Author Topic: Anonymity and Security  (Read 22424 times)

0 Members and 2 Guests are viewing this topic.

Offline Shadows

  • /dev/null
  • *
  • Posts: 19
  • Cookies: 13
  • I am a shadow in the dark forest.
    • View Profile
Anonymity and Security
« on: May 16, 2012, 11:27:41 am »
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
******************************************************************
                                           Anonymity and Security

******************************************************************
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

Note: I DID NOT MAKE THIS. This tutorial is very analytic to be more understandable to some users

Contents:
Check your Privacy
Privacy Basics
Proxies
Vpn
Firefox and Chrome add-ons
Anonymous Email
Disk Wipe
Firewall
Tor Project
Online proxy sites   
Safe online payment
SSH
Encrypt your data
Online Virus Check


1.Check your Privacy
Two sites to check your anonymity.

http://www.stayinvisible.com/
http://www.whattheinternetknowsaboutyou.com/

2.Privacy basics
Do not disclose any private information, unless absolutely required. In some cases when it is required such as your last name, only fill in partial information such as your last initial.
Don't fall into e-mail and web phishing traps. Become familiar with the signs of phishing and don't disclose private information in e-mail.
If you're using Microsoft Windows, familiarize yourself with Spyware and have at least one program installed to protect the computer.

3.Proxies
Proxy is a server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.

Download elite proxy switcher from this link
http://www.eliteproxyswitcher.com/EPS_setup.exe

After download and install, copy a list of proxies from these links.
http://proxy-ip-list.com/
http://www.tubeincreaser.com/proxylist.txt
http://hidemyass.com/proxy-list/
and save them ass a txt file. Load the txt from elite proxy switcher and check the proxies to see if they are alive. Double click to the alive proxies to set them on.

Note:Every proxy you are using it makes your internet more slow.

4.Vpn
Is a Virtual Private Network (VPN) that change your ip address and encrypt your traffic.
1-   Free VPN: It is not recommended, cause many features are capped, and in addition, many free VPN providers will hand user data upon warrant issue. Also, many free VPNs work with ad companies.
2-   Commercial pptp: It's been said, as telecomix pointed out, that some operating systems(Windows 7, Vista) might be vulnerable to an attack consisting in requesting p2p conns, wichcould lead the malicious attacker to get the user real ip. See https://www.ipredator.se/?lang=en For more information on this matter. Seems flaw has to do with ipv6 conns, so just ensure you use ipv4.
3-   Recommended VPN's. All that use the OpenVPN service. And that include specific policieson user data storage and policies regarding that data. (Best option, no data loggin + no user billing loggin, + safe payment methods ie: Ukash and similar services).

Free VPN direct downloads -- Not recommended.
If they aren't selling you a service. They are selling you.

Vpn Clients Downloads

Mac
• Ultra VPN: https://ssl0.ovh.net/fr/
Linux
• UltraVPN:  https://ssl0.ovh.net/fr/
Windows
• HotspotShield: http://hotspotshield.com
• UltraVPN: https://ssl0.ovh.net/fr/

Top 10 vpn clients here:
http://techpp.com/2009/07/09/top-5-free-vpn-clients/

5. Firefox and Chrome add-ons

1-HTTPS Everywhere is a Firefox and Chrome extension that encrypts your communications with many major websites, making your browsing more secure.
Encrypt the web by adding the HTTPS at the beginning of the url.
e.g  https://www.evilzone.com/
 
Download https everywhere from the link below
https://www.eff.org/files/https-everywhere-latest.xpi
   
2-No script disable sites scripts making things very difficult for sites that use scripts to grab ip address.

Download NoScript from the link below
https://addons.mozilla.org/en-US/firefox/downloads/latest/722/addon-722-latest.xpi?src=noscript.ownsite

6. Anonymous Email
To protect against email virus or spam messages or a trojan horse e.t.k that want to steal your private information  you can see your emails with no fear with HideMyAss Anonymous email.

Create an account at:
http://hidemyass.com/anonymous-email/

7. Disk Wipe
Disk Wipe is free utility for Windows operating system. It helps users secure permanent removal of data from their hard drives or other memory storage devices like USB memory sticks, SD memory cards or any other device who's memory can serve as a storage (some mp3 players, many cameras etc.) As long as the memory device is accessible and formatted with either NTFS, Fat, or Fat32 Disk Wipe can clean all the information's from it without possible data retrieval.

Download Disk Wipe
http://www.diskwipe.org/download/DiskWipe.exe

8. Firewall
Firewalls have helped protect computers in large companies for years. Now, they're a critical component of home networks, as well. It is the best network filter and also controls all your system actions by it self and sometimes warn you. It also works as an anti-virus against malware and other types.

