Subscribe to Wordpress Themes Demo
How to Protect your Internet Anonymity and Privacy

From protecting your online privacy, bypassing censorship, to fighting tyranny, this book aims to provide practical software and instructions for novices and the experienced. The emphasis is on the use of free and widely available tools to level the playing field against resourceful and powerful adversaries. With increasingly powerful computers, a modest laptop can use a massive P2P network such as Skype to hide your trails, or create a virtual machine with a virtual private network for kids to play safely online.

Table of Contents

Threat Models

Type of Proxy Servers

Open Source Anonymity Networks

 Proprietary Anonymity Networks

 Securing your Computer

 Risk Analysis Tools

0 comments:

Post a Comment