HomeLogin

How Egypt defeated the Tor anonymity tool

Saturday, January 29th, 2011 at 10:15 pm.

There are many regimes throughout the world who really want to make it very difficult, or preferably impossible, for their citizens to run software which allows them to browse the Internet anonymously.

Iran is doing SSL-handshake fingerprinting in order to prevent their citizens from using Tor-connections.

China is blocking the entire Tor-network and quite a large number of Tor bridges. Users who can not access the Tor-network directly can use it through bridges – but it is possible to block all of those too because there are too few of them.

Few countries have managed to block the entire Tor network and all bridges. It seemed impossible. But how Egypt’s done it. It’s all blocked. How did they do it? Simple: They simply cut the whole country off from the Internet..

5 Responses to How Egypt defeated the Tor anonymity tool

  1. glenn says:

    guess shutting down the internet is one way to stop tor..

  2. anon says:

    Well….. Happy for those who have sattelite connection……

    • anonym says:

      True, I really should write some long in-depth article about alternative ways to stay in touch when the Internet is shut off since that seems to be a increasingly common problem these days. This does get very hard when they also shut down things like electricity since you’re basically left with carrier pidgins and things like that..

      A satellite connection seems like a easy solution, it’s probably not that easy to block those (I know too little about those and their security, I should .. read).

  3. Anonymous says:

    that they did that they did xD and about the carrier connection… they did cut that off too xD

Leave a Reply

Your email address will not be published. Fields marked * are required.

Attach image(s) (jpg/png/gif):



*
To prove you're a person (not a spam script), type the security text shown in the picture. Click here to regenerate some new text.
Anti-spam image

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


  • Are You Targeted By The NSA?
    Meet XKeyscore - "a computer network exploitation system", as described in an NSA presentation, devoted to gathering "nearly everything a user does on the internet." The German site Das Erste has exposed the shocking truth about the rules used by the
    Read whole story...
  • Scammers Gonna Scam (doh!)
    Quite a few upset people are currently using various comment sections on this blog to complain that they did not get what they paid for when they were trying to buy stolen credit cards from anonymous people. People who sell stolen credit cards
    Read whole story...
  • Tails Linux version 1.0 released
    Tails Linux version 1.0 released: a Debian-based distribution known for its strong privacy features and pre-configured for anonymous web browsing After nearly five years of development, Tails, a Debian-based distribution known for its strong privacy features and pre-configured for anonymous web browsing, has
    Read whole story...
livelyblog.com | Random blog | Login | Get your own blog | ^^^
anonymous.livelyblog.com/Login