Dominathan's guide to digital security VERSION 2.0

Dominathan

Well-Known Member
Forward
With great power comes great responsibility, and knowledge is power. Remember that 100% anonymity allows you to do whatever you want, but it doesn't mean you should. Using anonymity is a great way to work around laws, but please remember that laws exist for a reason. Crimes against another human are still crimes, whether you get caught or not. Using this knowledge to cause chaos is counterproductive, and will prove that humans aren't responsible enough to handle full anonymity. If you can't, then please don't even read on. I hope that all usage of the following information will only be used ethically, and not to cause harm.


Digital security is the practice of protecting yourself for any reason, in a purely digital environment. Although we all use the internet, not all of us are aware of what steps we can take to protect our physical identity from being extracted by our digital identity. In this thread, I'll cover the basics of protecting yourself against "Eaves-droppers" (Spammers, Hackers, Law Enforcement, etc*).

Contents:

I. Tor
II. Bitcoins
III. PGP
IV. Proxies
V. Full Drive Encryption
VI. Spoofing MAC Address
VII. Ophcrack
VIII. AirCrack



I. Tor

Oh jeez, how do I explain this? Lemme give it a shot:

Imagine the internet as a piece of paper, with tons of dots randomly put all over it to represent computers. Now imagine a black circle in the middle of the paper. This black circle is a lot like Tor. By running web traffic through Tor on your computer, you are moving your little dot into the black circle. Browsing through Tor bounces all information back and forth before it goes out of an "Exit Node" (it's important to understand that there is a finite number of exits from Tor and to the "normal" internet) and into the free and uncovered dots. Not only is this useful for navigating to all those dots outside of the black circle, but now imagine if your destination was in the black circle itself!

This is a very clever to host a sensitive website, too. Since nobody in the world will ever be able to pinpoint where you are running your web service from, you are able to create a digital page that can not be physically tied to you. Tor proved itself extremely useful during the revolutions in both Egypt and Libya, and has a myriad of other uses.

NOTE : The fastest way to get somewhere is "as the crow flies", and Tor DOES NOT fly the fastest route. Normal web pages load slightly slower in Tor. Using Tor to connect to a Tor hosted site can be very slow, but it's the price you pay for anonymity.

So how can you use Tor?

IMPORTANT:
Tor will not anonymize all of your internet traffic. Configuring Firefox to run Tor will only anonymize traffic going through Firefox, and only while Tor is enabled. Eventually, I will include a segment on running other applications through Tor.


II. Bitcoins

Bitcoins is a form of currency specifically designed to meet the needs of a global economy. Instead of using paper bills, many prefer bitcoins for the instant digital transfer it provides. So how much is a BTC (Bitcoin) worth? Whatever people are will to pay for them! The idea seems funny at first, because it's something with no value whatsoever. That's what currency is though. It's an otherwise useless measuring stick on which we value everything else in our lives. Due to their rise in popularity, BTC have now become worth more per unit than the US dollar.

Some advantages to using BTC:
  1. 100% anonymous if used with Tor
  2. Instant transfers
  3. Impossible to counterfeit
  4. Is Peer2Peer (Meaning there is no central issueing unit, so no chance of corruption)

First time users may find it hard to obtain BTC, however. Mtgox.com is the only TRUSTED Bitcoin currency exchanger I know of. However, users will still find they can't simply enter a credit card number and buy BTC (yet).

Some uses for BTC would be:
  1. Anonymously making donations
  2. Buying illicit or "black market" goods or services
  3. Buying legal goods or services

So how can you use Bitcoins?
  • Download the application here.
  • After downloading and installing, you'll automatically be given a bitcoin address. For example, one of my addresses is "15aS6tvdBWASoTSgkcBHkmKghuBx9NJWyV". If you want to practice sending money, that'd be a great start . For the techno-impaired, remember that you're bitcoin address is no more private than you're public address.
  • Use Bitcoins as you would any other currency!

Special notes:

Users who would rather have their Bitcoin wallet in the cloud (accessible by your computer, but not stored on your computer) have the option of doing so too. MyBitcoin is a great site to have a bitcoin wallet on. It allows you to send and receive payments instantly, and being on another computer means that you could access it through Tor for yet another layer of security. Best of all? 100% free.

