SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Tor Instant Messaging Bundle - A New
Anonymous and Encrypted messaging
Software[1]
Friday, February 28, 2014 by Swati Khandelwal [2]
784 419 Buffer2 Reddit8 36

[3]
We are living in an era of Mass Surveillance, conducted by the Government Agencies like
the NSA[4] and GCHQ, and we ourselves gave them an open invitation as we all have
sensors in our pockets that track us everywhere we go i.e. Smartphone. Encryption[5] and
security are more important today than any other time in our history. So, the best
proactive way to keep your tracks clear is - Always use only trusted privacy tools and
services.
The same folks behind the Anonymity Tool, Tor Browser Bundle [6] is currently
working on a new Privacy tool called 'Tor Instant Messaging Bundle' (TIMB), that will
help you with encrypted communication to keep your online conversations private.
The Tor is the free software that lets users browse the Internet anonymously and
mostly used by activists, journalists and to conceal their online activities from prying
eyes.
Tor Instant Messaging Bundle, or TIMB is a real time anonymous chat system, that will
simply route all of your chat data through the Tor's encrypted network, which uses
proxy servers to hide the identities of its users, according to the documents posted[7]
from the Tor Project's 2014 Winter Dev Meeting. The client itself will be built on top of
Instantbird[8], an open source instant messaging service.
The Tor Instant Messaging Bundle will encrypt user messages multiple times, including
destination IP, making it sufficiently difficult to trace the original source.
Since the governments are engaged in the widespread data collection and analysis,
using various gateways such as Cell phone location information, the Internet, Camera
observations, and Drones. As technology and analytics advance, mass surveillance
opportunities continue to grow. In which, the Tor Instant Messaging Bundle can come
out to be the world's most secure real-time communication tool.
"People in countries where communication for the purpose of activism is met with
intimidation, violence, and prosecution will be able to avoid the scrutiny of criminal
cartels, corrupt officials, and authoritarian governments," states the Tor TIMB
project.
By the end of March, the experimental test builds of Tor Instant Messaging Bundle
(TIMB) is expected to be available, but the first experimental release won't include 'Off
The Record' (OTR) capability. OTR mode provides strong encryption for instant
messaging conversations.
"Tor has grown popular over the past few years as a way of surfing the Web while
blocking network surveillance, analysis of your traffic, or other monitoring that
threatens personal freedom and privacy, confidential business activities and
relationships, and state security," states the Tor Project founders. "The group's work
is all the more significant following reports of NSA's foreign and domestic
surveillance activities."
But, every technology has positive and negative aspects as well. Since, Tor is also a
Deep Web [9] friendly tool that allows hackers and cyber criminals to carry out illicit
activities.
It's a matter of concern, but we have to adopt measures to protect our privacy now, as
the former NSA contractor Edward Snowden[10] said:
"A child born today will grow up with no conception of privacy at all. They’ll never
know what it means to have a private moment to themselves an unrecorded,
unanalyzed thought. And that’s a problem because privacy matters, privacy is what
allows us to determine who we are and who we want to be. Together we can find a
better balance, end mass surveillance and remind the government that if it really
wants to know how we feel asking is always cheaper than spying."
The NSA has been trying to hack into the Tor network for years, and the FBI was
recently caught seizing data from TorMail[11], an anonymous email service, and trying
to use that data to catch hackers.
1. http://thehackernews.com/2014/02/tor-instant-messaging-bundle-new.html
2. http://thehackernews.com/p/authors.html
3. http://4.bp.blogspot.com/-IptO1ZJLMQ/UxG4fSYCUcI/AAAAAAAAAIQ/NkZJZ0sZM4o/s1600/Tor-Instant-Messaging-BundleDownload.png
4. http://thehackernews.com/search/label/NSA
5. http://thehackernews.com/search/label/encryption
6. http://thehackernews.com/search/label/tor
7. https://trac.torproject.org/projects/tor/wiki/org/meetings/2014WinterDevMeeting/notes/RoadmapTIMB
8. http://www.instantbird.org/
9. http://thehackernews.com/2012/05/what-is-deep-web-first-trip-into-abyss.html
10. http://thehackernews.com/search/label/Edward%20Snowden
11. http://thehackernews.com/2014/01/FBI-seized-TorMail-database-hacking-news.html

