"onion router"

Student programmers: Get paid to hack liberty-enhancing code with EFF this summer!

The Electronic Frontier Foundation is looking for student programmers to do paid work on various liberty-enhancing technologies this summer, paid for by Google, through its excellent Summer of Code project. This summer, there's funding for programmers to work on TOR (The Onion Router -- a system for evading censorwalls and enhancing online privacy by bouncing your traffic through several volunteers' computers), TOSBack (tracking changes to the terms of service of the Internet's most popular websites), OurVoteLive (tracking problems in elections with US polling places and voting machines) and Switzerland (a passive IP-layer network neutrality testing system).

Previous Summer of Code workers have had wonderful experiences working with EFF (as a former employee, I can testify to what a great workplace it is). Not only do you get to do paid, meaningful work, but you get to do it surrounded by some of the most astute, passionate and clever people in the technology world. For the right student, this is the chance of a lifetime.

Work With EFF and TOR for Google's Summer of Code

Previously: EFF helping produce anonymizing software Intro to TOR: how you can be an anti-censorship activist in your ... Run a TOR node, help Iranians and others keep their privacy ... TOR: German police are *not* cracking down on Tor. EFF public meeting on anonymizing software in San Fran next Tues ... EFF releases Net Neutrality detector software TOSBack: EFF's real-time tracker for changes in terms of service ... EFF sets sights on abusive EULAs Tracking e-voting dangers: I VOTED? Read the rest

Intro to TOR: how you can be an anti-censorship activist in your sleep

Here's a nice little introductory article on TOR, The Onion Router, a privacy-enhancing technology that helps you to circumvent national, corporate and school firewalls and enhance your anonymity. Originally developed by the US military to help communications get in and out of countries that heavily filter their networks, TOR is free/open software and is maintained by many volunteers around the world, including the Electronic Frontier Foundation.

TOR works by passing your traffic through several (theoretically) unrelated computers all over the Internet, using cryptography to keep the origin, destination, and intermediary steps secret from each computer it passes through.

You can run TOR on your own computers and they'll become part of this array of intermediary hosts all over the net, making your network connection into a tool for privacy and free access to information.

Bill McGonigle, of Lebanon, New Hampshire, decided to become a Tor volunteer when he learned that people in Iran were protesting the results of their June Presidential election. They were using the Internet to organize their meetings. The Iranian government was trying to censor their messages to one another. "I have a soft-spot for people trying to gain liberty for themselves," he wrote in an email, "especially against tyrannical regimes. It became known that they were using Tor to get around the censorship, so at that point I put up a relay....The people I'd like to help are those living under violence-based oppression, most commonly orchestrated by dangerous and corrupt individuals posing as legitimate governments. I'd like to see an end to oppression wherever it exists."

Volunteer Your Computer for Global Privacy

(Thanks, Rhona! Read the rest

Run a TOR node, help Iranians and others keep their privacy

Want to do something more meaningful for Iran's dissidents than turning your Twitter avatar green? EFF would like you to run a TOR bridge or relay, which will allow Iranians, and others around the world, to communicate with enhanced privacy and secrecy.

More sophisticated users can skip this paragraph, but for the rest, here's the basic outline. Tor (an acronym of "The Onion Router") is free and open source software that helps users remain anonymous on the Internet. Normally, when accessing websites, your computer asks for and receives a webpage out in the open, a process that exposes your IP address, the URL of the website, and the contents of the site, among other information to third parties. When accessing websites while using Tor, your computer essentially whispers its requests for a website, to another computer, which passes the request on to another computer, which passes it on to another computer, which passes it onto the computer where the website is hosted; the reply returns in the same, chain-message manner. The whispers are encrypted, so that neither outside authorities, nor the computers in the middle of the chain, can tell what is being said, and to whom. And the website itself does not have your IP address either.

