anonymity

Anonymity, adjective "anonymous", is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". read more at WikiPedia

  • Another scary news...even If you are behind a firewall, it is possible to fingerprint (identifying) Your computer...yes we may be not alone  :-)

    The technique works by "exploiting small, microscopic deviations in device hardware: clock skews." In practice, Kohno's paper says, his techniques "exploit the fact that most modern TCP stacks implement the TCP timestamps option from RFC 1323 whereby, for performance purposes, each party in a TCP flow includes information about its perception of time in each outgoing packet. A fingerprinter can use the information contained within the TCP headers to estimate a device's clock skew and thereby fingerprint a physical device. Read more at news.com

  • {moslistsub id=12/}
    You want to surf anonymously? here are some tools:
    • JAP (Java) is based on a set of trust node which mix all http connection and add a level of encryption (ssl) till nobody can say who watch what
    • Peekabooty, "Peekabooty is software run by "global-thinking, local-acting" people in countries that do not censor the Internet. A user in a country that censors the Internet connects to the ad hoc network of computers running Peekabooty. A small number of randomly selected computers in the network retrieves the Web pages and relays them back to the user.
    • ENTROPY stands for Emerging Network To Reduce Orwellian Potency Yield and as such describes the main goal of the project.

      • ENTROPY is developed as a response to increasing censorship and surveillance in the internet. The program connects your computer to a network of machines which all run this software. The ENTROPY network is running parallel to the WWW and also other internet services like FTP, email, ICQ. etc.
      • For the user the ENTROPY network looks like a collection of WWW pages. The difference to the WWW however is that there are no accesses to central servers. And this is why there is no site operator who could log who downloaded what and when. Every computer taking part in the ENTROPY network (every node) is at the same time server, router for other nodes, caching proxy and client for the user: that is You.
      • After you gained some experience with the ENTROPY network, there are command line tools for you to insert whole directory trees into the network as a ENTROPY site. So ENTROPY does for you what a webspace provider does for you in the WWW - but without the storage and bandwidth costs and without any regulation or policy as to what kind of content you are allowed to publish. Everyone can contribute his own ENTROPY site for everybody else to browse through. The contents is stored in a distributed manner across all available and reachable nodes and no one can find out about who put up what contents into the network [1]. Even if your node is not actively running, your contents can be retrieved by others -- without knowing that it was actually you who published the files. Of course this is only true if you do not publish your name (or leave your name or other personal data in the files you publish)
    As far the censoring firewall is concerned, the user is simply accessing some computer not on its "banned" list. The retrieved Web pages are encrypted using the de facto standard for secure transactions in order to prevent the firewall from examining the Web pages' contents. Since the encryption used is a secure transaction standard, it will look like an ordinary e-business transaction to the firewall."
  • Freenet (Java) is distributed encrypted storage node network so nobody can delete a document or know who is hosting it) are all project that try to bypass the nation-wide censorship of internet. The FAQ o freenet is very instructive and help to learn a lot about anonymity services...
  • I personnaly use JAP and Freenet sometimes...

    I fund an interesting portal discussing of legal news concerning information technology: "geeks, laws, everything in between"
    furthermore do not forget to read also: Why a "distributed cloud" of peer-to-peer systems will not be able to circumvent Internet blocking in the long run

  • I've installed SuSE 9.3 on a Notebook HP Nx7000 and a AMD desktop without any major difficulties except the fact that for some legal reasons, Novel has removed the ability of SuSe to play out the box any Divx, Xvid, mp3. In fact If You have a acess to internet, the online update tool may resolve some of these issues (You will have to download what Novel call "Multimedia pack" ). After using 2 years long SuSE 9.0, 9.1, 9.2 and now 9.3 I found pathetic that I still need to remove this crappy noatun, kaffeine and xine because they simply do not work as good as Mplayer or even better Videolan (VLC). Note that both Videolan, or VLC can not be install through YaST, and I think that it is really a big mistake.
    So let repair this by:

    • Installing APT-GET packaging system (a lot simpler than YaST as It deal with package conflicts!!!), First read this page, then If You are interested read on :-)
    • Decode encrypted DVD  under Suse 9.3
    • Install Videolan (VLC), the best multiplattform video player

     Before deciding to buy it, download it (FTP source are here), or starting Your favorite Bittorent client, You can

  •  Freenet is free software which lets you publish and obtain information on the Internet without fear of censorship. To achieve this freedom, the network is entirely decentralized and publishers and consumers of information are anonymous. Without anonymity there can never be true freedom of speech, and without decentralization the network will be vulnerable to attack.
    Communications by Freenet nodes are encrypted and are "routed-through" other nodes to make it extremely difficult to determine who is requesting the information and what its content is.
    Users contribute to the network by giving bandwidth and a portion of their hard drive (called the "data store") for storing files. Unlike other peer-to-peer file sharing networks, Freenet does not let the user control what is stored in the data store. Instead, files are kept or deleted depending on how popular they are, with the least popular being discarded to make way for newer or more popular content. Files in the data store are encrypted to reduce the likelihood of prosecution by persons wishing to censor Freenet content.

  • GNUnetis a framework for secure peer-to-peer networking. The primary application implemented within the GNUnet framework is anonymous censorship-resistant file-sharing.
    The goal of the GNUnet project is to provide an infrastructure for secure peer-to-peer networking. All communication in GNUnet is authenticated and link-to-link encrypted. The economic model makes attacks on the network harder since the economics can be used to control resource usage. GNUnet peers exchange messages using a pluggable transport service abstraction. Currently, transport services based on UDP, TCP, HTTP and SMTP are available. The GNUnet core provides mechanisms to perform resource allocations for CPU, bandwidth and storage space. The core enforces resource limitations set by the user. GNUnet does not rely on any centralized services. New Peer-to-Peer protocols can be easily implemented on top of the basic GNUnet infrastructure. Current protocols include anonymous file sharing, a trivial chat protocol, message throughput benchmarking and network topology visualization.

  •  Mute is a file sharing network that uses virtual addresses (instead of IP addresses) and ant-inspired routing algorithms to protect the privacy of both downloaders and uploaders.

    • MUTE protects your privacy by avoiding direct connections with your sharing partners in the network. Most other file sharing programs use direct connections to download or upload, making your identity available to spies from the RIAA and other unscrupulous organizations.
    • Ants display collectively intelligent behavior when foraging for food or fighting off predators. Each ant in the colony acts in a rather simple way, but together they end up doing something clever, like discovering the shortest path between their ant hill and a food source. MUTE's routing mechanism is inspired by ant behavior.

    Here is a lit of available NODES, a collaborative Wiki is also available Mute Wiki

  • Protecting Your Security and Privacy with Firefox
    Rising rates of identity theft and internet fraud mean that having a secure browser is more important than ever. For those interested in keeping their information safe, the good news is that Firefox has several important features that will help you stay secure. Find out how in this sample chapter.

    From the Book Firefox and Thunderbird Garage

  • JAP makes it possible to surf the internet anonymously and unobservably. Without Anonymization, every computer in the internet communicates using a traceable Address. That means:

    • the website visited,
    • the internet service provider (ISP),
    • and any eavesdropper on the internet connection can determine which websites the user of a specific computer visits.

    Even the information which the user calls up can be intercepted and seen if encryption is not used. JAP uses a single static address which is shared by many JAP users. That way neither the visited website, nor an eavesdropper can determine which user visited which website. more HERE

  • Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features....
    It use the principle of mixing all web request of all users into a huge distributed network of servers, called onion routers. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it's going.  It is working more or less like JAP
    License: free software (license BSD) - Version 0.0.9.9 - http://tor.eff.org/