Author Topic: Internet Security  (Read 327 times)

llamabox

  • Subordinate Wasp
  • ***
  • Posts: 119
Internet Security
« on: March 24, 2009, 02:53:13 AM »
"There's no such thing as complete security on the internet. Since internet connections are a two-way flow of data, every computer is basically an open pipeline to every other computer on the web."

Right now someone could be going through the files on your computer without you even knowing it. Mischievous hackers and virtuous legislators have made the internet a questionable place to discuss growing. Fortunately this primer can reduce the risks that the average closet grower is likely to encounter. Part I covers internet anonymity and Part II deals with general computer security. While no one is invincible against an all-out investigation, you can take some major steps to protect yourself and your computer from those who don't respect your privacy.

Note: This guide is not intended to assist with breaking laws, only to encourage safer surfing habits. Use it at your own risk.

Part I: Internet Security

One of the biggest goals in the quest for anonymity on the Net is to hide your IP (internet protocol) address. Each request you make to a website is stamped with the IP given by your internet provider. It functions like a return address on a piece of mail. Websites usually log IPs, and there are ways to trace it back to you. To see the IP you show to everyone on the internet, visit our snooper page or this one. Recognize the "client's address?" If it's your internet provider, you may want to start using a proxy server.

Proxy Servers

A proxy can add a big boost to your anonymity. A proxy server is a computer located elsewhere on the internet that acts as a middleman to retreive web pages for you. Many ISPs offer them to cache (store) popular web pages on their server so people can load them faster. The nice thing about some proxies is that they remove your IP info and replace it with theirs. By surfing through one of these "anonymous" proxies, websites will think your request came from the proxy, and not from you. Your IP is effectively laundered.

Proxy servers can be divided into two unofficial types: public proxies (caching proxies), and anonymizing services (Anonymizer, etc.).

Public Proxies

By making a few simple changes in your web browser's settings, the web pages you request can be retrieved anonymously by a proxy. Don't worry if you're not sure how to make these changes, step by step instructions for the popular browsers are at the end of this article.

Here are a few sites that list public proxy servers:
http://www.lightspeed.de/irc4all/eproxy.htm
http://proxys4all.cgi.net/proxy.shtml
http://www.ijs.co.nz/proxies.htm

Many proxies on the lists aren't usable. Some go down frequently while others restrict access to certain websites (censorship). And some of them don't pass the test...

Test Your Proxy

Not all proxies mask your IP. Many are "transparent" and transmit your IP info to websites-- obviously you don't want to use these proxies. To help you determine if your IP is showing, Overgrow has setup a test to show you exactly what information every website can see about you. Basically you're just looking for your internet provider's IP or domain name in each line, especially the following ones:

REMOTE_ADDR: the IP you transmit
REMOTE_HOST: your domain name (corresponds with your IP)
HTTP_X_FORWARDED_FOR: non-anon. proxies can show your IP here
HTTP_FROM: can show your IP
VIA: can show your IP
CLIENT_IP: this should be blank

If your IP shows up, look for another proxy. Eventually you'll find plenty that are anonymous.

Tips on using proxies:

Choose proxies in foreign countries - preferably ones with rational pot policies. To find the location and owner of a proxy, try whois at Holmes or Smart Whois.

Test your proxy before each surfing session. Occasionally a proxy that's worked fine for weeks will start transmitting your IP for no apparent reason. If this happens, use another.

Change proxies frequently. Some change them weekly, others daily. Frequent changing reduces the trail left behind that shows your surfing habits. Use caution with proxies on port 80 as they're usually run by ISPs. Many ISPs don't mind at all, but some reserve their proxies only for subscribers. While it's their fault for not requiring authentication, there's always the chance they could go postal and report you to your ISP

-------------------------------------------------- ------------------------------
"If worst comes to worst and an intruder should gain physical access to your computer, the following techniques will help safeguard your personal data from being disclosed."

