Sorry for kicking my two cents here but if I lived in Egypt I wouldn't want to let anyone but the most trusted people know that I'm an atheist. Especially the route that Egypt has taken lately I wouldn't have my data collected on some anonymous website on the internet.
This website doesn't collect identifying information Umbra, except for an email address, which is used solely to limit attempts to sabotage the integrity of the information submitted. Don't worry, we are pretty paranoid as it is around here. :~)
I admire your courage. However, please note your service provider in Egypt traces and records your activity on the Internet, and has absolute control over your access.
This includes every web site you visit, and every computer involved in routing you to that web site. For example, the complete path from my computer to ThinkAtheist.com is posted below. That is only the beginning. Your ISP can also see and log everything you read and everything you write online, unless you're using a secure SSL/TLS connection.
In other words, you are exposed and vulnerable unless you take precautions to ensure you are safely anonymous.
gallup@eternal ~ $ traceroute thinkatheist.com
traceroute to thinkatheist.com (126.96.36.199), 30 hops max, 60 byte packets
1 192.168.1.1 (192.168.1.1) 0.982 ms 0.996 ms 1.019 ms
2 10.240.96.1 (10.240.96.1) 15.897 ms 17.009 ms 16.932 ms
3 crr02chcpma-tge-0-0-0-6.chcp.ma.charter.com (188.8.131.52) 16.855 ms 17.229 ms 19.093 ms
4 crr03oxfrma-tge-0-3-0-6.oxfr.ma.charter.com (184.108.40.206) 20.729 ms crr04oxfrma-tge-0-1-0-3.oxfr.ma.charter.com (220.127.116.11) 19.662 ms 19.843 ms
5 bbr02oxfrma-bue-1.oxfr.ma.charter.com (18.104.22.168) 27.159 ms 27.084 ms 26.487 ms
6 bbr02ashbva-bue-2.ashb.va.charter.com (22.214.171.124) 40.593 ms 29.346 ms 29.556 ms
7 te0-7-0-8.ccr22.iad02.atlas.cogentco.com (126.96.36.199) 26.869 ms 22.610 ms 26.859 ms
8 te0-5-0-2.ccr22.dca01.atlas.cogentco.com (188.8.131.52) 27.856 ms te0-1-0-5.ccr22.dca01.atlas.cogentco.com (184.108.40.206) 27.689 ms te0-4-0-1.ccr22.dca01.atlas.cogentco.com (220.127.116.11) 26.927 ms
9 te0-7-0-3.ccr22.ord01.atlas.cogentco.com (18.104.22.168) 49.255 ms 49.077 ms te0-1-0-4.ccr22.ord01.atlas.cogentco.com (22.214.171.124) 48.561 ms
10 te0-3-0-0.ccr22.mci01.atlas.cogentco.com (126.96.36.199) 74.186 ms te0-0-0-3.ccr22.mci01.atlas.cogentco.com (188.8.131.52) 73.443 ms te0-2-0-4.ccr22.mci01.atlas.cogentco.com (184.108.40.206) 74.017 ms
11 te0-2-0-6.ccr22.sfo01.atlas.cogentco.com (220.127.116.11) 101.979 ms te0-2-0-2.ccr22.sfo01.atlas.cogentco.com (18.104.22.168) 105.564 ms te0-1-0-3.ccr22.sfo01.atlas.cogentco.com (22.214.171.124) 92.346 ms
12 te0-0-0-6.ccr22.sjc01.atlas.cogentco.com (126.96.36.199) 96.490 ms te0-3-0-5.ccr22.sjc01.atlas.cogentco.com (188.8.131.52) 95.948 ms te0-0-0-6.ccr22.sjc01.atlas.cogentco.com (184.108.40.206) 91.624 ms
13 te0-0-0-7.ccr22.sjc03.atlas.cogentco.com (220.127.116.11) 96.881 ms 96.803 ms te0-2-0-7.ccr22.sjc03.atlas.cogentco.com (18.104.22.168) 96.083 ms
14 te4-2.mag01.sjc03.atlas.cogentco.com (22.214.171.124) 95.163 ms 98.731 ms 99.010 ms
15 * * *
16 * * *
17 * * *
18 * * *
19 * * *
20 * * *
21 * * *
22 * * *
23 * * *
24 * * *
25 * * *
26 * * *
27 * * *
28 * * *
29 * * *
30 * * *
gallup@eternal ~ $
I'm well aware of the situation, thanks for informing the people more.
I'd like also to add that using TOR (even though a determined adversary could do things, but you should not be worried for all intended purposes) or I2P (www.i2p2.de). Or as you stated, utilize a friendly darknet to access the Internet.
Although that's kinda old school now, most ISPs/Govs utilize tagging, which is far more effective and harder to avoid or get rid of as ISPs could easily inject tagging advertisements in platforms like Facebook or Youtube that will get embedded in the browser local storage or even store it across browsers through 3rd party plugins/extensions through LSOs.
You sound more technical than I expected. Tell me you're using Linux or BSD.
Although that's kinda old school now,
When you're as young as you, everything is old school.
most ISPs/Govs utilize tagging, which is far more effective and harder to avoid or get rid of as ISPs could easily inject tagging advertisements in platforms like Facebook or Youtube that will get embedded in the browser local storage or even store it across browsers through 3rd party plugins/extensions through LSOs.
If the remote host is trustworthy, the connection is routed over TOR, encrypted end-to-end, and the session data is stored in volatile memory, that's about as safe as it gets (short of jetting over to Estonia).
It makes tracing and eavesdropping (pretty close to) impossible, and there's nothing written to local storage to worry about deleting. Turn off the computer or end the session and you vanish like a stack of pancakes on Sunday morning.
Of course, the downside is that none of your LSO settings ever get saved. But it's not worth losing a head over.
Try Tails Linux if you haven't already. I have a copy running on VirtualBox for curiosity's sake although I haven't much cause to use it.
And... Facebook? If you're using Facebook, and Windows or Apple, then for security's sake you might as well convert back to Islam and start praying they never find you.
Good luck, my new friend.
just a question .. which one is better (Tor or I2P2) regarding security and being user friendly?
I'm just now reading your question or I would have responded sooner.
I prefer Tor for security and the Tails linux distro for user friendliness. Boot into a live CD of Tails and you're good to go. You could also try the Tor Browser Bundle but for the truly paranoid Tails is supreme. Make sure you read and understand the documentation before you depend on Tor to use the deep web. Here are a few deep web resources that will start you off once you're ready.
The support community for Tor is very good. If you can't figure something out, you can almost always find someone who can. I also like that Tor was developed originally by the US Navy for intelligence purposes: military grade security. Most university and private sector research and support is centered on Tor as well.
I must admit I know less about I2P than Tor. I2P has a reputation for technical excellence but the support and development community is much smaller and less visible, and I2P is less documented than Tor. I'm not sure how much of a future I2P has so Tor seems like a safer bet.
Hi Muhammad - I like the way you are thinking. Here is my one. The world is now small enough so lets all get signed up.
This might be worth a look to "hide" you internet presence and IP address
Now that I'm feeling nice and paranoid, I wonder if any of you technology experts could tell me if this is possible/currently being done: could an intelligence entity access and search the internet activity of a large number of users for targeted phrases or website visits with the goal of filtering out who is doing/thinking certain things on the internet?