Off-the-Record Messaging

Purpose: Off-the-Record Messaging (OTR) is an encryption protocol making it possible to engage in private conversations using specific instant messaging software. Its aim is to provide a platform that enables both encrypted and ‘deniable’ instant messaging conversations [CPU02]. ‘Deniable authentication’ allows participants in an instant messaging conversation to verify each…

Continue reading

Emerging encryption software

Purpose: New types of encryption software are being developed that aim to address the vulnerabilities associated with traditional forms of encryption such as Public Key Encryption. At issue with traditional methods are traceability of authorship through the use of digital signatures (no true anonymity) and the decryption of messages and…

Continue reading

Low Tech or Non-Cryptographic Techniques

Purpose: There are options for preserving privacy and security that do not rely upon cryptographic technologies. Rather some people choose a selection of workarounds for communicating sensitive information. Techniques The most well known techniques include: Pseudonyms – a fictitious name used in place of a person’s real name to mask…

Continue reading

Tor

Purpose: Tor is software that directs Internet traffic through a network of relay servers in order to conceal the source and destination of the traffic. It allows for the anonymous sharing of information over the Internet, and can be used to circumvent Internet censorship (TOR01). Tor also enables the creation…

Continue reading

Freenet

Purpose: Freenet is a peer-to-peer platform designed to enable the anonymous publishing and retrieval of information, in order to counter the censorship of information on the Internet (FRE01). Freenet is not a proxy for accessing the Internet anonymously; it allows access only to content that has been inserted into the…

Continue reading