Monthly Archives: January 2016

The Tor Browser: Tor Browser – au.pcmag.com

Posted: January 27, 2016 at 7:43 pm

The Tor Browser makes the tricky work of surfing the Web anonymously as easy as using any other browser, but with a significant performance hit.

Jan. 26, 2016

Need to hire an assassin, buy some contraband, view illegal porn, or just bypass government, corporate, or identity thief snooping? Tor is your answer. Tor, which stands for "The Onion Router" is not a product, but a protocol that lets you hide your Web browsing as though it were obscured by the many layers of an onion. The most common way to view the so-called Dark Web that comprises Tor sites is by using the Tor Browser, a modded version of Mozilla Firefox. Using this Web browser also hides your location, IP address, and other identifying data from regular websites. Accessing Tor has long been beyond the ability of the average user. Tor Browser manages to simplify the process of protecting your identity onlinebut at the price of performance.

What Is Tor? Ifyou're thinking that Tor comes from a sketchy group of hackers, know that its core technology was developed by the U.S. Naval Research Lab and D.A.R.P.A.. The Tor Project non-profit receives sizeable donations from various federal entities such as The National Science Foundation. The Tor Project has a page listing many examples of legitimate types of Tor users, such as political dissidents in countries with tight control over the Internet and individuals concerned about personal privacy.

Tor won't encrypt your datafor that, you'll need a Virtual Private Network (VPN). Instead, Tor routes your Internet traffic through a series of intermediary nodes. This makes it very difficult for government snoops or aggressive advertisers to track you online. Using Tor affords far more privacy than other browsers' private (or Incognito) modes, since it obscures your IP address so that you can't be trackedwith it. Standard browsers' private browsing modes discard your cached pages and browsing history afteryour browsing session.Even Firefox's new, enhanced private browsing mode doesn't hide your identifiable IP address from the sites you visit, though it does prevent them tracking you based on cookies.

We tested a standard Windows installer, with choices to create desktop icons and run the browser immediately. The browser itself is a heavily modified version of Firefox 38.5 (as of this writing), and includes several security plug-ins as well as security tweaks such as not caching any website data. For a full rundown of the PCMag Editors' Choice browser's many features, read our full review of Firefox.

Before merrily browsing along anonymously, you need to inform Tor about your Webconnection. If your Internet connection is censored, you configure one way, if not, you can connect directly to the network. Since we live in a free societyand work for benevolent corporate overlords, we connected directly for testing. After connecting to the Tor relay system (a dialog with a progress bar appears at this stage), the browser launches, and you see theTor project's page.

The browser interface is identical with Firefox, except with some necessary add-ons installed. NoScript, a commonly used Firefox add-on, is preinstalled and can be used to block most non-HTML content on the Web. The green onion button to the left of the address bar is the Torbutton add-on. It lets you see your Tor network settings, but also the circuit you're using: Ourcircuit started in Germany and passed through two different addresses in the Netherlands before reaching the good old Internet. If that doesn't suit you, you can request a new circuit, either for the current session or for the current site. This was one of our favorite features.

One thing we really like about the Tor Browser is how it makes existing security and privacy tools easier to use. NoScript, for example, can be a harsh mistress, who can bedifficult to configure, and can break websites. But a security panel in the Torbutton presents you with a simple security slide. At the lowest, default setting, all browser features are enabled. At the highest setting, all JavaScript and even some image types are blocked, among other settings. This makes it easy to raise or lower the level of protection you need, without having to muck around in multiple settings windows.

Everything you do in the browser is tested for anonymity: When we tried full-screening the browser window, a message told us that that could provide sites a way to track us, and recommended leaving the window at the default size. And the project's site specifically states that using Tor alone doesn't guarantee anonymity, but rather that you have to abide by safe browsing guidelines: don't use BitTorrent, don't install additionalbrowser add-ons, don't open documents or media while online. The recommendation to only visit secure HTTPS sites is optionally enforced by a plug-in called HTTPS Everywhere.

Even if you follow these recommendations, though, someone could detect the simple fact that you're using Tor, unless you set it up to use a Tor bridge relay. Those are not listed in the Tor directory, so hackers (and governments) would have more trouble finding them.

One thing we noticed while browsing the standard Web through Tor was the need to enter a CAPTCHA to access many sites. This is because your cloaked URL looks suspicious to website security services such as CloudFlare, used by millions of sites to protect themselves. It's just one more price you pay for anonymity.

We also had trouble finding the correct version of websites we wished to visit. Directing the Tor Browser to PCMag.com, for example, took us to the Netherlands localization of our website. We could not find any way to direct us back to the main URL, which lets you access the U.S. site.

