A handy trio of tools for protecting your privacy
Conclusion
It is hard to guarantee privacy on today's networks, but if you are serious about getting started, it might be time to start thinking about encrypting your disk data, anonymizing your Internet browsing, and making sure your files and application history are really deleted. This article peeled back the privacy onion and took a look at some important tools for flying under the radar.
No technology can take the place of being responsible and realistic in regard to the permanence of what you create online. Still, these powerful tools provide a measurable margin of choice and privacy today.
Attempts to Compromise Tor
Over the past few months, reports have appeared on various governments and individuals who have tried to compromise Tor and other anonymizing software. For example, the United States National Security Agency has introduce code meant to compromise Tor and Tor-compatible browser bundles used to help "newbies" learn Tor. The compromise includes code inside of the browser that is meant to defeat Tor's functionality.
Many agencies have deposited compromised code onto Tor-networked machines as well. As always, be careful where you download your code and your resources.
Infos
- TrueCrypt: http://www.truecrypt.org/
- TrueCrypt Encryption Algorithms: http://www.truecrypt.org/docs/encryption-algorithms#Y167
- TrueCrypt Hidden Volumes: http://www.truecrypt.org/docs/hidden-volume#Y0
- Tor: http://www.torproject.org
- BleachBit: http://bleachbit.sourceforge.net/
« Previous 1 2 3 4 5
Buy this article as PDF
(incl. VAT)