Saturday, June 29, 2013

The Hidden Internet

This is a very good introduction to how you can hide yourself - and how much you can hide yourself - from the creepy NSA hooveramatic.  Highly recommended.

The point, of course, is not to participate in the unsavory aspects of the 'Net (like The Silk Road). Instead, it's how a group like the Tea Party can communicate with a reduced risk of retaliation from the Fed.Gov.  It's a bit annoying that the First Amendment means so little these days that legitimate political groups need to use some of the same tools as Internet scumbags.


Old NFO said...

That last sentence says it all... sigh

MSgt B said...

Allahu Akbar!

Have you finished that "chemical" project you were working on?

The Tea Party is Da Bomb!

(hee hee)

I found a great range over here in B-ham for SHOOTING GUNS.
I go back for my yearly membership next week.

If you get over this way, we definitely need to HIT it.

Borepatch said...

MSgt B, the CMP store seems to be right on the way to B-town.

MSgt B said...

Yeah. It's about 45 minutes from my house.

Shhh. Don't tell Mrs B.

lee n. field said...

Interesting. I'm about half way through. Took time out to download the tor browser and start the download for the tails live cd iso.

But there's the question: who do you trust, and why? How do we know these aren't compromised? I know, open source and all. But, pull up the older piece called "reflections on trusting trust." Things can be compromised at a deep, nigh undetectable level.

Borepatch said...

lee n. field, you ask precisely the right question, and Thompson's paper is one of the classics of the security industry.

I guess all I can say is that if we really think that the NSA had trojaned the GCC compiler, we may as well all head to the hills.

Also, the idea that they could do something like that and keep it a secret is not something that I think is viable. Someone woud brag to someone (probably some Deputy Director puffing himself up) and it would end up on a PowerPoint slide at The Guardian.