isadora wrote:Today i came across following article at falkvinge.net
No real news-source i visit on every-day-base, but the title intrigued me enough.
Especially now internet-security seems to be more in picture then ever.
http://falkvinge.net/2013/11/17/nsa-ask ... -gnulinux/
An Error 522 means that the request was able to connect to your web server, but that the request didn't finish.
The most likely cause is that something on your server is hogging resources.
I think the back doors are in the routers/modems/Wifi/BIOS etc!
$ lsusb
Bus 002 Device 006: ID 12d1:1436 Huawei Technologies Co., Ltd. E173 3G Modem (modem-mode)
doktor5000 wrote:Well, you can still run end-to-end encryption on top ...
doktor5000 wrote:By end-to-end encryption I mean end-to-end encryption: http://en.wikipedia.org/wiki/End-to-end_encryption
Tor is not end-to-end. Check the picture at http://en.wikipedia.org/wiki/Tor_(anonymity_network)#Operation
Examples of end-to-end encryption include PGP for email, OTR for instant messaging, Tresorit for cloud storage, ZRTP for telephony, and TETRA for radio.
Examples of non-E2EE systems are Google Talk, Yahoo Messenger, Facebook, and Dropbox.
doktor5000 wrote:Question is, what is your use case and what do you want to achieve actually?
viking60 wrote:Using DNScrypt will take care of the ISP snooping on your surfing.
jiml8 wrote:TOR will provide protection against a snoopy ISP. TOR + HTTPS provides end to end encryption AND prevents your ISP from knowing where you are browsing to (HTTPS alone does not prevent the ISP from knowing because of the DNS calls).
Setting up an email account in the darknet will provide you with complete security from your computer to the email server;
you have to access it using TOR. Here is a good entry point to the darknet: http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
yankee495 wrote:I don't want to get all into politics but I'm in the US. I think the back doors are in the routers/modems/Wifi/BIOS etc. It seems the corporations have sold us out. In the US they're trying to take our weapons, building up the police force like the military, stock piling ammunition to the tune of 2 billion rounds at last count, and passing laws by executive order bypassing Congress. There is no point in arguing politics because both sides are corrupt. World governments are in on it they don't intend to stop.
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/
A well regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms, shall not be infringed.
su35 wrote:doktor5000 wrote:Question is, what is your use case and what do you want to achieve actually?
My ISP has full knowledge about my browsing habits. That's really annoying and also some intelligence agencies do mass data collection which equally disturbing.
Even when there is nothing to hide the feeling that someone is looking is unacceptable.
So I guess anonymity is what I am looking for.
Weatherlawyer wrote:I don't know what fun GCHQ is having at my expense but I wish there was a second search engine to match those plonkers at G-spycentral.
doktor5000 wrote:Weatherlawyer wrote:I don't know what fun GCHQ is having at my expense but I wish there was a second search engine to match those plonkers at G-spycentral.
Feel free to try https://duckduckgo.com/ - Mageia will even earn money from that.
http://archives.mageia.org/zarb-ml/mage ... 20085.html
Users browsing this forum: No registered users and 1 guest