Welcome, Hacker.
Join the community to take advantage of all its opportunities
Sign up

Method Detailed FAQ on Network Security and Anonymity




Aug 4, 2019
This article will look at everything related to network security and anonymity.

1. Remember the most important thing: Full 100% anonymity does not exist. Do not be fooled!

"Complete anonymity" is not required, it is enough to create and confuse a chain, the unraveling of which will be unprofitable in time and money. To reach this level does not require any special knowledge or skills, just read this FAQ and have a head on your shoulders.

2. Why is all this necessary at all, when it is necessary to do things, and not to bother about the Internet?

So do it.

I immediately want to say that the vast majority of people who have been caught or are being developed by law enforcement agencies are not scorching on the tracks left on the Web.

It will be very sad if you are not tracked down in hot pursuit, trustees, etc. do not surrender, but are caught because of your laziness and neglect of your own safety. You can go to the basement with a laptop and a modem, VPN the desktop, dance with a tambourine from each incoming amount, but is it safe if you order food or goods from online stores from the same laptop?

3. You are not an IT specialist and you don’t really understand all this, but? What anonymity is enough?

First, let's determine your activities:

a) An ordinary expert in conspiracy theology, Zhidomassons, Anunaki and the parade of planets without any active illegal actions.

Relax and take off the foil hat. You are not interested in law enforcement.

b) There are intentions of some real activity in the future (divorces, IFIs) or cooperation (communication, work, purchase and sale, etc.) with the maximum approach and opportunities:

- We buy a left laptop, a left USB modem or a router (best hand-held)
- Install Tails on a flash card
- We pump the settings "Security settings ..." Tor Browser to the maximum
- We use a password manager to store and generate complex passwords
- Use OTR or GPG message encryption
- We refuse social networks and the transfer of personal data through these working devices

It'll be enough.

c) The level of paranoia goes off scale:

Same as above, but also:

Notebook with or without Intel ME disabled

- A router with open firmware (openwrt, dd-wrt, etc.), cable connection.
- From the router, connect to the VPN purchased for cryptocurrency (get VPN => Tor)
- A complete rejection of phones, even left
- Do not download anything, keep devices in sight, do not insert flash cards into other computers
- To live not by registration, to rent housing without documents

Paranoid over this is insanity ...

4. What kind of Tails is this?

This is an already configured operating system designed to ensure privacy and anonymity. All Tails traffic goes to Tor. It does not leave traces on the device from which it is used, does not store any data, and after each reboot it returns to its original form, after turning off the RAM is erased.

You will not need to:

- suffer with TrueCrypt, the Persistent encrypted partition is created there in a few clicks
- install Tor Browser, it is already installed and with even greater protection, pumped it as much as possible
- install programs for storing passwords, transferring files, overwriting metadata, working with Bitcoin, encrypting files and messages, instant messengers, programs for editing photos, videos, audio files
- Because all this has already been installed and is ready for use.

Download "write to a USB flash drive (minimum 2 GB) or disc" boot from them "install on a new USB flash drive (from 8 GB)" boot from a new flash drive »activate Persistent» everything is ready

Spend a few hours and see how convenient it is compared to your Windows ...

More on Tails

Built in:

- Tor Browser - with even more protection
- Pidgin - jabber + OTR
- Electrum– a light client for Bitcoin
- KeePassX - password manager (keeper)
- GPG - Asymmetric Encryption System
- MAT - removal of metadata from various data types
- Programs for editing documents \ photo \ audio \ video, etc.
- Thunderbird - email client
- Easy to put Psi or Psi + (jabber + GPG)
- An encrypted container is created in 2 clicks

5. What computer do you need to buy for Tails and what else do you need?

A laptop is highly recommended to buy a separate one in no way connected with your personality.

What you need for Tails:

- RAM from 4 GB, start at 1 GB, but brakes are possible
- 1 USB 3.0 port, for speed from a flash drive
- the processor is only 64bit (x86-64), it is difficult to advise a specific model, but remember that Intel has ME (neutralization), and AMD has PSP. Although you are unlikely to be so needed by the NSA

Flash Drive Requirements:

- Not SanDisk, PNY, Aegis
- USB 3.0
- Mandatory on MLC chips, this will give high survivability
- More than 8 GB of memory (usually the larger the volume, the higher the speed)
- Examples of specific models: JetFlash 750, JetFlash 780

I recommend buying 2 flash drives at once, make one of them backup, install Tails on it and copy all the important data to it from time to time, in case one of them fails.

