Jump to content

How to browse the internet without being spied on.


Mercer

Recommended Posts

1 hour ago, Dark_Knight said:

Is iMessage secure? I always used it because I figured it was more secure than sms. I just hope text threads don’t get leaked one day. The world will end 

 

I would say it may be more secure than normal text but only marginally.  The idea is to keep the big tech companies out of your business and the way to do that is end to end encryption.

 

Signal App offers this.  I would switch to using Signal if I were you and encourage everyone else you know, family and friends, to do the same.  Both of my parents use it.

Link to comment
Share on other sites

  • 1 month later...
This forum is supported by the 12ozProphet Shop, so go buy a shirt and help support!
This forum is brought to you by the 12ozProphet Shop.
This forum is brought to you by the 12oz Shop.

wasn't sure where to inquire but this seems like a good place. password keepers and what do yall think of them? i want to switch all of my devices over to the brave browser but i've heard things get all fucky with your passwords through google or whatever. when i really think about it i have so fucking many. would like to store in one place. do any of yall have/use?

Link to comment
Share on other sites

16 hours ago, NightmareOnElmStreet said:

wasn't sure where to inquire but this seems like a good place. password keepers and what do yall think of them? i want to switch all of my devices over to the brave browser but i've heard things get all fucky with your passwords through google or whatever. when i really think about it i have so fucking many. would like to store in one place. do any of yall have/use?

I use LastPass, its great 2 factor erything

Link to comment
Share on other sites

No, people are ditching LastPass because of their coercion to make people upgrade to premium.

 

They were recently acquired via the acquisition of LogMeIn who owned Last Pass.

 

The new owners instantly decided LastPass, which has been free forever, now costs money to use on both your phone and your PC.  This, understandably, upset the community of users and many have jumped ship.  I shaved my legs for this?

 

I'm going to use BitWarden as @poesmentioned.... but it's going to require me to export all of my stuff out of LastPass.

 

Because, fuck greed.

Link to comment
Share on other sites

  • 3 weeks later...

Yo! @NightmareOnElmStreet I figured out my brave password issue, as why brave kept clearing my stored passwords.  I guess when brave went through and update, the option to clear logins and passwords upon exiting brave 'option' was selected by default.   

Anyhow, its been corrected so now I will have to keep an eye out for that on the next update.

  • Props 1
Link to comment
Share on other sites

  • 2 years later...

Is there a way I can print and use file sharing on my network with VPN on in a way that my printer, other pc do not leak IP?

 

I am having an issue printing when PCMatic VPN is on.   I can toggle a feature ON or OFF for local internet but if it's on so that I can communicate to the PC via file share or to the printer, this is a vulnerability with potential leaking. 

 

Any help will be greatly appreciated.

Link to comment
Share on other sites

Countermeasures --------------------------------------------------------------------------- by Thomas Icom "An ounce of prevention is worth a pound of cure." - Ben Franklin

 