Tor hidden sites have URLs that end in .onion, preceded by 16 alphanumeric characters. You can find directories of these hidden sites with categories resembling the good old days of Yahoo. There's even a Tor Links Directory page (on the regular Web) that's a directory of these directories. There are many chat and message boards, but you even find directories of things like lossless audio files, video game hacks, and financial services such as anonymous bitcoin, and even a Tor version of Facebook. Many onion sites are very slow or completely downkeep in mind that they're not run by deep-pocketed Web companies. Very often we clicked an onion link only to be greeted with an "Unable to Connect" error. Sinbad helpfully displays a red "Offline on last crawl" bullet to let you know that a site is probably nonfunctional.

As for browser benchmarks, the results hew to Firefox's own performance, with near-leading performance on all the major JavaScript tests, JetStream and Octane, for example. Onourtest laptop, the Tor Browser scored 20,195 on Octane, compared with 22,297 for standard Firefoxnot a huge difference. The Tor network routing is a far more significant factor in browsing performance than browser JavaScript speed. That is, unless you've blocked all JavaScript.

Keep in mind, though, that the Tor Browser is based on the Firefox Extended Support Release versions, which updates less frequently so that large organizations have time to maintain their custom code. That means you don't get quite the latest in Firefox performance and features, but security updates are delivered at the same time as new main versions.

There's a similar story when it comes to standards compatibility: On the HTML5Test.com site, which quantifies the number of new Web standards supported by a browser, the Tor Browser gets a score of 412, compared with 468 for the latest Firefox version. You may run into incompatible sites, though. For example, none of the Internet speed connection test sites performed correctly in the Tor Browser.

Of course, you pay a price of extra setup and slower performance with the Tor Browser, but it's less onerous than you may think. And the included support for fine-grain privacy and security protection is excellent. If you take your online privacy seriously, you owe it to yourself to check out the Tor Browser. For standard, full-speed Web browsing, however, check out PCMag Editors' Choice Web browser, Firefox.

Read the original post:
The Tor Browser: Tor Browser - au.pcmag.com

Posted in Tor Browser | Comments Off on The Tor Browser: Tor Browser – au.pcmag.com

The Tor Browser: Tor Browser – uk.pcmag.com

Posted: at 7:43 pm

The Tor Browser makes the tricky work of surfing the Web anonymously as easy as using any other browser, but with a significant performance hit.

Need to hire an assassin, buy some contraband, view illegal porn, or just bypass government, corporate, or identity thief snooping? Tor is your answer. Tor, which stands for "The Onion Router" is not a product, but a protocol that lets you hide your Web browsing as though it were obscured by the many layers of an onion. The most common way to view the so-called Dark Web that comprises Tor sites is by using the Tor Browser, a modded version of Mozilla Firefox. Using this Web browser also hides your location, IP address, and other identifying data from regular websites. Accessing Tor has long been beyond the ability of the average user. Tor Browser manages to simplify the process of protecting your identity onlinebut at the price of performance.

What Is Tor? Ifyou're thinking that Tor comes from a sketchy group of hackers, know that its core technology was developed by the U.S. Naval Research Lab and D.A.R.P.A.. The Tor Project non-profit receives sizeable donations from various federal entities such as The National Science Foundation. The Tor Project has a page listing many examples of legitimate types of Tor users, such as political dissidents in countries with tight control over the Internet and individuals concerned about personal privacy.

Tor won't encrypt your datafor that, you'll need a Virtual Private Network (VPN). Instead, Tor routes your Internet traffic through a series of intermediary nodes. This makes it very difficult for government snoops or aggressive advertisers to track you online. Using Tor affords far more privacy than other browsers' private (or Incognito) modes, since it obscures your IP address so that you can't be trackedwith it. Standard browsers' private browsing modes discard your cached pages and browsing history afteryour browsing session.Even Firefox's new, enhanced private browsing mode doesn't hide your identifiable IP address from the sites you visit, though it does prevent them tracking you based on cookies.

We tested a standard Windows installer, with choices to create desktop icons and run the browser immediately. The browser itself is a heavily modified version of Firefox 38.5 (as of this writing), and includes several security plug-ins as well as security tweaks such as not caching any website data. For a full rundown of the PCMag Editors' Choice browser's many features, read our full review of Firefox.

Before merrily browsing along anonymously, you need to inform Tor about your Webconnection. If your Internet connection is censored, you configure one way, if not, you can connect directly to the network. Since we live in a free societyand work for benevolent corporate overlords, we connected directly for testing. After connecting to the Tor relay system (a dialog with a progress bar appears at this stage), the browser launches, and you see theTor project's page.

