https://www.extremetech.com/internet/258310-firefox-borrows-feature-tor-protect-user-privacy TOR borrowed many functions from FF, and now FF is using some TOR capabilities to block -“canvas fingerprinting” (an HTML5 devious tracking method that doesn’t need cookies). One of the problems of setting high privacy configurations, is that many sites tell you “you may not see our content unless you allow us to track […]
https://open.nytimes.com/https-open-nytimes-com-the-new-york-times-as-a-tor-onion-service-e0d0b67b7482 You could always use TOR to read the NYT site, but this is one level improved. The New York Times is Now Available as a Tor Onion Service Illustration by Kevin Zweerink for The New York Times Today we are announcing an experiment in secure communication, and launching an alternative way for people to access our […]
http://thehill.com/policy/cybersecurity/346544-dreamhost-claims-doj-requesting-info-on-visitors-to-anti-trump-website Of course if you have nothing to hide, and are proud of it, everything is as it should be. But a more cynical person might wonder, why is it so important for the Justice Department to identify exactly who is “against” a particular person or idea? TOR can anonymize your IP address — the […]
Good information hygiene: keep your stuff updated – operating system, applications, etc, including browsers – if you’re not sure how to do it, google is your friend, look for information from the source: for windows, find the recommendation on microsoft-dot-com, NOT your-friendly-hacker.com or free-helpdesk-here.com (unless you have an idea they are legit). https://blog.torproject.org/blog/tor-03010-released Update 7.0.4 […]
http://www.bbc.com/news/technology-40810771#ampshare=http://www.bbc.com/news/technology-40810771 Yes even though TOR is often mentioned in context of criminal activity, there are indeed legitimate uses by private citizens seeking protection from oppressive regimes – whether you think you live in an oppressive regime perhaps depends on your personal viewpoint. This is from the TOR project, and describes a wide range of appropriate […]
So far, visitors from 28 countries (plus “EU”) and counting! This is from the WordPress log of who visited this site from which countries. If some of you used TOR or a VPN to view the privacy blog (good for you!) of course it’s possible your real location was masked.
TOR has many parts. They fall into three general categories: Clients (using the TOR browser), and servers (“hidden servers”) are used to both anonymize the user’s IP address and to reach hidden servers. Hidden servers can hide their IP address and the physical location associated with that IP address. Then there is […]