Want to Try Anonymity on the Internet or the Dark Web? New Tor Browser 8 is here… and free

Data Breach

The Tor browser, which helps anonymize your internetting, has been updated to version 8.  It’s free and worth having on your desktop.

First, these steps simple install a secondary browser on your computer.  No spyware.  It’s not illegal.  It’s just a simple browser.

Download it here.  It will ask you to customize the experience, generally, the answer is no.  That will take you to the main home page.

Second, tap on the upper right green globe and take a quick tour.  Explanations of privacy, the tor network, security, and tips are helpful.

Third, jump on the internet by hitting the X in the upper right corner of the white box on the screen.

This will take you to the search page… DuckDuckGo, not Google.  “Duck” does not save your search history.

You can also hit the link to read the Tor Manual there.

Fourth, type URL in the search bar just like you would in other browsers.  It is slower (that’s the anonymizing part) but it is not easily traced back to your IP address.

Happy Tor browsing.  Read carefully about settings and behavior so you do not accidentally leak out personal information.  Oh, and nothing is 100% safe.  Someone could find you on Tor, it’s possible.

Privacy
Florida Wiretap Act — Reasonable Expectation of Privacy in Someone Else’s House? (Smiley v. Florida)

Corey Smiley was at someone else’s home with an invitation when the discussion turned argumentative, and the other person “began recording the argument on her cell phone… position[ing] the phone in front of Smiley’s face… Smiley questions her about the recording and grabs the phone…” He later was arrested and …

Data Breach
Christopher Hopkins Presents Keynote Cybersecurity Presentation at Florida Dispute Resolution Conference

Special thanks to the Florida Dispute Resolution Center and the 1,000+ attendees at this year’s ADR: Options and Opportunities (27th annual) Conference. My keynote address covered various forms of cybersecurity risks (not just for mediators) including phishing, spearfishing, WiFi Pineapple man in the middle attacks, DDOS attacks, physical attacks, and …

Internet
When You See People Trying to Sue a Social Media Platform Because Their Account Was Suspended, It’s a Stunt (lessons of the CDA & Brittain v. Twitter)

A number of politicians, activists, and others who feel aggrieved after their Twitter, Facebook, Instagram, and/or YouTube content has been removed or their accounts suspended have taken to the courts to sue the social media platforms with claims that they are being singled out, muzzled, or their free speech is …