[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/hack/ - Network Security

325f7164bc9f243cffaab287122f588d

Catalog

See 8chan's new software in development (discuss) (help out)
Infinity Next update (Jan 4 2016)
Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 3 per post.


File: 1413396076062.png (275.21 KB, 1345x1751, 1345:1751, 1366050319554.png)

 No.285

Sometimes the best offense is a good defense

Discuss ways to protect yourself in this new wild west.

I will post and share as much as I know.

Stay anonymous anon.

 No.286

File: 1413396510277.jpg (361.4 KB, 700x719, 700:719, 1366844698023.jpg)

>>285
It is always a better idea to use a program that is free (as in freedom) and open source then it is for a professional closed source program.

Closed source programs could have security holes that are either placed there intentionally or their response to fixing these holes takes some time.

With things that are open source most security issues are fixed immediately when they are discovered.

Using GNU/Linux or *BSD is usually a better bet then Windows or Mac

 No.287

File: 1413396783259.jpg (127.92 KB, 550x550, 1:1, 1375127380550.jpg)

>>285
Running a live operating via CD is an amazing way to stay anonymous.

As long as you don't mount your hard drive, using a CD operating system is like have a fresh start every time. Anything you do is deleted when you are done. This is why you cannot install Tails onto your computer, it is CD only

 No.288

File: 1413397006910.png (127.2 KB, 1045x580, 209:116, botnet.png)

>>285
Another info-graph

 No.289

File: 1413397164511.jpg (1.93 MB, 2550x3300, 17:22, 1377302671065.jpg)


 No.290

File: 1413397308991.jpg (540.57 KB, 2550x3300, 17:22, firefox-version-guide.jpg)

>>285
Using a browser that respects your freedom is important

Firefox has tons of addons that will help you stay anonymous

my favorites are https everywhere and no script

 No.293

>>288

So urmm.. I should probably stop using chrome then ? haha.. no seriously who does anything naughty in chrome.

 No.306

>>287
Snowden leaks, showed the NSA/FBI hates TAILS, because they cannot get anything from those computers. Its pretty much they stare at their computers at FBI HQ, and see a number, but that's it. Nothing behind that number.

 No.312

- Firefox
- No Facebook
- Twitter is eh, not heard anything too bad about it in terms of NSA data mining but it's probably happening anyway.
- Cryptocat
- Encrypted drive
- Malware Bytes
- Avast
- File attribute monitors

Pretty much the basics of what I run.

 No.329

>>285
http://blog.kaspersky.com/alternative-browsers/

Which one should I use? I heard Comodo comes from Chromium, so idk.

 No.343

>>312
TPB has posted a link to frootVPN. Well I gave it a change and well the connection is stable and good so I highly recommend that you anons using it.

 No.355

It's to bad its soon going to cost money.

 No.376

>>285
this guide is retarded
>guide for anonymity
>doesn't say to ditch Windows which is a bigger botnet than chrome
>Google is your enemy
>you can still use skype
this guy is a proprietary shill who doesn't understand that all of you privacy is fucked if you use closed source software.

 No.452

>>376
not going to claim actual knowledge of shit codewise, but just sayin, Microsoft's business model is selling pay-for-use software, Google's is targeted advertising, which necessarily requires knowing a lot about their users. It's been a while since I've used Skype, but I only ever remember seeing ads FOR Skype, so, I'm pretty sure that business model is "upsell"

 No.454

>>329
I think they make a new one based off of Firefox. IceDragon or some shit

 No.544

wtf

 No.604

File: 1426290422317-0.png (654.59 KB, 1361x3055, 1361:3055, 1415569875938.png)

File: 1426290422317-1.png (617.53 KB, 1024x4380, 256:1095, 1413049873520.png)

File: 1426290422317-2.png (1.07 MB, 650x6350, 13:127, 1423227577301.png)

Ok this thread needs stepping up

OP that info is a little incompleate - sure it helps but it is in no way a privacy guide.

TAILS TAILS TAILS
VPN VPN VPN

Profit!

Not all VPNs are the same - some are probably in bed with NSA!

Recomend: Mullvad - sweeden, Pure VPN - switzland, Air VPN run by people who are serious! As far as I have seen these 3 are pritty good!

If your runnig Virtual servers - again its all about location, location, location… Iceland being one of the last places in the west to truly respect privacy! Followed by Switzland (no one fucks with them.. WW1 WW2?)… then Sweeden who did have very good privacy laws… they are being erroded tho… Still better than the rest… you could go full foil and use some Iran VPN -NSA/GCHQ wont be getting any info requests served from them!

