For journalists, anonymous web surfing is a must

11:54 AM
For journalists, anonymous web surfing is a must -

In the media industry where "credibility is the name of the game," any information and sources to be used to familiarize the general public is essential and must be kept safe at all times, by both journalists and media companies.

with British government and its project survey project powers of law underway, the police and security services have received new powers. the said Bill has also gathered some reviews the part of media lawyers focusing on how it could be used to spy on journalists and their sources.

However, it is not only journalists based in the United Kingdom should be aware of the tools and techniques they can use for themselves and their sources of surveillance protection, especially if they manage investigative projects that have highly confidential information, and if they speak whistleblowers.

Aside from the encryption of documents included in their work ﹘ articles being or confidential documents ﹘ passed over them as it is an essential thing to connect to the Internet for web other valuable information, it is also a must for them surf the web anonymously to prevent piracy on the information of their personal and media companies. Complete web anonymous surfing can only be achieved through the use of Tor (The Onion Router) software, and / or encrypted VPN Service , when connecting to the Internet.

Whenever we connect to the Internet, our identity is revealed through a unique IP (Internet Protocol) address. Each connection we make, whether for websites, email and other servers, can be traced through our IP.

This simply means that, even if journalists make use of reasonable encryption for their documents, the identity of whistleblowers of their revelations and those they work with can be found . Because of this, especially in dramatic situations, secure anonymous surfing should certainly be done.

One of the simplest ways to achieve this is by using a Tor software that anonymous connections by sending them through a series of intermediate nodes (computers running the Tor software "relay" mode), before finally accessing the site through the endpoint system, the output node.

However, with Tor, even if the network is encrypted, the output node will transmit data as it was at the beginning. Simply put, the user is responsible to encrypt their communications, or their anonymity may be compromised. Care should also be taken when the links are followed from external applications such as related PDF file that is open will not be running through Tor by default and can unmask the user a great risk to the dog company custody. Always using the latest version of the software is also highly recommended.

Another way of surf anonymously online is to register and have an account on best VPN (Virtual Private Network) services , much better if it is ultra secure, encrypted VPN . In a word, VPN starting point is to relay your connections. When you connect to the Internet while using a VPN, IP address, you seem to be connecting from is that the VPN server, not your original IP address. And so, all your data is encrypted between your computer and the VPN server.

VPN services vary in their levels of security. It is best to use a Best VPN Service who does not connect any user activity, such as FrootVPN . It is because data retention and registration of activities can be dangerous because the information collected can be presented to governments and law enforcement agencies when a threatening situation arises.

In addition to Tor and VPN be great tools anonymous web surfing , these can also be used to access Web sites that have been blocked. Especially for journalists who work and always travel to handle different media covers and beats using a VPN or Tor is an essential gesture. In countries operating a particularly aggressive censorship of the Internet, such as Iran (for war coverage), China and Saudi Arabia, or even Western governments doing their movement toward censorship Internet, such as Australia, Italy, France and the United Kingdom (which were all placed under surveillance in the annual Reporters Without borders Enemies of the Internet report in 2010 following moves to implement their own filters ), access to sites commonly used by journalists (in social media correspondents particular) for coherent new updates, like Twitter or even Google itself may be limited. But with secure VPN However, any media practitioner can be allowed to circumvent these restrictions, regardless of their physical location.

News source: journalism.co.uk

Previous
Next Post »
0 Komentar