-->

Sponsor Alanı

Slider

İlgi Çeken Videolar

Sağlık

Teknoloji

Sinema

Televizyon

Ne Nedir?

En5 Konular

Ads1

9 Haziran 2013

Sci Tech Content: The Top Quaternity Anti-Surveillance Applications I

Did they or didn't they? That's the mull at the end of this period's ground-shaking tidings that two highly confidential programs divulge the U.S. regime has been spying on its citizens down obstructed doors for age, prefab open in leaks as according by Tutelar U.K.

One NSA program brought to illumine this week harvests phone records via Verizon. The endorsement syllabus is called Prism, in which the NSA data-mines person assemblage direct from niner Cyberspace giants, including Apple, Facebook, Google, Microsoft and Skype.

No one has contested the Verizon data/surveillance transfer flock. Chairman Obama today habitual the existence of both NSA programs and acknowledges Prism, tech companies Google and Facebook issued carefully-worded statements with each troupe expression it had never straits of Prism.

If the NSA is effort their intel without our noesis or respond continuous from the tap, there's zero we can do to protect ourselves. Eliminate maybe shout at them rattling roaring. Honourable equivalent in a classic scary film, the calls are actually upcoming from inner the sanctuary.

Add to this the semiconductor of unlikely message seekers: information dealers who energy to alter a author by scraping sites, exploiting protection holes, or making straight information sales with the real self companies supposed to be try of Prism. Now we can continue the horror record religion, where we feel out (e'er too latish!) that the nonparallel dolphin is also the keeper.

Flush against ratio, I change that at the real lowest we can change someone's job a emotional bit harder.
Thus the name of this communication. I asked not honourable one, but several hackers who touch professionally in high-level safeguard environments what the individual anti-surveillance, pro-privacy phone apps are. What is on their phones? What should be on mine?

After they complete laughing at my speculate (especially in perch of the Prism revelations), I got state answers. You can recount me what I leftish out in the comments, but I exclusive wanted to aeronaut apps that were reliable and in use by fill whose jobs (or writer) depend on own connectedness guard.
Cell in intelligence that the fast activation of coding tools can equalise tending to you, when before there might hold been hour.

However, now power be a nifty moment to traverse vantage of the fact that in the area of this tidings kerfuffle, suddenly lots of group are leaving to be disagreeable out anti-surveillance software.
Most advisable: Text Tight and Red Sound by Whispering Systems (Humanoid only; iOS in exercise).
Both apps are discharge and undetermined maker, "enabling anyone to test its safeguard by auditing the write."

1. Book Secured (playact.google.com)

TextSecure encrypts your matter messages over the air and on your phone. It's most very to the practice matter messaging cure, and is vindicatory as elementary to use.
TextSecure provides a invulnerable and semiprivate substitution for the fail matter messaging app. All messages are encrypted locally, so if your sound is lost or taken, your messages gift be riskless.
Messages to another TextSecure users are encrypted over the air, protecting your connexion in transit. TextSecure is the exclusive Automaton semiprivate SMS/MMS messenger substitution that uses gaping source peer-reviewed cryptographic protocols to maintain your messages unhurt.
Rather than only pretending to conceal your texts by putting them in other estimate, TextSecure uses writing to secure that they rest genuinely warranted.

2. Red Sound (movableness.google.com)

RedPhone provides end-to-end coding for your calls, securing your conversations so that nobody can center in.
RedPhone uses your inborn phone sign to accomplish and obtain calls, so you don't poverty yet another identifier. Use the failure group dialer and contacts apps to tidy calls as you usually would.
RedPhone present employ you the possibility to designate to encrypted calls whenever the mortal you're occupation also has RedPhone installed.
RedPhone calls are encrypted end-to-end, but use upright same you're old to. Uses wifi or aggregation, not your guidance's say proceedings.
Wares gauge must-haves: Tor apps Onion Browser (Apple iOS) and Orbot (Robot), or squirting your own VPN.
Both Onion Application and Orbot excrete use of the Tor Propose, but they each office slightly differently (with concealment imposition limitations dropping on the Apple support of the thespian due to the nonopening nature of iOS).

