Monday, December 10, 2012

High & low profile people use Tor

Does being within the public spotlight shut you faraway from having a personal life, forever, online? A rural professional associate exceedingly|in a very} geographic area state keeps an anonymous diary as a result of, with the varied patronage at his prestigious firm, his politics square measure guaranteed to offend somebody.

Journalists and their audience use Tor

Reporters without boundaries tracks net prisoners of conscience and captive or injured journalists everywhere the globe. They advise journalists, sources, bloggers, and dissidents to use Tor to make sure their privacy and safety.

Tor bridges in the Amazon cloud

 The Tor Cloud project provides you a easy method of deploying bridges to assist users access associate degree unexpurgated net. By putting in place a bridge, you present information measure to the Tor network and facilitate improve the protection and speed at that users will access the net. Learn a lot of concerning Tor and bridges ».

Vidalia

Vidalia is a cross-platform graphical controller for the Tor software, built using the Qt framework. Vidalia runs on most platforms supported by Qt 4.3 or later, including Microsoft Windows, Apple OS X, and Linux or other Unix variants using the X11 window system. It was originally written by Matt Edman, and is currently maintained by Tomás Touceda.

obfsproxy

obfsproxy may be a tool that makes an attempt to bypass censorship, by remodeling the Tor traffic between the consumer and also the bridge. This way, censors, World Health Organization typically monitor traffic between the consumer and also the bridge, can see innocent-looking remodeled traffic rather than the particular Tor traffic. obfsproxy diagram

obfsproxy supports multiple protocols, referred to as pluggable transports, that specify however the traffic is remodeled. as an example, there may be a protocol transport that transforms Tor traffic to appear like regular protocol traffic.

Even though obfsproxy may be a separate application, utterly freelance from tor, it speaks to tor exploitation an interior protocol to attenuate necessary end-user configuration.

Please open a price ticket on our bug hunter for any bugs you discover or options you'd prefer to see additional in future releases.


Tor Browser Bundle

What is the Tor Browser Bundle (TBB)?

The Tor software system protects you by bouncing your communications around a distributed network of relays travel by volunteers all round the world: it prevents someone looking at your web association from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it enables you to access sites that square measure blocked.

Privacy for anyone anywhere

Tails is a live system that aims at preserving your privacy and anonymity. It helps you to use the Internet anonymously almost anywhere you go and on any computer but leave no trace using unless you ask it explicitly.

Tails is a live DVD or live USB that aims at preserving your privacy and anonymity.
It helps you to:

Orbot: Mobile Anonymity + Circumventionv

What is Orbot?

Orbot is associate degree application that enables mobile users to access the net, instant electronic messaging and email while not being monitored or blocked by their mobile web service supplier. Orbot brings the options and practicality of Tor (read additional below) to the golem mobile software system.


IT Professionals use Tor

To verify IP primarily based firewall rules: A firewall might have some policies that solely permit bound IP addresses or ranges. Tor is wont to verify those configurations by mistreatment AN IP variety outside of the company's alloted IP block. To bypass their own security systems for sensitive skilled activities: for example, a corporation might have a strict policy concerning the fabric workers will read on the web. A log review reveals a potential violation. Tor is wont to verify the knowledge while not AN exception being place into company security systems.
 to attach back to deployed services: A network engineer will use Tor to remotely connect back to services, while not the necessity for AN external machine and user account, as a part of operational testing.

Bloggers use Tor

Frequently we have a tendency to hear regarding bloggers WHO ar sued or discharged for speech dead legal things on-line, in their web log. We have a tendency to advocate the sleep with Legal Guide for Bloggers. International Voices maintains a guide to anonymous blogging with Wordpress and Tor.

Business executives use Tor

Security breach info clearinghouses: Say a financial organisation participates in a very security clearinghouse of knowledge on web attacks. Such a repository needs members to report breaches to a central cluster, WHO correlates attacks to discover coordinated patterns and channelise alerts. however if a particular bank in St. Joe Louis is broken, they do not wish associate aggressor looking at the incoming traffic to such a repository to be able to track wherever info is coming back from. even if each packet were encrypted, the IP address would betray the situation of a compromised system.

Activists & Whistleblowers use Tor

Human rights activists use Tor to anonymously report abuses from danger zones. Internationally, labor rights employees use Tor and different sorts of on-line and offline obscurity to prepare employees in accordance with the Universal Declaration of Human Rights. even supposing they're at intervals the law, it doesn't mean they're safe. Tor provides the flexibility to avoid abuse whereas still raising a voice.
 once teams like the buddies Service Committee and environmental teams square measure more and more falling below police investigation within the u.  s. below laws meant to shield against act of terrorism, several peaceful agents of amendment consider Tor for basic privacy throughout legitimate activities.

Law enforcement officers use Tor

Online surveillance: Tor permits officers to surf questionable websites and services while not going away tell-tale tracks. If the computer user of Associate in Nursing misappropriated gambling website, as an example, were to visualize multiple connections from government or enforcement information science addresses in usage logs, investigations could also be hampered.

Militaries use Tor

Normal people use Tor

TOR

Protect your privacy. Defend yourself against network surveillance and traffic analysis.