|
>>
|
No. 6976
ID: d4df2e
File
14218247315.jpg
- (65.37KB
, 854x580
, Cell_Phone_-_Verizon_Tracking.jpg
)
Security is a process; not a product.
>>6973
>it becomes exceedingly easy to paint an innocent person to be guilty of something
"Find me the man, and I'll find the crime." - Lavrenti Beria
Useful quotation if you want to get people's attention.
>WiFi
Heads up: shit probably isn't secure. More so than just "lol WEP". Honestly, it's better not to have a phone if possible. Oh well, have this link:
https://blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy
>in total secrecy
Wrong. Do not trust your phone. It is probably backdoored already. There are a shitton of 0-days and built in backdoors for most phone OSs. Now think how much manpower the NSA has... yeah. Do not converse about such things. Never on or near non-FOSS, unaudited, relatively uncontrollable hardware. Especially if it is networked.
>nothing short of a dedicated NSA operation can really break it
Except a poor implementation of the code or PRNG or side-channel attack or an OS vuln or...
Seriously, there is something very important to know about this stuff... I can only think of one solitary thing that is actually "bulletproof". OTP with truly random numbers. That's it. Once you start taking any shortcuts, using computers, or repeat stuff, you sacrifice a significant amount of security. Start reading up on vulnerabilities and start realizing that there's more to this than just crypto algos.
>They can still track you via the GPS in your phone
Don't forget that passive cell tower data is monitored/stored by the NSA. They can and do use it to track your movements via triangulation and see who your potential cohorts are. I thought I covered this shit in another thread.
>>6974
>TOR is out.
Potentially. In some slides, they said that Tor is a thorn in their side. Could be misinformation or a limited hangout. Stay on your toes.
>If you pick one in a foreign country that isn't real keen on the NSA, you can be pretty sure they won't be in there nosing around in your traffic.
WTF? NO! No. Stop. That's where they attempt to break in the most. Using a VPN is tossing all of your trust on a single fail point. Did you not see the slides posted on Der Spiegel and the subsequent conversations afterwards? Remember the issue people had/still have with CAs and SSL/TLS certs? Yeah, centralized infrastructures are the low hanging fruit in front of the NSA. They often have logging requirements and they are often under gag orders or are required to install pipes directly from their server rooms to the spooks' offices. All of the incriminating evidence is in one spot. No, no, no, no, no. Stop that shit. VPNs are only good for non-state level adversaries.
>Using the A/I VPN will secure your email, skype, IM, and other web traffic. That takes care of the bulk of your NSA worries.
>email
Very wrong. Email is not secure. It is only as secure as when all parties involved practice good security. This means all servers and MTAs between you, the mail server you use, the servers and MTAs in between your friend, and your friend. If your friend opens the email in a webmail client and has his gpg key uploaded to it because he's lazy or some shit, or has browser vulns and uses x.509 certs or some shit in the browser, consider your message read.
Just the fact that the headers are public is incriminating enough.
Once again, there is WAY more to security than just all of this.
>skype
Don't use this shit. Unaudited proprietary direct feed to the NSA. Stop that shit.
>IM
Use OTR and don't use libpurple. Shit has more bugs than a coked out hooker with the sniffles.
>web traffic
At least use HTTPS Everywhere, noscript, request policy, and refcontrol. Also, tweak your browser settings to disallow shit crypto standards that are known to be flawed.
>>6975
>You're welcome.
>no sigs
>no hashes
Come on, man.
Here's an alternative:
https://veracrypt.codeplex.com/
Also, there is a project called CypherShed which aims to do the same thing.
If you're on Loonix, use dm-crypt/LUKS. If you're on FreeBDSM, use GELI. If you're on OpenButtSexDaily, use softraid, IIRC.
And just a heads up, Bruce Schneier uses PGP disk crypt, IIRC.
Related:
http://istruecryptauditedyet.com/
>If you unmount the drive manually before shutting the computer off, it will purge the keys from the memory and Truecrypt will remain as unbreakable as you could possibly want. If you aren't a lazy faggot who decrypts his file on login and never unmounts it, you can keep that hitlist of terrorist leaders safe from the prying eyes of even the Pentagon.
>All this assumes you're using a system that is independently secured in some way. A good Linux distro is your best bet since it is less vulnerable to the billion keyloggers floating around out there. If you must use windows, then keep it religiously clean of viruses, don't open odd attachments or use unknown thumb drives you yourself did not purchase.
This.
I know it sounds like I hate your guide, but I want people to know that there's more to it than just "download software... yay privacy!" There's stuff that needs to be corrected and people need to be aware of the dangers that they might miss.
Please point out anything I missed or got wrong. Assuming I have time, I'll ack the mistake or slap your shit for being wrong. Either way, let us learn and do better in security.
And remember... once again...
Security is a process; not a product.
|