Now Tails is not a day to day system its a use and run deal.

For your day to day you need a GNU+Linux OS - no winblows, no OSX… (you can easly dule boot if you must - mint makes this very easy)

I reccomed for the ease of use Linux Mint - its fucking sweet - so easy to install and setup - seriously my gran could do that in 5min!

Steping it up for more Freedom look at Gentoo or Arch.

Browser = firefox… nothing else Anon.
Facebook is just spilling shit about you all the time - you dont need that.
You dont need a youtube account,
You dont need a Google account,
You dont NEED Google mail.. go finad another for fucks sake… Go get a real email service (FREE) and totaly encrypted:
https://protonmail.ch

For coms do not use SKYPE! or normal email etc…
Safe to use coms programs are:
QTOX - this replaces skype
RETORSHARE - whole encrypted networking and comunications app with its own email, file share, channels and forums - ALL encryped!
CRYPTOCAT - addon to firefox, chat rooms, communal and private.

Use PGP encryption for solid encryption over normal channels - 2 people setup right using PGP could communicate over GMAIL without contence being read.
http://gpg4win.org/
https://www.gnupg.org/download/

An alternative to TOR (not Tails) is i2p network and Freenet. i2p is an encrypted layer and allows access to a "dark" net.
Freenet is a peer to peer distributed network (fully encrypted) that is decentralized - i.e. they could not take down servers because we all become servers! - I will let you seek the path from here on…

Now you got all that… follow the info GRFX!

 No.701

Adblock plus / ghostery / disconnent / don't track me an all that shit is junk. They either log all your activity and still send it to their own servers like ghostery. ABP uses their power to still allow ads and makes millions doing so. Other trackers still log everything and sell this data to advertising companies.

Use open source Ublock Origin and no script. Nothing else is required.


 No.703

optimum security to me

- Encrypted hard-drive and encrypted backup (of course, don't write the password anywhere. just memorize it)

- Firewall to block 99% of connexion. Just keeping the most useful. When there is a doubt, saving the data into a pcap for further analysis. don't trust anything.

- Double VPN (paid by bitcoin with no log policy) over TOR using a hacked or public Wi-Fi, use an alternative DNS (not google) with a software that has a kill switch (cut all network connection if the vpn is disconnected)

- Change Wi-Fi hotspot often (use a Ya-Gi antenna if necessary)

- Use open source software if you can (and actually check the source if you have time)

- Update all your applications often

- No flash, no java

- don't open any files from an untrusted source

- Use firefox, no history, disable all plugins, spoof user-agent, use noscript, ghostery, adblock edge and https everywhere

- Create a mail account on protonmail.com (mailbox encrypted, end-to-end encryption between user). No gmail, no yahoo, no live.

- Never use the same password twice

- Remove all unnecessary cookies after navigation

- Save "dangerous" files on a RAM disk. To be sure that there is no writing on the harddrive

- Shutdown your computer entirely at night (even laptop), to avoid cold boot attacks

- Keep you up-to-date on hacking attacks and exploit

I may be overly paranoid thou. But I think this is 99.999% safe.

Worst case scenario :

Untrusted VPN and fake TOR exit. If the TOR exit node is corrupted, they can reach your VPN. The thing is that the VPN use the same exit node for everyone. This is why using double VPN is interesting, if some authorities ask your VPN to track your back, they will only be able to track the first VPN, which is shared by many. BUT, if they have a warrant against you, they can start monitoring data in real time and then found… your public Wi-Fi IP, they can't track your real name if you have payed by bitcoins. Then they will have to physically locate you and take your computer to do a cold boot attack on it.

But you have to do something really bad to get caught.


 No.728

It may sound stupid, but I am looking for a mentor in the field. I can learn a little from books, a lot from listening, and everything by doing. I am looking for a mentor to start walking me through the learning process.


 No.739

>>728

it's not stupid at all it's why i created /blackhat/ becuase there are a lack of reliable teachers


 No.788

File: 1452357598722.gif (1.64 MB, 300x225, 4:3, 132.gif)

>>288

>>288

>>288

>mfw I'm using Chrome right now

when it comes to computers, I'm practically normie. I have work to do.




[Return][Go to top][Catalog][Post a Reply]
Delete Post [ ]
[]
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]