Part II: Computer Security

This sensitive data might include your grow logs, pictures, and any programs you'd like to hide. It may also include compromising data you didn't even know you had on your computer.

Wipe It Clean

A common misconception is that deleting a file actually deletes the file. Nope. All that usually happens is the file's name gets removed from the disk's index -- the data itself is still there on the disk! Eventually it gets overwritten with new files and programs, but there's still a chance it can be recovered.

There are many "undelete" utilities out there that can easily recover deleted files. For peace of mind use a file-wiping program. File-wipers overwrite deleted files with random data to make them nearly impossible to recover, even with forensics software. A good file-wiper comes with PGP. Another good free one is BC Wipe. Both programs allow you to choose how many times to overwrite each file with random data. Choose at least 10 "passes" to totally shred a file.

Both PGP and BC Wipe can also wipe "file slack" and "free space". File slack is the unused space in a data cluster that's at the end of most files. It can contain data from a previously deleted file. Free space is any unused disk space on the hard drive, including any files you "deleted" the old way. It may take all night to wipe a large hard drive clean, but for some it's definitely worth it.

Another security risk is Windows' "swap file". Windows frees up RAM memory by temporarily moving data over to the swap file on your hard drive (it's written back to RAM later if needed). Someone could easily scan your swapfile looking for passwords, grow logs, or something copied to the clipboard. The BC Wipe program can wipe the swap file clean. Also don't forget about Windows' recent documents listing (the one in the Start menu at "Documents") at: C:\Windows\Recent.

Encrypt Your files

Any files or programs you want to hide from prying eyes should be encrypted. Encrypted files are basically useless to law enforcement. Many encryption programs are available, but PGP is recommended here because of its widespread use and effectiveness. Bankers, businessmen, and politicians all use it regularly. The files you encrypt are de-crypted using the special password you select. Be sure to choose a long and complicated passphrase. Simple passwords are easy to crack.

Some programs can create an encrypted virtual drive on your hard drive to can hold files and even entire applications in total secrecy. The virtual drive is given a new drive letter like E:\ and can be used like an ordinary drive, except it's opened only with your password. There are no external hints of what files are inside. Scramdisk and also PGP can create encrypted virtual drives.

Part III: More Tools

Firewalls: A firewall is a security program that blocks unauthorized access to a computer (or network). A firewall inspects each packet of internet data entering or leaving your computer's ports and decides whether it should be allowed to pass or be blocked. Firewalls protect against all sorts of hacking, like Trojan horses, probing of your ports, spoofed IP's, and cracking of Windows' File & Print Sharing passwords. Trojans, for example, can secretly send info about your machine to someone else on the net.

Steve Gibson runs an outstanding site that is constantly updated with the latest firewall information. He recommends the new free release of Zone Alarm. Firewalls should be standard equipment on all new computers, but until that day it's well worth the few minutes to install a good one. Be careful with simple "port monitor" programs. Some of them open all your ports, which can attract the attention of passing port scanners. A good firewall works on a lower level while it monitors all port activity.

Anonymity 4 Proxy (A 4 Proxy) - Excellent proxy management program that automatically tests and grades each proxy's anonymity according to several variables. It has a database with hundreds of verified anonymous proxies, or use your own... sorts them by speed, even finds the fastest one for each website. Highly recommended.

Evidence Eliminator - a complete wiping "suite" that cleans everything - cache, cookies (except the ones you want), swap file, file slack, free space, as well as any files you specify. Highly recommended.

Window Washer - another wiper that cleans the cache, recent-documents history, auto-complete data forms, etc., and can selectively wipe cookies.

Junkbuster - Program that blocks cookies (selective) plus it can block unwanted advertisements and webpages. Also blocks the "referer" field, which tells websites the URL  of the site you just clicked from.

Intermute gets rid of cookies (selective), referers, Java, JavaScript, ads, animation, and more.

