Ex-Minister of International Trade Peter Van Loan confirmed June 2nd, 2011, that the Harper Government would be tabling a massive crime bill that Fall . Included in this crime bill is lawful access legislation, previously known as bills C-50, C-51, and C-52 . At the time this is being written (09/2011) it is unknown whether or not legislation such as the “Canadian DMCA” bill C-32 will be included in this crime bill. This lawful access legislation mandates the disclosure of Internet provider customer information to government and police without any warrant, in addition to requiring Internet providers to dramatically re-work their networks to allow for real-time surveillance. Lawful access legislation negatively affects the privacy of all Canadians.
The Pirate Party of Canada recognizes that Canadians want to be able to legally share information anonymously and securely, and in doing so preserve what should be their basic right to privacy. On this page we are providing a list and short summary of ways anyone can preserve this right, in addition to links to important documentation on how to use the programs involved. Read the documentation; learn how to use these programs correctly.
The Invisible Internet Project (I2P) can be used for anonymous and encrypted bittorrent downloads, and has a built in bittorrent client called I2PSnark. I2P also allows for anonymous browsing and hosting of “Eepsites” hosted in I2P. Another similar project is The Onion Router (TOR). TOR can be used for anonymously viewing websites, and has hidden services with .onion pseudo-top-level domains. It should be noted that while TOR allows for anonymous web surfing, using bittorrent over TOR is a bad idea and is bad for the network . I2P should be used for bittorrent. Additionally, information sent over TOR can be plainly read at exit nodes and so using an additional layer of encryption with GNU Privacy Guard (GPG) is recommended. GPG can also be used in a variety of situations to preserve the users privacy (e.g. email, Facebook, etc…) While browsing Eepsites and .onion sites it is important to use tools such as the Firefox add-on NoScript to protect from malicious scripts in websites that could compromise your anonymity. Lastly, it should be noted that IRC can be used with both I2P and TOR for anonymous and encrypted communication. One should however, read the IRC anonymity guide linked to in this page.
IRC anonymity guide:
GNU Privacy Guard:
Windows installation instructions for I2P, TOR, and Freenet: