They are forging ahead and using and installing a glut of Web 2.0 tools and applications such as peer-to-peer file sharing, Web conferencing and anonymiziers such as Tor, in addition to downloading user-generated applications from Facebook, MySpace and LinkedIn.