Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - scarecow

Pages: [1]
1
Anonymity and Privacy / Re: Route all traffic through tails?
« on: January 15, 2016, 04:13:24 pm »
It's not an optimal solution, every replay is right. Tor is good just for browsing for information ( perspective of normal user-usage ), and maybe for instant messing ( 512 AES & 2048 RSA for Keysharing would also be more than enough I guess). I'm  just little overwhelmed by the big amount of flaws which maybe leads to compromising my privacy: Mini-Autoloaded-Links of Google and Facebook placed on websites of which I never had an idea they would link to them and hence delivery my browsing habits - there, I could block all ip-ranges they use for this links or just by browsing tor... e.g.

I hate this upcoming way of thinking of the concerns. >>Hide the espionage and no one lose his mind...<<

Maybe I'm crazy enough to punish myself by trying to be untraceable by simultaneously holding most of my browsing habits - fortunately I'm an "e- nomad" and are not linked very hard to special sites or services.
Personally I don't use facebook/whatsapp or anything else, which is sacrificed enough ( in social life perspective  ::) ) to invest even more work on it and learn this stuff to prevent all unnecessary privacy-breaches at all - that I use all of theme and force everyone I know to do the same shit is very unlikely and should be situational. 

If I see people who aren't willed or even able to learn this stuff they have two options: Spread their data or don't us the Internet. 

In short my goals are:  get fluent with privacy-securing-methods, serve this security to people ( family e.g.). Maybe I have to search for the middle course, because I don't believe this will work perfectly and forever,even on my own. :)   

I hope this should clear up my intentions, because I really shot this raw unthoughtful idea in this forum because I believed there is a mediumeasy-install-and-go solution. Tor isn't enough and should be linked with other services to set of habits and knowledge about how to use theme.

When everything was pointless in the end I still would have learned to "hide my tracks" if I need to do so. :)

overflow: Every new solution leads to a deeper and more fundamental ( maybe necessary) solution which absence  could compromise the solution before. Your right. This leads me to the "middle course"-thoughts.
But your anti ISP setup sounds very interesting, I will focus on it when I feel comport with the basics.

 
Thank you for input so far.

2
Anonymity and Privacy / Re: Route all traffic through tails?
« on: January 13, 2016, 11:00:59 am »
Nice link, ty.

They definitely  will request audience when connection speed is going slow.  ::)

Yah, I didn't write or speak in English for a while, so I have to get comfort to not sound like a noob who lend his passion and his buzzwords while watching mr.robot.

I will read through the tor-documentation as soon as poss. :)





3
Anonymity and Privacy / Re: Route all traffic through tails?
« on: January 12, 2016, 06:21:47 pm »
I said I'm relatively new t o stuff regarding privacy.  :o

Because of no other reason, I want to get verification that there is no little thing I
maybe overlook and which undercut my complete project.

Ok, I can wireshark my complete outgoing traffic, but there I cant' see how many ways dataminers have,
to link tor-exit traffic to my browsing habit. What about perma-cookies in tor-perspective? I don't know yet, but I actually learn it, because I want to secure my network... You got it?

I just hoped tails can close - through it's totality - my gap of knowledge where data breaches would be possible. At least till I know all important stuff to do this on my own and with assurance . btw... "tails" sounds not cool, but everyone should have his own taste. :P

Tails is simply created to force all traffic through tor. Normal used home-pc's, used by people who have no knowhow, are very difficult to configure for privacy.  Mostly privacy force a change of habits and learn new stuff. I like this, but maybe others do not!  That would be reason two.

In reality most people who aren't it addicted don't use privacy tools because it's to complicated, so I want to close this gap through comport ( done by simply route all possible traffic ).  Maybe this count as reason 3.

Yahh, but through this post I got 2 new Buzzwords: whonix-gateway and tor-listener. Ty for that so far

4
Anonymity and Privacy / Re: Route all traffic through tails?
« on: January 12, 2016, 01:29:45 pm »
what exactly data miners observe if someone use reallife-accounts via tor?

Is it a big privacy breach or rather a small leak where a not blackhat shouldn't be worried about?

I assume that a hunting blackhat wouldn't use reallife accounts at all, right? :D


5
Anonymity and Privacy / Route all traffic through tails?
« on: January 12, 2016, 12:41:23 pm »
hi,

I want to create a privacy-setup. I'm relatively new in this field (TOR/Jondo/...), so excuse lacks of knowledge of the "how it works".
Because of this I want to ask here if this little project has potential to work at all.

Router <----> PC/Server where Tails is installed <----> Home-Use PC (for Youtube and so on).

Tails will be configured as "Router": http://www.yourownlinux.com/2013/07/how-to-configure-ubuntu-as-router.html
(Works also on Debian, so I assume it will work on an installed Tails too.

The primitively main-goal of mine is to privacy my whole family as much as I can. Some lack of netspeed wouldn't be an issue.
The relative  complicated way to learn the security plugins and methods is the mainproblem while "staying strong" in this case. :)
Best would be if they wouldn't notice something has changed ( instead of speed e.g.).

I know, by this setup they can't  or rather shouldn't use reallife-accounts, but therefor I will maybe setup a second connection routed through
proxy via Jono-OS for example.
 
So, please tell me if this will work at all or if I forgot some important things. Maybe some of you knows better methods.




 

Pages: [1]