EvilZone
Hacking and Security => Anonymity and Privacy => : x86_64 September 01, 2012, 06:13:13 PM
-
All my devices are from Apple. this includes an iDevice, a laptop and a desktop. I use tor and plan on working on some black hat research to learn how the exploits work first hand, so that I can defend against them. I have read the sticky in this section and the two part tutorial on remaining anonymous. I was going to use wireshark to find this out but felt that still being rather amateur and not being specifically familiar with that tool I may miss most things.
- What data is being leaked from these devices?
- How do I turn disable data being leaked?
Thank you for reading.
-
Dear lord. Owning every Apple product does not make you a instant-hacker. Hollywood has a false idea, bro :P
-
Could you elaborate a bit more? What do you mean by "leaked data"? As far as I know, there is very little difference between Apple computer and any other computer anonymity, as all computers and devices use same networking protocols (IP/TCP) to exchange data over the interntet.
Just because you use apple stuff, doesn't mean the anonymity techniques are any different. Tools might be different, but the underlying techniques to remain anonymous remain the same.
Correct me if I am wrong.
-
@kulverstukas
I work using linux and mac. Over time I progressed to only using apple machines as personal preference.
@namespace7
Sorry for the ambiguity. I meant from the specific applications. I know that the apple store is logged into by default, but I was not sure what other built-in applications put out data without my input. I do wish to learn more to understand it all enough that I wouldn't need to ask this question, but just need some rough guidance to remain anonymous while I am learning. I understand that I shouldn't be at risk as I do not know enough to exploit anything, but I just want to make sure I am secure to download ebooks for educational purposes.(Piracy)
-
Well, I doubt that iTunes or app store will track your online activity. Though I might be wrong, I don't own any apple products to test it. However, if you just want basic anonymity for browsing and learning, then VPN/SSH should be enough. Just don't try to do anything stupid.
Remember this: once you will have a real need for advanced anonymity then you will know what you need to do. So for a start, I would recommend doing some research on virtual private networks (VPN) and SSH.
-
Thank you Namespace7.
I'll follow your advice. I wont 'do anything stupid'. For the time being I am just trying to get learning resources (on a budget). so that I can program open source applications, currently trying to decide on the programming language I should specialize in (Computer Science graduate) and the field that I could be of most service to within open source.
-
Feel free to ask anything else you are not sure about in other topics. Just make sure you use search before, because often you might find answers to your questions in existing threads. I would answer your last questions, but you need to learn not to go off topic in these forums. :)
Sent you a PM.
-
Sorry for going off topic.
-
All my devices are from Apple. this includes an iDevice, a laptop and a desktop. I use tor and plan on working on some black hat research to learn how the exploits work first hand, so that I can defend against them. I have read the sticky in this section and the two part tutorial on remaining anonymous. I was going to use wireshark to find this out but felt that still being rather amateur and not being specifically familiar with that tool I may miss most things.
- What data is being leaked from these devices?
- How do I turn disable data being leaked?
Thank you for reading.
I'm just gonna put this down if someone wants to pick it up.
http://billstclair.com/matrix/