Boykott des PICS Ratingsystem - Gegen privatisierte Zensur
Download "Big Brother is watching you" Poster
from G. Orwells »1984« as Win 95 Startup Logo
CONTENT
DIRECT INPUT
|
YOUR ANONYMIZED SURF STARTS HERE
Begin surfing anonymously in any of these ways:
Email comments to comment@anonymizer.com
|
- ANON-WWW-PROXY
Ermöglicht das Einrichten eines anonymen WWW-Accounts, so daß das eigene WWW-Angebot
anonym im Web steht und der Zugriff seitens des Besuchers ebenfalls anonym erfolgt.
- JANUS
JANUS nimmt Requests von Browsern entgegen und entfernt alle Informationen, die Rückschlüsse auf den Benutzer zulassen.
Dazu wird die absolute URL zu einer Seite mit RSA verschlüsselt, der URL wird eine Versionsnummer vorangestellt und beides wird nach dem BASE64-Verfahren codiert, so daß diese als Referenz für einen Server benutzt werden können.
Bei einer Anfrage mit einer verschlüsselten URL entschlüsselt JANUS diese und leitet die Anfrage an den Server weiter, ohne daß der Benutzer weiß, wohin die Anfrage geleitet wird.
Alle Referenzen in der Antwort des Servers werden wiederum verschlüsselt, bevor die Antwort an den Client weitergegeben wird.
- Cypherpunks Eternity Service
This site supports the

Campaign
(local mirror page from 15.07.1997)
- Pirmasenser Zeitung-Proxy INFO
- LITNET-Proxy: proxy.ktu.lt (IP: 193.219.61.9) Portnumber: 8080 INFO
- Nanjing-Proxy University of Chicago: nanjing.spc.uchicago.edu Portnumber: 8001
- Charon-Proxy
INFO
- UNCC-Proxy: http://www.cs.uncc.edu/cgi-bin/proxy
(for automatic proxy configuration) INFO
- LAFN-Proxy: www.lafn.org Portnumber: 80
- Unix AG-Proxy: www-cache.unix-ag.uni.kl.de Portnumber: 3128
- DFN-Proxy: www-cache.dfn.de Portnumber: 8080
- University of Stuttgart-Proxy: wwwproxy.uni-stuttgart.de Portnumber: 8080
- FITUG-Proxy: http-XXXX.proxy.fitug.de Portnumber: 80, 8080 anstelle von XXXX einsetzen
- Interstroom-Proxy: proxy.interstroom.nl Portnumber: 8080
MUFFIN
a free Filter-Proxy-Server, written in Java for your local hard drive and web browser
with many options to block cookies, changes the REFER and USER-AGENT header,
strip unwanted HTML tags, switch off java and javascript and many more things.
Over the following links you can test, what informations are transmitted over the HTTP-Protocol about you:
this site is not powered by
- Pointers to cryptographic software
- Secure File System
live encryption program for your hard disc
- Secure Device 1.4
creates IDEA encrypted drives over device-drivers on your hard disc
- Secure Drive 1.4 b
SecureDrive is a 2.7K TSR that encrypts up to 4 hard disk partitions
(and/or 2 floppy drives) using IDEA in CFB mode, allowing free access
to the encrypted information by applications
- International PGP homepage
"Pretty Good Privacy" Encryption program for e-mails and files
- GUI4PGP
german PGP shell with simple use
- PGPclick
english PGP shell for PGP 2.6.3, works like PGP 5.0
- AEgis Shell
good PGP shell in english
- JAPF
"Jürgens Agent-PGP-Frontend"
einfache und freie PGP-Shell speziell für das E-Mail Programm Agent,
aber auch für andere PGP Zwecke einsetzbar.
- GDPGP
a PGP plug-in for the e-mail program Pegasus Mail 32-bit version
- JVPPGP
a PGP 2.6.3 and 5.0(i) plug-in for the e-mail program Pegasus Mail 32-bit version
- PGPfone
Encryption program for calls
- Nautilus
encryption program for calls under DOS/LINUX/SunOS/SOLARIS
- Speak Freely
encryption program for calls
- CryptoEx
von PGP lizensiertes deutsches PGP 2.6.3 Plug-in für Exchange und Outlook
- Mixmaster Remailersoftware für DOS
von Ulf Möller
- Blowfish Advanced 97
a file and folder encryption tool with implemented Blowfish standard,
Blowfish with 32 rounds, Triple-DES, CAST, RC4 and Cobra algorithm, comes with
integrated standard and SFS file wiping utility for wiping sensitive data in 35 rounds
- BestCrypt for Win 95 and Win NT
encrypts your data, with the algorithms DES in CBC mode, GOST 28147-89 in
CFB mode or Blowfish in CBC mode with 256 bit key length, 16 rounds,
in special container files, which are mounted to virtual drives ,
comes with an integrated (swap) file wiping utility to erase data
in a secure way
- F-Secure Desktop
from the company, who made the popular virus scanner F-Prot.
