VIKINGtrich
Member
Im not computer literate when it comes to all the technical talk....But would a proxy site like "HidemyAss" work? I really do want to be more careful online, but I'm not a computer programmer either...lol...
Just fyi-
The majority of us (and I've been an IT assistant before) won't understand half the shit you are talking about.
When you write 3 pages worth of info, citing a billion different plug ins/programs/different version of operating systems, nobody is going to be able to fallow it, or even want to.
If you want to really help, explain what to do in 5 steps, and keep each step under 3 sentences.
And overall, if cops/leo is after your computer shit, trying to track your internet activities, you've already fucked up in some way.
Real world security/procedures is much more important then going to conspiracy theory internet security status.
Seriously, most people have no idea what that shit means...blah blah blah blah proxy blah blah safe....lol....the awareness part is great, its the words that fucked me up....
..anyways, HidemyAss...good or bad? Will it keep me safe from spying eyes?
I think it's a good idea you are trying to help others, but, you are spreading FUD and have a few things mixed up. I will try explain what I mean in your post, and offer suggestions about how to do things 'right'.
If you're using any Microsoft based OS you already failed from a security viewpoint. You should be using *nix, at least Ubuntu, but better yet using BSD or some other hardened *nix OS, but, Ubuntu is good enough for most people and most windows users can learn it pretty easily. Ubuntu is freeware and open source. If using Ubuntu then make sure to WDE (whole disk encryption) and use > 1gig RAM and disable paging file.
If someone has to use Windows, then it's most wise to use TrueCrypt to encrypt the system as WDE (Whole Disk Encryption) and use the Hidden OS feature. That means LEO tries to access you computer they will be unable to, the whole disk is encrypted, and if they force you via court order to decrypt the disk then you simply give them the passphrase to "honey pot" OS. The honey pot OS is second OS installed that is not the one you use day to day. The honey pot OS will have no incriminating data on it. This is important due to the vast amount of data left on a Windows OS, and the fact with NFTS filesystems you can't be sure you securely shredded evidence like browsing history, documents, etc. There are many steps that must be taken to secure a windows OS, it's almost not worth the effort, mostly because windows is closed source so you can't trust it.
The best way to use Windows is to use Ubuntu and setup a virtual machine (VM) to run Windows. That way Windows will be setup to not be allowed to access the Internet, and you can still use windows programs (if they don't work under the windows emulator WINE in Ubuntu). TrueCrypt is available for Ubuntu, and it might be possible to setup a VM of Windows using TrueCrypt to encrypt the Windows VM a la WDE with hidden OS feature (untested, but I plan to test it someday soon).
There area many areas in a Windows install that you need to configured to make it more secure, such as disabling System Restore, Shadow Volume Copy, Write Behind Disk Cache, encrypt (or disable) SWAP (aka paging) file, setup a restricted guest account and only use the guest account, disable various services (see BlackViper services website), setup a firewall with "stealth ports" mode (windows firewall sucks ass; Comodo is good and free), setup a good virus scanner, malware scanner (like Malware Bytes and Super Anti Spyware), etc, etc, etc...
So, in short, for a secure computer use Ubuntu (or even Kubuntu), enable WDE when installing from Ubuntu Live-Cd and make sure the firewall has stealthed ports.
Going even a step further, one could use a Live-CD or Live-DVD as their OS (see link below). So, they could use Windows for normal stuff they don't worry about, and use a Live-CD or Live-DVD for anonymity related stuff. Using the Tor Live-CD below is a great way to go. Live-OS's leave zero data on the HDD, they only use RAM...however, using Live-OSs limits their usability big time, e.g., you can't save files, bookmarks, etc (unless using a Live-USB but that kind of defeats the purpose of using a Live-OS unless the Live-USB is encrypted). Thus, for usability we are back to Ubuntu with WDE with Microsoft inside VM that isn't allowed to access the Internet if one needs Microsoft.