The browser interface is identical with Firefox, except with some necessary add-ons installed. NoScript, a commonly used Firefox add-on, is preinstalled and can be used to block most non-HTML content on the Web. The green onion button to the left of the address bar is the Torbutton add-on. It lets you see your Tor network settings, but also the circuit you're using: Ourcircuit started in Germany and passed through two different addresses in the Netherlands before reaching the good old Internet. If that doesn't suit you, you can request a new circuit, either for the current session or for the current site. This was one of our favorite features.

One thing we really like about the Tor Browser is how it makes existing security and privacy tools easier to use. NoScript, for example, can be a harsh mistress, who can bedifficult to configure, and can break websites. But a security panel in the Torbutton presents you with a simple security slide. At the lowest, default setting, all browser features are enabled. At the highest setting, all JavaScript and even some image types are blocked, among other settings. This makes it easy to raise or lower the level of protection you need, without having to muck around in multiple settings windows.

Everything you do in the browser is tested for anonymity: When we tried full-screening the browser window, a message told us that that could provide sites a way to track us, and recommended leaving the window at the default size. And the project's site specifically states that using Tor alone doesn't guarantee anonymity, but rather that you have to abide by safe browsing guidelines: don't use BitTorrent, don't install additionalbrowser add-ons, don't open documents or media while online. The recommendation to only visit secure HTTPS sites is optionally enforced by a plug-in called HTTPS Everywhere.

Even if you follow these recommendations, though, someone could detect the simple fact that you're using Tor, unless you set it up to use a Tor bridge relay. Those are not listed in the Tor directory, so hackers (and governments) would have more trouble finding them.

One thing we noticed while browsing the standard Web through Tor was the need to enter a CAPTCHA to access many sites. This is because your cloaked URL looks suspicious to website security services such as CloudFlare, used by millions of sites to protect themselves. It's just one more price you pay for anonymity.

We also had trouble finding the correct version of websites we wished to visit. Directing the Tor Browser to PCMag.com, for example, took us to the Netherlands localization of our website. We could not find any way to direct us back to the main URL, which lets you access the U.S. site.

Tor hidden sites have URLs that end in .onion, preceded by 16 alphanumeric characters. You can find directories of these hidden sites with categories resembling the good old days of Yahoo. There's even a Tor Links Directory page (on the regular Web) that's a directory of these directories. There are many chat and message boards, but you even find directories of things like lossless audio files, video game hacks, and financial services such as anonymous bitcoin, and even a Tor version of Facebook. Many onion sites are very slow or completely downkeep in mind that they're not run by deep-pocketed Web companies. Very often we clicked an onion link only to be greeted with an "Unable to Connect" error. Sinbad helpfully displays a red "Offline on last crawl" bullet to let you know that a site is probably nonfunctional.

As for browser benchmarks, the results hew to Firefox's own performance, with near-leading performance on all the major JavaScript tests, JetStream and Octane, for example. Onourtest laptop, the Tor Browser scored 20,195 on Octane, compared with 22,297 for standard Firefoxnot a huge difference. The Tor network routing is a far more significant factor in browsing performance than browser JavaScript speed. That is, unless you've blocked all JavaScript.

Keep in mind, though, that the Tor Browser is based on the Firefox Extended Support Release versions, which updates less frequently so that large organizations have time to maintain their custom code. That means you don't get quite the latest in Firefox performance and features, but security updates are delivered at the same time as new main versions.

There's a similar story when it comes to standards compatibility: On the HTML5Test.com site, which quantifies the number of new Web standards supported by a browser, the Tor Browser gets a score of 412, compared with 468 for the latest Firefox version. You may run into incompatible sites, though. For example, none of the Internet speed connection test sites performed correctly in the Tor Browser.

Of course, you pay a price of extra setup and slower performance with the Tor Browser, but it's less onerous than you may think. And the included support for fine-grain privacy and security protection is excellent. If you take your online privacy seriously, you owe it to yourself to check out the Tor Browser. For standard, full-speed Web browsing, however, check out PCMag Editors' Choice Web browser, Firefox.

Read more:
The Tor Browser: Tor Browser - uk.pcmag.com

Posted in Tor Browser | Comments Off on The Tor Browser: Tor Browser – uk.pcmag.com

Tor Browser Latest (3.6.1) – Home

Posted: at 7:43 pm

Tor Browser

Inception

Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others. Overview

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected. Why we need Tor

Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.

How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.

A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.

But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers. The solution: a distributed, anonymous network How Tor works

Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.

To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.

Tor circuit step two

Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.

For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.

Tor circuit step three Hidden services

Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Learn more about configuring hidden services and how the hidden service protocol works. Staying anonymous

Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use the Tor Browser Bundle while browsing the web to withhold some information about your computer's configuration.

Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit. The future of Tor

Providing a usable anonymizing network on the Internet today is an ongoing challenge. We want software that meets users' needs. We also want to keep the network up and running in a way that handles as many users as possible. Security and usability don't have to be at odds: As Tor's usability increases, it will attract more users, which will increase the possible sources and destinations of each communication, thus increasing security for everyone. We're making progress, but we need your help. Please consider running a relay or volunteering as a developer.

Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands. Tor: Overview Topics

Inception Overview Why we need Tor The Solution Hidden services Staying anonymous The future of Tor

Inception

Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others. Overview

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected. Why we need Tor

Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.

How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.

A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.

But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers. The solution: a distributed, anonymous network How Tor works

Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.

To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.

Tor circuit step two

Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.

For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.

Tor circuit step three Hidden services

Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Learn more about configuring hidden services and how the hidden service protocol works. Staying anonymous

Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use the Tor Browser Bundle while browsing the web to withhold some information about your computer's configuration.

Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit. The future of Tor

Providing a usable anonymizing network on the Internet today is an ongoing challenge. We want software that meets users' needs. We also want to keep the network up and running in a way that handles as many users as possible. Security and usability don't have to be at odds: As Tor's usability increases, it will attract more users, which will increase the possible sources and destinations of each communication, thus increasing security for everyone. We're making progress, but we need your help. Please consider running a relay or volunteering as a developer.

Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands.

More:
Tor Browser Latest (3.6.1) - Home

Posted in Tor Browser | Comments Off on Tor Browser Latest (3.6.1) – Home

Bitcoin and Cryptocurrency Technologies – Princeton …

Posted: January 26, 2016 at 11:43 pm

About the Course

To really understand what is special about Bitcoin, we need to understand how it works at a technical level. Well address the important questions about Bitcoin, such as:

How does Bitcoin work? What makes Bitcoin different? How secure are your Bitcoins? How anonymous are Bitcoin users? What determines the price of Bitcoins? Can cryptocurrencies be regulated? What might the future hold?

After this course, youll know everything you need to be able to separate fact from fiction when reading claims about Bitcoin and other cryptocurrencies. Youll have the conceptual foundations you need to engineer secure software that interacts with the Bitcoin network. And youll be able to integrate ideas from Bitcoin in your own projects.

Course Lecturers: Arvind Narayanan, Princeton University Joseph Bonneau, Princeton University Edward Felten, Princeton University Andrew Miller, University of Maryland

The class will consist of lecture videos broken up into 5-7 segments, each 10-15 minutes in length. Each segment contains 1 or 2 integrated quiz questions.

There will also be standalone homeworks that are not part of video lectures.

See the original post here:
Bitcoin and Cryptocurrency Technologies - Princeton ...

Posted in Cryptocurrency | Comments Off on Bitcoin and Cryptocurrency Technologies – Princeton …

Eczema | Define Eczema at Dictionary.com

Posted: at 9:43 pm

Historical Examples

Unlike mange, eczema is not caused by the intrusion of an insect parasite.

Others say that she has eczema and dare not show her face, while others say she is mad.

When eczema is once inaugurated, excoriation is to be expected.

eczema may be due to constitutional or local causes, or to both.

Useful in eczema and diseases of the integument where cell destruction is a prominent factor.

What is to be said about the use of soap and water in eczema?

Unless business worries can be removed or family anxieties allayed the cure of eczema becomes a difficult matter.

Sulphur has been used with benefit in eczema, Impetigo, and Lepra.

When the eczema is not the result of an external irritant, it takes usually from one to two weeks to heal.

In eczema, and some other cutaneous affections, to allay irritation, &c.

British Dictionary definitions for eczema Expand

/ksm; zim/

(pathol) a skin inflammation with lesions that scale, crust, or ooze a serous fluid, often accompanied by intense itching or burning

Derived Forms

eczematous (ksmts) adjective

Word Origin

C18: from New Latin, from Greek ekzema, from ek- out + zein to boil; see yeast

Word Origin and History for eczema Expand

1753, from Greek ekzema, literally "something thrown out by heat," from ekzein "to boil out," from ek "out" (see ex-) + zema "boiling," from zein "to boil," from PIE root *yes- "to boil, foam, bubble" (see yeast). Said to have been the name given by ancient physicians to "any fiery pustule on the skin."

eczema in Medicine Expand

eczema eczema (k's-m, g'z-, g-z'-) n. An acute or chronic noncontagious inflammation of the skin, characterized chiefly by redness, itching, and the outbreak of lesions that may discharge serous matter and become encrusted and scaly.

eczema in Science Expand

Continued here:
Eczema | Define Eczema at Dictionary.com

Posted in Eczema | Comments Off on Eczema | Define Eczema at Dictionary.com

Eczema | Buzzle.com

Posted: at 9:43 pm

Do you or one of your near and dear ones suffer from redness and dryness of the skin, irritation and pain? It could be eczema. Read on to know about its nature, symptoms, treatment and cures.

