now that google.....

Ctuchik

FH is my second home
Joined
Dec 23, 2003
Messages
10,464
is spying on us everywhere we go on the internet. does anyone know if theres some program out there that actually blocks stuff like that?

and not just google btw, i dont want anyone exept my ISP to know what i'm doing and where i'm surfing :)
 

TdC

Trem's hunky sex love muffin
Joined
Dec 20, 2003
Messages
30,925
there are certain anonymous proxies et al that shield your identity. Best practice would be to go through one, and then another (and maybe another, ie always do things in threes) for maximum security.

also disable all cookies, activeX, java(script), flash, etc, and never use a search engine, social networking site or anything like lastFM or Steam.
 

Poag

m00?
Joined
Mar 11, 2004
Messages
2,411
Or just unplug your computer from the internet for maximum security
 

smurkin

Can't get enough of FH
Joined
Dec 22, 2003
Messages
561

I often wondered what the onion network was - but this page:

Who uses Tor?

Under military use - what a load of bolloxs :lol: this is pure walter mitty stuff

Militaries use Tor

--------------------------------------------------------------------------------

Field Agents: It is not difficult for insurgents to monitor Internet traffic and discover all the hotels and other locations from which people are connecting to known military servers. Military field agents deployed away from home use Tor to mask the sites they are visiting, protecting military interests and operations, as well as protecting themselves from physical harm.

Hidden services: When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and control to be physically secure from discovery and takedown.

Intelligence gathering: Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website to record a military address, thereby revealing the surveillance.
 

Users who are viewing this thread

Top Bottom