ICT 410 Lecture Notes - Lecture 22: Telephone Tapping, Anonymous Remailer, Stored Communications Act

30 views3 pages

Document Summary

Tor: encrypted proxy network, also an anonymizing network. Tor browser is used to keep your anonymity. Tor: in 2004 the us navy had research labs. The military personnel allowed them to conduct searches without revealing their physical locations. One way to hide your ip address is by using a proxy. Tor allows you to hide your ip address. You want to obscure your hardware and software. Two ways to hide your ip address. There isn"t any control over exit node. Revamping of telephone wiretapping act of 1968. Protection of telephone conversations on wired telephones. Limits the government"s ability to compel isps (internet service providers) to turn over content and non-content information (metadata) Handles all the private and public keys. Type a passphrase and it"ll generate the public key and the private key for you. Allows you to fake an email address.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers