From 4575a6e684ea9f4a72f4aa823c432bee9b977f74 Mon Sep 17 00:00:00 2001 From: Robert Date: Fri, 9 Aug 2024 16:49:56 +0200 Subject: [PATCH 1/3] Upload files to "servers/encryption" --- servers/encryption/index.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/servers/encryption/index.html b/servers/encryption/index.html index eeaffd2..784f4f3 100644 --- a/servers/encryption/index.html +++ b/servers/encryption/index.html @@ -119,7 +119,7 @@ The door is closed, the conversation remains between Alice and Bob, their conver
-

Why is Plausible Deniability is Vital?



+

Why is Plausible Deniability Vital?



From a legal standpoint, the only way to be protected against that scenario where you're forced to decrypt your harddrive is to be able to deny the existance of said encrypted volume (Plausible Deniability) . If the encrypted volume does not exist, there is no password to be given for it.

So here we need a technology that can provide us Plausible Deniability. That is what Veracrypt can do for us.

From ff710cfc1905a59b2b47d1730a51a2c7dd046c6c Mon Sep 17 00:00:00 2001 From: Robert Date: Fri, 9 Aug 2024 20:10:52 +0200 Subject: [PATCH 2/3] Add servers/anonuse/index.html --- servers/anonuse/index.html | 121 +++++++++++++++++++++++++++++++++++++ 1 file changed, 121 insertions(+) create mode 100644 servers/anonuse/index.html diff --git a/servers/anonuse/index.html b/servers/anonuse/index.html new file mode 100644 index 0000000..667e21e --- /dev/null +++ b/servers/anonuse/index.html @@ -0,0 +1,121 @@ + + + + + + + + + + + Why Privacy isn’t enough for Sensitive use ? + + + + + + + + + + + + + + + + + + + +
+
+
+
+ Previous Page

Robert - 06 / 08 / 24

+

Why isn’t Privacy enough for Anonymous Use?

+

In this post we are going to see why Privacy is not enough for Anonymous Use, and what can be done about it.

+ +
+
+
+
+ + +
+
+
+
+

Why isn’t Privacy enough?

+

Let’s say that Bob is using an open-source browser to access an open-source decentralized platform with next to no surveillance. His privacy is further strengthened by an HTTPS connection (nowadays a default), which does not permit middlemen to see what one is doing on a website.

+

This connection protects his privacy, but not his anonymity. The ISP knows Bob’s name because of the contract they signed, and it also knows the name of the website he is visiting, how often he does so, and how much traffic occurs between them. Moreover, if the website itself logs IP addresses, it would also likely be able to deanonymize Bob: nearly all stationary IP addresses and their respective locations are listed in databases sold by brokers.

+ +

These issues can be solved if Bob begins using Tor, which reroutes traffic in a way that obscures its origins and destinations, making it nearly impossible to figure out who is connecting to what.

+ +

Bob’s identity will be revealed only if he gives it up voluntarily.

+
+
+
+
+ + + +
+
+
+
+

Nihilism

+

+ Until there is Nothing left. + +

+
+ +
+

My Links

+

+ + RSS Feed
Matrix Chat
+ +

+
+ +
+

About Robert

+

Donate XMR: 871Hun183Cc2yXRmP4cEeUG8uiCkXfZPFQt5WVK6tCgxedWTXrpFGNTi9aRgknjYsh3jCD6iY9eyxMpGdr4xNyDNT7ZrKsK


Website: robertblinov.net


Contact: SimpleX

+
+ +
+ +
+
+ + + + + + + + From 156a42c612f898a61bff15b454f66c19f6dff2d1 Mon Sep 17 00:00:00 2001 From: Robert Date: Fri, 9 Aug 2024 21:48:52 +0200 Subject: [PATCH 3/3] Upload files to "servers/anonuse" --- servers/anonuse/index.html | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/servers/anonuse/index.html b/servers/anonuse/index.html index 667e21e..b6f04d0 100644 --- a/servers/anonuse/index.html +++ b/servers/anonuse/index.html @@ -67,13 +67,13 @@
-

Why isn’t Privacy enough?

-

Let’s say that Bob is using an open-source browser to access an open-source decentralized platform with next to no surveillance. His privacy is further strengthened by an HTTPS connection (nowadays a default), which does not permit middlemen to see what one is doing on a website.

-

This connection protects his privacy, but not his anonymity. The ISP knows Bob’s name because of the contract they signed, and it also knows the name of the website he is visiting, how often he does so, and how much traffic occurs between them. Moreover, if the website itself logs IP addresses, it would also likely be able to deanonymize Bob: nearly all stationary IP addresses and their respective locations are listed in databases sold by brokers.

- -

These issues can be solved if Bob begins using Tor, which reroutes traffic in a way that obscures its origins and destinations, making it nearly impossible to figure out who is connecting to what.

- -

Bob’s identity will be revealed only if he gives it up voluntarily.

+

Why isn’t privacy with a VPN enough?

+

Let’s say that Bob is using an open-source browser and a VPN to access a website. Thinking he is safe, he provides a false name and address when creating an account.

+

It seems like Bob has some privacy, yet his anonymity can still be compromised. The website’s owner notices that Bob provided an inexistent address, which is a violation of the Terms of Service. The owner files a lawsuit, and the court obliges Bob’s VPN provider to deanonymize him.

+ +

This situation would have been avoided had Bob used Tor, which reroutes traffic in a way that obscures its origins and destinations, making it nearly impossible to figure out who is connecting to what.

+ +

With Tor, Bob’s identity would be revealed only if he gave it up voluntarily.

@@ -119,3 +119,4 @@ +