Archives for Freenet

The Nonsecure Internet Protocol Router Network (NIPRNet)

The Nonsecure Internet Protocol Router Network (NIPRNet) is basically the same thing as the Secret Internet Protocol Router Network (SIPRNet), with the exception of what the two are used for. NIPRNet was created in the 1980s for the purpose of transmitting sensitive but unclassified information among “internal” users; it also allowed the “internal” users to access the regular Internet. NIPRNet is made up of Internet Protocol routers which are owned by the United States Department of Defense (DoD). Today NIPRNet is the largest private network in the world and is still growing.   The NIPRNet Verses the SIPRNet As I
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Tor an Anonymity Network

This post is for people who don’t already know what Tor is. If you already know what Tor is and how to use it, then I would recommend that you read another one of my posts. What Tor Is Tor is basally an anonymity network which is made up of nodes or “relays”. These relays might also be referred to as Onion Routers (OR’s) or simply routers. These relays route information in a way that it is nearly impossible for one person or organization to compromise your anonymity. Onion routing is just that, routing information in a way where communication
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Surveillance in the Modern Age

As you may have heard there are many different security agencies and people trying to spy on our every move. Luckily there is still hope for our society. We need to use VERY strong mathematics (cryptography) to put an end to mass surveillance at least at the network level. We can use tools such as the Onion router (Tor), I2P, and Freenet for avoiding someone monitoring your upstream and to provide end-to-end encryption (as long as you don’t exit the Tor network). We also need to use tools such as PGP and OTR messaging to protect our communications that might
Read More

Categories: Information Technology, IT Security, and Preston Hood.