Conclusion

It's sad that governments hunt and oppress growers for such a petty, victimless crime. Your safety on the internet will depend a lot on the political climate in your area. Fortunately most growers have four factors in their favor:

First, the ever-growing number of Cannabis  enthusiasts on the net provides "safety in numbers". Investigations are costly and time-consuming, so "mass busts" are impractical, especially with the international readership here.

Second, the profusion of other "vices" on the 'net - from credit card fraud to child porn to illegal weapons sales - gives marijuana sites a relatively low priority among investigators. (The highest priority, incidentally, is national security and terrorism).

Third, most countries have fairly decent civil-rights laws that protect citizens from their governments. In the U.S., for example, privacy laws usually require at least one court order to track someone down through their computer, while the First Amendment of the Constitution guarantees your right to discuss growing (assuming you don't actually admit to growing. ;-)

Last, there are the safe-surfing techniques we looked at. These factors make the chance of being harassed very slim. In fact, we know of no growers who have been busted from posting on a marijuana site. But we want it to stay that way, so play it safe.
-------------------------------------------------- ------------------------------
Changing Your Settings

Proxies - Cookies - Cache

Browser settings for proxies:

Just like any computer on the internet, a proxy server has a unique IP address and a corresponding domain name. It also has a port #. You can use either the IP or the domain name in your browser, since they're interchangeable. For example the IP of the Spanish proxy, linux.softec.es, is 194.224.102.2 and the port is 8080. Most proxies use ports 80, 3128, 8000, or 8080. Proxies are often listed with the port # tagged on to the end of the address: linux.softec.es:8080 (or 194.224.102.2:8080). Go back to the article for some lists of proxies on the web.

For Opera version 3 or 4:

Click Preferences,
Select Proxy Servers,
Put a check at HTTP and enter the proxy, and enter the Port #.

For Microsoft Internet Explorer 5:

Select the Tools menu,
Choose Internet Options,
Click the Connections tab,
Double-click on your dial-up connection,
Put a check at Use a proxy server,
At Address enter the proxy, and enter the Port #.

For Microsoft Internet Explorer 4.0.1:

Choose the View menu,
Select Internet Options,
Select Connections,
Select the Automatic Configuration "Configure" button,
Enter the proxy in the text box.

For Microsoft Internet Explorer 3:

Choose the View menu on your web browser,
Choose the Options,
Select Connection,
Tick Connect through a proxy server,
Click the Settings button
At HTTP Proxy enter the proxy, and in Port: put the port #.

For Netscape Navigator version 1, 2, or 4:

Choose Options from the browser's menu,
Select Preferences,
Select Proxies,
At HTTP Proxy, enter the proxy, and enter the Port #.

For other browsers, try http://proxys4all.cgi.net/setup.shtml.

Disabling Cookies

Cookies are usually stored in a file called cookies or cookies.txt or MagicCookie.

For Opera version 3 or 4:

Select the Preferences menu,
choose Advanced,
and de-select Enable Cookies.
While you're there also deselect Enable Referrer.

For Microsoft Internet Explorer 5:

Click the Tools menu,
Select Internet Options,
Click the Security tab,
Highlight the Internet icon and click Custom Level.
Scroll down to Cookies and select disable or prompt.

For Microsoft Internet Explorer 4.0.1:

Go to the View menu,
Choose Internet Options.
Click on the Advanced tab,
Scroll down to Security.
Under Cookies, select either Disable All Cookie Use or Prompt Before Accepting Cookies.


For Netscape Navigator 4.0:

Select Preferences from the Edit menu,
Choose Advanced
Either select Disable Cookies or check Warn Me Before Accepting a Cookie.

For Netscape Navigator 3.0:

Select the Options menu
Go to Network Preferences,
Choose Protocols.
Ynder Show an Alert Before, check Accepting a cookie.

More info on cookies at: Cookie Central

Cache and URL  history

The cache stores recently viewed web pages for quick loading later. The URL  history lists the websites you visited. Delete them, or better yet, wipe them.

For Opera versions 3 and 4:

Select Preferences, Cache, and check the Empty On Exit box. Or wipe the file manually, which is located in the Cache folder wherever you installed Opera. While you're there wipe the following URL  history files: vlink.dat, global.dat, and opera.dir. To turn off URL  history select Preferences, Generic, and deselect History, Direct Addressing, and Global History.

For Internet Explorer 4 and 5:

Select Tools, Internet Options, and click Delete at Temporary Internet Files to clear the cache, and click Delete History to clear the URL  history. Change "Days to keep pages in history" at zero and you won't have to worry about wiping it regularly. The technique for wiping the cache depends on your file wiping program. If yours doesn't find the file automatically, wipe it manually at C:\Windows\Temporary Internet Files. For URL  history check C:/Windows/History

For Netscape Navigator 3 and 4:

Select Preferences, Advanced, and Cache. Click on Clear Memory Cache and Clear Disk Cache. Also on that screen is the current location of where you can find those files to wipe.
-------------------------------------------------- ------------------------------
Several free services exist solely for anonymous surfers. The more popular ones like the Anonymizer may be under close scrutiny of law enforcement, hackers, or the administrators themselves."

Anonymizing Services

The smaller offshore services can come in handy, especially for WebTVers who can't make browser changes. To use an anonymizer you simply go to their website and type in your destination URL . You're then taken to your site through their proxy with your IP automatically masked-- no browser changes needed. Some services even use HTTPS (secure HTTP with encryption) to prevent messages from being intercepted and read.

Here are two lists of anonymizer services:

http://proxys4all.cgi.net/web-based.shtml
http://www.leader.ru/secure

You'll notice that many services modify the URL  by adding their domain name to it. For example, if you use the Anonymizer to visit www.overgrow.com, the URL  might change to:

http://anon.free.anonymizer.com/http://www.overgro w.com

If your proxy does this you can often just type their domain in front of your URL , instead of going to their website. For example you might type: http://anon.free.anonymizer.com/ in front of http://www.overgrow.com(you need to add the "http://" part). This trick won't work with services that encrypt your URL .

For additional security some proxies can be chained together. DeleGate and CGI proxies often allow chaining. To chain two proxies simply type a second (different) proxy's domain after the first one, followed by your URL . For example:

http://proxy1.com/http://proxy2.com/http://www.ove rgrow.com

Some proxies use "-_-" to separate addresses, like this:

http://proxy1.com/-_-http://proxy2.com/-_-http://w ww.overgrow.com

Avoid ProxyMate and LPWA. The creator of these services, Lucent Technologies, is a major weapons and wiretapping equipment supplier for our friends in the US government, military and FBI. It's likely these services are closely monitored. You'll also want to avoid the Onion router service, which is run by the U.S. Navy. Just like with public proxies, know who owns your proxy server, and also verify its anonymity.

Are proxies safe?

Even if a website (or proxy) knew your real IP address, an IP alone can't identify you. only your ISP. To identify you someone would need to compare the website's (or proxy's) logs with your ISP's logs (assuming those logs haven't been deleted yet), so they can find your username, phone number, etc. In the U.S. this often requires a court order, so it's not a simple task. But keep in mind an internet signal passes through many computers on its way to a website, and someone along the way could be watching and logging IP data. (To see the path your data takes use TraceRoute.)

So hiding your IP with an anonymous proxy adds an extra hurdle in the way of a malcontent. Those with fixed internet connections (DSL, cable modems, etc.) should definitely use a proxy. That's because the IP for a fixed connection is always the same, unlike a dial-up connection, which give you a slightly different IP each time your connect, making it a little harder to hack and track.

