796 shaares
41 results
tagged
Privacy
A text encryption tool, based on AES cryptography
How it works:
Mark needs to send personal text to Sarah, and wants that only Sarah can read it.
Mark writes here in Input field the text.
A password is automatically created. Or Mark and Sarah can estabilish a password for every communications over a secure channel (by voice, for example).
Mark can send the encrypted field OR the sharing url field over an insecure channel (for example a chat, mail, Skype, Facebook etc) where Sarah can read it.
Sarah opens the sharing url (or opens this page and pastes the encrypted text), enters the password and can read the original message in the decrypted field.
Note:MyWhisper.net and NOBODY in the network can technically see neither the original text nor the password, and not even the encrypted text if sharing url version isn't used, because all stuffs are only in Mark and Sarah browsers and all encryption/decryption is performed by their browsers with javascript. Therefore HTTPS/SSL access is useless.
How it works:
Mark needs to send personal text to Sarah, and wants that only Sarah can read it.
Mark writes here in Input field the text.
A password is automatically created. Or Mark and Sarah can estabilish a password for every communications over a secure channel (by voice, for example).
Mark can send the encrypted field OR the sharing url field over an insecure channel (for example a chat, mail, Skype, Facebook etc) where Sarah can read it.
Sarah opens the sharing url (or opens this page and pastes the encrypted text), enters the password and can read the original message in the decrypted field.
Note:MyWhisper.net and NOBODY in the network can technically see neither the original text nor the password, and not even the encrypted text if sharing url version isn't used, because all stuffs are only in Mark and Sarah browsers and all encryption/decryption is performed by their browsers with javascript. Therefore HTTPS/SSL access is useless.
Archive your tweets to easily browse and search them - all on your own website and in your control. See an example installation on my website: http://tweet.xoofoo.org
Refusez PRISM, le programme de surveillance globale des données de la NSA. Arrêtez de déclarer vos activités en ligne au gouvernement américain avec ces alternatives libres aux logiciels propriétaires.
DeepSound is a steganography tool that hides secret data into audio files - wave and flac. The application also enables you to extract secret files directly from wav, flac, wma lossless or audio CD tracks. DeepSound might be used as copyright marking software for wave, flac, wma and audio CD. DeepSound also support encrypting secret files using AES-256(Advanced Encryption Standard) to improve data protection.
Your data, your rules.
Securely self-hosting your websites, email, files and more has never been easier (or cheaper!). Decentralize your web and reclaim your privacy rights while keeping the conveniences you need.
Securely self-hosting your websites, email, files and more has never been easier (or cheaper!). Decentralize your web and reclaim your privacy rights while keeping the conveniences you need.
A modern, fast web-mail client with user-friendly encryption and privacy features. 100% Free and Open Source software
100% Private Online Backup, Sync & Sharing
Instantly retrieve files from any device, anywhere.
Instantly retrieve files from any device, anywhere.
Need some privacy?
Secure your communication with our mobile applications. It's that simple.
Secure your communication with our mobile applications. It's that simple.
Le 7 Mai dernier, le trafic internet en Syrie a disparu pendant près de 24h...Huit jours plus tard, rebelote. A l'autre bout du Monde, un groupe d'activistes connectés tente à distance de désenclaver le pays, mais aussi de permettre la communication à l'intérieur, son nom Telecomix.
Daiyuu Nobori va peut-être au travers de ces travaux à l'université de Tsukuba au Japon, révolutionner l'Internet sans censure. C'est même pour cela qu'il a créé son projet, SoftEther, qu'il a lancé le 8 mars 2013 et qui fait suite à sa première idée lancée en 2010 sous le nom de UT-VPN. C'est aujourd'hui, un service de VPN entièrement gratuit que l'on peut qualifier de décentralisé, comme l'est par exemple TOR.
Son projet SoftEther signifiant Software Ethernet, est donc un service de VPN basé sur le partage des ressources serveurs selon la volonté de chacun. Un logiciel client et un logiciel pour les serveurs est mis à la disposition de tout le monde, gratuitement. Les volontaires installeront le client sur leurs serveurs afin de permettre aux utilisateurs du client sur leurs ordinateurs d'en profiter. Ces derniers pourront alors se connecter partout dans le monde de façon plus sécurisée et surtout contourner les censures mais on reste quand même dépendants des scripts potentiellement malveillants installés sur des serveurs par des "méchants".
Il ne s'agît bien sûr pas d'avoir un tunnel ultra-rapide, puisque les ressources d'un serveur seront partagées à plusieurs centaines, mais ce système se veut aussi être une alternative à TOR qui souffre un peu de lenteurs.
Son projet SoftEther signifiant Software Ethernet, est donc un service de VPN basé sur le partage des ressources serveurs selon la volonté de chacun. Un logiciel client et un logiciel pour les serveurs est mis à la disposition de tout le monde, gratuitement. Les volontaires installeront le client sur leurs serveurs afin de permettre aux utilisateurs du client sur leurs ordinateurs d'en profiter. Ces derniers pourront alors se connecter partout dans le monde de façon plus sécurisée et surtout contourner les censures mais on reste quand même dépendants des scripts potentiellement malveillants installés sur des serveurs par des "méchants".
