Official: Digital Protection/Encryption Techniques Thread

Kid McNamara

'97 Mike Bibby
Joined
Jan 24, 2013
Messages
3,632
Reputation
-625
Daps
5,760
Reppin
Freshman Year
It seems we have a new thread highlighting the ways in which the Government, Corporations, and even individual actors can collect and log your digital footprint every day.

To protect free speech, we need to learn how to counter and protect ourselves against unjust intrusions.

1.) Obscuring your IP information

First, visit the website: What Is My IP Address? Lookup IP, Hide IP, Change IP, Trace IP and more... to see how your IP Address is tied to your location.

IP Address are assigned to regions, meaning that your IP can easily be used to track your location without much effort at all. If you wish to obscure your IP Address, start by implementing a proxy or VPN. If you sign-up with a VPN provider, be sure they do not keep traffic logs.

Proxy server - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Virtual_private_network

2.) Securing your Operating System

Either follow one of the many NSA guides (ironic) on securing your Apple, Linux, or Windows operating system or download and use a "secure" operating system such as Whonix or Tails. These Operating Systems close ports and uninstall unnecessary programs. They can also be run from encrypted disks or thumb drives if necessary.

Operating Systems - NSA/CSS
Whonix | Free Security & Utilities software downloads at SourceForge.net
https://tails.boum.org/about/

3.) Encrypt Data

Self-explanatory, use a program such as TrueCrypt to encrypt data at rest. You can also encrypt volumes and physical devices with this software.

TrueCrypt - Wikipedia, the free encyclopedia

4.) Use a Secure Email Service

Use a service like Hushmail along with Desktop PGP or GnuPG to secure email communication.

Hushmail - Wikipedia, the free encyclopedia

5.) Learn how to monitor traffic

If you're really paranoid, learn how to monitor traffic using Wireshark and Snort.

6.) Don't bind anything questionable to your online persona.

This is pretty self-explanatory.

If there is interest in this thread, I will post more tips and expand on those already mentioned. This is just a starting point.

I'm all about protecting free speech. If you're engaging in other kinds of illegal fukkery, expect to be found.
:ufdup:
 

Yapdatfool

Superstar
Joined
May 5, 2012
Messages
8,543
Reputation
1,195
Daps
22,559
Reppin
NULL
I tried the proxy/TOR route once, far too slow for my taste.

Is there any real fast & free proxies/VPN that yall know of??
 

Type Username Here

Not a new member
Joined
Apr 30, 2012
Messages
16,368
Reputation
2,385
Daps
32,645
Reppin
humans
A lot of the shyt you have to worry about comes from you own doing. Companies and yourself have spread your information all over the public web, and sometimes you don't even know it. START there.

Remove yourself from these sites:

Intelius.com
Acxiom.com
MyLife.com
ZabaSearch.com
Spoke.com
BeenVerified.com
PeekYou.com
USSearch.com
PeopleFinders.com
PeopleLookup.com
PeopleSmart.com
PrivateEye.com
WhitePages.com
USA-People-Search.com
Spokeo.com
PublicRecordsNow.com
DOBSearch.com
Radaris.com

Each one has their own requirements to remove information. This site:

UnlistMy.Info - Your web privacy. In your hands.

Teaches you how to do it.
 

yo moms

drunk
Joined
Mar 19, 2013
Messages
21,895
Reputation
-164
Daps
24,063
Tor traffic is unencrypted at the end nodes, and there is no telling who is actually running the TOR relays (there are many compromised relays out there).

:ohhh:

Teach me how to run a safe shyt from a USB stick.
 

MrPentatonic

Superstar
Joined
May 2, 2012
Messages
4,225
Reputation
670
Daps
14,071
Reppin
NULL
When looking for a VPN make sure you pick one that doesn't keep data logs and what the type. Check their privacy policy and whether they have sent users to jail before or not
 
Top