Here are two great resources:
1. Tor Live-CD/Live-USB:
Incognito + Amnesia = The (Amnesic) Incognito Live System: https://amnesia.boum.org/ (the SSL cert is not from a SSL cert authority, it's self signed, so you will need to accept it in the browser)
2. Setup secure VM browsing with Tor inside Ubuntu:
"More Secure Tor Browsing Through A Virtual Machine in Ubuntu" I uploaded that PDF to this post.
It's easy enough to remove meta-data from pics...also, just disable GPS geo-tagging in the phone, the same goes for new cameras and all smart phones.
You are posting lots of misinformation and FUD. To remove meta-data read my posts on the subject in this sub-forum, or the other myriad of posts on the subject in this sub-forum.
If anyone is posting pics/video's without using Tor if they worry about anonymity then they failed anyway. Also, google doesn't know what ISP you use if you don't use google, and don't allow google via cross-site scripting.
What has "provided enough information"? Do you mean meta-data from pics? That claim smells like FUD to me, do you have any proof they got raided due to meta-data? And do you really mean "a bunch", that is more than half a dozen...
Do neither of those for security, simply download the free Ubuntu and install it on your HDD setting up WDE...
Please do not use that add-on, you need to use TorButton with Tor! It is a must for a myriad of reasons I don't fell like covering here.
Please read my posts in this thread, and use the add-ons I suggest in that thread for a sufficient level of security and anonymity:
https://www.icmag.com/ic/showthread.php?t=194459
If someone is using Tor but not TorButton with Firefox they are sticking out like a soar thumb and they are very vulnerable to a myriad of attacks on their anonymity. Not using TorButton with Tor is a major fail.
Just use the RefControl add-on I wrote about in that thread I linked to above. Done and done. Then you can visit FOO.com from icmag.com and FOO.com only sees a referrer for FOO.com.
That is total FUD man. Sure SSL can be broken, but it's not non-trivial and it's not done by LEA, nor by hackers. What is more likely to happen is MIM (Man In the Middle) attacks, SSL spoofing, etc. But it's not nearly as easy as you are implying. Current SSL is safe, more of a worry is SSL cert authorities, that is why using a self-singed cert is often a better choice.
Blowfish is NOT better "encryption than the military", no matter what bit length; Blowfish is old. The best option for strong encryption is using an algorithm chain, e.g. AES > Twofish > Serpent. And make sure to use a hash algorithm that adds salt, like SHA-512 or better yet use Whirlpool (third version).
FreeOTFE is not a good choice, people should use TrueCrypt if they want to make encrypted volumes, and they should use the "hidden volume" feature; which is analogous to the "hidden OS" feature in TrueCrypt I wrote about above. Also, with TrueCrypt you can use the encryption algorithm chain and hash algorithms I listed above; which are much better than using Blowfish.
You cannot "specify as many connections as possible" in Tor, you only get to use 3 nodes for non-hidden service surfing. I.e., your computer > Tor entry node > Tor middleman node > Tor exit node. There is no proven security or anonymity gained with node chains longer than 3.
No it does not. Tor uses standard encryption via OpenSSL (IIRC Tor uses TLS), and data is encrypted with 3 'layers', once at your computer, a second time at the entry node and a third time at the middleman node; then the exit node decrypts the layers and passes the data on to the website "in the clear".
If using HTTP with Tor (which is a bad idea if one can use HTTPS), then the data from the Tor exit node is not encrypted en route to the website. That means the Tor exit node can "sniff" all the data "packets" and see what is being transferred like passwords, posts, etc. That is why if using Tor then it's very important to try and use HTTPS, especially when entering passwords. For ICmag a Tor user should always use HTTPS. See the thread I linked to above for my directions on configuring NoScript to force HTTPS at ICmag and for Icmag cookies too.
On that point: cookies, especially HTML 5 cookies, aka EverCookies, are very dangerous for anonymity. See the thread I linked to for info about the only way to remove EverCookies (re: BleachBit).
The thread I linked to covers lots of topics about security and anonymity for Internet traffic, issues such as JavaScript, etc.
You do not need to configure a firewall/router to use Tor. Have you even used Tor before? You only need to configure firewall/routers (i.e. open incoming ports/port forward 9001 and 9030) if you are running a Tor node...
If using Tor one should configure their local firewall to stealth all ports, this defeats port scanners, etc. In fact, one should stealth all ports all the time, and if using online gaming, running a Tor node, etc., then one would need to forward specific ports.
What you wrote will provide much reduced anonymity and security, you didn't even discuss issues about Javascript that can fully break anonymity when using Tor. When using Tor it's imperative to use Firefox and TorButton add-on, and it's wise to use the other add-ons I listed in the thread I linked to above.
Done and done. Sorry if I seem kind of terse, it's just that the info you provided is very flawed and will make people worse off because they think they are anonymous and secure when in fact they are not. It's very important to know what you are writing about before suggesting tips to people that can make or break their freedom.
Really man, com one! That is such bad advise I don't even know where to start. Just use WDE via Ubuntu and no one will be able to access any data on your HDD. Better yet would be using WDE with hidden OS feature via TrueCrypt in case someone tortures you to get the passphrase, or you are court ordered give the passphrase otherwise facing jail time; but the hidden OS feature of TrueCrypt is only available with Windows IIRC.
Using a Live-CD/Live-DVD (I linked to above) is another route to take but one can't save data unless using an encrypted USB or encrypted container on the HDD.
Yes it is, if using proper methods. But the safer route is to use WDE, then one doesn't need to worry about evidence as long as one wouldn't be forced to give up the passphrase; and in the U.S. courts can't force you to give up the passphrase (AFAIK).
Oops, I'll edit the main thread post, wicked, thanks for the info!
You need sdelete in the current directory of kill.bat if you want to be able to use it, and cipher.exe in your system32 dir.
What the hell, it's 2.9 mb 'compressed', I don't understand why they'd fill it with garbage, someone upload it to a different hosting service??
You own this thread man, props . Muchos appreciated. (as ironic as that might sound) sslstrip, look'r up
I'm obviously not an officer, but I know no one 'snitched' on anyone and they must have gotten this information somehow.
The backdoors will try to do a lookup for the 'server' to connect to, the code is all there, but it'll attempt to connect to the ill-legit windows updating thing that was patched via hosts file, which will make the 'backdoor' useless.
I was under the impression tor encrypted it's content using openssh, with each node's private key.
Most users will only contend with what they have in front of them and not venture much further than that. I'd be greatful if a user decided to install tor and did 2 out of the million things mentioned here.
I would love for anyone to find that batch file online, I wrote it myself, 100%. It's a batch file, not a program. I'll 're-write it' to utilize other programs, but those are definitely being prioritized in my awesome apps list.
The reason why I added the check for cipher is because I know it's not included on most systems, only newer ones (vista and 7) but can be found on windows server os's from 2000.
As far as I recall, secure blowfish has never been broken unlike rsa? I may be wrong, but I can't recall a single instance where blowfish has ever been broken.
Use noscript to permit and deny javascript and other scripting languages from running on your computer with firefox, easily done. Shouldn't be a problem if you're running another operating system.
I don't know if this will work, but 0/43 antivirus programs threw any warnings with my zip downloaded from uploading.com....
VirusTotal analysis security in mind.zip (downloaded from uploading.com) <--- give it a second, it takes a while to queue
Just fyi-
The majority of us (and I've been an IT assistant before) won't understand half the shit you are talking about.
When you write 3 pages worth of info, citing a billion different plug ins/programs/different version of operating systems, nobody is going to be able to fallow it, or even want to.
If you want to really help, explain what to do in 5 steps, and keep each step under 3 sentences.
And overall, if cops/leo is after your computer shit, trying to track your internet activities, you've already fucked up in some way.
Real world security/procedures is much more important then going to conspiracy theory internet security status.
Just fyi-
The majority of us (and I've been an IT assistant before) won't understand half the shit you are talking about.
When you write 3 pages worth of info, citing a billion different plug ins/programs/different version of operating systems, nobody is going to be able to fallow it, or even want to.
If you want to really help, explain what to do in 5 steps, and keep each step under 3 sentences.