With the recent crackdown on "computer hackers" and evidence that more busts are on the way modem users in general have been quite concerned that by exercising their rights they could have the S.S. knocking on their door because they called a BB S. This has prompted many telecomputists and computer bulletin board systems to cease operations for fear of being raided. With the recent raids at Steve Jackson Games and Jolnet perhaps these fears are reasonable. However, if you are committing no wrongdoings you still, despite the KGB and Gestapo like actions of the Secret Service have the right to exercise your freedom of information access via electronic media. There are only three laws relating to the use of modems and BBS systems. The first two are toll fraud and computer trespass. Toll Fraud is the avoidance of paying telephone company service charges. Computer trespass is the unauthorized access of a computer system. When you call a public BBS, or a private one you are a member of and pay for the call you are not committing either of these crimes. While they may not like the fact that you have a computer and modem, they can't touch you. The other law is not particularly computer related and goes under many different statues, but in all cases deals with encouraging people to commit illegal acts. This law applies to "illegal" information on BBS systems. What is "illegal information"? Well any information which has no educational or informational purpose that encourages people to commit a crime. When applied to BBS systems it only includes calling card/long distance telephone service codes, credit cards, and computer passwords /login sequences. That's all. Hacking and phreaking information has an educational purpose in that it teaches people computer security, and shows dangerous flaws in systems that could be used by someone for nefarious purposes. As long as no direct encouragement is given to exploit these flaws the information is not illegal and is thus protected by the First Amendment: freedom of speech. If you are a BBS owner you can have all the hacking and phreaking g-files and message bases on your system and they can't do a thing. If they do, they open themselves up to a law suit. The prime examples of this are the Private Sector, OSUNY, and The Central Office BBSes. Private Sector was raided, but no charges were filed because there were no codes, passwords, or credit cards on the BBS. OSUNY and Central Office were online for years and were the subject of many investigations, but no action was ever put forth against these BBSes as n o illegal information was on them. The precedent is there. In order to evoke First Amendment protection on your BBS or newsletter display a clear statement that the information is for educational purposes only, and that no illegal use is implied or suggested. Now of course the Secret Service often violates these laws despite the fact that in doing so they don't have a legal leg to stand on. They do this on the basis of a technique which has been used from the Middle Ages, down through Nazi Germany, up to the various activities of the KGB in the Soviet Union: Fear and Ignorance. People who are ignorant of the law become afraid because in being unaware of their rights they don't know what the government can and more importantly can't do. Due to fear and ignorance they can operate carte blanche because they know the chance of reprisal by some irate citizen is very low. Also, once they raid someone they can gain intelligence on other modem users/"hackers". Once they have the info on the system, they can give it back. They accomplished what they set out to do. Fortunately you can fight back, and your efforts will eventually be rewarded. On many of the busts the S.S. has gotten burned, and it has been plainly shown to them that they can't continue to operate this way. However no modem user has yet had the balls to sue those bastards. With the current state of affairs the charges get dropped due to various improper procedures, but no specific precedent has been set to make them liable for their illegal activities. Once they lose in a lawsuit brought against them by a modem user they screwed over, we'll see some severe restructuring in that particular branch of the Treasury Department. The first stage in protecting yourself is to be aware of the laws and your rights. Knowledge is power, and they are well aware of that. In light of that they watch themselves when dealing with people who know their rights because they know t hat those people will have them nailed to a wall if they slip. Know your rights and be adamant about them. The second stage is that if you deal in anything even slightly controversial take precautions to secure the info in your system. Encryption is a definite must, as well as any other tricks to hide data on your system and prevent tampering. When encrypting data stay away from DES. While everyone say it's the best system the NSA has not recertified it, and the fact that it was developed for the government leads enough credence to the possibility of there being a back-door in the algorithm. About the best personal encryption system I've seen out there is the Absolute Computer Security System scheme by Consumertronics. A good idea is to double encrypt the data with two different algorithms. From what was shown by the recent busts in Operation SunDevil the technological expertise of the agents wasn't too high. To quote Lloyd Blankenship of Steve Jackson games, "They don't know what subdirectories are." This means that any moderately sophisticated data hiding technique should stump t hem. I would expect though they should be getting better as time goes on. What I would do is use some of the tricks that computer viruses use when hiding data. Marking off used or "bad" sectors to put your data on, or appending it to ordinary programs. One of the best things you an do is put your data on floppy disks, then store them in a container containing a large electromagnet hooked up a tamper switch. This way if they raid you just give the box a good push an d everything's wiped. For paper documents use a burn box. This is a sturdy metal container with an incendiary mixture hooked up to a tamper switch. When they mess with it, everything is turned to ashes. You can store data "off-site" where their search warrant doesn't cover . This can be as simple as burying it in the backyard/under the shed or in a "friend's" house. Rig up special hidden access programs to your system, preferably in ROM, so that if your data isn't accessed in a certain way it gets wiped. If you want to be real nasty, put some fake "incriminating" data on your system for them to bite onto. Good suggestions would be random phone numbers with an extra 4 digits attached or random 16 digit numbers with fake names. This way it looks like they've found calling cards or credit cards. Then if they are stupid enough to take you to court, you can explain where you got them from. Even if they aren't stupid enough to fall for that trick, you still have wasted their time. Another idea would be to make a fake database of fellow hackers. This way they waste time tracking down all those false leads. These techniques would serve to make fools of these assholes. Now if you do happen to get raided or put under surveillance there are a number of things you can do. If you see any "strange activity" outside your house call the police. If some "strange people" come on your property you can warn them that it's private property and then have them arrested for trespassing. You can also go outside and start taking pictures or videotaping them. That pisses them off but they are generally loath to do anything because you'll have evidence against them. If they come over to ask you questions politely refuse and tell them to talk to your lawyer. If they persist have them arrested for trespassing and harassment. You should also check their ID. John Williams and I have often run into corporate and idependent goons who decide to visit you in some sort of attempt to intimidate you. If their ID looks fake or it's otherwise obvious that they're not real law enforcement then have all the fun you want with them! If you receive a phone call, turn o n your tape recorder, refuse to answer any questions, an give them the name and number of your lawyer. The tape recorder is important as you'll want evidence of the phone call if their manner of talking to you on the phone opens them up to legal repercussions. And always before you pick up, state the date and time on the tape, and make sure they identify themselves to you. If government agents come with a warrant call your lawyer, and document everything. Actions they commit on the search warrant may screw them later, but you'll need evidence. Videotape them if it's feasible, and if you have a friend in the press call him/her. Above all invoke your right to remain silent, and don't help them by opening your mouth. With the recent rash of Gestapo-style no-knock warrants a modem using friend of mine has started keeping a .44 Magnum by the door. His explanation is since he's not doing anything illegal if someone comes crashing through the door he's going to assume its a burglar or psychotic and protect his property and family until the police come. We of course don't recommend that you follow his example, but the choice is yours. After all a law abiding citizen has the right to defend himself. After the bust have your lawyer keep on them like a fly to manure. According to the law a search warrant is supposed to be for gathering evidence for an indictment. If no indictment is forthcoming (none should be if you're clean) then demand your property be returned to you. In any event you should always file suit and seek legal charges against them. Just the simple act of doing that creates hassles for them. Before I wrap this up, let me state that I have nothing against law enforcement people. Most of the police officers out there do a fine job, and are good people. However, the few rotten apples in this country's law enforcement infrastructure do a lot to blacken the name of police officers everywhere. I am also amazed that with all the murderers, rapists, and child molesters running around lose in this country, our police agencies are so quick to jump to the whim of some whining, clueless , control-addicted corporate bureaucrat; who's probably broken more laws than the worst hacker ever could, and go after innocent telecomputists. (Why wasn't Neal Bush arrested?) I would tend to believe that child molesters should have a higher hunt-down priority then kids with computers; however sometimes that doesn't seem to be the case. Driving Tips Motor vehicles are probably the most common form of transportation used today. Perhaps this is why most people involved in an operation get busted while driving.

