Archives for Tor

The Nonsecure Internet Protocol Router Network (NIPRNet)

The Nonsecure Internet Protocol Router Network (NIPRNet) is basically the same thing as the Secret Internet Protocol Router Network (SIPRNet), with the exception of what the two are used for. NIPRNet was created in the 1980s for the purpose of transmitting sensitive but unclassified information among “internal” users; it also allowed the “internal” users to access the regular Internet. NIPRNet is made up of Internet Protocol routers which are owned by the United States Department of Defense (DoD). Today NIPRNet is the largest private network in the world and is still growing.   The NIPRNet Verses the SIPRNet As I
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Why the World Needs Cryptocurrencies

If you have never heard of the term “cryptocurrencies” then please read my other article Cryptocurrencies A Possible Alternative to Traditional Banking before you read this one.   Why Cryptocurrencies Are Critical To Our Freedom Cryptocurrencies bring a simple choice to people today and that is the choice to be in control of your money or for a bank to be in control. At this point in time I don’t think Bitcoin and other cryptocurrencies are at the point where everyone should go out and invest all of their money into, that would be foolish, but that does not mean
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Internet Censorship in China or “The Great Firewall of China”

As some of you may have heard there is a block on China’s access to information. The Chinese government blocks all forms of communication that they feel is necessary but in this article I am going to only refer to the internet side of things. If you don’t already know blocking access to certain sites or servers on the internet is referred to as internet censorship. Internet censorship in the People’s Republic of China (PRC) is technically overseen by the Ministry of Information Industry (MII).   The “The Great Firewall of China” The great firewall of China is a term
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Tor Exit Relays Listed In DNSBL

This article is for the people who already know what Tor is and have a basic idea of how it works. If you don’t know what Tor is or how it works, then please visit my article Tor an Anonymity Network for a general idea of what Tor is and how it works.   What DNS-based Blackhole Lists (DNSBLs) Are DNSBL stands for DNS-based Blackhole List (DNSBL) which is just the DNS based blacklists out there today that blacklist certain servers on the internet which they think are botnets. These servers are not in any way bad but many times
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Tor an Anonymity Network

This post is for people who don’t already know what Tor is. If you already know what Tor is and how to use it, then I would recommend that you read another one of my posts. What Tor Is Tor is basally an anonymity network which is made up of nodes or “relays”. These relays might also be referred to as Onion Routers (OR’s) or simply routers. These relays route information in a way that it is nearly impossible for one person or organization to compromise your anonymity. Onion routing is just that, routing information in a way where communication
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Surveillance in the Modern Age

As you may have heard there are many different security agencies and people trying to spy on our every move. Luckily there is still hope for our society. We need to use VERY strong mathematics (cryptography) to put an end to mass surveillance at least at the network level. We can use tools such as the Onion router (Tor), I2P, and Freenet for avoiding someone monitoring your upstream and to provide end-to-end encryption (as long as you don’t exit the Tor network). We also need to use tools such as PGP and OTR messaging to protect our communications that might
Read More

Categories: Information Technology, IT Security, and Preston Hood.