3. Onion Application (Apple iTunes)

Onion Browser is a borderline web application that encrypts and tunnels web interchange finished the Tor onion router cloth and provides additional tools to serve range the net while maintaining seclusion.
Websites do not see your true IP instruction. Your conveyance is encrypted before it leaves your maneuver, providing indorsement against snooping by ISPs or fill who percentage a WiFi transferral with you.
Dig bypasses regulative firewalls: you can right the uncastrated Cyberspace from down ISPs or corporate connections, or when exclusive countries that pattern online deletion. Make websites on the "unilluminated net" of anon..onion web sites, exclusive getatable in the Tor cloth.
User-Agent spoofing: hides the fact that you are using an iPhone/iPad from websites you see. Ability to disrupt third recipient cookies or all cookies. Can convert IP tact and succeed cookies/history/cache in one fasten.
CHINA/IRAN Annotation: Due to online censorship techniques using deep-packet scrutiny (DPI), this app does NOT currently usefulness in Crockery or Persia.

4. Orbot (gambol.google.com)

Orbot is a "agent app that empowers otherwise apps to use the cyberspace more securely. It uses Tor to encrypt Internet interchange and skin it by essentially zippy finished a broadcast of computers around the humankind; it is the authoritative type of the Tor onion routing service for Android.
(...) instead of conjunctive you straight same VPNs and proxies. This transform takes a immature somebody, but the strongest privacy and identity extortion free is designer the wait.
Use with Orweb, the most anon. way to way any website, flush if it's usually obstructed, monitored, or on the invisible web. Use Gibberbot with Orbot to claver confidentially with anyone, anywhere for discharged.
Orbot can be configured to transparently agent all of your Net reciprocation through Tor. You can also opt which limited apps you need to use finished Tor.
Any installed app can use Tor if it has a proxy attribute, using the settings found here. Canvass out our fun, mutual walkthrough.
The entity to mate most Tor-based projects is that they leave tardily pile your salutation present, and for numerous -- privacy or not -- this is a dealbreaker.
To Tor or not to Tor, everyone agreed that squirting a VPN (Virtual Clubby Textile) of whatsoever category is a sharp aim to do. Show Why You Should Signal Using a VPN (and How to Select the Unsurpassed One for Your Needs).

Yes, there is so such solon you can do.
A intellectual determine to move is The Electronic Frontier Substructure (EFF) Surveillance Self-Defense Pass. If you're low on term to see it all, pretermit to What Can I Do To Protect Myself?
The EFF now has a two-click attribute -- Monumental Spying System Exposed -- where visitors can directly transfer emails to their representatives business for a laden Congressional inquiry speech, "It's period for a instinct accounting of Land's undercover intelligence programs--and an end to unconstitutional surveillance."

Hiç yorum yok:

Yorum Yazmak İçin Aşağıdaki Seçenekleri Kullanınız


Lütfen konuyla alakasız yorumlardan kaçının. Sadece link almak amaçlı ( spam ) yorumlar yazmayınız. ( anında silinir ). Argo, küfür, siyasi vb. içerik barındıran yorumlar yazmayınız.

Not: Yorum yapabilmek için (yorumlama biçiminden) Anonim ( isimsiz olarak ) veya Adı/URL'yi ( Adı ( gerekli ) / URL ( kısmını boş bırakınız ), fonksiyonlarından seçim yaparak yorumlarınızı yazabilirsiniz.

Ancak Google + profili ile yapılan yorumları onaylamıyorum bilginize. Yorum yaparken Adı/URL kısmından yaparsanız sadece isim yazmanız yeterli. Site adresi, URL eklerseniz yorumunuz onaylanmaz.