And overall, if cops/leo is after your computer shit, trying to track your internet activities, you've already fucked up in some way.
Real world security/procedures is much more important then going to conspiracy theory internet security status.
thanks spurr your time and effort explaining these things is much appreciated. i need to study up on those links. is chrome open source too?
peace out
headez said:Just fyi-
The majority of us (and I've been an IT assistant before) won't understand half the shit you are talking about.
When you write 3 pages worth of info, citing a billion different plug ins/programs/different version of operating systems, nobody is going to be able to fallow it, or even want to.
If you want to really help, explain what to do in 5 steps, and keep each step under 3 sentences.
And overall, if cops/leo is after your computer shit, trying to track your internet activities, you've already fucked up in some way.
Real world security/procedures is much more important then going to conspiracy theory internet security status.
for once....
im with this guy.
especialy the last 2 parts.
if LEO is asking, your 2 late.
if you go into pentagon mode....your never going to be able to do it, ISP's keep cache for warrents(usualy for child porn offendors)
TWC seams to keep cache of activites for 30 days.
verizon i think had a clause where they dont delete any cache, like google.
is chrome open source too?
peace out
To all the naysayers about Internet security/anonymity:
I would like to point out that when cannabisworld and overgrow were taken down by the RMCP and DEA, they got access to the serves hosting both sites, and that means they would have gained access to all IP address in the logs of both sites. Thus, if someone who used to post on those two sites didn't use a proxy like Tor, there is a very good chance their IP address is/was known to feds in Canada and the US.
Considering the feds in both counties have acted against cananbis sites in the past, I hope that gives naysayers pause about their false sense of security/anonymity in terms of not trying to hide their IP address from their ISP, Icmag, and any Internet backbones (that are all owned by the US, IIRC) their data packets traverse...
spurr said:To all the naysayers about Internet security/anonymity:
I would like to point out that when cannabisworld and overgrow were taken down by the RMCP and DEA, they got access to the serves hosting both sites, and that means they would have gained access to all IP address in the logs of both sites. Thus, if someone who used to post on those two sites didn't use a proxy like Tor, there is a very good chance their IP address is/was known to feds in Canada and the US.
Considering the feds in both counties have acted against cananbis sites in the past, I hope that gives naysayers pause about their false sense of security/anonymity in terms of not trying to hide their IP address from their ISP, Icmag, and any Internet backbones (that are all owned by the US, IIRC) their data packets traverse..
Yet nobody got busted after overgrow was taken down.
IC is hosted in another country, will never be shut down.
I applaud you trying to help people, obviously you can't be too safe. But realistically the majority of people will either pass it by or laugh at its complexity. No skin off your back, sure, just time wasted.
I tried to find a news article where a grow bust occurred due to an ISP snooping, forwarding the info to LEO, them investigating, securing a warrant, and then busting the person. I couldn't find one. In order for your theory to be correct, there would have be not one, but multiple dozen cases where it is shown that your internet activities alone initiated an investigation which lead to a grow bust.
Your notion that it is important to have your computer locked out DURING a bust makes no sense to me. If you get raided, and they find your grow in full working order, them finding out that you posted in a grow forum about said grow isn't going to hurt your case.
Just like if you own tons of illegal guns and they find out you posted pictures online of the guns.
You aren't taking the real world statistics into mind. Given our economy, and how busy LEO is to begin with, not to mention the thousands and thousands of tips they receive, the amount of LEO who literally sits around and looks through what random people are looking at online is very small. And even if it wasn't, how many millions of people have ISPs? What are your odds of being selected. ISPs sole purpose in life is to make money. They do what they have to in order to keep LEOs happy, beyond that, they could care less what you are doing online.
The bottom line is people need to 100% focus their security on real world scenarios first, not being anonymous online where they essentially already are.
I DO think that if you are already being investigated and THEN they look into your internet activities (again couldn't find an article to support this) then ya, that could hurt your case. But if they are already investigating you, you've done something wrong.
You are an online version of Mel Gibson in Conspiracy Theory and that is totally fine, but don't say everyone else is risking there freedom by not taking it to the extreme you are.