Upgrade to Pro — share decks privately, control downloads, hide ads and more …

A Hacker's Guide to the Internet

A Hacker's Guide to the Internet

Penelope Phippen

February 25, 2014
Tweet

More Decks by Penelope Phippen

Other Decks in Technology

Transcript

  1. Ser

  2. “Since there is no registry of these (bitcoin) addresses, people

    can use them to protect their anonymity when making a transaction.” - BBC 14 February 2014 http://bbc.in/1eYQUNI (From the ‘How Bitcoin works‘ infobox)
  3. TOR

  4. “T he NSA, they want to be able to spy

    on you. And if they have ten different options for spying on you that you know about, they have 13 ways of doing it and they do all 13” ! Jacob Applebaum - 30c3 ‘To protect and infect’
  5. Targetting individuals “who have never been charged with, let alone

    convicted of, any crimes” - http://bit.ly/1k6dHGh