IMPORTANT:
Bitcoins a completely digital currency, and as such is subject to fluctuation in value. Also, it is extremely important that you back up your bitcoin wallet if stored on a personal computer. If for some reason the hard drive fails, you don't also want to lose all your e-currency.


III. PGP

PGP, or "Pretty Good Privacy" is an idea used to encrypt and decrypt messages that were intended for only one recipient. PGP works by generating two separate "keys". The keys are paired algorithms, with one key requiring a "Pass phrase" to work. This key is called the "Private Key". Users of PGP make their public key widely available (generally have it posted in profiles on anonymous forums, or e-mail it to their correspondent). In fact, the more people that have your public key, the safer you are. Using the public key to encrypt a message is easy, and only requires two fields (Public key, message). However, decrypting can ONLY be done with the paired algorithm ("Private" key) and pass phrase. Many pass phrases are simply a sentence highlighted from a book.

How do I actually use PGP?
Well, PGP is software, and must be paid for. Like everyone else though, I hate paying for what isn't tangible. GnuPG is a free replacement that one can use for PGP security.

Why use PGP?
  1. Protect trade secrets
  2. Have a truely "one on one" conversation online
  3. Sending private messages in an unsecure network
  4. Encrypt entire hard drives

Many anonymity networks operating on Tor require users to send messages in PGP. This way, even if they are intercepted, they cannot be read.

Free PGP programs:


IV. Proxies

Though this may seem novice to some of use, proxies are a great stepping stone into private browsing. Proxies are pretty simple to use and understand. Basically, put a computer between you and where you are going on the internet. Proxy servers are numerous, but also very slow. It's important to note that your proxy is not hidden, and serious violations can result in a subpoena forcing the proxy server to reveal you're information. That's why it's important to use a proxy server that runs on a machine that is physically housed in another country.

Different types of proxies include :

  • Socks : A fairly new type of proxy that allows for more types of data transfer.
  • Anonymous : Proxy does not reveal information about the computer making requests.
  • Transparent : These are the snitches of the proxy world. Avoid them.

So how can you use Proxies?

IMPORTANT:
Using a proxy does not guarantee anonymity. Proxy servers in your country can be court ordered to give out your IP address. Even if the proxy is physically housed in another country, your activity can still be connected to you. If they have a court order for your internet activity (meaning whatever you did had an obvious connection to you), and the receiving internet activity, they can match yours going to the proxy, and the receiving coming from the proxy.



V. Full Drive Encryption

You never know when your computer is going to be seized, and if it is you could very well wish you had encrypted your hard drive beforehand. Simple hard drive encryption (encrypting the entire drive with PGP) is savvy, but possibly fruitless. This is because a fully encrypted hard drive throughs up red flags in a courtroom (and you may be forced to provide you're passphrase). Failure to comply is a larger charge than possession of marijuana in some areas, so keep that in mind! So, if encrypting our entire drive isn't enough, what do we do? Truecrypt! Truecrypt is a fantastic open source (free) encryption tool that allows you to hide an additional OS (Operating System) in a hidden partition of your drive. If done right, it's impossible to prove that a hidden operating system exits. The way this works is by having a "dummy" operating system that is engaged by using a seperate password. Giving up that password would satisfy the needs of any court or demanding wife, while slyly maintaining the truly "hidden" OS.

