Internet Anonymity
Circumvention & Anonymity
- Subsections
| Type | |
|---|---|
| Internet Anonymity/Internet surveillance and censorship | Lesson |
| Internet Anonymity/Tor | Lesson |
| Tor | Lesson |
Add or edit subsection:
| Minimum time | |
| Maximum time |
| Position |
6 |
| Type | Module |
| Lang | En |
- Last modified: 6 August 2013 17:18:21
Data retention, Internet surveillance and website filtering have made the Internet a closed and controlled environment in many countries. The majority of these practices function on the identification of the client and the host - namely our IP and the IP of the webservice we are seeking. Anonymysing these identifiers renders much of this technology irrelevant.
Trainer's notes: You will need a fast Internet connection for a group session, preferably without a network proxy. USB memory stick for Tor Browser portable