Il ne s'agît bien sûr pas d'avoir un tunnel ultra-rapide, puisque les ressources d'un serveur seront partagées à plusieurs centaines, mais ce système se veut aussi être une alternative à TOR qui souffre un peu de lenteurs.
Openmeetings provides video conferencing, instant messaging, white board, collaborative document editing and other groupware tools using API functions of the Red5 Streaming Server for Remoting and Streaming.
OpenMeetings is a project of the Apache, the old project website at GoogleCode will receive no updates anymore. The website at Apache is the only place that receives updates.
OpenMeetings is a project of the Apache, the old project website at GoogleCode will receive no updates anymore. The website at Apache is the only place that receives updates.
How to install and configure all software necessary to host a VPN on an Ubuntu 12.04 VPS. Full tutorial with copy and paste commands available at http://geeksandtweaks.com/wp/?p=1908
Many activists have been tracked via their mobile phones, and some countries conduct surveillance more extensively than others. You need to assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your community have experienced.
Phone companies have the capability to track and collect information about your use of mobile phones, including your location, and may share that information with the government if so requested. There is also the possibility of installing surveillance software on a phone that runs in the background without the user noticing. There is a risk of this, if your handset has been physically out of your hands for a period of time.
Phone companies have the capability to track and collect information about your use of mobile phones, including your location, and may share that information with the government if so requested. There is also the possibility of installing surveillance software on a phone that runs in the background without the user noticing. There is a risk of this, if your handset has been physically out of your hands for a period of time.
Plus de 200 milliards d’emails sont envoyés dans le monde chaque jour. Si l’email est un moyen extrêmement pratique pour échanger des informations, c’est également un outil très vulnérable : interception, usurpation d’identité, surveillance de boîte mail etc., sont autant de problèmes auxquels peuvent être confrontés les utilisateurs de boîtes emails. Il existe pourtant des moyens simples d’assurer la confidentialité de vos échanges sur Internet.
Chercher son nom sur Google peut parfois être inquiétant : certains résultats ne permettent pas d’améliorer son identité numérique. On pense aux profils sur les médias sociaux, qui peuvent parfois nuire à votre e-réputation. Bien-sûr, l’indexation de ces profils peut aussi devenir un avantage. S’ils attestent de vos compétences et de votre sérieux, cela peut influencer un recruteur. Mais si vous souhaitez opter pour un usage plus personnel de certains réseaux, vous pouvez faire disparaître vos profils de Google et des autres moteurs de recherche.
Face à ces constats, la seule voie praticable semble être de devenir capables d’imaginer et de mettre en place des politiques de sécurité adéquates. Tout l’enjeu de ce guide est de fournir cartes, sextant et boussole à quiconque veut cheminer sur cette route.
Un guide à lire, relire, pratiquer, en solitaire ou à plusieurs, à faire découvrir et à partager… ou comment affiner l’art de la navigation dans les eaux troubles du monde numérique.
Un guide à lire, relire, pratiquer, en solitaire ou à plusieurs, à faire découvrir et à partager… ou comment affiner l’art de la navigation dans les eaux troubles du monde numérique.
Prevent spambots from getting your email, encode all the addresses you publish on your site!
Enter the address you want to encode, then put the code we provide in the source code where the address should appear and...VOILA!
Enter the address you want to encode, then put the code we provide in the source code where the address should appear and...VOILA!
Flash proxies are a new way of providing access to a censorship circumvention system such as Tor. A flash proxy is a miniature proxy that runs in a web browser. It checks for clients that need access, then conveys data between them and a Tor relay.
Tor has bridge relays, but in some cases even these can be blocked despite the fact that their addresses are handed out only a few at a time. The purpose of this project is to create many, generally ephemeral bridge IP addresses, with the goal of outpacing a censor's ability to block them. Rather than increasing the number of bridges at static addresses, we aim to make existing bridges reachable by a larger and changing pool of addresses.
"Flash proxy" is a name that should make you think "quick" and "short-lived." Our implementation uses standard web technologies: JavaScript and WebSocket.
If your browser runs JavaScript and has support for WebSockets then while you are viewing this page your browser is a potential proxy available to help censored Internet users.
Tor has bridge relays, but in some cases even these can be blocked despite the fact that their addresses are handed out only a few at a time. The purpose of this project is to create many, generally ephemeral bridge IP addresses, with the goal of outpacing a censor's ability to block them. Rather than increasing the number of bridges at static addresses, we aim to make existing bridges reachable by a larger and changing pool of addresses.
"Flash proxy" is a name that should make you think "quick" and "short-lived." Our implementation uses standard web technologies: JavaScript and WebSocket.
If your browser runs JavaScript and has support for WebSockets then while you are viewing this page your browser is a potential proxy available to help censored Internet users.
Privly makes it possible for you to control your data after posting it across the internet. You can post to Facebook without allowing Facebook access to your communications, you can even unsend emails. Privly works by extending browsers to look for specially formatted links, which are then "injected" into the pages you are viewing. Privly is a Foundation owned concept being made by and for all internet users. For more information about what Privly is, read our about page.
Crypto.is is an organization designed to assist and encourage anonymity and encryption research, development, and use. As part of this goal, we seek to revitalize the Cypherpunk movement and provide better software, security, and anonymity to individuals worldwide.