A handy trio of tools for protecting your privacy

Conclusion

It is hard to guarantee privacy on today's networks, but if you are serious about getting started, it might be time to start thinking about encrypting your disk data, anonymizing your Internet browsing, and making sure your files and application history are really deleted. This article peeled back the privacy onion and took a look at some important tools for flying under the radar.

No technology can take the place of being responsible and realistic in regard to the permanence of what you create online. Still, these powerful tools provide a measurable margin of choice and privacy today.

Attempts to Compromise Tor

Over the past few months, reports have appeared on various governments and individuals who have tried to compromise Tor and other anonymizing software. For example, the United States National Security Agency has introduce code meant to compromise Tor and Tor-compatible browser bundles used to help "newbies" learn Tor. The compromise includes code inside of the browser that is meant to defeat Tor's functionality.

Many agencies have deposited compromised code onto Tor-networked machines as well. As always, be careful where you download your code and your resources.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus

Direct Download

Read full article as PDF:

Price $2.95

News

njobs Europe
What:
Where:
Country:
Njobs Netherlands Njobs Deutschland Njobs United Kingdom Njobs Italia Njobs France Njobs Espana Njobs Poland
Njobs Austria Njobs Denmark Njobs Belgium Njobs Czech Republic Njobs Mexico Njobs India Njobs Colombia