This is a Hitskin.com skin preview
Install the skin • Return to the skin page
being invisible
Page 1 of 1
being invisible
https://www.wired.com/2017/02/famed-hacker-kevin-mitnick-shows-go-invisible-online?mbid=synd_msntechnology
** this article was certainly an eye-opener. maybe you all know this stuff cuz you're in tech???
**excerpts below:
The most popular method of email encryption is PGP, which stands for “Pretty Good Privacy.” It is not free. It is a product of the Symantec Corporation. But its creator, Phil Zimmermann, also authored an open-source version, OpenPGP, which is free. And a third option, GPG (GNU Privacy Guard), created by Werner Koch, is also free. The good news is that all three are interoperational. That means that no matter which version of PGP you use, the basic functions are the same.
......
One way to mask your IP address is to use the onion router (Tor), which is what Snowden and Poitras did. Tor is designed to be used by people living in harsh regimes as a way to avoid censorship of popular media and services and to prevent anyone from tracking what search terms they use. Tor remains free and can be used by anyone, anywhere—even you
....
That being said, if you still decide to use Tor you should not run it in the same physical device that you use for browsing. In other words, have a laptop for browsing the web and a separate device for Tor (for instance, a Raspberry Pi minicomputer running Tor software). The idea here is that if somebody is able to compromise your laptop they still won’t be able to peel off your Tor transport layer as it is running on a separate physical box.
** this article was certainly an eye-opener. maybe you all know this stuff cuz you're in tech???
**excerpts below:
The most popular method of email encryption is PGP, which stands for “Pretty Good Privacy.” It is not free. It is a product of the Symantec Corporation. But its creator, Phil Zimmermann, also authored an open-source version, OpenPGP, which is free. And a third option, GPG (GNU Privacy Guard), created by Werner Koch, is also free. The good news is that all three are interoperational. That means that no matter which version of PGP you use, the basic functions are the same.
......
One way to mask your IP address is to use the onion router (Tor), which is what Snowden and Poitras did. Tor is designed to be used by people living in harsh regimes as a way to avoid censorship of popular media and services and to prevent anyone from tracking what search terms they use. Tor remains free and can be used by anyone, anywhere—even you
....
That being said, if you still decide to use Tor you should not run it in the same physical device that you use for browsing. In other words, have a laptop for browsing the web and a separate device for Tor (for instance, a Raspberry Pi minicomputer running Tor software). The idea here is that if somebody is able to compromise your laptop they still won’t be able to peel off your Tor transport layer as it is running on a separate physical box.
pravalika nanda- Posts : 2372
Join date : 2011-07-14
Similar topics
» The Invisible Kannadiga
» India’s invisible workers
» Are Indian Women Invisible?
» Algorithms are like invisible judges that decide our fate
» India’s invisible workers
» Are Indian Women Invisible?
» Algorithms are like invisible judges that decide our fate
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum