Still, as a network engineer or administrator, you should familiarize yourself with the state of technology used for anonymity because you may need it yourself someday, or you may need to prevent someone from using your network and exposing your company to liability or leaking your company's intellectual property.
Another thing to keep in the back of your mind as we discuss the services below is all this talk about a "
Requires Free Membership to View
In this tip, we briefly survey a few programs and services and then provide some links for further reading.
The first thing to realize is that most of the services for anonymity are similar to peer-to-peer file sharing services in that they send your "anonymous" traffic through any number of proxies, which are in fact software on other people's PCs. Thus, if someone on your network has enabled the service, your network may be a transit used to hide anything from political dissent to whistle blowing, the difference being that these services are primarily HTTP and SSH oriented, rather than file sharing.
The two most popular services are "The Onion Router," otherwise known as TOR, and I2P. There are many differences between these services -- some subtle, others substantial -- but I2P has an excellent comparison page for several services. You can read more about them here.
The second thing to realize is that "anonymous" services aren't just for outbound access but for hosting services. You can use either of the above to host a Web site, for instance, while hiding the real location. Here is some information from TOR on this subject.
Another popular service is Freenet (which is not at all like the old "Freenet" community projects such as my favorite, Buffalo Freenet). And, of course, Gnunet, which is focused on anonymous file sharing.
|
||||
By the way, there are many other portable apps, including the whole Open Office suite.
If you're just tuning in to the anonymity scene, a quick scan of the links above will get you started and hopefully give you a good idea of what may be going on in your network, or perhaps what you could use. For much more reading, check out the Anonymity Bibliography.
Tom Lancaster, CCIE# 8829 CNX# 1105, is a consultant with 15 years of experience in the networking industry. He is co-author of several books on networking, most recently, CCSPTM: Secure PIX and Secure VPN Study Guide, published by Sybex.
This was first published in June 2006
Network Management Strategies for the CIO

Join the conversationComment
Share
Comments
Results
Contribute to the conversation