Practical Anonymity

Practical Anonymity

Hiding in Plain Sight Online

1st Edition - July 15, 2013

Write a review

  • Author: Pete Loshin
  • eBook ISBN: 9780124104426
  • Paperback ISBN: 9780124104044

Purchase options

Purchase options
DRM-free (Mobi, EPub, PDF)
Available
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. Practical Anonymity: Hiding in Plain Sight Online shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult because most of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple. The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers. Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing

Key Features

  • Simple, step-by-step instructions for configuring and using anonymous networking software
  • Use of open source, time-proven and peer-reviewed tools for anonymity
  • Plain-language discussion of actual threats, and concrete suggestions for appropriate responses
  • Easy to follow tips for safer computing

Table of Contents

  • Preface

    Acknowledgments

    Chapter 1. Anonymity and Censorship Circumvention

    1.1 What Is Anonymity

    1.2 What Is Tor

    1.3 Why Use Tor

    1.4 What Tor Can’t Do

    1.5 How Tor Works

    1.6 Who Uses Tor

    1.7 How Do I Use Tor

    1.8 Using Tor Safely

    Chapter 2. Using the Tor Browser Bundle

    2.1 What Is Bundled in the Tor Browser Bundle

    2.2 Using Tor Browser Bundle

    2.3 Settings

    2.4 Using Tor Browser

    2.5 When Tor Won’t Connect

    Chapter 3. Using Tails

    3.1 What Is in Tails

    3.2 Setting Up for Tails

    3.3 Using Tails

    Chapter 4. Tor Relays, Bridges, and Obfsproxy

    4.1 When Basic Tor Is Not Enough

    4.2 Bridge Relays

    4.3 Setting Up to Use a Bridge Relay

    4.4 Pluggable Transports and Obfsproxy

    Chapter 5. Sharing Tor Resources

    5.1 How (and Why) I Should Contribute Services

    5.2 What Are Your Options

    5.3 What Do You Risk

    5.4 Configuring as a Tor Relay

    5.5 Requirements and Consequences

    5.6 Nonexit Relay

    5.7 Exit Node

    5.8 Bridge Relay

    Chapter 6. Tor Hidden Services

    6.1 Why? Why People Want to Use Hidden Services

    6.2 How Tor Hidden Services Work

    6.3 How to Set Up a Tor Hidden Service

    Chapter 7. E-mail Security and Anonymity Practices

    7.1 One-Time (Throwaway) Accounts

    7.2 Anonymous Remailer Services

    7.3 Anonymous E-mail Through Tor

    7.4 Anonymous E-mail as a Tor Hidden Service

    7.5 Anonymity and Pseudonymity

    7.6 Tips for E-mailing Anonymously

    7.7 Step-by-Step: Setting Up Anonymous E-mail

    Appendix A. Validating Tor Software

    A.1 Validating Tor Software with Gnu Privacy Guard

    A.2 Validating Tails Distribution with GnuPG

    A.3 Which PGP Keys Sign Which Packages

    Appendix B. When Tor Downloads Are Blocked

    B.1 Tor Mirrors

    B.2 Tor Via E-mail

    B.3 Other Options

    Appendix C. Getting Help and Finding Answers

    C.1 Tor

    C.2 About the Tor Project

Product details

  • No. of pages: 128
  • Language: English
  • Copyright: © Syngress 2013
  • Published: July 15, 2013
  • Imprint: Syngress
  • eBook ISBN: 9780124104426
  • Paperback ISBN: 9780124104044

About the Author

Pete Loshin

Pete Loshin writes and consults about Internet protocols and open source network technologies. Formerly on staff at BYTE Magazine, Information Security Magazine and other publications, his work appears regularly in leading trade publications and websites including CPU, Computerworld, PC Magazine, EarthWeb, Internet.com, and CNN.

Pete Loshin, Independent Consultant

Affiliations and Expertise

Internet-Standard.com, Arlington, MA, USA

Ratings and Reviews

Write a review

Latest reviews

(Total rating for all reviews)

  • Martin B. Mon May 14 2018

    Practical Anonymity

    Excellent. I rely on the book for conducting IT audits on my company's users. Highly recommended.