F-Secure is a program to encrypt folders and files in different categories
with the Triple-DES or Blowfish algorithm. It comes with a comfortable user
interface and integrated file wiping utility, works inside the Explorer too.
- Fortify
The export grade Netscape only generates and uses 40-bit secret keys for SSL encryption.
Fortify simply arranges for Netscape (english versions only) to generate and/or use
128-bit secret keys whenever possible.
After use of Fortify you have a Netscape executable that is
equally as strong as the U.S.
domestic version, the next time you connect
to any full strength SSL server, 128-bit
encryption will be used, end-to-end, from the server right through to your browser.
- Password Safe
a free program from Bruce Schneier, you can store all of your passwords in an administration tool,
encrypted with the Blowfish algorithm.
Very useful for a high number of different passwords
- Magic and Encrypted Magic Folders
a program, that hides and encrypts the folders on your hard disc
- CodedDrag
a shell extension for encrypting files in the explorer.
Works with the Blowfish, Triple-DES and DES algorithm.
Developed by the university of Linz
- Steganography Info and Archive
- Steganography tools for Windows
a free steganographic tool, which hides data in BMP an GIF pictures
or WAV sound files over "drag and drop".
Operates with IDEA, DES, Triple-DES and MDC algorithm
- Steganos for Windows 95
steganographic program for Windows 95, hides all kinds of data
in pictures (BMP, DIB), sound files (WAV, VOC) and in all kinds of
ASCII files or HTML documents. The used HWY1-algorithm generates an
outputstream, compatible to the "Alleged RC4" algorithm.
The integrated Shredder delets files and overwrite them with pseudo-random
data three times
- Stego
Online (a pleasure for NSA and FBI ???) - steganographic program from Romana Machado
- Stego-Seiten
von Burkhard Schröder
- Private Idaho Version 2.8
the original version from Joel McNamara.
An universal tool to en- and decrypt e-mails with PGP, PGP-shell,
use of cypherpunk and mixmaster remailers, nymserver frontend,
works fine togehter with all known mailreaders
- Private Idaho Version 3.4 t
the advanced version from Ian Lynagh
- Private Idaho 1.2.0
the 32-bit version from H. G. Martin
- Potato
a freeware DOS utility for remailers, it provides support for
Cypherpunk, Mixmaster, and pseudo-anonymous "newnym" remailers,
including encrypted attachments, UUE attachments, MIME mail, and
extensive header support. Potato also includes a Nym Editor for
easy editing and maintenance of nym accounts and multiple reply
blocks, and a Decrypt utility for automatic decryption of nym mail
- Jack B. Nymble
a remailer help program from Potato Software for Windows95 for
easy use of anonymous and pseudo-anonymous remailers, more
configurable and complex than Private Idaho
- Garbage Can
program for file deletion under Win95, which fills the specifications
after the orders of the US-Department of Defense (DoD) and the Guide
to Understanding Data Remanence in Automated Information Systems
(NCSC-TG-025) from the Computer Security Center.
- Real Delete 1.02
program for file deletion under DOS
- Win Real Delete 1.0
Windows shell for Real Delete
- Nuke 1.11
a file wiping utility with several levels of file deletion and overwriting
- Scorch
a secure file overwrite utility that has been optimised for speed
when used on large files, especially for use with the Windows95 swap file
Several levels of security are offered, from a one pass overwrite
to seven pass overwrites, each file overwrite is followed by a
"file commit" call. After the overwrites, the file pointer is invalidated,
the file is renamed and the file time and date are zeroed.
Finally, it is deleted.
- BestCrypt Wipe utility
to erase and shred files, folders, the free disk space
and the content of the windows swapfile
- Galactus: File wiping utilities index
- Spam-Attack
mail programm with integrated list of spammers,
delets spam e-mail before retrieving
- Spam Hater
this program analyses the retrieved spam e-mail and generates
automatically responses to the authors and postmaster
Some links for further information
SUPPORT
because on 17 September 1997,
their UK website was shutdown
by their ISP Easynet PLC
- Polizeiliche Online-Informationssysteme
von Stefan Winkler
Übersicht zu INPOL, SIS, EIS, APIS, DISPOL
- Widerspruchsformular an die Telekom
gegen Komfortauskunft, Adressweitergabe und CD-ROM Veröffentlichung
- Big Brother's Gesetze (11 Kb)
wichtige Auszüge und Paragraphen des Telekommunikationsgesetzes (TKG),
Begleitgesetzes zum TKG (BegleitG), zum Informations- und Kommunikationsdienstegesetzes
(IuKDG), Gesetz zum Artikel 10 GG (G10), Strafprozessordnung (StPO),
Außenwirtschaftsgesetz (AWG)
- Das "Ministerium für Wahrheit"
-oder: Warum Absicherung von Datenübertragungen, Kryptografie und Steganografie nötig sind-
Infos zu ENCHELON; TKG; EUROPOL und anderem (under construction)
- Spy Tech Agency - SpyLINKS
- Virtual World of Intelligence Master Spy Operations
- The Complete, Unofficial
TEMPEST Information Page
by Joel McNamara (Private Idaho)
© by raven