The free Internet that many of us loved has become a surveillance web, serving governments and mega-corps, while abusing the rest of us. For those whose eyes are opening to this sad fact, I’ve have assembled this guide.
This purpose of this guide is to make Internet privacy as simple and concise as possible. Our intention is not just for you to understand, but for you to
act upon the information we give you.
Learning to protect yourself online is simple, and does not need to interfere with your daily activity. This is the complete guide to surfing anonymously. What steps you choose to take depend upon what you wish to guard against. Each level will require more work or money to achieve, but gives much greater protection.
Free as in beer, not free as in freedom – though some of it is both. I didn’t put trialware there, or things that require you to pay, to get certain features. You can use Ninite.com to install a lot of it automatically, without any toolbars and crap like that. I didn’t include things like Blender and Sketchup, as they are, in my opinion, very niche. If you need such software, I’d assume you would already know about it. Obviously most of it is for Windows, but a lot of it is multi-platform.
In an effort to protect its users privacy, the developers of Firefox web browser have made some serious changes that will allow to encrypt non HTTPs(http://) traffic.
How is that even possible? You can thank opportunistic encryption, a technique, which encrypts the communication when connecting to another system. As a result, Firefox will route HTTP (port 80) requests that are usually sent in the cleartext to a port of server administrator’s choice. In addition to that, users won’t experience any delays as connections will be fully established before they are even used.
The only requirement? A server must support HTTP/2 protocol and specify the AltSvc header.
As far as other important Firefox 37 changes go, it improves YouTube HTML5 playback on Windows as well as WebGL rendering performance, uses HTTPS for Bing search and improves protection against site impersonation via OneCRL centralized certificate revocation.
Don’t do this unless you NEED to. You don’t even need to secure erase your SSD when you reinstall. The only reasons to secure erase is if there is a drastic speed decrease from either a hard workload or a TRIMless environment which you need fix quickly or if your SSD is acting up. Otherwise TRIM and garbage collection will take care of everything automatically.
Erasing all the data on the SSD:
It is not safe to use DBAN Nuke or similar on SSDs. First, it’s not good for the drive, and second, it wouldn’t work properly anyway. Not good for the drive because it writes to the drive too many times. Wouldn’t work properly because just like the OS, DBAN and similar cannot control where it writes to on the drive. The SSD’s controller is responsible for that, and due to wear leveling algorithms, wouldn’t get you the intended results. DBAN in its current state, is not designed for SSDs. It is used for magnetic drives that have a tendency to retain “images” of previously stored magnetic data. It writes (and sometimes overwrites again) data to the drive, and what is called “secure erase” in DBAN, is different than a “secure erase” command issued by a program designed for SSDs. The secure erase command for an SSD is a command that tells the SSD’s controller to “flush” all of its stored electrons, that it has trapped, from the individual storage cells. It does not write to the drive in any fashion, like a DBAN secure erase does.With an SSD, all you need is to perform a “secure erase” with the proper software.
Secure Erase and NAND:
To learn about how NAND works at a technical level read this: (link)
Tunneling is used to alter the placement of electrons in the floating gate. An electrical charge is applied to the floating gate. The charge enters the floating gate and drains to a ground. This charge causes the floating-gate transistor to act like an electron gun. The excited electrons are pushed through and trapped on other side of the thin oxide layer, giving it a negative charge. These negatively charged electrons act as a barrier between the control gate and the floating gate. A special device called a cell sensor monitors the level of the charge passing through the floating gate.
NAND flash memory uses floating gate MOSFET transistors. Their default state is when the charge is over the 50%. If the flow through the gate is above the 50% threshold, it has a value of 1. When the charge passing through drops below the 50% threshold, the value changes to 0.
0’s are data, 1’s is erase….the fundamental laws of MLC NAND dictate this. You only write the 0’s when you write data to NAND.
The Isohunt.to team have decided to give an early Christmas present to Pirate Bay fans. They’ve launched “The Open Bay,” an initiative that allows anyone to put a ‘copy’ of The Pirate Bay online, minimal technical knowledge required. — “We, the team that brought you Isohunt.to and oldpiratebay.org, are bringing you the next step in the torrent evolution. Open Pirate Bay source code. History of torrent sites such as Isohunt and The Pirate Bay gives us a lesson that would be a crime not to learn. The era of individual torrent sites is over.”
Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to:
* use the Internet anonymously and circumvent censorship;
* all connections to the Internet are forced to go through the Tor network;
* leave no trace on the computer you are using unless you ask it explicitly;
* use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.
A user has reported that the wifi passwords are not encrypted on Ubuntu systems, being stored in clear text in a folder outside the user’s home, (/etc/NetworkManager/system-connections/) making it accessible for unwanted users.
After this issue has been reported, a Canonical developer has explained in the mailing lists that this is caused by the fact that the “All users may connect to this network” option is enabled by default.
This issue has an easy fix, directly from the graphical user interface. All you have to do is: Open network indicator -> Edit connections -> Select network -> Click edit -> untick “All users may connect to this network.” from the general tab.
By doing this setting, the password will be stored in the user’s home and so, it will become unavailable for unwanted users. Also, encrypt your homedir, for better security.
Thank you for your patience and support all throughout 2013. As we noted in our previous update there are many things happening, and we’re proud to announce two more major developments that will make MtGox both easier and more economical for our valued customers:
1) One million MtGox customers and reduced fees for the holidays! Thanks to our loyal customer and increased global interest in Bitcoin, MtGox has now achieved a milestone of over one million customers and growing. This is an incredible moment for us all, and to celebrate, we are offering a Special Holiday Discount of 25% off all trading fees starting today, December 20th 2013 to January 20th 2014!
2) Mayzus MoneyPolo Partnership We are proud to announce a new partnership with Mayzus MoneyPolo that will enable our customers outside of the United States to deposit quickly and without long processing times. Now that we are working with Mayzus MoneyPolo, a leading financial company that is in-tune with the future of Bitcoin, anyone with a verified account will be able to quickly send money to their MtGox account via 128 global currencies.
Meaning, you probably won’t learn anything new from it, but it will make you feel good. As Bitcoin prices continue to roller-coaster endlessly I thought this would be a good time to look back at where Bitcoin was when it just started out.
Using the Internet’s “Wayback machine”, Google search and various tools to explore Bitcoin’s past
So what I did in order to travel back in time is use the Wayback machine which is basically an Internet archive to see how several of the biggest Bitcoin websites looked when they first started out. I also used advanced Google and Twitter search tool to find out what where the earliest mentions of Bitcoin online. So let’s start out by comparing the biggest site of them all Bitcoin.org.