The goal of this website is to classify spyware programs, so that users can be aware that they are installing spyware.
After Laura Poitras received encrypted emails from someone with information on the government’s massive covert-surveillance programs, she and reporter Glenn Greenwald flew to Hong Kong to meet the sender, who turned out to be Edward Snowden.
If you’re one of those people who think privacy isn’t really an issue for you because you have nothing to hide, you should read this.
Good resource for tools and knowledge to protect your privacy against government surveillance.
The Tin Hat is a really interesting website, with lots of tutorials and blog articles regarding privacy and security on the internet. There are some very good articles relating to the Tor and I2P networks.
The Tin Hat website – https://thetinhat.com
Tor hidden service – qza32xuddl3guikc.onion
I2P eepsite – Secure.TheTinHat.i2p
I’m using Amazon Web Services (AWS) to run my Tor relay. I’m using an Amazon EC2 instance. The instance type is a t1.micro and the OS is Ubuntu 14.04 (Trusty), amd64 version.
These are the instructions I followed. SSH into your AWS EC2 instance.
Figure out the name of your distribution.
add this line to your
deb http://deb.torproject.org/torproject.org trusty main
Change trusty to the name of your distribution e.g. sid, saucy or whatever.
Then add the gpg key used to sign the packages by running the following commands at your command prompt.
Now refresh your sources, running the following command (as root) at your command prompt.
Help you keep our signing key current. It is recommended you use it. Install it using.
To finally install Tor just run.
Edit the file /etc/tor/torrc
RelayBandwidthRate 200 KB
AccountingMax 3 GB
AccountingStart month 3 15:00
ExitPolicy reject *:*
Because I’m using port 80 I need to allow incoming traffic to my AWS EC2 instance on port 80 i.e. AWS Security Groups.
Restart the Tor service.