Circumvention & Anonymity
- Subsections
Type | |
---|---|
Internet Anonymity/Internet surveillance and censorship | Lesson |
Internet Anonymity/Tor | Lesson |
Tor | Lesson |
Add or edit subsection:
Minimum time | |
Maximum time |
Position |
6 |
Type | Module |
Lang | En |
- Last modified: 6 August 2013 17:18:21
Data retention, Internet surveillance and website filtering have made the Internet a closed and controlled environment in many countries. The majority of these practices function on the identification of the client and the host - namely our IP and the IP of the webservice we are seeking. Anonymysing these identifiers renders much of this technology irrelevant.
Trainer's notes: You will need a fast Internet connection for a group session, preferably without a network proxy. USB memory stick for Tor Browser portable