Pete Loshin writes and consults about Internet protocols and open source network technologies. Formerly on staff at BYTE Magazine, Information Security Magazine and other publications, his work appears regularly in leading trade publications and websites including CPU, Computerworld, PC Magazine, EarthWeb, Internet.com, and CNN.Pete Loshin, Independent Consultant
Diplomat or investigator, whistleblower or a political refugee fearing for your life; some have cause to use the internet anonymously. Yet privacy is dead - and that's on the authority of Google, as Peter Loshin reminds us at the beginning of his book Practical Anonymity. --Professional Security, November 2013 Loshin, a cybersecurity expert, introduces the Tor Project and Tor Browser Bundle, an open-source solution for those with a legitimate reason to maintain anonymity or circumvent censorship on the Internet. He includes diagrams showing how the Tor network works, tips for e-mailing anonymously, and resources. --Reference & Research Book News, October 2013 ...the book is easy to read and reasonably well organized. The coverage of Tor is very complete and far easier to read than the Tor documentation... If you are moderately technical and are looking for a book on the capabilities of Tor, then this is a good book to start with. --Escaped...from a Twisted Mind blog, September 2013 ...[in Practical Anonymity] Loshin does a decent job of presenting the topic, including why Tor is important, and who it could most benefit... the book [Simple Steps to Data Encryption] starts with an overview of how to use GnuPG (Gnu Privacy Guard). --Slashdot.org, September 2013