Más contenido relacionado

Más de Vision Concepts Infrastructure Services Solution

Más de Vision Concepts Infrastructure Services Solution (20)

NetApp To Offer Integrated Storage Array And Virtualization Software
NetApp To Offer Integrated Storage Array And Virtualization SoftwareNetApp To Offer Integrated Storage Array And Virtualization Software
NetApp To Offer Integrated Storage Array And Virtualization Software
 
Big Data - Security Concerns
Big Data - Security ConcernsBig Data - Security Concerns
Big Data - Security Concerns
 
Apple adding hundreds of new engineers and operations staff in China to speed...
Apple adding hundreds of new engineers and operations staff in China to speed...Apple adding hundreds of new engineers and operations staff in China to speed...
Apple adding hundreds of new engineers and operations staff in China to speed...
 
Data Analytics and the Ubiquitous Internet of Things
Data Analytics and the Ubiquitous Internet of ThingsData Analytics and the Ubiquitous Internet of Things
Data Analytics and the Ubiquitous Internet of Things
 
Citrix UniPrint NetGain Case Study
Citrix UniPrint NetGain Case StudyCitrix UniPrint NetGain Case Study
Citrix UniPrint NetGain Case Study
 
Uniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing SolutionUniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing Solution
 
The CIO Pocket MBA
The CIO Pocket MBAThe CIO Pocket MBA
The CIO Pocket MBA
 
Citrix Top 10 Trends
Citrix Top 10 Trends Citrix Top 10 Trends
Citrix Top 10 Trends
 
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
 
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
 
Using Concurrent Multipath Transmission for Transport Virtualization
Using Concurrent Multipath Transmission for Transport VirtualizationUsing Concurrent Multipath Transmission for Transport Virtualization
Using Concurrent Multipath Transmission for Transport Virtualization
 
GuideIT - Virtual Economies of Scale
GuideIT - Virtual Economies of Scale GuideIT - Virtual Economies of Scale
GuideIT - Virtual Economies of Scale
 
Build Your 2008R2 2-Node Cluster
Build Your 2008R2 2-Node ClusterBuild Your 2008R2 2-Node Cluster
Build Your 2008R2 2-Node Cluster
 
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
 
VDI - Zero Client Printing Solution
VDI - Zero Client Printing SolutionVDI - Zero Client Printing Solution
VDI - Zero Client Printing Solution
 
GuideIT Storage Requirements Template
GuideIT Storage Requirements TemplateGuideIT Storage Requirements Template
GuideIT Storage Requirements Template
 
GuideIT Delivery Design - Netscaler
GuideIT Delivery Design - NetscalerGuideIT Delivery Design - Netscaler
GuideIT Delivery Design - Netscaler
 
GuideIT Delivery Design - File Shares
GuideIT Delivery Design - File SharesGuideIT Delivery Design - File Shares
GuideIT Delivery Design - File Shares
 
GuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria GuideGuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria Guide
 
Guide IT Delivery Design - Security
Guide IT Delivery Design - SecurityGuide IT Delivery Design - Security
Guide IT Delivery Design - Security
 

Último

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Último (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Tor Instant Messaging Bundle - A New Anonymous and Encrypted messaging Software

