Tor Browser Bundle Download– The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
Tails Operating System– Is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. Tails article at Charles Caroll Society including download info
TrueCrypt– Open Source Encryption. Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Provides plausible deniability.TrueCrypt article at Charles Caroll Society including download info
I2P- An anonymous overlay network – a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. I2P article at Charles Caroll Society including download info
Main Core– There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously
[…] week I had the pleasure of being interviewed on the very popular Radio Free Redoubt (RFR) by John Jacob Schmidt. During the interview we talked about the American Redoubt Darknet […]
Bravo! Great interview. I’m an electronic & computer engineer but was not up to speed on I2P & Tails. Needless to say, I am now. Many thanks to you and Alex Barron.
Great show and very informative. I new there was a way to get around discretely. My only question would be, what about the MAC address? Is it not unique to each individual computer and can be traced?
I had a buddy in college that was a computer major that would change his too crazy things from time to time and don’t ask me how in the world he did it.
GUYS THIS INFO. IS SUPER!!! THANKS.
[…] week I had the pleasure of being interviewed on the very popular Radio Free Redoubt (RFR) by John Jacob Schmidt. During the interview we talked about the American Redoubt Darknet […]
HI GUYS. I HAVE TROUBLE OPENING THE I2P WEBSITE. PLEASE ADVICE.
Here is the link, seemed to open up fine on this end? https://geti2p.net/en/
Bravo! Great interview. I’m an electronic & computer engineer but was not up to speed on I2P & Tails. Needless to say, I am now. Many thanks to you and Alex Barron.
P.S. Check your RMS mail box 😉
I downloaded the Tor Browser and started making “White Noise”
Thanks for making that information available and sharing with us techno challenged types
Great show and very informative. I new there was a way to get around discretely. My only question would be, what about the MAC address? Is it not unique to each individual computer and can be traced?
I had a buddy in college that was a computer major that would change his too crazy things from time to time and don’t ask me how in the world he did it.