Anonymous File Sharing & Darknet - How to be a Ghost in the Machine by Lance Henderson

No critic rating

Waiting for minimum critic reviews

See Reader Rating


Trust, but Verify. That has been the adage online as well as off, but do you really know how to protect yourself against identity thieves, government snoops, and other misfits nosing into your online affairs? What you do online is *your* business, and no one else. Does the concept of encrypting your hard drive, using Truecrypt, Tor, Freenet, Drivecrypt and the like send your head spinning in confusion? No longer. This book makes it ridiculously simple to live a life free of the tracking mechanisms put in place by Google, Facebook and Twitter, along with a host of other sites that care nothing about your online privacy concerns. In fact, as far as they're concerned, the less privacy you have, the higher their your expense. - Learn how to keep everyone, even corrupt governments, out of your computer, even if it is confiscated. - Learn when to engage the Fifth Amendment to protect YOUR rights from those that wish to turn your own words against you. - Discover why Facebook profits exponentially when you encourage your family and friends to sign up and "tag" photos - Learn why anonymous systems like Tor and Freenet are the antithesis of privacy-destroying corporate giants like Facebook, Google & LinkedIn - Learn why Google, Facebook & other social media giants will lobby against anonymous networks in the coming years - Darknet: what is it and why it is a threat to Facebook, Google and other ad networks who stand to lose millions in ad revenue as more and more people opt-out You have absolutely nothing to lose and everything to gain by teaching yourself the basics. Start now and sleep at night with peace of mind! Excerpt: Freenet Vulnerabilities "Unlike most other P2P systems, it actually matters what you say on Freenet boards. Like Tor, you can quite easily give away your geographical location if you are not careful. Geographical spellings like "colour" and "labour" can reveal that you are either in the UK or Canada. This is mostly a problem only in conjunction with other leaks of personal information, such as a list of your favorite sports team or local restaurant. Node Reference: If you give anyone your node reference, they can link your IP address with your nick and reveal your true identity. You should only reveal this to sources that you trust 100%, such as those on your friends list. If you let slip your node reference on a message board in Frost, it will be viewable by thousands of Freenet users across the globe, and there is absolutely no deleting it from the boards. There are no moderators or administrators on Freenet in the sense that they can remove inserts from the network. Needless to say, having this level of free speech has some drawbacks, in that spammers and trolls like to target the network. System Time: Make certain that your system time in your BIOS for your motherboard is set correctly. It can be used to correlate an attack and reveal your Freenet identity if it is not. While this method might not stand up to jury scrutiny in the US, it would certainly be disastrous for a Chinese or Iranian dissident wanting to keep his identity secret. There are a multitude of places online where you can synchronize your system time. The default tray icon in windows is insufficient in this regard. Restart your pc, then hit "delete" to see what timestamp your system is really relaying to the world."

About Lance Henderson

See more books from this Author
Published August 8, 2012 by CreateSpace Independent Publishing Platform. 54 pages
Genres: Computers & Technology.

Reader Rating for Anonymous File Sharing & Darknet - How to be a Ghost in the Machine

An aggregated and normalized score based on 6 user ratings from iDreamBooks & iTunes

Rate this book!

Add Review