Dyshidrotic Eczema Treatment

Dyshidrotic is a form of eczema that affects the hands and the feet. This form of dermatitis is characterized by development of small blisters. While medication and other treatment options can help in alleviating the symptoms,...

Apple Cider Vinegar for Eczema

Using apple cider vinegar for eczema is very popular. In this article, you'll learn how you too can benefit from this wonderful gift of Mother Nature.

Eczema Treatment

Many people are searching for effective eczema treatments that will help reduce the redness and itching. If you too are searching for some remedies for treating eczema, then read on.

Psoriasis vs Eczema

This article discusses the basic characteristics of psoriasis versus eczema. The important symptoms, common causes, and treatment options for both the conditions have been described in the following.

Eczema Around the Eyes

Experiencing eczema around the eyes is a common problem that usually affects those who have a weak immune system. Here's a look into the causes of and treatment for this condition.

Scalp Eczema

One of the most common forms of eczema is scalp eczema. It affects individuals of all age groups. Read on to know more about this skin problem, its symptoms, causes and treatment.

Tips for Moisturizing Eczema-Prone Skin

It can be very distressing if you cannot wear the clothes of your choice due to a skin condition that has been bothering you. You may feel embarrassed and self-conscious about appearing in public. You may even have been bullied or...

Ease Eczema with Baking Soda Treatment

Baking soda has been used for medicinal purposes since ancient times. Its use provides great relief in certain skin conditions. Through this article, we will learn how to ease eczema with baking soda treatment.

Which Foods Cause Eczema - Foods to Avoid with Eczema

Recent researches have revealed that several food items trigger the symptoms of eczema. Even many patients show improvements in the skin condition after making dietary changes and adopting personal care tips.

Effective Bleach Bath Treatment for Eczema

Many parents are quite apprehensive about bleach bath treatment for eczema as small children have a delicate skin. This article will help you to understand the beneficial effects of bleach bath.

Avocado Oil for Eczema

Read this article to know the benefits of avocado oil for eczema and other skin related issues. Know all about the healing properties of avocado oil and how these natural properties help cure eczema.

How to Treat Atopic Eczema

Atopic eczema is a skin condition that leads to chronic skin inflammation. To know more about how to treat atopic eczema, read this article.

Stress Induced Eczema

Stress and skin health does not go well together and eczema is one of its manifestations. Too much stress on a daily basis predisposes a person to eczema.

Is Dyshidrotic Eczema Contagious?

Is dyshidrotic eczema contagious? To get answer for this query, read on.

How to Use Manuka Honey for Eczema

Few scientists believe that the healing properties of manuka honey can treat eczema. In the following article, we will be discussing how to use manuka honey for eczema. Take a look...

Asthma and Eczema

Recent studies showed that the onset of adult asthma is connected to childhood eczema. People with a history of childhood eczema have a higher chances of getting adult asthma.

Calamine Lotion for Eczema

Applying calamine lotion is considered as a reliable approach for getting relief from itchy eczema. But, how to use calamine lotion for eczema? Is this skin formulation safe for babies? To get your answers to these queries, scroll...

Homemade Lotion for Eczema

The treatment for eczema revolves around controlling the symptoms of the skin condition. The homemade lotion for eczema often proves to be of immense help in reducing inflammation and relieving itching sensation.

Emu Oil for Eczema

Emu oil is gaining a lot of popularity as a natural treatment option for eczema. To get more information on this eczema cure, you must read this article.

Ear Eczema

Ear eczema is a fairly common skin infection. What is surprising is that, even though there are many people who have been suffering from this condition for years, there is yet no definite cure.

Shampoo for Scalp Eczema

There are a number of medicated shampoos that are known to be effective in curing scalp eczema much effectively. If you are suffering from this scalp skin condition, then here are the details of a few good shampoos which you can...

Diet Triggers for Eczema

Dairy products, seafood, and gluten rich foods are regarded as diet triggers for eczema.

Scalp Eczema Treatment

Eczema is a common skin condition of which scalp eczema is most common. Treating eczema of the scalp normally consists of both home remedies and different scalp eczema treating products.

Best Natural Remedies for Eczema

This article on best natural remedies for eczema will help you understand the long term benefits of following natural methods. In this article we will also see some information on what causes eczema in the body, along with some...

Alternative Treatments for Eczema

There are very few side effects associated with the alternative or natural treatments for eczema. Presented in this article are natural methods to treat eczema.

Common Eczema Triggers

In the article written below, you will read about the common triggers of eczema which may start an allergic reaction. Read on and learn more about these causes.