So, how can I use Truecrypt to create a hidden OS?
  • Download Truecrypt here
  • Download Parted Magic here
  • Unzip and install both files
  • Run a "Disk Defrag" by doing this (Windows) or this (Mac)
  • Use Parted Magic (Or any other disk partitioning service) to create a new partition. We can partition it either as NTFS, or FAT32 (Fat32 is unable to store files larger than 4gb, so I go with NTFS). If it's NTFS, make your partition 2 times larger than the other partition. If using FAT32, make the new partition 5-10% larger.
  • Launch Truecrypt, go to the "System" tab, and choose to create a hidden operating system
  • Choose single boot vs. multi boot (If you are going to only run windows, you choose single boot. To use multiple OS's, use multi boot)
  • Set up "Outer volume" (Decoy OS) by choosing your encryption type. (AES works fine)
  • It should accurately predict the partition you wish to use for your hidden volume, if not, correct it.
  • Choose a password for the outer volume, choose an data type (NTFS or FAT32), and accept the disclaimer telling you all you're files in that partition are going to die.
  • Wait around for it to format...
  • Move some documents to the outer volume (Truecrypt prompts you to do so, and provides a GUI interface for it)
  • Truecrypt now prompts you to create passwords for the hidden OS, and encrypts it.
  • Create passwords for the decoy OS, format it.
  • At this point, you can put a disk in your computer and Truecrypt will create a rescue disk (an .iso file used to restore your computer should something go wrong).
  • After the computer reboots, enter both the hidden and decoy operating system passwords.
  • When the decoy operating system loads, have truecrypt encrypt it (it will prompt you to do so).

BOOM! That's it! Now you're protected from all the just and unjust things that could happen by someone taking your computer! I use my decoy operating system primarily, that way it's not just a shell of an OS, and it's believably occupied.



VI. Spoofing your mac address

This is a little trick that has some useful applications. Basically, a wireless router assigns what is known as the ARP (Address Resolution Protocol). If you've ever tinkered with the network, you know that computers on it are assigned protocol like: 192.168.2.1 This is what we are spoofing. We make ISP logs appear to come from a machine that is not ours. This is useful when at a public location that is anonymous but unsecure (Starbucks, etc*), or even on a home network.

How do I spoof my Mac address?

Well, if you're running linux, you're in luck! Two simple commands:

ifconfig eth0 down hw ether 00:00:00:00:00:01
ifconfig eth0 up

For macs you need to be using Tiger OS or earlier editions. A patch is needed to spoof the address, however http://slagheap.net/etherspoof/ . Once installed, use a command such as:

sudo ifconfig en0 lladdr 00:00:00:00:00:01

For windows, I reccomend Mad Macs (lol). It's a free program that will randomize your hostname and mac address with every boot. Download it here, and install!


VII. Ophcrack

Ophcrack is a handy tool used to crack windows passwords. It works by decoding "hash's" (a string of characters that a password is translated to through an algorithm) with Rainbow Tables. It also has a "Brute-Force" feature for simple passwords (guess and check password recovery). It's a powerful tool that only requires a CD to be popped into a computer, if you want acces to it.

So, how do I use Ophcrack?

  • Download it HERE
  • Burn the .iso file to a disk
  • Boot up the computer with the disk in
  • Run it, and find all the windows passwords on the system!

(This is a very good reason NOT to use windows. The password system on it is a joke, made to keep out young children and old grandparents.)

VIII. AirCrack

Aircrack is a great tool for cracking WEP and WPA-PSK keys. This is handy if you find yourself in need of the internet, but can't find any public networks. It could also be used in combination with Mac spoofing to do discreet searching on another network (If the mac address is spoofed, it's unlikely anything will happen to the other networks administrator). Aircrack works by capturing data packets from a wireless network, and then "Attacks" the network to recieve the keys. Not all wireless cards work with it though. The Nokia N900 phone has been modified to run packet capturing and packet injection with Aircrack, so that's a great mobile option.

So, how do I use Aircrack?




I hoped you all enjoyed reading this as much as I enjoyed writing it! And remember to mouse-attack my reputation!

-DomiNate bongsmilie
 

dannyboy602

Well-Known Member
This has been very helpful to an idiot like me who likes to dl porn and shouldn't and didn't even know how to copy and paste till like five years ago. I do think about this site and it's security measures.. I mean they know my email address which can be traced back to me. I think this site may be perused by popo but don't know for sure. I did ask admin once how safe is my information and was ignored. If I even smell a problem I'm out of here sooooo fucking fast
This site has been fun but in no way will I let it interfere with my business.
 

mantiszn

Well-Known Member
i think a lot of people, myself included, create another "fake" email account and link shit like this to it.. keeping personal and forums like these separate..

