PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Send a file File manager PDF Toolbox Search Help Contact



sikrit0 2 0.pdf


Preview of PDF document sikrit0-2-0.pdf

Page 1 2 3 45677

Text preview


­­­I2P
­­­Proxies
­­­Tor Onion Router
*Communications
*Additional Information
­­­Temporary Emails
­­­Firefox Plugins
­­­Care Package

[i2p9]
[prx0]
[tor1]
[cmm2]
[add3]
[eml4]
[ffx5]
[pkg6]

­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­
To skip between sections of this article, use the search function on your computer [Windows: Ctrl­F / Macintosh: 
Command­F] and type in the four character code listed after the section in the index listing. For example, to jump 
to the foreword on Windows, you would press Ctrl­F and type "fwd1" [without the quotations].
­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­
*** Introduction [idn3] ***
­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­
The first section of this article will focus on personal safety. Personal safety can be spoken of in two different 
spheres: Physical Safety and Internet Safety. It is important to remember that these two spheres overlap: a lapse 
of internet safety could lead to physical identification. However, by keeping in mind a few important rules you 
can drastically reduce the chance of being singled out and identified.
The second section of this article will go into specifics regarding technology that can be used to communicate 
anonymously, maintain secrecy, and protest effectively.