ICT 410 Lecture Notes - Lecture 22: Telephone Tapping, Anonymous Remailer, Stored Communications Act
Document Summary
Tor: encrypted proxy network, also an anonymizing network. Tor browser is used to keep your anonymity. Tor: in 2004 the us navy had research labs. The military personnel allowed them to conduct searches without revealing their physical locations. One way to hide your ip address is by using a proxy. Tor allows you to hide your ip address. You want to obscure your hardware and software. Two ways to hide your ip address. There isn"t any control over exit node. Revamping of telephone wiretapping act of 1968. Protection of telephone conversations on wired telephones. Limits the government"s ability to compel isps (internet service providers) to turn over content and non-content information (metadata) Handles all the private and public keys. Type a passphrase and it"ll generate the public key and the private key for you. Allows you to fake an email address.