Africa-focused technology, digital and innovation ecosystem insight and commentary.
…
continue reading
Indhold leveret af The Linux Inlaws and Linux Inlaws. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af The Linux Inlaws and Linux Inlaws eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !
Gå offline med appen Player FM !
LI_S01E75_The_Onion_Router_Network
Manage episode 352173515 series 3298550
Indhold leveret af The Linux Inlaws and Linux Inlaws. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af The Linux Inlaws and Linux Inlaws eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
As privacy is becoming more and more of a concern even outside of the shady regions of international arms trading, contraband smuggling and selling relatives on the Internet, even your ordinary man/woman/diverse is turning to virtual private networks and other means for obfuscating personal communications. The Onion Router Project (or Tor for short) plays a central role in this context. Essentially implementing an overlay network on top of the Internet, it not only allows journalists working under less-than comforting regimes (for wont of a better expression) and political oppositions in similar contexts to but rather anybody who uses it communicate freely and without any censorship. As there are quite a few myths and misconceptions surrounding this project, this episode will dispel them all :-) apart from giving an overview of the technical and non-technical side of the implementation. If you're concerned with the your privacy and happen to use the Internet (and who isn't these days), then this definitely an episode you shouldn't miss.
…
continue reading
Links
- Tor: https://www.torproject.org
- Public Money Public Code Campaign: https://fsfe.org/activities/publiccode/index.en.html
- Tor Browser Bundle: https://www.torproject.org/download
- Tor architecture: https://thesecmaster.com/detailed-anatomy-of-the-tor-network-structure-of-the-tor-network
- Tor SOCKS Proxy: https://github.com/PeterDaveHello/tor-socks-proxy
- Tor source code: https://github.com/torproject/tor
- Theoretical attack vectors: https://www.whonix.org/wiki/Speculative_Tor_Attacks
- Node control attack: https://www.researchgate.net/publication/260353732_A_New_Cell-Counting-Based_Attack_Against_Tor
- How to set up a bridge: https://tb-manual.torproject.org/bridges
- SAS Rogue Heroes: https://en.wikipedia.org/wiki/SAS:_Rogue_Heroes
- Up First: https://www.npr.org/podcasts/510318/up-first
134 episoder
Manage episode 352173515 series 3298550
Indhold leveret af The Linux Inlaws and Linux Inlaws. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af The Linux Inlaws and Linux Inlaws eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
As privacy is becoming more and more of a concern even outside of the shady regions of international arms trading, contraband smuggling and selling relatives on the Internet, even your ordinary man/woman/diverse is turning to virtual private networks and other means for obfuscating personal communications. The Onion Router Project (or Tor for short) plays a central role in this context. Essentially implementing an overlay network on top of the Internet, it not only allows journalists working under less-than comforting regimes (for wont of a better expression) and political oppositions in similar contexts to but rather anybody who uses it communicate freely and without any censorship. As there are quite a few myths and misconceptions surrounding this project, this episode will dispel them all :-) apart from giving an overview of the technical and non-technical side of the implementation. If you're concerned with the your privacy and happen to use the Internet (and who isn't these days), then this definitely an episode you shouldn't miss.
…
continue reading
Links
- Tor: https://www.torproject.org
- Public Money Public Code Campaign: https://fsfe.org/activities/publiccode/index.en.html
- Tor Browser Bundle: https://www.torproject.org/download
- Tor architecture: https://thesecmaster.com/detailed-anatomy-of-the-tor-network-structure-of-the-tor-network
- Tor SOCKS Proxy: https://github.com/PeterDaveHello/tor-socks-proxy
- Tor source code: https://github.com/torproject/tor
- Theoretical attack vectors: https://www.whonix.org/wiki/Speculative_Tor_Attacks
- Node control attack: https://www.researchgate.net/publication/260353732_A_New_Cell-Counting-Based_Attack_Against_Tor
- How to set up a bridge: https://tb-manual.torproject.org/bridges
- SAS Rogue Heroes: https://en.wikipedia.org/wiki/SAS:_Rogue_Heroes
- Up First: https://www.npr.org/podcasts/510318/up-first
134 episoder
Alle episoder
×Velkommen til Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.