Comodo Firewall for Windows
http://download.comodo.com/cis/download/installs/1000/standalone/cfw_installer.exe

gufw Firewall for Ubuntu
http://gufw.tuxfamily.org/

9. Tor project
On internet every machine will have an ip address. It works as a primary identifier online. It’s very important to hide/fake it to remain anonymous. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Individuals, journalists, whistle blowers from all over the world use Tor. You should use it too.Tor prevents anyone from knowing your location or browsing. Tor can be used with browsers, instant messaging clients, remote logins, and more. Tor is free and open source for Windows, Mac, Linux/Unix, and Android phones. You should use it.Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Very useful when you are traveling and want to remain anonymous.Tor makes your traffic channelized anonymously but it doesn’t promise data security between you and the end server. You must always use HTTPS, encrypt your mails. Active content, such as Java, Javascript, Adobe Flash, Adobe Shockwave, QuickTime, RealAudio, ActiveX controls, and VBScript, are binary applications. These binary applications run as your user account with your permissions in your operating system. They might bypass Tor. I would avoid using them when I want to remain anonymous.


Download Tor
https://www.torproject.org/download/download-easy.html.en

11. Online Proxy Sites
Online proxy site is a site that provides you a proxy server just by entering an url on it in order to surf anonymously.

Here is some online proxy site:
http://www.anon.me/
http://hidemyass.com/proxy/
https://aniscartujo.com/webproxy/
http://www.free-web-proxy.de/
http://bind2.com/



10. Safe Online payment (BitCoin)

Bitcoin is an experimental new digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: managing transactions and issuing money are carried out collectively by the network. Bitcoin is also the name of the open source software which enables the use of this currency.

Downloads

•  Windows (zip) ~12MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2-win32.zip/download
•  Windows (exe) ~9MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2-win32-setup.exe/download
•  Ubuntu PPA
https://launchpad.net/~bitcoin/+archive/bitcoin
•  Linux (tgz, 32/64-bit) ~11MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2-linux.tar.gz/download
•  Mac OS X ~12MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2.2-macosx.dmg/download

SSH

Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist.
SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled.
When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords.
SSH is available for Windows, Unix, Macintosh, and OS/2, and it also works with RSA authentication.

PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator. It is written and maintained primarily by Simon Tatham.

Download PuTTY
http://the.earth.li/~sgtatham/putty/latest/x86/putty-0.62-installer.exe

To configure a PuTTY tunnel go to
http://www.devdaily.com/unix/edu/putty-ssh-tunnel-firefox-socks-proxy/2-configure-putty-ssh-tunnel-ssh-server.shtml

Encrypt your data
Everyone has some private data that they don’t want other to see. It may be a document consisting of all your login passwords, your bank account information that you want to keep out of  your family or some stalker’s sight. In case you are wondering how to encrypt the files/folders/entire hard drive and keep it safe from prying eyes, here is an easy method.

TrueCrypt is a free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux. It creates a virtual encrypted disk within a file and mounts it as a real disk. You can use it to:

•Create a virtual disk within a file and mount it as an actual drive letter.
•Encrypt an entire hard disk partition or a storage device such as USB flash drive.
•Provide encryption that is real time and transparent.

The procedure will be the same for Linux and Mac OSX.
There are two main ways to create an encrypted disk.
You can encrypt an entire disk, or you can create a virtual disk within a file.
The first method has its risks, since converting a drive will erase everything that is on it. The second method is great for experimenting – you simply create a file somewhere on your hard drive and map it.

Download the latest version from here:
http://www.truecrypt.org/downloads.php

Online Virus Check
Check your files for viruses online in VirusTotal. VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.

Check your files here
https://www.virustotal.com/
« Last Edit: May 22, 2012, 11:30:56 am by Shadows »
The Shadows is everywhere, but not mine.

Offline iTpHo3NiX

  • EZ's Pirate Captain
  • Administrator
  • Titan
  • *
  • Posts: 2920
  • Cookies: 328
    • View Profile
    • EvilZone
Re: Anonymity and Security
« Reply #1 on: May 16, 2012, 11:10:23 pm »
Nice paper, I'm moving to the Anonymity board as a sticky
[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry

Offline iTpHo3NiX

  • EZ's Pirate Captain
  • Administrator
  • Titan
  • *
  • Posts: 2920
  • Cookies: 328
    • View Profile
    • EvilZone
Re: Anonymity and Security
« Reply #2 on: May 17, 2012, 02:39:57 am »
asdf
« Last Edit: February 13, 2013, 11:19:45 am by DeepCopy »
[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry

Offline Shadows

  • /dev/null
  • *
  • Posts: 19
  • Cookies: 13
  • I am a shadow in the dark forest.
    • View Profile
Re: Anonymity and Security
« Reply #3 on: May 17, 2012, 08:56:45 am »
Thank you all guys, i appreciate it.
The Shadows is everywhere, but not mine.

