-
February 19th, 2022, 10:37 AM
#1
Junior Member
Anonymous communication private network
Hi, I am doing a project about anonymous communications. The main idea is that I have to configure a private network in which I will try differents methods like Tor, proxychains or VPN. Like I said, all this in a private network, so I am going to be able to se all the traffic and I will have to decide the best anonymity method.
I would like to know if there are similar experiments because I couldn't find much information. I also accept ideas about how could I determine which option is the best.
-
February 19th, 2022, 02:20 PM
#2
-
April 27th, 2023, 07:08 AM
#3
Member
Anonymous messaging private networks encrypt user communications. By routing data over several nodes, third parties cannot trace its origins.
Protecting users against tracking, spying, and censorship is prevalent with this network. It also helps anonymous web surfers.
-
August 29th, 2023, 04:29 AM
#4
Junior Member
 Originally Posted by 4LUAP
Hi, I am doing a project about anonymous communications. The main idea is that I have to configure a private network in which I will try differents methods like Tor, proxychains or VPN. Like I said, all this in a private network, so I am going to be able to se all the traffic and I will have to decide the best anonymity method.
I would like to know if there are similar experiments because I couldn't find much information. I also accept ideas about how could I determine which option is the best.
OK, I have been around for a long time. I realize this post is 2022 and this is 2023 but the first thing you need to do is identify operational security (opsec) vulnerability. Meaning do you need anonymous communication for a sale or do you need it for city, county, state or federal govt? If your opsec vulnerability requires you to deal with three letter federal agencies then you have a massive problem. You seem to indicate this is educational possibly university level. If that is accurate then develop differing opsec statuses. If this is real world start with the mirimir articles at iVPN and then venture over to wilders. Im done.
Similar Threads
-
By disturb in forum Miscellaneous Security Discussions
Replies: 14
Last Post: March 7th, 2004, 10:11 AM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|