encrypted

GNUnet Circumvents Censorship with Open-Source P2P Networking

Peer-to-peer networking tools, like Lantern and uProxy, are increasingly important for circumventing Internet censorship rules. But this strategy isn’t actually very new, as GNUnet, an open source peer-to-peer connectivity tool developed since 2001, makes clear. GNUnet establishes a mesh network with no central control point. That lets users skirt traditional gateways that Internet censors could …

GNUnet Circumvents Censorship with Open-Source P2P Networking Read More »

Lantern Provides P2P Proxy Network for Beating Internet Censorship

Need to beat online censorship, but don’t have access to a VPN? Lantern, an open-source app that uses peer-to-peer connections to get around firewalls, may be for you. Lantern was launched by Adam Fisk, the man behind the now-defunct LimeWire file-sharing platform. Fisk said he first conceived of the idea for Lantern when working on …

Lantern Provides P2P Proxy Network for Beating Internet Censorship Read More »

Indian Government Aims to Curtail Data Encryption and Privacy

The government of India this week rescinded the controversial National Encryption Policy, which would have sharply curtailed Internet freedom and privacy in India. But serious privacy concerns remain. The proposal would have required computer programs that encrypt data to make it available in plaintext form for at least ninety days after it is created. The …

Indian Government Aims to Curtail Data Encryption and Privacy Read More »

Tor .onion Domain Gets Security Enhancement with IETF Approval

The Internet Engineering Task Force (IETF) has made private and anonymous Internet browsing easier by officially granting special status to the .onion domain name. Now, Tor users can be more certain that their tracks are hidden when they visit sites that use the .onion domain. The change’s chief significance is that it makes it impossible …

Tor .onion Domain Gets Security Enhancement with IETF Approval Read More »

Dropbox Improves Privacy With Two-Factor U2F Authentication

How private is Dropbox, the popular cloud storage and file syncing service?  Not as private as it could be, for sure. But the platform’s developers have been taking steps recently to beef up the service’s security and privacy protections, namely by adding more robust authentication options. To Dropbox or Not to Dropbox? If you’re super-serious …

Dropbox Improves Privacy With Two-Factor U2F Authentication Read More »

How to Set Your MAC Address Randomly Using Linux

In theory, every networking device has a unique media access control, or MAC, address. In practice, using a simple tool called macchanger, it’s easy to “spoof” your computer’s MAC address on Linux by setting a random value for it each time you connect to a network, which helps protect your privacy. Here’s how and why. …

How to Set Your MAC Address Randomly Using Linux Read More »