recentpopularlog in

mcherm : anonyminity   26

Death Note: L, Anonymity & Eluding Entropy - Gwern.net
Contains an amazing list of ways to identify an anonymous individual.
via:HackerNews  anonyminity  security 
april 2018 by mcherm
Building a new Tor that can resist next-generation state surveillance | Ars Technica UK
A survey of the current state of items that are being built to replace or complement TOR.
anonyminity  privacy  via:HackerNews  ArsTechnica  tor 
september 2016 by mcherm
Hot or Not: Revealing Hidden Services by their Clock Skew
An astounding side channel attack to locate a TOR server. Close observation can detect even tiny clock drifts. Quartz clocks change speed with temperature. CPU load changes temperature. Use this to probe even TOR hidden services to find if they are on a target machine and if they share space with another TOR service.
security  blogworthy  privacy  tor  anonyminity  sidechannelattack  via:reddit 
may 2014 by mcherm
Introducing Strongbox, a Tool for Anonymous Document-Sharing : The New Yorker
The New Yorker sets up a mechanism for accepting fully anonymous documents without being able to tell where they are coming from.
journalism  anonyminity  via:HackerNews  cryptography 
may 2013 by mcherm
How the Great Firewall of China Blocks Tor | threatpost
China can detect and block Tor. They send probes to the machines to which users are making encrypted connections and begin the Tor exchange protocol until they get far enough to get some identifying behavior. This is phenomenally difficult to defend against.
security  china  tor  anonyminity 
january 2012 by mcherm
Pipl - People Search
A people search site that gathers information from many other places and is surprisingly effective.
useful  privacy  via:HackerNews  identity  identitytheft  anonyminity 
december 2011 by mcherm
Google Rejects 2-Step Plan to End Nymwars
Apparently Larry Page said "no" to the idea of solving it by just not insisting on real names. I really wish I knew what reasons he gave... this is only hearsay.
nymwars  google  anonyminity  via:boingboing 
october 2011 by mcherm
Iran blocks Tor; Tor releases same-day fix | The Tor Blog
Iran looked at expiration times on SSL certs and the ones TOR uses were unusual. So they made them look normal, but if Iran is sufficiently motivated they can probably block TOR. Worse yet, they could try to DETECT the use of TOR.
security  tor  internet  anonyminity  via:HackerNews 
september 2011 by mcherm
“Real Names” Policies Are an Abuse of Power « Social Media Collective
A well-written explanation of why a "real names only" policy is harmful to women and minorities.
via:HackerNews  anonyminity  googleplus  facebook  privacy 
august 2011 by mcherm
Phantom, a system for generic, decentralized, unstoppable internet anonymity : opensource
I post to Reddit about "Phantom", a securely anonymous network protocol from Google.
cryptography  anonyminity  via:reddit  security 
may 2011 by mcherm
TOR for Android: anonymize your phone's data-connection - Boing Boing
An article on Boing Boing says they have TOR for android. I haven't been able to navigate to the site itself.
android  security  anonyminity  via:boingboing 
april 2010 by mcherm
Court case shows limits of anonymous blogging - Ars Technica
You have a right to be anonymous on the internet, but there are limits to that right and in extreme cases (like this) a court may decide to unmask you. Or if it's a big corporation asking. (That last bit is just sarcasm from me.)
anonyminity  via:ArsTechnica  ArsTechnica  law 
october 2009 by mcherm
John Resig - Eulogy to _why
A major figure in the Ruby world, who has always stayed anonymous but has written books, tutorials, code, comics and more, suddenly disappeared from the web entirely.
via:HackerNews  identity  anonyminity  internet  ruby 
august 2009 by mcherm
NSFW: Don’t bullshit a reformed bullshitter; the off-the-record gravy train stops here
Off the record sources often lie to the reporter. Perhaps the reporter's guarantee of anonymity should only hold so long as what was said was true.
journalism  via:HackerNews  privacy  anonyminity 
august 2009 by mcherm
Software improves p2p privacy by hiding in the crowd
Interesting attack: you can tell *generally* what someone downloads via bittorrent by noticing that they make connections to the same set of servers as someone else; there's an 85% chance that they download the same kind of stuff. (Bittorrent was designed to resist this, but it fails.) The authors built a tool that downloads a small amount of random stuff to defend against this.
via:BruceSchneier  security  p2p  anonyminity  bittorrent  privacy 
may 2009 by mcherm
New service unmasks anonymous cell callers | Wireless - CNET News
Another level of "but I clearly can't choose the wine in front of me" in the battle to hide/show caller ID.
security  anonyminity  phone  via:digg 
february 2009 by mcherm
The NSA Teams Up with the Chinese Government to Limit Internet Anonymity: Schneier on Security
Bruce Schneier questions why the Chinese government is teaming up with the US government to stamp out anonymity on the internet.
via:BruceSchneier  privacy  security  internet  rights  BruceSchneier  anonyminity 
september 2008 by mcherm
L.A. grand jury issues subpoenas in Web suicide case - Los Angeles Times
Girl commits suicide after being rejected by a "friend" on MySpace. Friend was _really_ a neighbor's mom. Prosecutors can't prosecute since she hasn't broken laws. So they prosecute her for "fraud" for using a false name. I certainly hope it fails... this
law  internet  anonyminity  privacy  eff  via:kuro5hin 
march 2008 by mcherm
Schneier on Security: Anonymity and the Netflix Dataset
Bruce Schneier essay on how easy it is to identify individuals in large anonymous datasets and some implications of that. Uses the Netflix rental data as an example.
via:BruceSchneier  privacy  anonyminity  netflix  essay 
december 2007 by mcherm
deadfake - free, easy and anonymous email service.
Site allowing one to easily send email with a spurious from address.
useful  email  security  anonyminity 
september 2006 by mcherm

Copy this bookmark:





to read