Internet Privacy

Stoney McFried

Well-Known Member
Thanks for clarifying that for me. You learn something new every day!:D
This is what's known as a jailed environment, and while it can work, if the virtual machine is connected to the internal network there's nothing to stop it from infecting the host. Also any data used on the virtual machine is still saved on the actual disk, actually in a format which makes it easier to extract and transport (this was its true purpose). For security's sake you're really better off saving everything to an encrypted flash disk that you could easily destroy.




This generally is not the case. While you can change your internal IP address at leisure it's becoming more and more difficult to change your physical IP, which is what actually connects to websites. Most modems these days all come pre-equipped with a DHCP router and forcing an IP address change on the computer doesn't reset the IP the router itself is holding.

Now you could reset the router but that in itself isn't enough to force the change either. Often enough your IP address is actually bound to the MAC address (which isn't so easily changed) and will only renew if it's been unused for a predetermined period of time that only the ISP would know. This could be anywhere from a matter of hours to weeks, and some customers are even issued static IPs which never change. So the only way to truly know you've changed your IP is to unplug the modem for quite a while, but until you know what the length of time is, you're stuck in a one step forward two step back process.
 

CLOSETGROWTH

Well-Known Member
He's right the best way to delete data is to get a program that deletes and writes over the data you want to delete multiple times..I was amazed when I downloaded a data recovery tool and could access things that were deleted from my recycling bin a year ago(might be an exaggeration..this was a while ago..months at least)
Im a computer tech, if you install lets say win xp.. make sure you dont do the "quick format", always choose the "full format", takes longer but it does destroy data for good.
 

MacReady

Member
Im a computer tech, if you install lets say win xp.. make sure you dont do the "quick format", always choose the "full format", takes longer but it does destroy data for good.
No, it doesn't.

The only difference between a full format and a quick format is whether or not it checks for bad sectors after it erases the master file table. That data is still recoverable by any data recovery pro, probably even if it's been overwritten once or twice.

If you want to remove data beyond recovery, your best bet is to shred individual files, or sanitize the whole disk with a 7 pass cryptographically secure pseudo-random sequence (using software like what I mentioned above). That will stop all but the most resourceful of adversaries (e.g. the NSA). The only way to be completely certain is to physically destroy the disk beyond recovery. Physically shred or melt the hard drive platters.
 

meowmix

Active Member
2nd this - tor project is awesome. -- id also say its the easiest free proxy service ive ever found.

www.torproject.org

It essentially routes your traffic through two or more other computers, and it can be used in conjunction with encryption. If you are browsing the net with computer A, you send a message to computer B, B sends a message to computer C, computer C accesses the information (such as a website) and then sends it back to B, and B sends it back to you at computer A. It essentially hides your IP address, so that if this site were forced by law enforcement to give up IP logs, or they were tracking it, it would make it more difficult for them to trace back to your ip. You can't use anything flash based, so no youtube, but it will help. No matter what, if law enforcement gets bullshit warrants (which they do every day thanks to crusading judges) they can data mine pretty much everything that is done on the internet and nothing can stop that. There's also the possibility that law enforcement could be operating both computers B and C, and they'd know exactly what you were viewing.

It's a little bit slower than usual internet, but I almost always have pages load in under 30 seconds. Occasionally you get some interesting stuff when a website tries to determine your country of origin. When using it, I've had Google come up in German, and (I think) Japanese.
 

HardCorps420

Active Member
I use a few things, one i use BestCrypt which obviously is an encryption tool. you can use it to encrypt any physical drive and it also has key-logging protection. you have to buy it but i just dled it from a torrent site. im not big into proxys (i'm looking inot it as we speak) cause im on such a slow internet connection, but all i do is keep all sensitive info on a flash drive and encrypt it. I also have a program calld BCWipe which is made by the same company and completely erases all info. BCWipe complies with U.S. Department of Defense (DoD 5220.22-M) standard, U.S. Department of Energy (DoE M 205.1-2) standard and a set of other standard wiping schemes. You can also create and use your own customized wiping scheme to wipe sensitive information from storage devices installed on your computer. (taken from site). they also have a nice firewall which i will be investing in shortly. heres an exert from the site:

Jetico provides military-standard data protection software for all highly sensitive information and mission-critical data throughout the lifecycle - permanently delete files, erase entire hard drives, encrypt files/folders, encrypt whole volumes and control network traffic.


