/ Tor browser does not protect. How to be anonymous?

Tor browser does not protect. How to be anonymous?

For today there are the following alternatives:

*Invisible Internet Project (I2P).



All three technologies are also not able to provide absolute protection. For example, the creators of I2P and are recognized: de anonymization complicated, but still possible (No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount). But there is no better.

Invisible Internet Project is quite cleverly arranged distributed network based on Kademlia DHT. In addition to the decentralized structure, the network I2P interesting self-similar DNS and intensive use of asymmetric encryption. Inside I2P have their own sites, and network users are guaranteed anonymity (not absolute).
Program to work in the Invisible Internet Project written in Java that allows you to use I2P on any device and any operating system. Installation is simple: you need to download the JAR file from the official website and run it:

java -jar i2pinstall_0.9.17.jar

Another distributed network. Used for anonymous storage and data access. Something like anonymous torrent. As I2P, Freenet uses the installer for Java:

cd /tmp && wget '' -O new_installer_offline.jar
java -jar new_installer_offline.jar

Unlike free I2P and Freenet, the VPN will have to pay. From $ 5 per month and above. VPN is a virtual private network. Under this clever phrase is a very simple idea. You are accessing the Internet through a computer intermediary. The relationship with the intermediary securely (but not reliably) is encrypted, so neither the provider nor the intelligence agencies are not able to read incoming and outgoing traffic. But the owner of the VPN server can read all your traffic. And do it, if it will put pressure state bulldogs or he will see the financial benefitsMakes sense to have multiple servers, and intermediaries in different countries.

As you can see from above, the absolute anonymization network operation can only provide well-edged axe, which the user must cut the Internet cable before connecting.

On account of infrastructure Tor personally, I think that 2/3 of the nodes have long been under the control of the various intelligence agencies.

Good Luck!!!

6-02-2015, 14:05
Go Back