"An anonymous reader writes with word that MIT researchers "created an
alternative to Tor, a network messaging system called Vuvuzela that
pollutes the network with dummy data so the NSA won't know who's
talking to who." Initial tests show the systems overhead adding a
44-second delay, but the network can work fine and preserve anonymity
even it has more than 50% of servers compromised."
-- source: http://yro.slashdot.org/story/15/12/13/1522224
Dept. of Computer Science
University of Waikato, NZ
+64 (7) 858-5174
A guide for the perplexed. As in, if you weren’t perplexed before
reading this, you will be after
<http://www.adequacy.org/stories/2001.12.2.42056.2147.html>. Watch out
for that nasty Lunix and that devil incarnate, Linyos Torovoltos!
Seems like there are some other similar gems to be found on that site,
all dating from the early ’00s. Nice that they keep it online.
One of the presentations at the upcoming Kiwicon in Wellington is going
to be about a device built out of a Raspberry π Zero using “nothing
more than off-the-shelf components and "questionable life choices"”. It
looks for attempts to connect to Instagram and other “social-media
vanity” sites (including rugby), and blocks them by returning bogus
Quote: “It is exceptionally effective at selfie-drenched "music"
festivals and coffee shops”.