Approved for use by the U.S. Department of Defense, BCWipe surgically removes all traces of selected data, while BestCrypt disguises the data you need to keep with convenient, reliable encryption. Jetico Personal Firewall protects computers against hackers and malware when networked or connected to the Internet.


I hope this helps you, and while theres pretty much anyway around shit you can get pretty fucking close to where the FBI CIA or NSA would have to help the local law enforcement agency and they would simply laugh at them unless your columbian cartel or a terrorist.


 

nicktater

Well-Known Member
They would have to go through everyone on this site though to find someone that live in an area that they can actually do anything about. It would take too much time to be effective for them i wouldnt beleive they do that.
 

MacReady

Member
They would have to go through everyone on this site though to find someone that live in an area that they can actually do anything about. It would take too much time to be effective for them i wouldnt beleive they do that.
They'll subpoena the log file of visitors' IP addresses, or gather other clues that could help identify an individual, and use this to support getting a warrant or a conviction.
Obscure your shit.
 

agent11475

Active Member
this is about the topic but not really fallowing the conversation, a lot of people screw themselvs over and not because they dont use a proxy, people put their private information into public view. the best example i have of this is with pictures off of peoples cell phones. http://janezlifeandtimes.files.wordpress.com/2009/08/my-meal.jpg i just grabbed that photo from google and know its been taken with an iphone, the picture has metadata in it called exif, this data gives you some crazy information including a GPS tag of where the picture was taken. if you want to see for yourself paste the link from the picture into http://regex.info/exif.cgi and it will show you on a map where it was taken.


http://regex.info/exif.cgi?url=http%3A%2F%2Fjanezlifeandtimes.files.wordpress.com%2F2009%2F08%2Fmy-meal.jpg


mind=blown
 

whiteflour

Well-Known Member
Jetico provides military-standard data protection software for all highly sensitive information and mission-critical data throughout the lifecycle - permanently delete files, erase entire hard drives, encrypt files/folders, encrypt whole volumes and control network traffic.


Approved for use by the U.S. Department of Defense, BCWipe surgically removes all traces of selected data, while BestCrypt disguises the data you need to keep with convenient, reliable encryption. Jetico Personal Firewall protects computers against hackers and malware when networked or connected to the Internet.
BC is good but I wouldn't rely on it protecting too much by the way of LEO. Your best bet is to only use it in conjunction with removable media which you can destroy. If you're really worried about it you should NEVER, EVER put information on your hard drives. Anyway it's wise to keep in mind that any algorithms which have been approved for civilian use by the NSA have already been compromised by them at least, and if it's anything less than 256-bit it can be feasibly cracked with distributed computing. Everyday those resources get cheaper.
 

MediMary

Well-Known Member
this is about the topic but not really fallowing the conversation, a lot of people screw themselvs over and not because they dont use a proxy, people put their private information into public view. the best example i have of this is with pictures off of peoples cell phones. http://janezlifeandtimes.files.wordpress.com/2009/08/my-meal.jpg i just grabbed that photo from google and know its been taken with an iphone, the picture has metadata in it called exif, this data gives you some crazy information including a GPS tag of where the picture was taken. if you want to see for yourself paste the link from the picture into http://regex.info/exif.cgi and it will show you on a map where it was taken.



http://regex.info/exif.cgi?url=http%3A%2F%2Fjanezlifeandtimes.files.wordpress.com%2F2009%2F08%2Fmy-meal.jpg



mind=blown
damn my mind is blown now to .. fuckin eh
 

agent11475

Active Member
to get rid of all of the exif data from a photo you should use a program like photoshop or gimpshop(free) and resave the photo when you go to resave the photo under options uncheck the box that says "save exif data" thats what i do with gimpshop
 

blazin256

Well-Known Member
simply put....if they want you your fucked. just watch what you say and how you word things. act dumb and never admit to any crime online or around your "friends". and if you dont want your phone to track you, take the battery out.
 

brownguy

Member
One of the best way to protect yourself online is to use TOR. It is a free software. You can download it by Googling for it. It comes with Firefox browser which operates in "private browsing" mode. Java/Flash,etc are disabled to protect your privacy further.

All the data sent between your computer and the Internet is encrypted. At the same time, your IP will also be obfuscated, so no one can trace you.
 

bigv1976

Well-Known Member
so is it as simple as dowloading and installing? I did that and see no change as far as browsing goes.
 
Top