How to Get Rid of Eczema on Arms

Eczema on any part of the body may be irritating and painful. You can use simple home remedies to overcome this skin condition. Read this article to get rid of eczema from different parts of the body naturally and completely.

How to Get Rid of Eczema on the Face

Wanting to get rid of facial eczema? We tell you how to get rid of eczema on the face faster than any other method you've tried out so far. Take a look at what this article has to say.

How to Get Rid of Eczema Scars

Learn some home remedies for how to get rid of eczema scars fast, and reduce the use of chemical-based treatment creams. The effectual tips for getting rid of eczema scars are focused on using scar healing agents and reducing skin...

How to Get Rid of Eczema Fast

Tips for getting rid of eczema quickly include avoiding triggers, using skin moisturizer, applying essential oils and following proper skin care regime amongst others. Go through this article to know more.

How to Cure Eczema

How to cure eczema? If you are stuck with this question then read on the article to get details about its natural as well as medical treatments.

Pompholyx Treatment

The treatment for pompholyx may vary with the severity of the condition. Here is a brief overview about the treatment for this skin disorder.

Eczema Herpeticum Symptoms

Eczema herpeticum is a complication of eczema. This write-up provides information on the contributing factors and symptoms of this condition.

Causes of Eczema in Children

Also known by the term 'atopic dermatitis', eczema is more prevalent in infants and children. This article discusses the possible causes of eczema in children.

Over-the-Counter Eczema Treatment

Eczema can be treated with over-the-counter medication as well as natural remedies. This article will give you detailed information on the same.

Eczema Herpeticum

Eczema herpeticum is a serious skin infection caused by the herpes simplex virus. This Buzzle article will give you a brief information about this potentially fatal infection.

Home Remedies for Eczema in Children

Home remedies for eczema involves the use of some naturally occurring substances to get rid of this problem. This article will enhance your knowledge about a few such natural remedies for eczema in children.

Eczema in Toddlers

Eczema in toddlers is quite a common incidence, which usually starts before their first birthday. The effective way to treat eczema in them is to identify the causes and avoid them. Read on to know more.

Hand Eczema Treatment

Hand eczema can be treated effectively by using the right products and following certain home care measures. Read on to know about the treatment for this condition...

Nummular Eczema Symptoms

Coin-shaped patches on the skin is one of the most characteristic signs of nummular eczema. This write-up provides information on the symptoms of this skin condition.

Best Soap for Eczema

Using a good soap is essential for a quick recovery from eczema. What are the things that you need to consider while choosing the soap? Find it out in the ensuing Buzzle article.

Creams for Eczema

When it comes to using topical products for eczema, corticosteroid creams are the first choice. Scroll down to know more about creams that are effective to treat this skin condition.

Eczema Diet

The eczema diet plan is focused on avoiding food that triggers the onset of inflammatory skin symptoms. Taking a note of the allergic food items and refraining from them are the thumb rules for eczema diet therapy.

Nummular Eczema Treatment

Nummular eczema is characterized by coin-shaped, itchy patches on the skin. This article provides a brief overview about this skin condition.

Borage Oil for Eczema

Borage oil is very beneficial to get rid of many skin disorders. If you are planning to use borage oil for eczema treatment, then you will find this Buzzle article very useful. It presents some important information on the same.

Eczema on Feet

Eczema, which is characterized by inflammation of the skin, could affect parts of the body such as the face, torso, arms, or feet. This write-up provides treatment options and remedies that can be followed in case this condition...

Eczema Relief

Eczema is a chronic skin condition that affects infants and children. This article provides information about effective home remedies and self-care measures that can help alleviate the symptoms of this skin condition.

Eczema on the Lips

Eczema, a skin inflammatory process, is observed to occur on the lips apart from other body parts. Read this Buzzle article to learn about the symptoms, causes, and natural as well as medical treatments for eczema on the lips.

Eczema in Infants

Eczema can affect children as well, and when it does, it can become extremely uncomfortable for the infant, and extremely frustrating for the parents. Luckily, there are a few simple remedies that can help to treat this condition,...

Hydrocortisone for Eczema

Continue reading here:
Eczema | Buzzle.com

Posted in Eczema | Comments Off on Eczema | Buzzle.com

NATO Vikipedija

Posted: at 8:44 am

Straipsnis i Vikipedijos, laisvosios enciklopedijos.

iaurs Atlanto Sutarties Organizacija (angl. NATO North Atlantic Treaty Organization; pranc. Organisation du trait de l'Atlantique Nord - OTAN) tarptautin sjunga, kurta 1949 metais.

Organizacij 1949m. kr 12 ali:

Vliau prisijung kitos 16 ali:

iuo metu prisijungti prie NATO siekia Makedonija.

