"unzip; strip; touch; finger; mount; fsck; more; yes; unmount; sleep" - my daily unix command list
All articles
Last comments
Go to your settings -> themes Press the icon button and change it, in this case, to flat-remix
use this for example https://imgur.com/ then just insert link to the page with picture
Shekin, thanx for your answer. I'm not using Facebook or any other spying (social) sites. Can I somehow uploaded that screen here? Probably not.
Give the right for file sudo chmod +x amd-driver-installer-15.20.1046-x86.x86_64.run
«    October 2016    »
» » Tor browser does not protect. How to be anonymous?

Tor browser does not protect. How to be anonymous?

Tor browser does not protect. How to be anonymous?

Users means of anonymization presence in the Tor network for a long time felt invulnerable superhuman. And then came the trailer with FBI agents and all the "anonymous" was taken to jail. As it turned out, blame Tor, which gave a false sense of security, but in fact did not provide serious protection. Before fans of anonymity acutely the question: what to use now?

Sorry for the spelling and phonetic errors in the text.
Owner and main writer of MintGuide.org is not a native English speaker.

For today there are the following alternatives:

  • Invisible Internet Project (I2P).
  • Freenet.
  • VPN

All three technologies are also not able to provide absolute protection. For example, the creators of I2P and are recognized: de anonymization complicated, but still possible (No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount). But there is no better.


Invisible Internet Project is quite cleverly arranged distributed network based on Kademlia DHT. In addition to the decentralized structure, the network I2P interesting self-similar DNS and intensive use of asymmetric encryption. Inside I2P have their own sites, and network users are guaranteed anonymity (not absolute).
Program to work in the Invisible Internet Project written in Java that allows you to use I2P on any device and any operating system. Installation is simple: you need to download the JAR file from the official website and run it:

Linux terminal: ~$java -jar i2pinstall_0.9.17.jar[/code]

Another distributed network. Used for anonymous storage and data access. Something like anonymous torrent. As I2P, Freenet uses the installer for Java:

Linux terminal: ~$cd /tmp && wget 'https://freenetproject.org/jnlp/freenet_installer.jar' -O new_installer_offline.jar
java -jar new_installer_offline.jar[/code]

Unlike free I2P and Freenet, the VPN will have to pay. From $ 5 per month and above. VPN is a virtual private network. Under this clever phrase is a very simple idea. You are accessing the Internet through a computer intermediary. The relationship with the intermediary securely (but not reliably) is encrypted, so neither the provider nor the intelligence agencies are not able to read incoming and outgoing traffic. But the owner of the VPN server can read all your traffic. And do it, if it will put pressure state bulldogs or he will see the financial benefitsMakes sense to have multiple servers, and intermediaries in different countries.


As you can see from above, the absolute anonymization network operation can only provide well-edged axe, which the user must cut the Internet cable before connecting.

On account of infrastructure Tor personally, I think that 2/3 of the nodes have long been under the control of the various intelligence agencies.


Good Luck!!!


Related articles

1 comment

  1. Dorey yellowfin
    This Message to the NSA and other goverment douche bags violating the constitution (a binding contract between us and them) "The more you tighten your grip Tark, the more star systems will slip through your fingers"
  • bowtiesmilelaughingblushsmileyrelaxedsmirk
Login via
MintGuide.org © 2014-216
Any copying, including separate parts of texts or images the publication and republication, reprinting or any other dissemination of information, in whatever form and by whatever technical means it has not been, is strictly prohibited without the prior written consent of the publisher. While citing information subscribers references required. Quotable material without prior consent, but in no more than one paragraph and binding direct, open for search engines hyperlink to the website is not lower than in the second paragraph of text.