Some very good reading, if You are interested by the subject...

  • ....more to come
    • comments powered by Disqus

      You might like also

      No Thumbnail was found
      Protecting Your Security and Privacy with FirefoxRising rates of identity theft and internet fraud mean that having a secure browser is more important than ever. For those interested in keeping their information safe, the good news is that Firefox has several important features that will help you stay secure. Find out how in this sample chapter.From the Book Firefox and Thunderbird Garage …
      4746 Days ago
      No Thumbnail was found
      Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. ... It use the principle of mixing all web request of all users into a huge distributed network of servers, called …
      4973 Days ago
      P2P and anonymity: Freenet
      Freenet is free software which lets you publish and obtain information on the Internet without fear of censorship. To achieve this freedom, the network is entirely decentralized and publishers and consumers of information are anonymous. Without anonymity there can never be true freedom of speech, and without decentralization the network will be vulnerable to attack. Communications by Freenet nodes are encrypted and are "routed-through" other nodes to make it extremely difficult to determine who is requesting the information and what …
      5026 Days ago
      No Thumbnail was found
      GNUnet is a framework for secure peer-to-peer networking. The primary application implemented within the GNUnet framework is anonymous censorship-resistant file-sharing. The goal of the GNUnet project is to provide an infrastructure for secure peer-to-peer networking. All communication in GNUnet is authenticated and link-to-link encrypted. The economic model makes attacks on the network harder since the economics can be used to control resource usage. GNUnet peers exchange messages using a pluggable transport service abstraction. Currently, transport services based on UDP, TCP, …
      5026 Days ago
      P2P and anonymity: MUTE
      Mute is a file sharing network that uses virtual addresses (instead of IP addresses) and ant-inspired routing algorithms to protect the privacy of both downloaders and uploaders.MUTE protects your privacy by avoiding direct connections with your sharing partners in the network. Most other file sharing programs use direct connections to download or upload, making your identity available to spies from the RIAA and other unscrupulous organizations.Ants display collectively intelligent behavior when foraging for food or fighting off predators. Each ant …
      5026 Days ago
      No Thumbnail was found
      You want to surf anonymously? here are some tools: JAP (Java) is based on a set of trust node which mix all http connection and add a level of encryption (ssl) till nobody can say who watch what Peekabooty, "Peekabooty is software run by "global-thinking, local-acting" people in countries that do not censor the Internet. A user in a country that censors the Internet connects to the ad hoc network of computers running Peekabooty. A small number of randomly selected …
      5157 Days ago