Archives for Anonymity Networks

Why the World Needs Cryptocurrencies

If you have never heard of the term “cryptocurrencies” then please read my other article Cryptocurrencies A Possible Alternative to Traditional Banking before you read this one.   Why Cryptocurrencies Are Critical To Our Freedom Cryptocurrencies bring a simple choice to people today and that is the choice to be in control of your money or for a bank to be in control. At this point in time I don’t think Bitcoin and other cryptocurrencies are at the point where everyone should go out and invest all of their money into, that would be foolish, but that does not mean
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Internet Censorship in China or “The Great Firewall of China”

As some of you may have heard there is a block on China’s access to information. The Chinese government blocks all forms of communication that they feel is necessary but in this article I am going to only refer to the internet side of things. If you don’t already know blocking access to certain sites or servers on the internet is referred to as internet censorship. Internet censorship in the People’s Republic of China (PRC) is technically overseen by the Ministry of Information Industry (MII).   The “The Great Firewall of China” The great firewall of China is a term
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Tor Exit Relays Listed In DNSBL

This article is for the people who already know what Tor is and have a basic idea of how it works. If you don’t know what Tor is or how it works, then please visit my article Tor an Anonymity Network for a general idea of what Tor is and how it works.   What DNS-based Blackhole Lists (DNSBLs) Are DNSBL stands for DNS-based Blackhole List (DNSBL) which is just the DNS based blacklists out there today that blacklist certain servers on the internet which they think are botnets. These servers are not in any way bad but many times
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Tor an Anonymity Network

This post is for people who don’t already know what Tor is. If you already know what Tor is and how to use it, then I would recommend that you read another one of my posts. What Tor Is Tor is basally an anonymity network which is made up of nodes or “relays”. These relays might also be referred to as Onion Routers (OR’s) or simply routers. These relays route information in a way that it is nearly impossible for one person or organization to compromise your anonymity. Onion routing is just that, routing information in a way where communication
Read More

Categories: Information Technology, IT Security, and Preston Hood.