<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Onion Archives - Jay Longley</title>
	<atom:link href="https://jaylongley.com/tag/onion/feed/" rel="self" type="application/rss+xml" />
	<link>https://jaylongley.com/tag/onion/</link>
	<description>Innovator, Technologist &#38; Aviator</description>
	<lastBuildDate>Thu, 21 Mar 2024 17:58:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jaylongley.com/wp-content/uploads/2022/09/cropped-skull01-32x32.jpg</url>
	<title>Onion Archives - Jay Longley</title>
	<link>https://jaylongley.com/tag/onion/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Why Journalists Must Use Onion Sites</title>
		<link>https://jaylongley.com/why-journalists-must-switch-to-using-onion-sites-and-securedrop-for-confidential-communication/</link>
					<comments>https://jaylongley.com/why-journalists-must-switch-to-using-onion-sites-and-securedrop-for-confidential-communication/#comments</comments>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Wed, 13 Mar 2024 17:55:47 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Anonymous]]></category>
		<category><![CDATA[Onion]]></category>
		<category><![CDATA[Onionsite]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Secure]]></category>
		<category><![CDATA[SecureDrop]]></category>
		<category><![CDATA[Tor]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=1038</guid>

					<description><![CDATA[<p>Jay Longley on why Journalists need to use the Dark Web, Tor, Onionsites, and SecureDrop to keep sources private</p>
<p>The post <a href="https://jaylongley.com/why-journalists-must-switch-to-using-onion-sites-and-securedrop-for-confidential-communication/">Why Journalists Must Use Onion Sites</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3><p>Introduction:</p></h3>



<p>For investigative journalists, keeping information safe and sources anonymous is crucial. Traditional methods aren&#8217;t always secure enough. This piece highlights why onion sites and SecureDrop are essential for secure, confidential communication with sources.</p>



<h3><p>Understanding Onion Sites:</p></h3>



<p>Onion sites end with &#8220;.onion&#8221; and are part of the Tor network, offering unmatched privacy in addition to security. Their complex encryption ensures that communications stay confidential and anonymous, ideal for journalist-source interactions.</p>



<h3><p>The Essence of SecureDrop:</p></h3>



<p>SecureDrop, an open-source system designed for whistleblowers, allows anonymous, secure exchanges between journalists and sources. It uses strong encryption to keep shared information confidential further protecting source identities.</p>



<p><h3>Why Journalists Need SecureDrop:</h3></p>



<ul class="wp-block-list">
<li><strong>Protecting Sources:</strong><br>To keep sources safe and encourage story sharing, journalists need a secure, and equally important, an anonymous way to communicate. SecureDrop provides this digital protection.</li>



<li><strong>Preserving Integrity:</strong><br>Journalistic integrity is vital. SecureDrop supports confidential discussions, enabling reporters to investigate sensitive issues without further risking their ethics.</li>



<li><strong>Defending Against Surveillance:</strong><br>With government and corporate surveillance threats, it&#8217;s crucial to have a secure communication method. Onion sites and SecureDrop offer protection, keeping journalistic work and sources safe from prying eyes.</li>



<li><strong>Building Trust:</strong><br>Trust is the foundation of journalism. Using SecureDrop shows sources that journalists take confidentiality seriously, encouraging more to share their stories.</li>
</ul>



<p><strong>Setting Up the Technology:</strong><br>Journalists wondering how to implement these tools should consult cybersecurity experts to further their knowledge before attempting.</p>



<p>Further, if you would like to use TOR, you can set it up using TAILS and you can test it by viewing my onion site.  To setup TOR using TAILS you can use this guide here:<br><a href="https://tacticalware.com/how-to-access-tor-safely/" target="_blank" rel="noreferrer noopener">https://tacticalware.com/how-to-access-tor-safely/</a></p>



<p>Furthermore, a practical example of an onion address can be found here on my contact me page:<br><a href="https://jaylongley.com/#contact" target="_blank" rel="noreferrer noopener">https://jaylongley.com/#contact</a></p>



<p>And for those interested in moving forward and creating their own sites using confidential communication for journalists, may consult a guide such as one found here:<br><a href="https://tacticalware.com/how-to-setup-a-tor-onionsite-on-apache/" target="_blank" rel="noreferrer noopener">https://tacticalware.com/how-to-setup-a-tor-onionsite-on-apache/</a></p>