In New York & many other states, your rights are nonexistent while you're behind the wheel, and you can get pulled over and searched for any reason. So, to stay out of trouble and avoid any problems that might result in getting pulled over, I've put together some guidelines that should help keep you out of trouble while you're on the road.

1. Keep tabs on the local law enforcement agencies. While most cops are more or less decent and won't bother you as long as your not driving recklessly, there are a few bad apples who will bother you for whatever reason. Also, remember that you have no rights on the road. You're fair game for any reason. Get ahold of a mobile scanner and hide it behind your dashboard or in a seat. Scanners are illegal to have in vehicles in some states and much frowned upon in others. Run a remote speaker to a convenient but hidden spot with a hidden switch to turn it off. This way they can't see anything that looks suspicious, and you can cut out the audio quick if you get stopped. Also remember to program in secondary car- to-car and mobile to base frequencies. This will give you an indication of law enforcement activity nearby you and allow you to take appropriate action should your plates get checked all of the sudden.

2. Drive at the proper speed. By that I mean not too fast and not too slow. Not only can you get pulled over for speeding, but if you drive too slow, you'll get pulled over for being suspicious.

3. Know your geography. Intimate knowledge of the roads in your area of operations is essential. This way, you can take alternate routes if there is an obstruction down the road as well as know what roads not to take so you don't make an evasive turn into a dead-end street.

