Level of privacy and security in sales and marketing communications are reliable concerns of those who are in repressive regimes or simply individuals who wish to stop their personal activities out of being discovered. Onion redirecting, as it is commonly known as to the Tor network, was specially designed to provide this kind of secureness and level of privacy, but there are numerous doubts regarding its performance, so in the following paragraphs we examine its abilities and failings. The article was focused on Tor, being the most recognized deepweb technology, recognized and studied worldwide, although it is necessary to make note of that Net security does not depend exclusively on Treffer. The security company is composed of multiple elements that must be considered once trying to shield us with this network,
Activists, political dissidents, journalists in countries incompatible or repressive regimes, individuals rights defenders, undercover agents and anyone who wishes to prevent their very own activities from being examined, sometimes need to communicate, browse the Internet or perhaps share facts freely, confidential and safe. The natural doubts that often come up are:
What do you do to hide identity and location?
How does one ensure the privacy of your communications (telephone, instant communications, forums or perhaps e-mail)?
Ways to share files confidentially?
How do you keep information on your units, without others having access to the information, even if they have access to the devices?
There are several technologies to protect privacy and security, and the dark internet is one of the most recognized, however , the safety it provides leads many criminals to hide their particular activities in it. The technologies that best represent the dark web will be Tor and i2P, Tor being the most widely used and studied network worldwide, so it has been encountered with multiple hits.
On the other hand, the dark world wide web is a challenge for the government bodies who, additionally to distinguishing, collecting research and locating the criminals exactly who are disappearing in this, need to show, in courtroom, that such evidence is collected by law.
It is necessary to notice, finally, that to develop this post compiled info from numerous sources for the internet, to be able to better be familiar with level of personal privacy and security that is obtained from the dark web.
Privacy & Security
There are different technologies to guard privacy and security. In this regard, computer security firm Cyberkov published a list of recommended products (the unique document can be written in Arabic)
Social network for sending messages: Twitter.
Falsear the knowledge that is placed with the digital photographs (geo-location), before publishing the photos (useful for correspondents): Mappr.
Mobile devices with advanced features for encrypting text, tone and video: Blackphone and Cryptophone.
Alternatives when communications have been cut: Twitter through SMS, non-public wifi systems, short-range interaction radios (walkie talkies, taking into account that communication is not really encrypted), applications that do certainly not require connection networks just like FireChat, Jar Can plus the Serval Job.
Virtual Individual Networks (VPN): Freedome and Avast SecureLine.
Browsing the net: Tor, Orweb, Onion Internet browser, Aviator (Google denounced the existence of multiple protection holes in Aviator), Yandex OperaMini.
Security of data files and products in case of damage or confiscation of equipment: TrueCrypt (deprecated), VeraCrypt, BitLocker and Crypto SSD. Email: Hushmail, ProtonMail, Tutanota, which allow encryption of messages and attachments.
Instantaneous messaging: Threema, Telegram, SureSpot, Wickr, Cryptocat, SwissCom IO, PQChat, Sicher and iMessage.
Protected VoIP: Linphone, Swisscom IO, RedPhone and Signal; products of the Silent Circle provider and the FaceTime service.
Cloud Storage: ULTRA, SpiderOak, SugarSync, Copy. junto de