Internet users in Iran are using Tor to both (a) circumvent censorship systems and (b) remain anonymous while reading and writing on the Internet. Both are critically important to the safety of protesters, many of whom fear retaliation from the government. Preliminary reports indicate that use of the Tor client in Iran has increased in the days after the contested election.

Read the rest

HOWTO use TOR to enhance your privacy

Here's the final installment in the amazing Instructables series of HOWTOs inspired by my young adult novel Little Brother. This week, it's a HOWTO on TOR, The Onion Router, a technology for increasing your privacy and anonymity when you look at the web, and for getting around censorwalls.

The Instructables folks did an amazing job with this -- and the response has been great!

When you go online, you leave tracks all over the place. You could be hanging out with friends on IM, checking out websites, or downloading music. If you live in a country where snoops are prying into what ordinary citizens do online (lke, um, the US) you want a way to cover those tracks.

If you're in school, though, then it's even worse. No matter what country you're in, chances are that your access to the internets is as snooped-on as any police state in the world.

So, how do we escape our little virtual prisons? In this Instructable, I'll tell you about something called Tor (The Onion Router.) I'll tell you how it works, and then offer some simple instructions on how to get your web browser hooked up. No more getting snooped!

Link Read the rest

Google Summer of Code accepts Tor for 2008 program

Jacob sez,

The Tor project was accepted into the Google Summer of Code program for 2008!

The Tor project is looking for a few good happy mutants. Are you a hacker interested in contributing to a successful open source project? Do you qualify for the GSOC? Are you interested in helping solve some of the practical issues a large and successful anonymity network faces?

It appears that many of the BB happy mutants enjoy Tor - Perhaps this is a good chance for a few good students to be paid to hack on the project!

Tor, of course, is The Onion Router, an anonymizing system for beating censoring firewalls like those in China, Syria and the Denver International Airport.


(Thanks, Jacob!) Read the rest

HOWTO Use TOR to protect yourself from censorship and snooping

The Unwired Show has a great (and hilarious) little video explaining how to use TOR, The Onion Router, an anonymizing program that makes it much harder for bad guys to censor or snoop on your Internet connection.


(Thanks, Wil!) Read the rest

Charlie Stross's Halting State: Heist novel about an MMORPG

Charlie Stross's latest novel Halting State starts out as a hilarious post-cyberpunk police procedural, turns into a gripping post-cyberpunk technothriller, and escalates into a Big Ideas book about the future of economics, virtual worlds, the nation state and policing, while managing to crack a string of geeky in-jokes, play off a heaping helping of gripping action scenes, and telling a pretty good love story.

Here's the gimmick: Halting State opens when a virtual bank in a distributed, multiplayer world is robbed by a horde of orcs who march in and clean it out of all its prestige items and other loot, a direct frontal assault on the game-economy's integrity. The losses run to millions, which triggers an insurance audit -- led by Elaine, who's not only a forensic accountant, but also a sword-swinging LARPer who likes her espionage alternate reality games. She contracts with Jack, an extraordinary gamespace hacker who's just been made redundant from his Edinburgh gaming company, to serve as her native guide, and finds herself working alongside of Sue, a lesbian mom detective-sergeant with the Edinburgh Polis who has been called to the scene with a report of a "robbery" and is now duty-bound to pursue the matter in compliance with the tenets set out in the ISO 9000 binder for police-stations.

I've been following Halting State since Charlie and I sat in a coffee shop in the Strand in London about five years ago and talked about a novel about a "multimillion dollar heist in gamespace." It's a sticky idea, and one that a lot of us are going to end up playing with over the years -- but it's also clearly one that Charlie has had an indecent amount of fun playing with. Read the rest

Students: get paid to hack TOR this summer!

EFF is recruiting student programmers to do paid work on the onion router (TOR) this summer -- this is a technology for anonymizing Internet connections. It's intended for use by people living in surveillance societies like China, Syria, and the average American high-school.

Working on Tor is rewarding because:

* You can work your own hours in your own locations. As long as you get the job done, we don't care about the process.

* We only write free (open source) software. The tools you make won't be locked down or rot on a shelf.

