Communications > Computer COMSEC Lessons

6 - Anonymous browsing

<< < (2/5) > >>

crudos:
Posted via Tor! :thumbsup:

special-k:
I finally have a rainy day here so I can work on this.

Could you please simplify (in nube terms) what this means and/or how to accomplish it:


--- Quote ---...use HTTPS whenever is possible.
--- End quote ---

APX808:
Usually the URLs you use are something like http://www.google.com, that is HTTP and all the traffic goes in clear text.
HTTPS URLs start with HTTPS like https://www.google.com when you use those the traffic is encrypted, for instance most login pages or home banking services will run using HTTPS.

Depending the browser it will display an special icon in the address bar when you are using HTTPS, something like a padlock.

The Tor browser bundle includes a Firefox extension called "HTTPS Everywhere" made by the EFF that will activate HTTPS wherever it can
https://www.eff.org/https-everywhere

In a nutshell HTTPS is a protocol for two computers to communicate using HTTP over a secure channel, to negotiate a key it uses diffie-hellman to avoid an eavesdropper to know it.

Sorry my explanation isn't very deep as I'm in the middle of a move LOL

I plan to write a lesson about HTTPS in a near future.

Kbop:
For those of you who like TOR - you should check out TAILs.  It is a Linux distro that uses TOR natively.  you can put your OS on a CD and boot up on almost any computer.  Linux is open source and free.
https://tails.boum.org/
http://en.wikipedia.org/wiki/Tails_(operating_system)

EJR914:
Let's say I've compromised myself, I've accidentally royal screwed myself and logged into my personal email after or before I start anonymously browsing some very subversive sites and send some very subversive messages with TOR, is there anything I can do now to try make it a little better on myself?

Yes, this just happened to me.

Just kidding.   ;)

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version