6. What about instant messengers: Skype, Whatsapp, Viber, is there encryption in the same place?

They can not be used for dark work:

- Central server (you cannot create your own)
- Closed source code (what these programs actually do and where nobody pours everything)
- Encryption not on open proven algorithms (GPG, OTR), but on its proprietary (you will be decrypted when necessary)
- Binding to a SIM card or device.

7. Why not just chat in random online chat and \ or communicate pre-set words that others will not understand?

It is not enough to hide the subject of conversation, since the very fact of the conversation remains: its side, time, place, from which devices it was and other data that will remain on the server. And you can’t trust the encryption of certain “online chats”.

8. Then what messenger to use?

The ones that work under the jabber protocol (XMPP), with open sources, are time-tested and support encryption of client-to-client GPG and \ or OTR correspondence (i.e. no one else will see it, even the server owners):

- Psi + (GPG, OTR) brought to mind Psi with additional features
- Pidgin (OTR) is an old trusted client, built into Tails
- Tor Messenger (OTR) is still in beta

For Android:

- Conversations (GPG, OTR)
- Xabber (OTR)

9. Why Jabber, and not messengers like Tox, Ricochet?

Jabber is time-tested, supports proven client-client encryption algorithms (GPG, OTR), allows you to send messages offline (when the person you are talking to is offline). All newfangled crafts so far do not possess this.

10. And what is the difference between GPG and OTR encryption if in a simple way?

In a simple way: OTR requires an online interlocutor, but it gives denial (after the conversation, the keys are destroyed and the messages can no longer be decrypted, even if the keys were seized from both sides).

GPG is much older, more reliable and more extensive (you can encrypt files, sign messages, verify signatures), keep the keys in an encrypted section, have complex passwords and backups and there will be no problems.

11. And how and where do the files needed to be stored and how to encrypt them?

Of course, you can encrypt your hard drive with TrueCrypt, but can you quickly destroy it if something happens? Is it easy to hide? Therefore, it is more practical to use an easily destructible medium. For example, on a flash drive with Tails in the Persistent section (this is a separate folder, everything dropped into it is encrypted on the fly).

12. And what about emails (email), which can be used and how?

Encrypt GPG correspondence through Thunderbird email client configured to Tor. Choose foreign services that do not require a phone and do not have servers in the CIS (Google has, for example).

13. Where to upload photos, videos, audio files?

On foreign hosting services and better in .onion, delete metadata from files before downloading.

14. How to delete metadata from photos, videos, audio files?

Using the MAT program, details on how to do this: To view the link, you must: Sign In or Sign Up

15. How to transfer / receive photos, videos, audio files to the interlocutor safely? Can't you use jabber?

With OnionShare, secure file sharing through Tor.

Files cannot be sent directly through jabber, only through third-party servers, this is unsafe and do not do this.

16. What about private messages (PM) on the forums including on this forum? It's safe?

Only if you encrypt them using GPG. Remember that all messages are kept open and visible to server owners. By pressing the "delete" button, messages still remain in the database. Do not transfer critical information even in PM.

17. What are .onion sites and how safe are they?

Sites on the Tor network, all IPs are hidden and not visible to anyone, including site owners, traffic is encrypted inside Tor and does not go beyond it. Visits to sites with JavaScript turned off (the "Security settings ..." Tor Browser settings to the maximum) are safe. With it turned on, in theory, attacks against you through scripts are possible, but if you use Tails, then the threat is lower, because The browser is isolated and there is a configured firewall that will not pass by Tor.

18. What about trust in .onion sites?

It depends on the site and changes over time. It’s better not to trust anyone. There are enough scammers in the clearnet, in the onion zone tsugrozy multiplied by x100

19. What about communication via left telephones with left sim cards? Proven Method!

See paragraph 7 above. Yours remains: location, voice, fact of connection, subject of communication, no encryption, sometimes places to top up, places to buy a SIM card and phone, etc. etc.

20. And how to receive SMS anonymously?

Find a service for receiving SMS, deposit money using bitcoins or anonymous cryptocurrencies, receive SMS.