* You will work with a world-class team of anonymity experts and developers on what is already the largest and most active strong anonymity network ever.

* The work you do could contribute to academic publications -- Tor development raises many open questions and interesting problems in the field of [WWW] Privacy Enhancing Technologies.

Link(via Deep Links) Read the rest

Torpark is out, offering "anonymous, portable web browsing"

The computer security wonks and human rights advocates at Hacktivismo today released Torpark, a portable tool to keep web users' identities private. Think of it as anonymity on a stick. A privacy-pop! Snip from launch announcement:

[The] anonymous, fully portable Web browser [is] based on Mozilla Firefox. Torpark comes pre-configured, requires no installation, can run off a USB memory stick, and leaves no tracks behind in the browser or computer. Torpark is a highly modified variant of Portable Firefox, that uses the TOR (The Onion Router) network to anonymize the connection between the user and the website that is being visited.

"We live in a time where acquisition technologies are cherry picking and collating every aspect of our online lives," said Hacktivismo founder Oxblood Ruffin. "Torpark continues Hacktivismo’s commitment to expanding privacy rights on the Internet. And the best thing is, it’s free. No one should have to pay for basic human rights, especially the right of privacy."

Torpark is being released under the GNU General Public License and is dedicated to the Panchen Lama*.

Link to press release, and here's Here's v (thanks, Oxblood Ruffin and Steve Topletz!)

Reader comment: Amos says,

It might be worth reminding people that your identity and information when using tools like this is only as secure as the computer you are running it from. While suspect the Torpark folks did a very good job of ensuring that it won't *leave* any information on the system it's plugged into, there is nothing they can do to keep a keyboard logger (trojan or otherwise) from logging everything you type or, as we've seen recently, logging everything you see and everything your mouse clicks too.

Read the rest

TorPark: anonymizing Firefox

Steve sez, "TorPark is a combination of Firefox and the anonymizingTor Onion Router project. Sticking it on a USB stick allows you to bring not just a great browser wherever you go, but privacy as well!"

How can this be used?

Lots of ways! It can be used to circumvent censorship firewalls, like at work or in China. It can be used to bypass paying for internet access at a wifi cafe. It can be used at school computers so you can get full access to the internet. And best of all, if there is no key loggers secretly installed on the machine, nobody is going to know where you went, what you saw, who you spoke to, or what you said. It is all encrypted in a tunnel between your computer, and at least three others somewhere in the world. Only after your data has passed through the encrypted and constantly changing tunnel (a tor circuit) will it reach the internet as unencrypted. The data from surfing the internet goes through the same tunnel as well, passing back to you encrypted, where your computer uses Tor to decrypt it to the Torpark browser. When you need a secret and secure tunnel to surf the internet, Torpark is your mobile solution.


(Thanks, Steve!)

Update: Jake sez,

it doesn't appear that the torpark people are giving a download link for any of their source code. Nor are they explaining how their project was built.

I know I can get the source code for the programs elsewhere.

Read the rest

EFF helping produce anonymizing software

I have the coolest job: my employer, EFF, is now officially doing development on Tor, an anonymizing network tool that lets people use the Internet without being snooped upon:

Your traffic is safer when you use Tor, because communications are bounced around a distributed network of servers, called onion routers. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it's going. This makes it hard for recipients, observers, and even the onion routers themselves to figure out who and where you are. Tor's technology aims to provide Internet users with protection against "traffic analysis," a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.

Traffic analysis is used every day by companies, governments, and individuals that want to keep track of where people and organizations go and what they do on the Internet. Instead of looking at the content of your communications, traffic analysis tracks where your data goes and when, as well as how big it is. For example, online advertising company Doubleclick uses traffic analysis to record what web pages you've visited, and can build a profile of your interests from that. A pharmaceutical company could use traffic analysis to monitor when the research wing of a competitor visits its website, and track what pages or products that interest the competitor.

Read the rest

Previous Page