I think you mean this case: https://torrentfreak.com/retired-computerless-woman-fined-for-pirating-hooligan-movie-111222/ It was a ruling from a...
Stop spreading fut. No federal law holds you responsible for how others use your connection. It's copyright troll logic 101 and even in these...
I don't see the logic; he has attempted to plead the Fifth, and he may yet be completely innocent. The Fifth Amendment issue has nothing to do...
Interestingly, there appears to be some disagreement among the lower courts over the application of the foregone conclusion exception. The Ninth,...
The EU Data retention Directive has been ruled unlawful by the Court of Justice of the European Union, and the directive only applies to Internet...
How can they do that? Whether Hushmail's built-in encryption is trustworthy is a separate question from using the mail service anonymously...
Hello Have any here tried Bitmessage (http://www.bitmessage.org)? I really like it.
I disagree. There is nothing inherently insecure about using any other socks capable application with Tor provided that you don't care about the...
Receive-sms.com is no solution. All the phone numbers have already been used to activate Google accounts. Hushmail is good for anonymity as...
So in other words, you could have multiple plaintext messages for different situations - one for the actual communication and another innocent to...
There are two problems with anonymity and email. First, the signup must be anonymous done from another IP than one's owhn, or at least in a way...
Several problems: Google often flags an IP address as potential abuse and requires phone verification. That can happen during signup or at...
7ZIP is good enough for my needs. You can compress an entire folder into a 7Z archive with AES from the command line or a context menu.
You might also try other payment methods like Ukash and Paysafecard. The following VPN providers accept Paysafecard which can be acquired...
Yes, and I already do that on several forums. But let's say that someone shares the file with a friend. His intend is not only protecting the...
But not all file hosting sites are Tor safe. Some require flash, registration and valid (non-disposable email addresses), while others have...
Hello When using file hosting sites like Dropbox, Mediafire etc, most users don't think about the privacy and logging implications and the...
Sweden has implemented the EU Data Retention Directive but the law does not apply to VPN providers. And even a normal ISP subject to the law...
One setup which might aleviate though not completely eliminate all these concerns is using the Tor Browser from within a virtual environment...
Depending on the type of VPN connection and proxy. As far I know, PPTP can't be proxied but OpenVPN can. Also be aware that the type of...
I thought that LR wasn't really anonymous. In order to use LR, you must first set up an account, and it was my impression when I tried LR some...
Thank you DarkPhoenix for an informative post. Let me add that even a free VPN may be used to chain another heavier anonymity layer. My...
Separate names with a comma.