[thomas at northernsecurity.net: Handbook for bloggers and cyber-dissidents]

Tyler Durden camera_lumina at hotmail.com
Thu Oct 6 12:28:29 PDT 2005


There's also some very nice advice for nontechnical people about things like 
Mixmaster, checking IP addresses, and how to DO a lot of stuff making use of 
the tools that are out there.

It's a great little book.

Oh yeah...I think Gilmore wrote a section in it.

-TD


>From: Eugen Leitl <eugen at leitl.org>
>To: cypherpunks at jfet.org
>Subject: [thomas at northernsecurity.net: Handbook for bloggers and  
>cyber-dissidents]
>Date: Thu, 6 Oct 2005 08:28:06 +0200
>
>----- Forwarded message from Thomas Sj?gren <thomas at northernsecurity.net>
>-----
>
>From: Thomas Sj?gren <thomas at northernsecurity.net>
>Date: Wed, 5 Oct 2005 23:20:14 +0200
>To: or-talk at freehaven.net
>Subject: Handbook for bloggers and cyber-dissidents
>User-Agent: Mutt/1.5.9i
>Reply-To: or-talk at freehaven.net
>
>Reporters Without Borders (Reporters sans fronti?res, RSF) has
>released a "Handbook for bloggers and cyber-dissidents":
>http://www.rsf.org/rubrique.php3?id_rubrique=542
>
>Topics include:
>   	How to blog anonymously
>	Technical ways to get around censorship
>	Ensuring your e-mail is truly private
>	Internet-censor world championship
>
>From the chapter "How to blog anonymously":
>"Step five - Onion Routing through Tor
>[...]
>
>Given the complexity of the technology, Sarah is pleasantly surprised to
>discover how easy it is to install Tor, an onion routing system. She
>downloads an installer which installs Tor on her system, then downloads
>and installs Privoxy, a proxy that works with Tor and has the pleasant
>side benefit of removing most of the ads from the webpages Sarah views.
>
>After installing the software and restarting her machine, Sarah checks
>noreply.org and discovers that she is, in fact, successfully "cloaked"
>by the Tor system - noreply.org thinks shes logging on from Harvard
>University. She reloads, and now noreply thinks shes in Germany. From
>this she concludes that Tor is changing her identity from request to
>request, helping to protect her privacy.
>
>This has some odd consequences. When she uses Google through Tor, it
>keeps switching language on her. One search, its in English - another,
>Japanese. Then German, Danish and Dutch, all in the course of a few
>minutes. Sarah welcomes the opportunity to learn some new languages, but
>shes concerned about some other consequences. Sarah likes to contribute
>to Wikipedia, but discovers that Wikipedia blocks her attempts to edit
>articles when shes using Tor.
>
>Tor also seems to have some of the same problems Sarah was having with
>other proxies. Her surfing slows down quite a bit, as compared to
>surfing the web without a proxy - she finds that she ends up using Tor
>only when shes accessing sensitive content or posting to her blog. And
>shes once again tied to her home computer, since she cant install Tor on
>a public machine very easily.
>
>Most worrisome, though, she discovers that Tor sometimes stops working.
>Evidently, her ISP is starting to block some Tor routers - when Tor
>tries to use a blocked router, she can wait for minutes at a time, but
>doesnt get the webpage shes requested."
>--
>
>
>
>----- End forwarded message -----
>--
>Eugen* Leitl <a href="http://leitl.org">leitl</a>
>______________________________________________________________
>ICBM: 48.07100, 11.36820            http://www.leitl.org
>8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
>
>[demime 1.01d removed an attachment of type application/pgp-signature which 
>had a name of signature.asc]





More information about the cypherpunks-legacy mailing list