{moslistsub id=12/}
You want to surf anonymously? here are some tools:
  • JAP (Java) is based on a set of trust node which mix all http connection and add a level of encryption (ssl) till nobody can say who watch what
  • Peekabooty, "Peekabooty is software run by "global-thinking, local-acting" people in countries that do not censor the Internet. A user in a country that censors the Internet connects to the ad hoc network of computers running Peekabooty. A small number of randomly selected computers in the network retrieves the Web pages and relays them back to the user.
  • ENTROPY stands for Emerging Network To Reduce Orwellian Potency Yield and as such describes the main goal of the project.

    • ENTROPY is developed as a response to increasing censorship and surveillance in the internet. The program connects your computer to a network of machines which all run this software. The ENTROPY network is running parallel to the WWW and also other internet services like FTP, email, ICQ. etc.
    • For the user the ENTROPY network looks like a collection of WWW pages. The difference to the WWW however is that there are no accesses to central servers. And this is why there is no site operator who could log who downloaded what and when. Every computer taking part in the ENTROPY network (every node) is at the same time server, router for other nodes, caching proxy and client for the user: that is You.
    • After you gained some experience with the ENTROPY network, there are command line tools for you to insert whole directory trees into the network as a ENTROPY site. So ENTROPY does for you what a webspace provider does for you in the WWW - but without the storage and bandwidth costs and without any regulation or policy as to what kind of content you are allowed to publish. Everyone can contribute his own ENTROPY site for everybody else to browse through. The contents is stored in a distributed manner across all available and reachable nodes and no one can find out about who put up what contents into the network [1]. Even if your node is not actively running, your contents can be retrieved by others -- without knowing that it was actually you who published the files. Of course this is only true if you do not publish your name (or leave your name or other personal data in the files you publish)
As far the censoring firewall is concerned, the user is simply accessing some computer not on its "banned" list. The retrieved Web pages are encrypted using the de facto standard for secure transactions in order to prevent the firewall from examining the Web pages' contents. Since the encryption used is a secure transaction standard, it will look like an ordinary e-business transaction to the firewall."
  • Freenet (Java) is distributed encrypted storage node network so nobody can delete a document or know who is hosting it) are all project that try to bypass the nation-wide censorship of internet. The FAQ o freenet is very instructive and help to learn a lot about anonymity services...
  • I personnaly use JAP and Freenet sometimes...

    I fund an interesting portal discussing of legal news concerning information technology: "geeks, laws, everything in between"
    furthermore do not forget to read also: Why a "distributed cloud" of peer-to-peer systems will not be able to circumvent Internet blocking in the long run

    comments powered by Disqus

    You might like also

    No Thumbnail was found
    Protecting Your Security and Privacy with FirefoxRising rates of identity theft and internet fraud mean that having a secure browser is more important than ever. For those interested in keeping their information safe, the good news is that Firefox has several important features that will help you stay secure. Find out how in this sample chapter.From the Book Firefox and Thunderbird Garage …
    4741 Days ago
    No Thumbnail was found
    Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. ... It use the principle of mixing all web request of all users into a huge distributed network of servers, called …
    4968 Days ago
    No Thumbnail was found
    Some very good reading, if You are interested by the subject...Anonymous P2P at WikiPediaAnonymity at InfoArnarchy.orgAnonymity and Peer to Peer (Powerpoint)....more to come …
    5021 Days ago
    P2P and anonymity: Freenet
    Freenet is free software which lets you publish and obtain information on the Internet without fear of censorship. To achieve this freedom, the network is entirely decentralized and publishers and consumers of information are anonymous. Without anonymity there can never be true freedom of speech, and without decentralization the network will be vulnerable to attack. Communications by Freenet nodes are encrypted and are "routed-through" other nodes to make it extremely difficult to determine who is requesting the information and what …
    5021 Days ago
    No Thumbnail was found
    GNUnet is a framework for secure peer-to-peer networking. The primary application implemented within the GNUnet framework is anonymous censorship-resistant file-sharing. The goal of the GNUnet project is to provide an infrastructure for secure peer-to-peer networking. All communication in GNUnet is authenticated and link-to-link encrypted. The economic model makes attacks on the network harder since the economics can be used to control resource usage. GNUnet peers exchange messages using a pluggable transport service abstraction. Currently, transport services based on UDP, TCP, …
    5021 Days ago
    P2P and anonymity: MUTE
    Mute is a file sharing network that uses virtual addresses (instead of IP addresses) and ant-inspired routing algorithms to protect the privacy of both downloaders and uploaders.MUTE protects your privacy by avoiding direct connections with your sharing partners in the network. Most other file sharing programs use direct connections to download or upload, making your identity available to spies from the RIAA and other unscrupulous organizations.Ants display collectively intelligent behavior when foraging for food or fighting off predators. Each ant …
    5021 Days ago