21. And how to pay anonymously for something on the web?

- Using anonymous cryptocurrencies (Bitcoin, Ethereum, etc.)
- Using left electronic wallets (left sim cards, left documents, left cards)

22. Questions about Tor and Tor Browser:

a) This is the development of the United States and all that?

Yes, like processors, RAM, and everything else. But Tor is open source and has passed some test of time.

b) Is it possible to configure Tor Browser?

Not. You can’t even open the browser window. No additional settings can be entered. Add-ons cannot be installed. The "Security settings ..." settings can and should be set to the maximum.

c) Can JS scripts (JavaScript) lead to deanon if resolved?

In theory, very possible.

e) What does the provider see when I use Tor?

Just the fact of using Tor. How exactly do you use it: what sites do you visit, what messengers do you use, correspondence, etc., none of this is visible. But the sites on which you do this, of course, can see it, and if the connection is not via https: //, but via http: //, then everything you do on such sites also sees Tor output nodes.

The fact that you use not just Tor, but Tails, the provider can also see.

e) How to make the provider not see the connection to Tor?

Use bridges or first connect to a VPN, and then to Tor (get VPN => Tor).

g) What are the general Tor usage guidelines that need to be followed?

- Do not accept an unsigned certificate (which may be an output node certificate)
- It is advisable to exclude CIS nodes from the chain and post-installation (in the first post in the topic about Tails)
- In order not to leave your correspondence on servers, it is worth using client-client encryption (OTR \ GPG)
- Do not download torrents through Tor, it is advisable not to download at all, whatever
- Use https: // site versions
- Have complex and different passwords everywhere
- Everything else that is described in this FAQ will not be repeated

23. What is there with mac addresses, are they somehow scorched? How to deal with them?

Wi-Fi module and laptop network card have Mac addresses. As well as a router and modem.

Sites DO NOT see your mac addresses. But they are seen by your provider and neighboring devices (other people's routers and Wi-Fi points) and merge this information, for example, into Google and Yandex to determine the location. Exit: disconnect Wi-Fi modules and connect to the router via Ethernet cable.

Tails automatically changes the mac-addresses of your Wi-Fi module and the network adapter of the laptop every time it starts.

24. And why do we need a VPN before Tor, is Tor enough?

Tor is experimental software that could potentially contain vulnerabilities, although it is constantly updated. In addition, the VPN hides from the provider the fact of using Tor, which can be important. Well, double protection has never been superfluous.

25. Which VPN service to choose?

A good VPN service should:

- the server and the company itself are not in the posting and not in the USA
- support work through OpenVPN (only configuration files are downloaded, and some program from the service is not installed)
- payment using cryptocurrencies
- ask for a minimum of information about you

26. Do you need an antivirus at all?

Another tool spying on you and your activity. You should not have it.

Tails antivirus, like all Linux, is not needed.

27. Password manager - what is it and what does it eat with?

KeePassX is built into Tails, it allows you to create an encrypted database with your passwords, logins, notes, small files, private keys, accounts, bitcoin wallets and everything else valuable and encrypt it with one powerful password, which you only need to remember to enter her, and all other passwords will be random, reliable and from 20-25 characters. Agree that it is much easier for you to have and store a structured database of several megabytes than huge text files in which the devil breaks his leg.

28. Why does https not work on sites and forums in .onion?

A https connection for .onion is not required., .Onion and so does everything the same as https, only for free.

29 What about public Wi-Fi?

The owner of the Wi-Fi hotspot sees that you are connected to Tor and often sees you through the camera. So buy a left modem and change them more often.

30. Why can not I use Windows, MacOS, iOS, etc.?

They have closed source code (what these OSs actually do not know anyone), collect all kinds of data about you and merge them "wherever needed", they themselves are a trojan and a bookmark. Using these OSs, encryption and so on is practically pointless, except in the cases of Elusive Joe, when nobody needs you to fuck (see the beginning about anunaki).

How to either "configure" these OSs is impossible from the word "completely."

31. The devices were removed by garbage or I have suspicions about it. How to find or how to check for hardware bookmarks?

No way. Sell / present and buy another.

32. And how to anonymously use a contact or other social network?

Anyway, someone asks ...

- Register using SMS reception services
- Tails with twisted "Security settings ..." in Tor Browser to the maximum, see above
- Use the mobile version
- Do not disclose your data, do not write to friends, do not write anything in PM
  • Like
Reactions: Golordi

Members, viewing this thread

No members online now.