Shows you how to use the most effective and widely-used anonymity tools---the ones that protect activists, diplomats, military and other government agencies---to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.
Contents
Anonymity and Censorship Circumvention -- Using the Tor Browser Bundle -- Using Tails -- Tor Relays, Bridges, and Obfsproxy -- Sharing Tor Resources -- Tor Hidden Services -- E-mail Security and Anonymity Practices -- Appendix A -- Validating Tor Software -- Appendix B -- When Tor Downloads Are Blocked -- Appendix C -- Getting Help and Finding Answers.