Practical anonymity hiding in plain sight online
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons...
Autor principal: | |
---|---|
Autor Corporativo: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Waltham, Mass. :
Syngress
c2013.
Waltham, MA : 2013. |
Edición: | 1st edition |
Colección: | Gale eBooks
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627948506719 |
Tabla de Contenidos:
- Front Cover; Practical Anonymity; Copyright Page; Contents; Preface; Acknowledgments; 1 Anonymity and Censorship Circumvention; 1.1 What Is Anonymity; 1.2 What Is Tor; 1.3 Why Use Tor; 1.4 What Tor Can't Do; 1.5 How Tor Works; 1.5.1 Tor Protocol Components; 1.5.2 Building a Secure Tunnel with Tor Node Public Keys; 1.5.3 The Exit Node Acts on Behalf of the Tor Client; 1.6 Who Uses Tor; 1.6.1 Normal People; 1.6.2 Military; 1.6.3 Journalists and Their Readers/Viewers; 1.6.4 Law Enforcement; 1.6.5 Whistle-Blowers and Activists; 1.6.6 "High- and Low-Profile People"
- 1.6.7 Business People and IT Professionals1.6.8 Others; 1.6.9 The Benefit of Having Diverse Users; 1.7 How Do I Use Tor; 1.7.1 Plan Ahead and Learn Tor Now; 1.7.2 TBB or Tails; 1.7.3 Tor Browser Bundle; 1.7.4 Tails; 1.7.5 What Can Go Wrong; 1.8 Using Tor Safely; 1.8.1 Use the Tor Browser; 1.8.2 Don't Open Documents; 1.8.3 Don't Install or Enable Browser Plugins; 1.8.4 Avoid Websites that Are Not HTTPS-Enabled; 1.8.5 Use Bridges/Find Company; 2 Using the Tor Browser Bundle; 2.1 What Is Bundled in the Tor Browser Bundle; 2.1.1 Vidalia; 2.1.2 Tor; 2.1.3 Mozilla Firefox ESR+Torbutton
- 2.1.4 And More2.2 Using Tor Browser Bundle; 2.2.1 Getting it Started; 2.2.2 Starting Tor Browser Bundle in Windows; 2.2.3 Starting Tor Browser Bundle in Mac OS X; 2.2.4 Starting Tor Browser Bundle in Linux; 2.2.5 Installing on Ubuntu/GUI; 2.2.6 Installing on Ubuntu/Command Line; 2.2.7 Using Vidalia; 2.2.8 Shortcuts; 2.2.9 Message Log; 2.2.10 Stop/Start Tor; 2.2.11 Setup Relaying; 2.2.12 View the Network; 2.2.13 Use a New Identity; 2.2.14 Bandwidth Graph; 2.3 Settings; 2.3.1 General; 2.3.2 Network; 2.3.3 Sharing; 2.3.4 Services; 2.3.5 Appearances; 2.3.6 Advanced; 2.4 Using Tor Browser
- 2.5 When Tor Won't Connect2.5.1 Basic Troubleshooting; 2.5.2 Do You Need a Proxy?; 2.5.3 Checking the Tor Log; 2.5.4 Reconfiguring Tor for Firewalls; 2.5.5 If Tor Still Won't Connect; 3 Using Tails; 3.1 What Is in Tails; 3.2 Setting Up for Tails; 3.2.1 Getting Tails; 3.2.2 Configuring the System to Boot Tails; 3.3 Using Tails; 3.3.1 Booting Tails; 3.3.2 Shutting Tails Down; 3.3.3 Installing Tails on a USB Drive; 3.3.4 Installing Tails to a USB Device, Manually; 3.3.5 Upgrading Tails ("Clone & Upgrade"); 3.3.6 Persistent Storage on Tails; 3.3.7 Configuring Persistence; 3.3.8 Whisperback
- 3.3.9 KeePassX3.3.10 Metadata Anonymization Toolkit; 3.3.11 Claws Mail; 3.3.12 GNU Privacy Guard; 4 Tor Relays, Bridges, and Obfsproxy; 4.1 When Basic Tor Is Not Enough; 4.1.1 How China Blocked Tor; 4.1.2 Is Tor Down, or Do You Need a Bridge; 4.2 Bridge Relays; 4.2.1 Getting a Bridge Relay Using BridgeDB; 4.2.2 Getting Bridge Relays by E-mail; 4.2.3 Other Ways to Get Bridge Relays; 4.3 Setting Up to Use a Bridge Relay; 4.4 Pluggable Transports and Obfsproxy; 4.4.1 Pluggable Transport Proxies; 4.4.2 Flash Proxy; 4.4.3 Using Pluggable Transports; 5 Sharing Tor Resources
- 5.1 How (and Why) I Should Contribute Services