Author Topic: Apple Machines and Anonymity.  (Read 2959 times)

0 Members and 1 Guest are viewing this topic.

Offline x86_64

  • Serf
  • *
  • Posts: 21
  • Cookies: 5
    • View Profile
Apple Machines and Anonymity.
« on: September 01, 2012, 06:13:13 pm »
All my devices are from Apple. this includes an iDevice, a laptop and a desktop. I use tor and plan on working on some black hat research to learn how the exploits work first hand, so that I can defend against them. I have read the sticky in this section and the two part tutorial on remaining anonymous. I was going to use wireshark to find this out but felt that still being rather amateur and not being specifically familiar with that tool I may miss most things.
  • What data is being leaked from these devices?
  • How do I turn disable data being leaked?
Thank you for reading.

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: Apple Machines and Anonymity.
« Reply #1 on: September 01, 2012, 06:44:29 pm »
Dear lord. Owning every Apple product does not make you a instant-hacker. Hollywood has a false idea, bro :P

Offline namespace7

  • Sir
  • ***
  • Posts: 561
  • Cookies: 115
  • My Brother's Keeper
    • View Profile
Re: Apple Machines and Anonymity.
« Reply #2 on: September 01, 2012, 06:45:53 pm »
Could you elaborate a bit more? What do you mean by "leaked data"? As far as I know, there is very little difference between Apple computer and any other computer anonymity, as all computers and devices use same networking protocols (IP/TCP) to exchange data over the interntet.

Just because you use apple stuff, doesn't mean the anonymity techniques are any different. Tools might be different, but the underlying techniques to remain anonymous remain the same.

Correct me if I am wrong.
"A programmer’s greatest enemy isn’t the tools or the boss or the artists or the design or the legacy code or the third party code or the API or the OS. A programmer’s greatest enemy is getting stuck.
Therefore a crucial step to becoming a better programmer is learning how to avoid getting stuck, to recognize when you’re stuck, and to get unstuck." -Jeff Wofford

Offline x86_64

  • Serf
  • *
  • Posts: 21
  • Cookies: 5
    • View Profile
Re: Apple Machines and Anonymity.
« Reply #3 on: September 01, 2012, 06:51:35 pm »
@kulverstukas
I work using linux and mac. Over time I progressed to only using apple machines as personal preference.

@namespace7
Sorry for the ambiguity. I meant from the specific applications. I know that the apple store is logged into by default, but I was not sure what other built-in applications put out data without my input. I do wish to learn more to understand it all enough that I wouldn't need to ask this question, but just need some rough guidance to remain anonymous while I am learning. I understand that I shouldn't be at risk as I do not know enough to exploit anything, but I just want to make sure I am secure to download ebooks for educational purposes.(Piracy)

Offline namespace7

  • Sir
  • ***
  • Posts: 561
  • Cookies: 115
  • My Brother's Keeper
    • View Profile
Re: Apple Machines and Anonymity.
« Reply #4 on: September 01, 2012, 07:05:53 pm »
Well, I doubt that iTunes or app store will track your online activity. Though I might be wrong, I don't own any apple products to test it. However, if you just want basic anonymity for browsing and learning, then VPN/SSH should be enough. Just don't try to do anything stupid.

Remember this: once you will have a real need for advanced anonymity then you will know what you need to do. So for a start, I would recommend doing some research on virtual private networks (VPN) and SSH.
"A programmer’s greatest enemy isn’t the tools or the boss or the artists or the design or the legacy code or the third party code or the API or the OS. A programmer’s greatest enemy is getting stuck.
Therefore a crucial step to becoming a better programmer is learning how to avoid getting stuck, to recognize when you’re stuck, and to get unstuck." -Jeff Wofford

Offline x86_64

  • Serf
  • *
  • Posts: 21
  • Cookies: 5
    • View Profile
Re: Apple Machines and Anonymity.
« Reply #5 on: September 01, 2012, 07:14:16 pm »
Thank you Namespace7.
I'll follow your advice. I wont 'do anything stupid'. For the time being I am just trying to get learning resources (on a budget). so that I can program open source applications, currently trying to decide on the programming language I should specialize in (Computer Science graduate) and the field that I could be of most service to within open source.

Offline namespace7

  • Sir
  • ***
  • Posts: 561
  • Cookies: 115
  • My Brother's Keeper
    • View Profile
Re: Apple Machines and Anonymity.
« Reply #6 on: September 01, 2012, 07:44:43 pm »
Feel free to ask anything else you are not sure about in other topics. Just make sure you use search before, because often you might find answers to your questions in existing threads. I would answer your last questions, but you need to learn not to go off topic in these forums. :)

Sent you a PM.
« Last Edit: September 01, 2012, 07:50:15 pm by namespace7 »
"A programmer’s greatest enemy isn’t the tools or the boss or the artists or the design or the legacy code or the third party code or the API or the OS. A programmer’s greatest enemy is getting stuck.
Therefore a crucial step to becoming a better programmer is learning how to avoid getting stuck, to recognize when you’re stuck, and to get unstuck." -Jeff Wofford

Offline x86_64

  • Serf
  • *
  • Posts: 21
  • Cookies: 5
    • View Profile
Re: Apple Machines and Anonymity.
« Reply #7 on: September 01, 2012, 07:48:30 pm »
Sorry for going off topic.

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: Apple Machines and Anonymity.
« Reply #8 on: September 01, 2012, 10:50:25 pm »
All my devices are from Apple. this includes an iDevice, a laptop and a desktop. I use tor and plan on working on some black hat research to learn how the exploits work first hand, so that I can defend against them. I have read the sticky in this section and the two part tutorial on remaining anonymous. I was going to use wireshark to find this out but felt that still being rather amateur and not being specifically familiar with that tool I may miss most things.
  • What data is being leaked from these devices?
  • How do I turn disable data being leaked?
Thank you for reading.

I'm just gonna put this down if someone wants to pick it up.

http://billstclair.com/matrix/
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python