This has been very helpful to an idiot like me who likes to dl porn and shouldn't and didn't even know how to copy and paste till like five years ago. I do think about this site and it's security measures.. I mean they know my email address which can be traced back to me. I think this site may be perused by popo but don't know for sure. I did ask admin once how safe is my information and was ignored. If I even smell a problem I'm out of here sooooo fucking fast
This site has been fun but in no way will I let it interfere with my business.
 

dannyboy602

Well-Known Member
Emil accounts from the same computer can be tracked back to that computer. Am I correct? So how is it different?
I just don't know , am totally ignorant, and slightly frustrated with my own ignorance. It's not like I am a serial killer but I cant have this thing get out of my control. I really have to digest all the info OP wrote. And it may take a few days
Christ I'm not a terrorist just a stoner.
 

mantiszn

Well-Known Member
it depends on how you are accessing the email account...

but if they were to subpoena your details from the site and managed to get your email address you would have a difficult time proving the email address [email protected] (if your name is mark johnson) with all your personal details and activities, isn't your email address rather than [email protected]

if they did track either back to your location and you were growing at the location you are accessing the internet you'd still be fucked.. but like the OP says if they access the account and it has further evidence to incriminate you... it's yet another problem in the courts.. where if it is a random account you can say well lots of people use my computer i don't know what account that is or the password..

i think at the end of the day if they want you they will most likely find you.. the people they want are the people growing loads of plants.. i know numerous people that have been on this site for many years just accessing it normally without any problems at all.. but they all have small operations..

if you had a huge operation then yes below is helpful if you have the desire to be posting on the internet about it... but personally.. if i was growing for commercial and financial gain i would not be posting about it here in the first place...
 

Dominathan

Well-Known Member
i think at the end of the day if they want you they will most likely find you.. the people they want are the people growing loads of plants.. i know numerous people that have been on this site for many years just accessing it normally without any problems at all.. but they all have small operations..
The thing is though, if you use all the tools I provide, you can make it so that you are untracable! Just using Tor and spoofing your Mac address should be good enough. And if Tor is too slow, just use a Socks or a "Tunnel" Proxy. Tunnel proxies bounce the information over a relay of about 3-6 machines. It's not randomized as is with Tor, but 5 extra subpoena's would definitely discourage law enforcement (the process is long and drawn out). However, Tunnels travel on a known path where the information is rarely encrypted from relay to relay. Another good alternative would be to get a VPN (Virtual Private Network) and tunnel traffic through there. That's just my 2 cents. :D Enjoy!
 

mantiszn

Well-Known Member
yeh i agree with you.. and if i am doing something i shouldn't be doing online i usually jump through about 6 or 7 different servers and use tor or equivalent .. but for this site its a pain in the ass.. i'm not worried... like i said i doubt they would go to all the effort and trouble to bust me for 3-4 plants..
BUT like i said people running unreasonable amounts it's definitely worth doing..

great guide very informative..

and like i said .. if they want to find you.. they will.. but you can slow them down .. hopefully enough for them not to bother..
 

Dominathan

Well-Known Member
yeh i agree with you.. and if i am doing something i shouldn't be doing online i usually jump through about 6 or 7 different servers and use tor or equivalent .. but for this site its a pain in the ass.. i'm not worried... like i said i doubt they would go to all the effort and trouble to bust me for 3-4 plants..
BUT like i said people running unreasonable amounts it's definitely worth doing..

great guide very informative..

and like i said .. if they want to find you.. they will.. but you can slow them down .. hopefully enough for them not to bother..
Yea, it's all about jumping through hoops. I think the full drive encryption would be especially helpful, if they ever wrestled my computer from me.
 

tristynhawk

Well-Known Member
Wow...thanks for all this is info and time you put into this guide. Your computer I.Q is way above mine but ima look into these steps a little more. Thanks for tip bro.
 

Dominathan

Well-Known Member
Wow...thanks for all this is info and time you put into this guide. Your computer I.Q is way above mine but ima look into these steps a little more. Thanks for tip bro.
Anytime man! Digital security is so important, and there didn't seem to be a great guide on it. If anyone sees anything I omitted, just holler at me!
 
Top