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Anonymity and Security
« Reply #4 on: May 20, 2012, 07:19:24 pm »
This is an okay paper but after checking it out on Google, this is pure copy & paste from various articles, books and papers. Which is fine, but you should have had a references part at the bottom listing all the sources. But good work nonetheless.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline Shadows

  • /dev/null
  • *
  • Posts: 19
  • Cookies: 13
  • I am a shadow in the dark forest.
    • View Profile
Re: Anonymity and Security
« Reply #5 on: May 21, 2012, 09:05:27 am »
Oh I have completely forgot to say that I took the information from other sources ! Thanks for remind me
« Last Edit: May 21, 2012, 09:09:22 am by Shadows »
The Shadows is everywhere, but not mine.

Offline Axon

  • VIP
  • King
  • *
  • Posts: 2047
  • Cookies: 319
    • View Profile
Re: Anonymity and Security
« Reply #6 on: May 21, 2012, 09:45:54 am »
Oh I have completely forgot to say that I took the information from other sources ! Thanks for remind me


This is considered stealing? edit your first post and put the references.

Offline BallsOfSteel

  • /dev/null
  • *
  • Posts: 8
  • Cookies: -3
    • View Profile
Re: Anonymity and Security
« Reply #7 on: June 03, 2012, 06:48:17 pm »
thank you very much for the informations, but the first time i used HotSpotShield(1min ago), it make to me a LiveJasmin pop up, so i was like wtf, after that i delete my history and restart my naviguation and now everything is perfect thank you again

Offline Ghastly

  • Serf
  • *
  • Posts: 23
  • Cookies: 0
    • View Profile
Re: Anonymity and Security
« Reply #8 on: July 01, 2012, 08:30:13 am »
Pretty good info, but could improve on several points:


1) For VPN's, never use a free one, even paid, do your research and pay via bitcoin. (privateinternetaccess.com)


2) Hidemyass keeps records. It has gotten some hackers busted before, use safe-mail.net or hushmail.


3) Diskwipe is good but DBAN is better in a total wipe need.


4) Free proxys usually log, so it is best to setup your own vpn tunnels using hacked RDP servers.


Thanks for the guide!

Offline Next

  • NULL
  • Posts: 1
  • Cookies: 0
    • View Profile
Re: Anonymity and Security
« Reply #9 on: August 12, 2012, 01:01:53 pm »
http://hidemyass.com Awesome services. I have just purchased a VPN for only $59.99 saving from $138(the initial price).  :o

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Anonymity and Security
« Reply #10 on: August 12, 2012, 05:47:11 pm »
http://hidemyass.com Awesome services. I have just purchased a VPN for only $59.99 saving from $138(the initial price).  :o

hidemyass is okay privacy wise. But not if you use it for illegal stuff, there have been several cases where hidemyass have given out information to authorities.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline Cyb3r

  • /dev/null
  • *
  • Posts: 7
  • Cookies: 0
    • View Profile
Re: Anonymity and Security
« Reply #11 on: September 11, 2012, 04:09:00 am »
Wow man thanks so much for this thread i went on the first site to check and im pretty much 100% anonymous!

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Anonymity and Security
« Reply #12 on: September 14, 2012, 02:22:11 am »
Wow man thanks so much for this thread i went on the first site to check and im pretty much 100% anonymous!

No such thing, those online checkers or whatever are a bunch of bullshit.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline namespace7

  • Sir
  • ***
  • Posts: 561
  • Cookies: 115
  • My Brother's Keeper
    • View Profile
Re: Anonymity and Security
« Reply #13 on: September 14, 2012, 10:47:01 am »
I believe that if there is anything you want to do that might get you into trouble with the authorities, you should never do that something from the comfort of your home. Using a temporary location and random wifi access point adds a lot of anonymity. Of course the place has to have no cameras that could film you. On top of this temporary location thing, you of course need to use the techniques described in the other posts of this thread.
"A programmer’s greatest enemy isn’t the tools or the boss or the artists or the design or the legacy code or the third party code or the API or the OS. A programmer’s greatest enemy is getting stuck.
Therefore a crucial step to becoming a better programmer is learning how to avoid getting stuck, to recognize when you’re stuck, and to get unstuck." -Jeff Wofford

Offline G Man

  • Serf
  • *
  • Posts: 43
  • Cookies: -2
    • View Profile
Re: Anonymity and Security
« Reply #14 on: September 16, 2012, 01:54:27 am »
Great post regardless of what anyone else says. This was very very helpful and I learned alot. Personally i dont see whats wrong with him copy/pasting this. He brought togerher alot of information that I, new to this, needed. Thanks everyone.
Insanity in individuals is rare - but in groups, parties, nations, and epochs, it is the rule.