Well Chromium and Flash will work through TCP just fine... Skype or some other VOIP may be a bit more problematic but I'm sure that there's some...
If you want to use Chromium or Flash through Tor securely, I would use Whonix, you can install whatever you normally would be able to in Debian...
I would be careful with executable files via Tor because of the malicious nodes issue, you probably don't need anonymity for most of those, and if...
If it's a company machine, which is more than likely here, there's a very solid chance that there's employee monitoring software on it. Trying to...
Your web activity over http and smtp (email) is visible to your employer. I would presume that passwords for most things go through https so they...
Ok, but if you look at the report of all programs/ports connected, and someone was running ssh from a random port, wouldn't the program show as...
With ufw you can do "deny ssh" instead of just "deny 22," wouldn't that block ssh tunneled over any arbitrary port or am I mistaken? Same goes for...
SSH has a ton of legitimate uses that have nothing to do with evading the firewall or seeking anonymity (administering a web server for example)....
No, I believe the poster was referring to DNSCrypt as encrypted DNS. I likewise don't see a point to using DNSCrypt with OpenVPN
In network manager I set my Wifi to "Automatically connect to VPN" When you click to connect, you'll see the Wifi applet blinking for about 10...
I'm sorry but at this point, this isn't news. It'd be news if any closed-source encryption software made by a major US corporation wasn't...
I don't have history enabled and I bet most others here don't either. What scares me here is the "browser sniffing," if a site can sniff out...
In my experience RP breaks more sites than even NoScript, total headache to use, and I think it's of less practical use in preventing exploits...
Nobody is arguing that simply using Linux out of the box makes you impervious to gov't attack, and avoiding zero days is near impossible on any...
Tried that in VBox before, looked simpler to use even than Debian for me, but package management I would have to learn. I saw that it has built-in...
What do you guys think about using FreeBSD or even better OpenBSD as a protection to Finfisher-type malware? Afaik, there's never been any of that...
Search "Bitlocker backdoor," there was a huge controversy about the FBI trying to compel Microsoft to put in a backdoor. Supposedly Microsoft...
I think using OpenDNS and clearing your cache with CCleaner/Bleachbit regularly is a more practical solution here. Clearing your cache takes...
Let's assume that TLA's are interested in me. Can a program from a USB automatically execute in Linux without giving it permission with the root...
http://thehackernews.com/2014/11/china-made-e-cigarette-chargers-could_26.html This got me thinking. I have a USB mouse that I use on my...
If you want to see something really freaky, look up Van Eck phreaking. It's highly unlikely to be used against you unless maybe you're a Russian...
Right, I understand and implement all of those. What I'm asking is what are some ways a government could infect someone that they were...
Do you think that there's any sense in using the linux version of Comodo's AV to protect against this sort of government spyware? As far as I...
Truecrypt is cross-platform, it works on all Windows versions, but it's not full-disk encryption. It creates encrypted virtual hard disks that are...
You can also use Truecrypt for deniable encryption, meaning that you can create several virtual hard disks, and if pressured only give up the...
Separate names with a comma.