4. Stay off well-traveled roads whenever possible. You're less likely to get stopped on a secondary road.

5. Drive something appropriate looking for your locale. If you drive something too fancy or too beat-up you will attract more attention to yourself.

6. Keep anything attention getting out of sight. If you get stopped, and nothing is visible, then there is less cause for them to search your vehicle.

7. Obey all the traffic laws. This is common sense, but many people who were wanted criminals got nailed by a simple traffic infraction stop. 8. If you get pulled over, be polite even you are insulted and harassed. Also, don't make any sudden moves. Again, common sense, but some stupid people think that they have to mouth-off when they get pulled over and given a hard time. They're the ones who usually get busted. 

Link to comment
Share on other sites

  • 3 weeks later...

Hypothetically, yes.  But is there some like Qubes/Whonix for mobile phones.  I am interested in software that encrypts my entire phone.  I am more interested in cell data encryption where my number, device ID, location and any other info being leaked that will encrypt the data but still operate off of cell towers? 

 

Are there any search phrases I need to use?  

Link to comment
Share on other sites

4 minutes ago, Deine Mudder said:

..yeah, "tinfoil" and "hat" :classic-smile:

 

Jokes aside though I think you'd need to build your own phone and write your own OS for it if you wanted to be really sure everything is how you'd want it.

 

I was thinking the same on building an OS, but I imagine many airwaves/freqs militaries use are all encrypted.  So I would imagine there has to be something floating around the deep web tucked away in some opsec discussion. 

Link to comment
Share on other sites

If you guys and gals want total anonymity and security in the digital world, I only recommend using Qubes OS with Whonix, and for an extra layer, run Tails via killbus.  Encrypt all your emails with a PGP with Thunderbird as your email client. 

Edited by ndv
Link to comment
Share on other sites

Keep your cell phone away from your keyboard.

 

Smartphone sensors: Researchers have demonstrated that it is possible to capture the keystrokes of nearby computer keyboards using only the commodity accelerometer found in smartphones.[34] The attack is made possible by placing a smartphone near a keyboard on the same desk. The smartphone's accelerometer can then detect the vibrations created by typing on the keyboard and then translate this raw accelerometer signal into readable sentences with as much as 80 percent accuracy. The technique involves working through probability by detecting pairs of keystrokes, rather than individual keys. It models "keyboard events" in pairs and then works out whether the pair of keys pressed is on the left or the right side of the keyboard and whether they are close together or far apart on the QWERTY keyboard. Once it has worked this out, it compares the results to a preloaded dictionary where each word has been broken down in the same way.[35] Similar techniques have also been shown to be effective at capturing keystrokes on touchscreen keyboards[36][37][38] while in some cases, in combination with gyroscope[39][40] or with the ambient-light sensor

Link to comment
Share on other sites

  • 2 months later...
  • 5 weeks later...

that is the biggest text post I have ever seen?!

 

What about when updating iOS how it automatically activates a load of new experimental functionality within Safari? How does one disable this whwn updating their OS as last thing I need is to be looked at as "game" by some reptilian devs whose heart is dead cold?

  • Like 1
  • Truth 1
Link to comment
Share on other sites

On 1/16/2021 at 6:36 AM, Dirty_habiT said:

 

I would say it may be more secure than normal text but only marginally.  The idea is to keep the big tech companies out of your business and the way to do that is end to end encryption.

 

Signal App offers this.  I would switch to using Signal if I were you and encourage everyone else you know, family and friends, to do the same.  Both of my parents use it.

What is this end to end encryption you speak of?

 

Such a term only brings this to mind

 

 

Those familiar with Requiem for a dream may understand it, as anyone who spends their energy towards hacking other people nefariously are those who are not only dead but are the equivalent of the shit that comes out of an un-enemaed ass to ass escapade.

Edited by Mauler5150
Link to comment
Share on other sites

2 hours ago, Fist 666 said:

Yo @ndv please don't post shit that long. It makes these pages virtually unusable. Share the link or break it into a hundred smaller posts.

 

It takes literal minutes just to scroll past it, it would be days of reading...

 

My bad. I chose to do it that way so in case the site ever goes off line we would have something to fall back on. 

Link to comment
Share on other sites

  • 1 month later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...