1989m. Europoje prasidjo fundamentals politiniai pasikeitimai, kuri dka baigsi karinis ir ideologinis Europos padalijimas ir iiro Varuvos paktas. Soviet Sjungos lugimas 1991m. prats proces. Paymtos ir kitos po 1989m. vestos svarbios naujovs. Tai naujos strategijos koncepcijos primimas Romos aukiausio lygio susitikime 1991m., iaugs bendradarbiavimas ir koordinacija su kitomis tarptautinmis institucijomis. Koncepcija numat mainti priklausomum nuo branduolinio ginklo.

Nuo 1990m. birelio mn. vykusio Londone aukiausio lygio Aljanso susitikimo prasidjo esmin NATO transformacija. Jos tikslas sukurti atskiras, bet ne atskirtas karines pajgas, kuriomis galt pasinaudoti tiek NATO tiek VES. Pasikeitus padiai 1993m. NATO valstybi taikos metu esanios pajgos, palyginti su 1990m., sumajo . NATO dispozicijai priklausanias pajgas galima suskirstyti 3 kategorijas: neatidliotinos ir greito reagavimo pajgos, pagrindins gynybos pajgos ir neiskleistos (rezervins) pajgos.

NATO struktroms ilaikyti yra sukurtas bendras civilinis ir karinis fondas. J sudaro valstybs, besiremianios ilaid pasidalijimo principu. NATO finansiniai itekliai skiriami du atskirus t. y. karin ir civilin biudetus. Sprsti finansiniams itekli sunkumams buvo kurta Vyriausioji itekli taryba (SRB).

Detalesn veiksm chronologija:

Vikiteka

More here:
NATO Vikipedija

Posted in NATO | Comments Off on NATO Vikipedija

Internet Censorship Debate | Debate.org

Posted: January 25, 2016 at 12:41 am

Internet Censorship Debate

Censorship refers to any action taken by a society to control access to ideas and information. Throughout history, many different types of societies, including democracies, have used censorship in various ways. The issue is increasingly important due to the rapid development of new communication technology. As innovators continue to create new ways for people to share information, many people are now arguing over the issue of censorship.

For the proponents of censorship, restricting the access of information is something that can provide benefits to society. By censoring pornography on the internet, children are less likely to encounter it. By censoring certain types of images and videos, society can prevent offensive or vulgar material from offending those that it targets. For example, some would argue that society should censor material that is insulting to a particular religion in order to maintain societal harmony. In this way, censorship is viewed as a way to protect society as a whole or certain segments of society from material that is seen as offensive or damaging.

Some argue that censorship is necessary to preserve national security. Without using any kind of censorship, they argue that it is impossible to maintain the secrecy of information necessary for protecting the nation. For this purpose, censorship protects a state's military or security secrets from its enemies who can use that information against the state.

Those who are against censorship argue that the practice limits the freedoms of speech, the press and expression and that these limitations are ultimately a detriment to society. By preventing free access to information, it is argued that society is fostering ignorance in its citizens. Through this ignorance, citizens are more easily controlled by special interest groups, and groups that are able to take power are able to use censorship to maintain themselves. Additionally, they argue that censorship limits a society's ability to advance in its understanding of the world.

Another main issue for those who are against censorship is a history of censorship abuse. Those who argue against censorship can point to a number of examples of dictators who used censorship to create flattering yet untrue images of themselves for the purpose of maintaining control over a society. They argue that people should control the government instead of the government controlling its people.

See more here:
Internet Censorship Debate | Debate.org

Posted in Censorship | Comments Off on Internet Censorship Debate | Debate.org

Transhuman Singularity – webmac.com

Posted: at 12:40 am

A list of links to my science fiction short stories:

I am a Hummingbird After my body died the surgeons put me in a hummingbird. It took a while to get use to having my perspective darting around so quickly, but my mind had finally adapted to it.

Sneeze! A few days Mr. Anderson. Don't worry, it's a positive virus, I'm origin zero. Then you'll be one of us, welcome to the new global hivemind, we-I always choose well. It will be unlike anything you have ever experienced or imagined. Expect a mental call, anything will be possible, said Kay, a future echo ... Kay Noble replied, then collected the documents, velvet and all, and left the room without a further word.

Muffy the Time Traveling Chihuahua Muffy was a loyal pack dog on the locally collapsed time-day of his death, which varied in fractal quantum probability across a multitude of bifurcated futures or space-time universes.

Lunch 2032 Her IQ was probably skyrocket norm. It seems the gene engineers had given her both great brains and beauty. She wanted to be a Terraforming Research Scientist, but on Earth she would have to settle for other work. Her parents had lost most of their money in a wild Marsearth start-up investment, so she had to work her way through the university, no one would give a genmod scholarship. It was just plain and simple prejudice.

