If you are at all politically active it will also make it > difficult for government to monitor you, if they decide you are in > disagreement with their current position. > > The browser is built on the Mozilla engine and its features and it browser > functionality is similar to Firefox. It supports all major platforms but if > you are using Debian Linux distros like Ubuntu or Mint etc, there is a much > better and easier method of installation. > > 1. Go to your terminal window. (Alt-Ctrl-T) > > 2. Enter the appropriate repository for your hardware type: > 32 bit: $ sudo add-apt-repository ppa:upubuntu-com/tor > 64 bit: $ sudo add-apt-repository ppa:upubuntu-com/tor64 > > 3. Do a general update of all the libraries, download and install the Tor > package: > $ sudo apt-get update > $ sudo apt-get install tor-browser > > 4. Set up the tor directory ownership and access rights for the current > logged in user. > $ sudo chown -R $USER ~/.tor-browser > > I have already installed the package and it seems to work well...so far. > (Now if I can get access to my PBS videos...) ;-) > > Aside: There has been some troubles with the Tor sites as it seems that > interest in the Tor browser has jumped sharply and this has invoked internet > wide certification issues as governments and businesses don't want this > package available as there is a feeling that the program will impact both > (their) web security and their business (financial) models. So what are your > feeling on this? > > Jim > > _______________________________________________ > dba-Tech mailing list > dba-Tech at databaseadvisors.com > http://databaseadvisors.com/mailman/listinfo/dba-tech > Website: http://www.databaseadvisors.com _______________________________________________ dba-Tech mailing list dba-Tech at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/dba-tech Website: http://www.databaseadvisors.com