

This means that you can anonymously and freely surf the entire web. Once you start the application, you'll be connected to the PsiPhon servers, which give you access, through a network of proxies, to any website in the world without the danger of being discovered in the process. It uses an (optional) VPN system and SSH and HTTP Proxy masking techniques to mask your connection. The command-and-control servers receiving the information stolen by Triout have also changed, perhaps indicating that a new group has taken over.PsiPhon is an open-source browser tool aimed at circumventing the censorship suffered by millions of users in several countries around the world, where freedom of expression is restricted and not all Internet content is freely accessible. If you're targeting specific victims, you don't want to be drowned in useless information collected from thousands of unintended infections, so perhaps Triout is now being run by a criminal group just out to make money. Triout's infection methods seem to be more scattershot. Spyware apps with such powerful capabilities are often part of state-sponsored espionage campaigns, but they usually target specific victims with malicious emails or by infecting websites known to be of interest to particular groups. Nor is it clear what exactly the people running Triout want. It's not clear where Triout comes from, but most of its earliest victims were in Israel, while the latest batch are in South Korea and Germany. Triout, first detected last May, reads text messages, takes screenshots, copies photos and records phone calls, videos and GPS location from infected phones. However, the Psiphon website notes that "Psiphon does not increase your online privacy, and should not be considered or used as an online security tool." It routes internet traffic through its own proxy servers using virtual-private-network ( VPN ) and encryption software. Psiphon was created in 2006 by the University of Toronto's Citizen Lab as a tool to evade internet censorship. Its abilities to evade blocks on internet access through encrypted communications and proxy servers seem to work just as well as the uncorrupted version. The corrupted version of the Psiphon app looks and acts exactly like the real thing, however.
