A handy trio of tools for protecting your privacy


It is hard to guarantee privacy on today's networks, but if you are serious about getting started, it might be time to start thinking about encrypting your disk data, anonymizing your Internet browsing, and making sure your files and application history are really deleted. This article peeled back the privacy onion and took a look at some important tools for flying under the radar.

No technology can take the place of being responsible and realistic in regard to the permanence of what you create online. Still, these powerful tools provide a measurable margin of choice and privacy today.

Attempts to Compromise Tor

Over the past few months, reports have appeared on various governments and individuals who have tried to compromise Tor and other anonymizing software. For example, the United States National Security Agency has introduce code meant to compromise Tor and Tor-compatible browser bundles used to help "newbies" learn Tor. The compromise includes code inside of the browser that is meant to defeat Tor's functionality.

Many agencies have deposited compromised code onto Tor-networked machines as well. As always, be careful where you download your code and your resources.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.