A network of individuals, independent and alternative media activists and organisations, offering grassroots, non-corporate, non-commercial coverage of important social and political issues.
www.indymedia.org
Projects
print
radio
satellite tv
video
Africa
Europe
antwerpen
armenia
athens
austria
barcelona
belarus
belgium
belgrade
brussels
bulgaria
calabria
croatia
cyprus
emilia-romagna
estrecho / madiaq
galiza
germany
grenoble
hungary
ireland
istanbul
italy
la plana
liege
liguria
lille
linksunten
lombardia
madrid
malta
marseille
nantes
napoli
netherlands
northern england
nottingham imc
paris/île-de-france
patras
piemonte
poland
portugal
roma
romania
russia
sardegna
scotland
sverige
switzerland
torun
toscana
ukraine
united kingdom
valencia
Latin America
argentina
bolivia
chiapas
chile
chile sur
cmi brasil
cmi sucre
colombia
ecuador
mexico
peru
puerto rico
qollasuyu
rosario
santiago
tijuana
uruguay
valparaiso
venezuela
Oceania
aotearoa
brisbane
burma
darwin
jakarta
manila
melbourne
perth
qc
sydney
South Asia
india
United States
arizona
arkansas
asheville
atlanta
Austin
binghamton
boston
buffalo
chicago
cleveland
colorado
columbus
dc
hawaii
houston
hudson mohawk
kansas city
la
madison
maine
miami
michigan
milwaukee
minneapolis/st. paul
new hampshire
new jersey
new mexico
new orleans
north carolina
north texas
nyc
oklahoma
philadelphia
pittsburgh
portland
richmond
rochester
rogue valley
saint louis
san diego
san francisco
san francisco bay area
santa barbara
santa cruz, ca
sarasota
seattle
tampa bay
united states
urbana-champaign
vermont
western mass
worcester
West Asia
Armenia
Beirut
Israel
Palestine
Topics
biotech
Process
fbi/legal updates
mailing lists
process & imc docs
tech
Comments
Hide the following 6 comments
?
06.09.2001 23:09
-=-
Be suspicious.......
07.09.2001 09:11
Who would benefit the greatest from activists signing up to 'secret-squirrel' web nav. and coms. tools? Who is MOST likely to jump first and create a web communication system where their users locations can be logged, their comments ( which are likely to be much more liberal under the illusion that they are with friends ) can be logged, and all that they communicate with and where can be logged........?
Don'tmean to worry you guy's but any offer of a secure 'closed' system which could cover your tracks needs to be eyed with great suspicion....key seems to be either get your mates to set one up or do it yourself - just please be very careful people. To me, this seems the next logical step in logging activist activities.
I mean no offence to current secret mail operators - but you set your own up so you know what I mean!
Good luck people
Love to you all............
Paxman
oh well
07.09.2001 12:05
Pretty Good Privacy is a very useful tool. But at the end of they day you can face serious criminal charges for refusing to hand over decryption keys and even warning anyone that you have been busted or that they are being monitored.
As for masking IP. Forget it! The ISPs that sell anonymity are not going to protect you from the law, but just other users knwoing more than you choose to tell them. IP stands for Internet Protocol, which states that you cannot access the Internet without IP. IP is a system that relies on unique addresses ( i.e. in a normal scenario easy to trace ) to function over network that isn't too difficult to intercept data.
So, I would always operate online assuming that someone may be watching or logging.
You could become an elite hacker and make it very *difficult* for anyone to track you, but never impossible.
Encryption is your best defence, but again use it with caution and the knowledge that if you are faced with a question of whether what you are encrypting is important enough to enough to go to jail for if you are asked for the decryption keys ( assuming the police haven't been able to retrieve it from your computer because you have been thorough enough to destroy all trace of it ).
So the genral rule would be use decryption for anything you wish to HINDER anyone seeing.
In terms of removing things from you computer itself there are a few useful tools for truly blanking deleted files from your hard drive. However these programs are *very* slow and certainly only keeping a blast furnace near your PC would *quickly* stop police recovering any data. Simple file deletion does not remove data but simply allows the operating system to overwrite that data at some point when the space is needed.
There are also methods of hiding data within various types of files.
So as we see, there is no Internet privacy; encryption can be at best used as an inconvience; your hard drive is a liability.
Solutions: obviously bearing in mind those points, using a system that does not rely solely on the methods of privacy technology and relies information that has not been electronically archived, or has no obvious link can create a bigger barrier to intrusion than simply encyption alone.
I.e. if privacy and encryption means are used merely as part of the privacy and laws designed to yield information can only gain access to the electronic part of the information, you can happily give up decryption keys, happily be monitored and logged and safe in the knowledge that that information alone is not enough to intrude.
DON'T PUT ALL YOUR EGGS IN ONE BASKET. You brain is still the best tool you have got.
You will find this place an interseting place for further resaerch:
:-)
Mustermann
e-mail:
spam@spam.spam
ps
07.09.2001 12:17
:-)
Mustermann
e-mail:
spam@spam.spam
hmmmm....
07.09.2001 14:38
; )
[-Hack-Tha-System--]
Ip masking
07.09.2001 14:55
There just aren't enough IP v4 addresses (the ones that go xxx.xxx.xxx.xxx) to go around, so most "anonymous proxies" on the web are just "Network Address Translation" and "Caching" services being used by ISP's to give themselves more IP addresses and speed up access times on their internal network (ie for their dial-up customers) and they ALL KEEP LOGS for legal and administrative reasons and can be forced to turn this info over to the laws. There will even be material in the packet encapsulation which may be used to trace you (eg the MAC (media access control) address of your network card which is unique amongst all network devices) or the NetBIOS name of your PC (which you set up yourself when you instlled Window$.
One plus in this is that since ISP hand out IP addresses dynamically, several (thousand?) people may be issued the same IP address in the course of a day, making tracing the user just a teensy bit trickier, ie. you have to know at what time the user was accessing network services using a particular IP address.
Their are some genuinely "free" and "anonymising" proxies which do not keep logs (they usually have a name which suggests secrecy), best to email the administrator to make sure if you think you have found one (administrators email addresses are available by running a "whois" on the IP address or domain name (if you have one you can easily discover the other by using the DNS (Domain Name System) servers which are all over the network. there are DNS lookups and reverse DNS lookups, one to match IP's to a domain name and the other to list a domain names hosted on a computer with a particular IP address.
For REAL online security, find a reputable anonymiser service like anonymiser.com, they use port forwarding to mask the nature of your online activities, this avoids the "well known ports" used for attaching to web, email services, etc. In addition to port forwarding they use "secure shell" encryption which makes all the packets you are transfering illegible to anyone without the decryption key (ie everyone on the net except the anonymiser server). That takes care of the data transfer between them and you but to finish it off they re-originate the packets of data from their proxy server and keep NO LOGS, there is NO WAY ON EARTH to discover what someone is doing online using these techniques because you only communicate with the proxy server (it then requests web pages for you) and all the traffic is encrypted and since you only attach to one port on the proxy server no-one can tell if you are watching porn, reading a web page, collecting your email, transfering files, organising a coup or whatever.
Subscriptions are around $30 per quarter.
Hope that clears things up a little for folk.
mjarsk