Virtuality Zane Pax hid behind a large bolder as the black alien warship flew overhead. NaHan had swarmed the cities of the world laying waste to human civilization. Humanity was on the endangered species list, on our way out for good.

The Alien Time-Traveler Historian Mathew answers, Variations of me exist in most all future branches. Thats really rare, and thats why Im allowed to speak to you. To help you understand. You see, those that are still basically human in the future have great compassion. They want to help reduce the suffering. Im here on their behalf to try and influence things.

The Galactic Culture Finally, in order to survive the approaching technological singularity and remove their aggressive and self-destructive evolved behaviors, pre-type 1 species sometimes begin an extensive program of self-initiated genetic re-engineering and intelligence amplification (usually proceeded by development of a global computing system -Internet). Sometimes this is successful, other times not.

Lunar CityOutward space exploration and expansion grew at a rapid pace, due to the privatization of all space exploration and its subsequent exploitation. Corporations headed by forward thinking executives now controlled access to space. Spaceports have sprouted up all over the world, giving average citizens access to affordable space travel. Now space stations, moon bases and asteroid factories, which provided most of the raw materials, have become independent space communities. Distant science outposts have been constructed on the outer planets and moons. The solar system has become the playground of humanity.

VR Prototype Jason Chen bent over in his subway seat to pick up a rarely seen plastic penny he spotted face-up on the train floor. A penny existed today only to make exact change for those who still stubbornly used physical money. He didnt understand why, but somehow its continued existence was comforting for some. Angling the lucky coin in his fingers to see the three-dimensional head of Abraham Lincoln, he noted the year on the coin was 2053, the year of his birth.

Dr. Xanoplatu Dr. Xanoplatu, an alien anthropologist, historian, and time traveler, materialized on stage wearing the body of his ancestors, a giant green Praying Mantis with large yellow eyes and small black pupils. He was speaking at a galactic cultural lecture, inside a de-localized spherical space station, somewhere and some when in a multi-versed space-time reality.

Virtuality Mind Marcus replies, Yes, you can assume Im crazy. But, Im just communicating to you through this mans body. For a short period of time, I can do this, without his knowing it. When I leave and his consciousness re-awakens, this memory will seem like a daydream to him.

Resurrection Birth Jason awoke to a static humming sound.It was so annoying, grating on his nerves more than a badly tuned alarm clock.He lifted his heavy eyelids to blinding light, and out of focus images.His vision slowly cleared and he realized he was inside a plastic coffin thing.

Read the original:
Transhuman Singularity - webmac.com

Posted in Transhuman | Comments Off on Transhuman Singularity – webmac.com

Singularity (operating system) – Wikipedia, the free …

Posted: January 23, 2016 at 1:47 pm

Singularity was an experimental operating system built by Microsoft Research between 2003 and 2010.[1] It was designed as a highly-dependable OS in which the kernel, device drivers, and applications were all written in managed code.

The lowest-level x86 interrupt dispatch code is written in assembly language and C. Once this code has done its job, it invokes the kernel, whose runtime and garbage collector are written in Sing# (an extended version of Spec#, itself an extension of C#) and runs in unprotected mode. The hardware abstraction layer is written in C++ and runs in protected mode. There is also some C code to handle debugging. The computer's BIOS is invoked during the 16-bit real mode bootstrap stage; once in 32-bit mode, Singularity never invokes the BIOS again, but invokes device drivers written in Sing#. During installation, Common Intermediate Language (CIL) opcodes are compiled into x86 opcodes using the Bartok compiler.

Singularity is a microkernel operating system. Unlike most historical microkernels, its components execute in the same address space (process), which contains "software-isolated processes" (SIPs). Each SIP has its own data and code layout, and is independent from other SIPs. These SIPs behave like normal processes, but avoid the cost of task-switches.

Protection in this system is provided by a set of rules called invariants that are verified by static analysis. For example, in the memory-invariant states there must be no cross-references (or memory pointers) between two SIPs; communication between SIPs occurs via higher-order communication channels managed by the operating system. Invariants are checked during installation of the application. (In Singularity, installation is managed by the operating system.)

Most of the invariants rely on the use of safer memory-managed languages, such as Sing#, which have a garbage collector, allow no arbitrary pointers, and allow code to be verified to meet a certain policy.

Singularity 1.0 was completed in 2007. A Singularity Research Development Kit (RDK) has been released under a Shared Source license that permits academic non-commercial use and is available from CodePlex. Version 1.1 was released in March 2007 and version 2.0 was released on November 14, 2008.

The rest is here:
Singularity (operating system) - Wikipedia, the free ...

Posted in The Singularity | Comments Off on Singularity (operating system) – Wikipedia, the free …