Cryptography

Anonymous remailer

An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anonymous remailers, and nym servers, among others, which differ in how they work, in the policies they adopt, and in the type of attack on the anonymity of e-mail they can (or are intended to) resist. Remailing as discussed in this article applies to e-mails intended for particular recipients, not the general public. Anonymity in the latter case is more easily addressed by using any of several methods of anonymous publication. (Wikipedia).

Video thumbnail

How to be anonymous on the web? Tor, Dark net, Whonix, Tails, Linux

Why should you become anonymous? And how can you even be anonymous on the web? Watch to learn how to use essential anonymity tools to become anonymous on the web. Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR

From playlist TUTORIALS & HOW TO's

Video thumbnail

Can You Validate These Emails?

Email Validation is a procedure that verifies if an email address is deliverable and valid. Can you validate these emails?

From playlist Fun

Video thumbnail

Using Messages on LinkedIn

In this video, you’ll learn more about using Messages in LinkedIn. Visit https://edu.gcfglobal.org/en/linkedin/keeping-up-with-linkedin/1/ for our text-based lesson. We hope you enjoy!

From playlist LinkedIn

Video thumbnail

Best secure and private email services review - guide to Gmail alternatives and encrypted email

Secure your privacy and claim a new encrypted email at these secure and private email services. Follow my guide to gmail alternatives and end-to-end encryption using private email providers as part of degoogleify campaign. I made this channel because I believe standing up against power an

From playlist TUTORIALS & HOW TO's

Video thumbnail

What are common scams I should be aware of?

While online scams vary, many of them have certain features that help to identify them from legitimate online communications. Learn how to recognize and avoid some common types of scams.

From playlist Internet Safety

Video thumbnail

CERIAS Security: Sphinx: A Compact and Provably Secure Mix Format 1/6

Clip 1/6 Speaker: Ian Goldberg · University of Waterloo Mix networks, originally proposed in 1981, provide a way for Internet users to send messages--such as email, blog posts, or tweets--without automatically revealing their identities or their locations. In this talk, we will describe

From playlist The CERIAS Security Seminars 2009

Video thumbnail

Source Boston 2010: Changing Threats To Privacy: From TIA to Google 6/6

Clip 6/6 Speaker: Moxie Marlinspike A lot has changed since discussions around digital privacy began. The security community won the war for strong cryptography, anonymous darknets which presumably make the eradication of information impossible have been successfully deployed, and much of

From playlist SOURCE Boston 2010

Video thumbnail

HAR 2009: Anonymous Vs. Scientology 5/6

Clip 5/6 Speaker: Henk de Vries a case study in 2.0 hacktivism & how it could help future projects About Social organising via Web 2.0 In January 2008, 'the headless entity of the internets' was awakened when a video was repeatedly removed from websites and blogs under threats of

From playlist Hacking at Random (HAR) 2009

Video thumbnail

Gmail: Responding to Email

In this video, you’ll learn more about how to respond to emails you receive in your Gmail account. Visit https://edu.gcfglobal.org/en/gmail/responding-to-email/1/ for our text-based lesson. This video includes information on: • Reading emails • Opening attachments • Responding to email W

From playlist Gmail

Video thumbnail

The Computer Chronicles - Cyber Security (1997)

Special thanks to archive.org for hosting these episodes. Downloads of all these episodes and more can be found at: http://archive.org/details/computerchronicles

From playlist Computer Chronicles Episodes on Software

Video thumbnail

Shmoocon 2010: Becoming Jack Flack: Real Life Cloak & Dagger 3/6

Clip 3/6 Speakers: Taylor Banks and Adam Bregenzer Are you on too many social networking sites? Have all of your exes found you on facebook? If the fuzz came looking, how easy it would be for them to find you? kaos.theory, the creators of Anonym.OS, bring you this abridged guide to bec

From playlist ShmooCon 2010

Video thumbnail

DEFCON 14: SAMAEL and NARC (Network Analysis Reporting Console)

Panel: dr.kaos (aka Taylor Banks), Founder, kaos.theory/security.research arcon (aka Adam Bregenzer) atlas (aka Gavin Mead) beth (aka Beth Milliken) digunix (aka Kevin Miller) Abstract: From the 1337 hax0rs that brought you Anonym.OS, kaos.theory/security.research presents SAMAEL (Secure,

From playlist DEFCON 14

Video thumbnail

23C3: Data Retention Update

Speakers: Rikke Frank Jørgensen, Ralf Bendrath, Patrick Breyer News and Perspectives on Implementation and Opposition The EU adopted a directive on the retention of data regarding the communications, movements and use of media of all 365 mio. EU citizens. The struggle is now continuin

From playlist 23C3: Who can you trust

Video thumbnail

23C3: An Introduction to Traffic Analysis

Speaker: George Danezis Attacks, Defences and Public Policy Issues... This talk will present an overview of traffic analysis techniques, and how they can be used to extract data from 'secure' systems. We will consider both state of the art attacks in the academic literature, but also pr

From playlist 23C3: Who can you trust

Video thumbnail

How to Make Your Email Private and Secure (Fastmail) 🔒

Try Fastmail for free and get a bonus just for Simpletivity fans: https://www.fastmail.com/simpletivity/ Don't like the idea of Google or Microsoft seeing your emails? Wish that you could have a private and secure email account where YOU own your data? Fastmail keeps your email, calendars

From playlist How to Manage Email Effectively (Master Your Inbox)

Video thumbnail

Stuff They Don't Want You To Know - Wikileaks

Wikileaks allows whistleblowers across the planet to anonymously submit reports of crime by businesses, individuals and governments. Tune in and learn why some people, including the U.S. government, want the site shut down. http://howstuffworks.com http://facebook.com/ConspiracyStuff http

From playlist Stuff They Don't Want You To Know

Video thumbnail

24C3: To be or I2P

Speaker: Jens Kubieziel An introduction into anonymous communication with I2P I2P is a message-based anonymizing network. It builds a virtual network between the communication endpoints. This talk will introduce the technical details of I2P and show some exemplary applications. My talk

From playlist 24C3: Full steam ahead

Video thumbnail

HITB SecConf 2009 Malaysia: The Bad Guys are Winning: So Now What? 7/7

Clip 7/7 Speaker: Ed Skoudis (Co-Founder, InGuardians) With the continual release of zero-day exploits, ever-larger-scale botnets, and rampant spyware, attackers have compromised tens of millions of machines connected to the Internet. With clever attackers mixing social engineering, ph

From playlist Hack In The Box Malaysia 2009

Video thumbnail

24C3: Anonymity for 2015

Speaker: Len Sassaman Why not just use Tor? In recent years, an increasing amount of academic research has been focused on secure anonymous communication systems. In this talk, we briefly review the state of the art in theoretical anonymity systems as well as the several deployed and ac

From playlist 24C3: Full steam ahead

Video thumbnail

Outtakes

Yes. I make mistakes ... rarely. http://www.flippingphysics.com

From playlist Miscellaneous

Related pages

Traffic analysis | Onion routing | I2P | Tor (network) | Padding (cryptography) | Cryptography | Mix network