How to Protect your Internet Anonymity and Privacy
From protecting your online privacy, bypassing censorship, to fighting tyranny, this book aims to provide practical software and instructions for novices and the experienced. The emphasis is on the use of free and widely available tools to level the playing field against resourceful and powerful adversaries. With increasingly powerful computers, a modest laptop can use a massive P2P network such as Tor to hide your trails, or create a virtual machine with a virtual private network for kids to play safely online.
The game changer in this space is the popularity of low cost cloud hosting, and at the other end, netbooks and nettops. Users can have their own proxy, VPN, or more sophisticated anonymity systems such as TOR. Anonymity conscious users will push their defense from the firewall to the cloud, just like when they pushed their defense from PC based software to low-cost firewalls. The success of the firewall is not because every user wants security bad. It's because it's a necessity for home networking, connecting all your computers, printers, scanners, game consoles, media centers, and even Skype phones.
Table of Contents
- Threat Models
- Type of Proxy Servers
- Open Source Anonymity Networks
- Proprietary Anonymity Networks
- Your own proxy and VPN on Amazon EC2
- Your own TOR node on Amazon EC2
- TOR VPN
- TOR Hidden Service for Anonymous Websites
- Securing your Browser
- Securing your Computer
- Risk Analysis Tools