[thomas@northernsecurity.net: Handbook for bloggers and cyber-dissidents]
----- Forwarded message from Thomas Sj?gren <thomas@northernsecurity.net> -----
There's also some very nice advice for nontechnical people about things like Mixmaster, checking IP addresses, and how to DO a lot of stuff making use of the tools that are out there. It's a great little book. Oh yeah...I think Gilmore wrote a section in it. -TD
From: Eugen Leitl <eugen@leitl.org> To: cypherpunks@jfet.org Subject: [thomas@northernsecurity.net: Handbook for bloggers and cyber-dissidents] Date: Thu, 6 Oct 2005 08:28:06 +0200
----- Forwarded message from Thomas Sj?gren <thomas@northernsecurity.net> -----
From: Thomas Sj?gren <thomas@northernsecurity.net> Date: Wed, 5 Oct 2005 23:20:14 +0200 To: or-talk@freehaven.net Subject: Handbook for bloggers and cyber-dissidents User-Agent: Mutt/1.5.9i Reply-To: or-talk@freehaven.net
Reporters Without Borders (Reporters sans fronti?res, RSF) has released a "Handbook for bloggers and cyber-dissidents": http://www.rsf.org/rubrique.php3?id_rubrique=542
Topics include: How to blog anonymously Technical ways to get around censorship Ensuring your e-mail is truly private Internet-censor world championship
From the chapter "How to blog anonymously": "Step five - Onion Routing through Tor [...]
Given the complexity of the technology, Sarah is pleasantly surprised to discover how easy it is to install Tor, an onion routing system. She downloads an installer which installs Tor on her system, then downloads and installs Privoxy, a proxy that works with Tor and has the pleasant side benefit of removing most of the ads from the webpages Sarah views.
After installing the software and restarting her machine, Sarah checks noreply.org and discovers that she is, in fact, successfully "cloaked" by the Tor system - noreply.org thinks shes logging on from Harvard University. She reloads, and now noreply thinks shes in Germany. From this she concludes that Tor is changing her identity from request to request, helping to protect her privacy.
This has some odd consequences. When she uses Google through Tor, it keeps switching language on her. One search, its in English - another, Japanese. Then German, Danish and Dutch, all in the course of a few minutes. Sarah welcomes the opportunity to learn some new languages, but shes concerned about some other consequences. Sarah likes to contribute to Wikipedia, but discovers that Wikipedia blocks her attempts to edit articles when shes using Tor.
Tor also seems to have some of the same problems Sarah was having with other proxies. Her surfing slows down quite a bit, as compared to surfing the web without a proxy - she finds that she ends up using Tor only when shes accessing sensitive content or posting to her blog. And shes once again tied to her home computer, since she cant install Tor on a public machine very easily.
Most worrisome, though, she discovers that Tor sometimes stops working. Evidently, her ISP is starting to block some Tor routers - when Tor tries to use a blocked router, she can wait for minutes at a time, but doesnt get the webpage shes requested." --
----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
participants (2)
-
Eugen Leitl
-
Tyler Durden