Which is better, public proxies or the services? Generally speaking, a good offshore public proxy is probably safer than a service like the Anonymizer, which is teeming with folks who are hiding for one reason or another. This makes them tasty targets for web vultures. Meanwhile there are thousands of public proxies out there with "legitimate" users, so it's much easier to blend in with the crowd. For maximum safety try using a public proxy in conjunction with a lesser-known anonymizer, perhaps chained. Keep in mind that HTTPS webpages will strip away HTTP anonymizers, leaving you with just your public proxy.

One more word on proxies: don't abuse them. Never use them to spam, hack, or send threatening messages to the president. Mis-using them will force them to close their doors to the public or start transmitting IPs.

Other safe-surfing techniques

Turn off cookies, java and any multimedia components. Cookies are text files that many web sites store on your hard drive to track your surfing habits. Letting a website store information on your computer without your approval is an obvious no-no. Here's the procedure to turn off cookies. If a website requires cookies to navigate simply turn them back on. Java, ActiveX, etc. can hide malicious codes and should also be turned off.

Avoid Micro$oft. The Internet Explorer browser is integrated too deeply with Windows to trust with your personal info. Plus it has frequent security bugs, holes, etc. Use Netscape, or - even better - the Opera web browser. Opera is a full-featured, user-friendly browser that is definitely faster than the other two. It's also much smaller and only takes a minute or two to download. If you must keep the Exploiter on your computer, consider using Opera as a second browser for your cannabis-related surfing.

Use a fresh internet connection for your Cannabis  surfing. In other words, disconnect when you're done surfing the weed sites, then reconnect and continue surfing. This gives you a new IP on a dial-up connection, and reduces the chance that someone along the datastream can associate your pot posts with the "real you".

Surfing at work may jeopardize your corporate-slave job. Many companies have the ability to closely monitor employees computer usage and internet activity. Even if management is lenient about surfing, it's a wise move to clear your browser's cache and URL  history regularly.

Open an anonymous email account. Don't post the email address your ISP gave you!. There are dozens of free email services that let you enroll using bogus information. This site lists 'em all.

Use public computers for extra anonymity. Many universities, libraries, and cafes offer internet access for little or no cost. Use them for your most sensitive communicating.

Watch what you say. Many growers refer to "a friend's" garden to avoid incriminating themselves in their posts. Remember, it's not illegal to discuss illegal things, at least in the U.S. Proper marijuana-related websites are hosted somewhere with kinder laws. Say what you want, but remember Jackerspackle's Law: don't say anything on the internet that you may regret later.

Encrypt your most private communications. Your email service can read your messages, even the ones you deleted. Also, email can travel through many mail servers on its way to the recipient, and any of them may be looking at messages. For maximum security use PGP to encrypt email. Both parties will need to load the PGP software, but your messages will be virtually unreadable to privacy invaders, including law enforcement. Here is an easy introduction to using PGP and the software can be downloaded free.

Even with PGP be careful about downloading email attachments. Some of them have been known to hide viruses and trojan horses which the anti-virus programs don't detect. If you have any doubts about an attachment, be safe and open it at a public terminal.
-------------------------------------------------- ------------------------------
Here's a basic document that may be helpful as an initial primer for members concerned about privacy/security issues. Feel free to edit-feedback appreciated. changling

Hello fellow privacy seekers. This info is intended for those who seek
anonymity while browsing at little or no cost. It is very basic and intended primarily for home users of Windows 9.x using Internet Explorer. Info on Netscape should be contributed at a later date.

An important part of the process includes securing your PC  from hackers, government or otherwise. Let’s start with a few basics that should get you on the anon path within an hour or so. Later updates will cover issues in more detail.


1.Secure your machine. If you don’t already use antivirus software, or would like something less cumbersome than most commercial products, try InoculateIT Personal Edition. (http://www.antivirus.cai.com). This barebones program is free for non-commercial users, as is the tech support and updates.


