CreditsLast Updated 2015-05
This module covers specific browsing practices and tools for remaining anonymous online, and circumvention for accessing blocked or censored content online. Many tools and strategies to circumvent Internet restrictions are in existence today; however, some tools offer more security features than others, and may be better for your unique needs for security than others.
The number of countries where the use of encryption is illegal has decreased, but legal concerns are still very real for some participants. Before a training, review the laws of where your participants live and work, as well as the laws of where you’re conducting the training, to confirm that the use of technologies highlighted in this session, including the Tor Browser Bundle, is allowed.
Comment directly on any of this page's content, using the Hypothes.is toolbar found in the upper right-hand corner of this page.