A look into Corporate fraud in Australia, Stranglehold of Monopolies, Telecom's Oppression, Biased Law System, Corporate influence in politics, Industrial Relations disadvantaging workers, Outsourcing Australian Jobs, Offshore Banking, Petrochemical company domination, Invisibly Visible.
It's not what you see, it's what goes on behind the scenes. Australia, the warrantless colony.
Note: Site has more info in desktop mode or 'web version' as seen at bottom of page, when on smartphone.
COMMONWEALTH OF AUSTRALIA (ABN: 122 104 616)
Australia's Prime Minister (CEO) Tony Abbott : "Australia is Open for Business"
29 October 2013
How to remain anonymous online
The lengths to which you must go to remain anonymous online depend on
whether you're trying to hide your tracks from your partner or the
Pentagon.
Former US National Security Agency computer specialist Edward
Snowden lifted the lid on just how extensively the US government and
partners, such as Australia, are spying on us. You don't need to be a
suspected terrorist for the spooks to trawl through your phone, SMS,
browsing, email and chat records. Meanwhile, the US Patriot Act lets
them search your email and cloud back-ups in data centres on US soil, or
elsewhere if they are controlled by US companies.
(No secrets: Edward Snowden lifted the lid on US government snooping. Photo: WikiLeaks/AFP)
You should always assume that someone, somewhere, is
watching. Tricks for gaining a little privacy depend on whether you're
worried about hiding from members of your household, your internet
service provider (ISP) or the government.
Your web browser's ''private browsing'' mode deletes your history and
temporary files such as cookies, but it doesn't stop your broadband
modem or router logging the websites you visit. Your ISP can also see
where you've been, so government agencies can too.
A proxy server offers an extra level of privacy by sending
requests to websites on your behalf and sending back pages. The website
doesn't know who you are and your ISP doesn't know which site you're
visiting, making proxy servers a common way to bypass filtering.
The next level of security involves a virtual private network, or VPN, which can also bypass filtering.
VPNs encrypt all the internet traffic between your computer and the VPN provider. The encrypted link stops people snooping on your internet traffic when
you're using a public Wi-Fi hotspot. Your ISP can't even see what you're
doing, but it can tell you're using a VPN. There are many options
available online for both paid and free VPN and proxy server providers.
Unless you enable private browsing, your browser will still track your
web history when using a VPN or proxy server. These tricks offer a
certain level of anonymity but stubborn cookies, network metadata and
even your computer's ''fingerprint'' - the specific characteristics of
your machine and software - can still make it possible to identify you.
Using a VPN tricks websites into thinking you're located in
the same place as the VPN server, so connecting to a US-based VPN often
lets you bluff your way into US-only video services such as Hulu. It
might not be able to tell you're in Australia, but Hulu can see the web
address of the VPN server. It has been known to block traffic from
popular VPN servers in an effort to keep out foreigners.
VPNs might let you bend geo-blocking rules, but they're not a
foolproof way to avoid the long arm of the law. Government agencies can
demand records from VPN providers and ISPs to trace traffic back to
you, plus they might examine your computer's fingerprint. Fake email
addresses also only offer limited anonymity for the same reasons. The
authorities might go through Google, your VPN provider and your ISP to
track you down as the owner of anonymous@gmail.com.
The heavy-handed tactics of the US government have even seen
secure email services such as Lavabit and Silent Circle pull the plug
because they can't guarantee privacy. To send secure messages you can
use Pretty Good Privacy (PGP) to encrypt emails. Each PGP user is
allocated a public and private encryption code.
Anyone can use your
public code to send you an encrypted message, but you need your private
code to read it. You can also hide messages inside other files such as
digital photos - known as steganography.
Political dissidents and whistleblowers often use TOR and I2P
to hide their online activities, but these are also used by people with
less noble intentions. You can run TOR from a USB stick and it will
encrypt your traffic and bounce it through a string of servers.
Not even TOR is infallible, though, with a recent attack on TOR for Firefox on Windows designed to identify users.
It appears the attack may have been launched by US law
enforcement agencies to help bring down a secretive child pornography
ring.
Someone, somewhere, is always watching.
theage.com.au 27 Oct 2013
There is literally NO SUCH THING AS ANONYMITY when it comes to being internet connected.
All encryption keys are held by US 'authorities' and used to retrieve the (encrypted) desired data upon request.
If the general populous were to carry out surveillance to a similar extent, then they would be labeled (by the government lap dogs - the corporate media) as 'nut jobs', paranoid, conspiracy theorists, and the like.
No comments:
Post a Comment