  • 1. Tor Instant Messaging Bundle - A New Anonymous and Encrypted messaging Software[1] Friday, February 28, 2014 by Swati Khandelwal [2] 784 419 Buffer2 Reddit8 36 [3]
  • 2. We are living in an era of Mass Surveillance, conducted by the Government Agencies like the NSA[4] and GCHQ, and we ourselves gave them an open invitation as we all have sensors in our pockets that track us everywhere we go i.e. Smartphone. Encryption[5] and security are more important today than any other time in our history. So, the best proactive way to keep your tracks clear is - Always use only trusted privacy tools and services. The same folks behind the Anonymity Tool, Tor Browser Bundle [6] is currently working on a new Privacy tool called 'Tor Instant Messaging Bundle' (TIMB), that will help you with encrypted communication to keep your online conversations private. The Tor is the free software that lets users browse the Internet anonymously and mostly used by activists, journalists and to conceal their online activities from prying eyes. Tor Instant Messaging Bundle, or TIMB is a real time anonymous chat system, that will simply route all of your chat data through the Tor's encrypted network, which uses proxy servers to hide the identities of its users, according to the documents posted[7] from the Tor Project's 2014 Winter Dev Meeting. The client itself will be built on top of Instantbird[8], an open source instant messaging service. The Tor Instant Messaging Bundle will encrypt user messages multiple times, including destination IP, making it sufficiently difficult to trace the original source. Since the governments are engaged in the widespread data collection and analysis, using various gateways such as Cell phone location information, the Internet, Camera observations, and Drones. As technology and analytics advance, mass surveillance opportunities continue to grow. In which, the Tor Instant Messaging Bundle can come out to be the world's most secure real-time communication tool. "People in countries where communication for the purpose of activism is met with intimidation, violence, and prosecution will be able to avoid the scrutiny of criminal cartels, corrupt officials, and authoritarian governments," states the Tor TIMB project. By the end of March, the experimental test builds of Tor Instant Messaging Bundle (TIMB) is expected to be available, but the first experimental release won't include 'Off
  • 3. The Record' (OTR) capability. OTR mode provides strong encryption for instant messaging conversations. "Tor has grown popular over the past few years as a way of surfing the Web while blocking network surveillance, analysis of your traffic, or other monitoring that threatens personal freedom and privacy, confidential business activities and relationships, and state security," states the Tor Project founders. "The group's work is all the more significant following reports of NSA's foreign and domestic surveillance activities." But, every technology has positive and negative aspects as well. Since, Tor is also a Deep Web [9] friendly tool that allows hackers and cyber criminals to carry out illicit activities. It's a matter of concern, but we have to adopt measures to protect our privacy now, as the former NSA contractor Edward Snowden[10] said: "A child born today will grow up with no conception of privacy at all. They’ll never know what it means to have a private moment to themselves an unrecorded, unanalyzed thought. And that’s a problem because privacy matters, privacy is what allows us to determine who we are and who we want to be. Together we can find a better balance, end mass surveillance and remind the government that if it really wants to know how we feel asking is always cheaper than spying." The NSA has been trying to hack into the Tor network for years, and the FBI was recently caught seizing data from TorMail[11], an anonymous email service, and trying to use that data to catch hackers. 1. http://thehackernews.com/2014/02/tor-instant-messaging-bundle-new.html 2. http://thehackernews.com/p/authors.html 3. http://4.bp.blogspot.com/-IptO1ZJLMQ/UxG4fSYCUcI/AAAAAAAAAIQ/NkZJZ0sZM4o/s1600/Tor-Instant-Messaging-BundleDownload.png 4. http://thehackernews.com/search/label/NSA 5. http://thehackernews.com/search/label/encryption
  • 4. 6. http://thehackernews.com/search/label/tor 7. https://trac.torproject.org/projects/tor/wiki/org/meetings/2014WinterDevMeeting/notes/RoadmapTIMB 8. http://www.instantbird.org/ 9. http://thehackernews.com/2012/05/what-is-deep-web-first-trip-into-abyss.html 10. http://thehackernews.com/search/label/Edward%20Snowden 11. http://thehackernews.com/2014/01/FBI-seized-TorMail-database-hacking-news.html