diff --git a/servers/anonuse/index.html b/servers/anonuse/index.html new file mode 100644 index 0000000..b6f04d0 --- /dev/null +++ b/servers/anonuse/index.html @@ -0,0 +1,122 @@ + + +
+ + + + + + + +
In this post we are going to see why Privacy is not enough for Anonymous Use, and what can be done about it.
+ +Let’s say that Bob is using an open-source browser and a VPN to access a website. Thinking he is safe, he provides a false name and address when creating an account.
+It seems like Bob has some privacy, yet his anonymity can still be compromised. The website’s owner notices that Bob provided an inexistent address, which is a violation of the Terms of Service. The owner files a lawsuit, and the court obliges Bob’s VPN provider to deanonymize him.
+ +This situation would have been avoided had Bob used Tor, which reroutes traffic in a way that obscures its origins and destinations, making it nearly impossible to figure out who is connecting to what.
+ +With Tor, Bob’s identity would be revealed only if he gave it up voluntarily.
++ Until there is Nothing left. + +
+
+
+ RSS Feed
Matrix Chat
+
+
Donate XMR: 871Hun183Cc2yXRmP4cEeUG8uiCkXfZPFQt5WVK6tCgxedWTXrpFGNTi9aRgknjYsh3jCD6iY9eyxMpGdr4xNyDNT7ZrKsK
Website: robertblinov.net
Contact: SimpleX
+From a legal standpoint, the only way to be protected against that scenario where you're forced to decrypt your harddrive is to be able to deny the existance of said encrypted volume (Plausible Deniability) . If the encrypted volume does not exist, there is no password to be given for it.
So here we need a technology that can provide us Plausible Deniability. That is what Veracrypt can do for us.