<p><h3>Conclusion</h3></p>


<p>Onion sites and SecureDrop are vital for journalism&#8217;s future, finally offering security and confidentiality in an era where privacy is scarce. What&#8217;s more, they enable journalists to protect their sources and maintain journalism&#8217;s core values in the digital age. Every journalist should consider these tools as indispensable for their work to further protect their sources.</p>
<!-- /wp:post-content --><p>The post <a href="https://jaylongley.com/why-journalists-must-switch-to-using-onion-sites-and-securedrop-for-confidential-communication/">Why Journalists Must Use Onion Sites</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jaylongley.com/why-journalists-must-switch-to-using-onion-sites-and-securedrop-for-confidential-communication/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Using TOR and the Dark Web for Enhanced Privacy</title>
		<link>https://jaylongley.com/using-tor-and-the-dark-web-for-enhanced-privacy/</link>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Thu, 07 Mar 2024 16:14:31 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Anonymity]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Onion]]></category>
		<category><![CDATA[Onionsite]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Tor]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=1034</guid>

					<description><![CDATA[<p>Why ALL Businesses should use TOR and Create Onionsites</p>
<p>The post <a href="https://jaylongley.com/using-tor-and-the-dark-web-for-enhanced-privacy/">Using TOR and the Dark Web for Enhanced Privacy</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><h3>Introduction</h3></p>



<p>For individuals and organizations committed to safeguarding freedom of speech, protecting sensitive data, and ensuring secure communication channels&#8230; We have a solution.  TOR, along with its onion sites, are a beacon of privacy in a world of monitoring and surveillance. In this article, we dive into <strong>TOR for enhanced privacy</strong>, highlight <strong>the benefits of onion sites</strong> , and discuss <strong>bypassing censorship with TOR</strong>.</p>



<p><h3>The TOR Advantage</h3></p>



<p><strong>Anonymity and Privacy:</strong><br>Known for its layered encryption, TOR, The Onion Router, anonymizes internet traffic through multiple servers.  After all, each server, within each layer of the onion it adds security.  Making it nearly impossible for malicious actors to trace communications. Likewise this encryption is a shield against data breaches and cyber-attacks.  Also using <strong>the benefits of onion sites</strong>, and maintaining anonymity, and above all it protects your identity.</p>



<p><strong>Bypassing Censorship:</strong><br>TOR stands as a fortress against censorship, while enabling access to unrestricted information. For this reason it&#8217;s a critical tool for those in restrictive environments.  When <strong>bypassing censorship with TOR</strong>, you are allowed open communications and the flow of information, which is crucial, in repressed areas.</p>



<p><strong>Security Against Traffic Analysis:</strong><br>In contrast to regular communication methods which can be subject to interception and analysis, TOR encrypts data at each node. Furthermore this complexity thwarts attempts to monitor or decipher traffic, reinforcing <strong>TOR for enhanced privacy</strong>.</p>



<p><h3>Onion Sites for Organizations</h3></p>



<p><strong>Enhanced Security for Web Services:</strong><br>Onion sites, specific to the TOR network, offer an additional layer of security for hosting web services. This approach minimizes exposure to cyber threats, showcasing <strong>the benefits of onion sites</strong>.</p>



<p><strong>Mitigating Man-in-the-Middle Attacks:</strong><br>With end-to-end encryption, onion sites within the TOR network are safeguarded against interception, ensuring private and secure user interactions.</p>



<p><strong>Building Trust with Privacy-Conscious Users:</strong><br>Adopting onion sites allow for data privacy, improving trust among users and enhancing an organization’s reputation in the digital privacy realm.</p>



<p><h3>Privacy Allows for Better Communication</h3></p>



<p><strong>Protection Against Surveillance:</strong><br>Privacy serves as the foundation for secure, honest communication, free from surveillance, allowing for the exchange of ideas.</p>



<p>To read more on how to use TOR with TAILS, see my article here:<br><a href="https://tacticalware.com/how-to-access-tor-safely/" target="_blank" rel="noreferrer noopener">https://tacticalware.com/how-to-access-tor-safely/</a></p>



<p>If you would like to read about why I think Journalists need to use TOR, see my article here:<br><a href="https://jaylongley.com/why-journalists-must-switch-to-using-onion-sites-and-securedrop-for-confidential-communication/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/why-journalists-must-switch-to-using-onion-sites-and-securedrop-for-confidential-communication/</a><br></p>



<p><h3>In Summary</h3></p>



<p>While we live within a world filled with cyber threats and privacy challenges, TOR and onion sites emerge as essential tools.  These tools allow for privacy, security, and freedom. Likewise, by integrating these tools, organizations and individuals can strengthen their defenses, build trust, and ensure an environment where unfiltered communication thrives. Privacy is not just a benefit but also a necessity for a secure, open digital future, echoed through <strong>TOR for enhanced privacy</strong>, <strong>the benefits of onion sites</strong>, and the empowerment from <strong>bypassing censorship with TOR</strong>.</p>



<p></p>
<p>The post <a href="https://jaylongley.com/using-tor-and-the-dark-web-for-enhanced-privacy/">Using TOR and the Dark Web for Enhanced Privacy</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