2.Install a firewall. Some are free for personal use. Check out Zonealarm (my favorite) at http://www.zonelabs.com. This product shows you the IPs of whoever may be trying to gain access, and can even stop VBscripts. You can also try http://www.Sygate.com, or http://ealaddin.com/esafe/enterprise/personal_fire wall.asp.
Be sure to test your firewall, as they are not all created equal. One excellent online testing program is Shields Up at http://grc.com/default.htm, (might as well pick up the freeware program OptOut while you’re there and read The Anatomy of File

Download Spyware too. A couple of other free online testing programs are http://scan.sygatetech.com, and just for the hell of it
check out HackerTracker the online port scanner at http://www.lockdown2000.com/. You just might be surprised to one of those IPs snagged by your firewall ending in .gov, as once

happened to me!


3.Take control of cookies. Cookie Crusher is a a very cool user friendly program that can be configured to allow cookies you may need for to access certain websites, like Yahoo mail, and automatically block cookies you never want. I like to toggle the controls to accept cookies needed for various web mail sites, and then delete them from my hard drive when I'm finished.

It can also be configured to automatically reject pesky cookies you will never want to accept. . Many will argue that cookies are harmless and can always be deleted, but there’s too much we may not know about them for my comfort. Hippie3  pointed out several years ago that the Shroomery cookie stored members ISP addresses.

Cookie Crusher is available at http://www.thelimitsoft.com . It is a shareware program with a 30-day free trial period. There are others that also strip banners, like AdSubtract (www.adsubtract.com ) which offer freeware versions, but are more complex to use and will act as servers which might snag your real ISP.


4. Anonymous proxies. A proxy server downloads web pages to your computer, and some are faster than your ISP. Proxies substitute their ISP for yours, but many are transparent and will reveal your real ISP in email and Usenet headers. You want a proxy that doesn't do this: an anonymous, or non-transparent proxy.

(Note: Some ISPs, like AOL, don't want you to be anon. You will need to
download a different browser, or better yet, get rid of AOL!)

There are some web based anonymous proxies. Some are can be very slow and may also log your real ISP. (This is one place Cookie Crusher alerts come in handy.) If you use a web based proxy list, try
http://www.cyberarmy.com/lists/proxy/. To test if a proxy is anon, open
another window and visit http://www.all-nettools.com/tools1.htm. Go to the Network Tools Proxy Test page. The Proxy Test button is at the bottom of this page. Switch back to the proxy list; copy a proxy, (Note: do not copy the port#; if there is a : after the proxy, don't copy that either), then switch to the Proxy Test page. From the Explorer menu bar click Tools, Internet Options, Connections, Settings, and check "Use a Proxy Server". Click the Advanced box, and paste the proxy you copied in the first box: HTTP. Type the Port # (e.g. 8080) in the corresponding Port box. Click OK until you’re back to the main
screen. Click the Proxy Test button. If the proxy isn’t open, you’ll get an error message and the page will not display. Simply switch back to the Proxy List and make another selection. Then go back to the Proxy Check page, and click Refresh. If the proxy is open but isn’t anon, you should get a message saying, "proxy server detected", and your real ISP may also be displayed. If you found an anon proxy, the message will read "proxy server not detected", and will display the address of the proxy you selected. You can save some time by trying all proxies listed at a specific port, say all the 8080 ones first. When you find an anon proxy, run the SMARTWHOIS to see where the proxy is located, and who owns it.. Avoid Proxies that end in .gov, just to be safe.

Your goal is to find a reasonably fast proxy that will say, "proxy server not detected" (and of course isn't your real ISP). So try testing with the proxy on and then off. Also, a proxy that is anon today may not be tomorrow, so check frequently. Occasionally delete your Temporary Internet Files from your browser’s cache.

If you are into Instant Messaging or want to share files via FTP, try the freeware program RAZIUS EXPRESS (http://www.mercuryprime.com/products.htm).

Think this is too much of a hassle? Well, it can be labor intensive to do on the cheap, but please take a moment to read the short paper, The IP Address: Your Internet Identity at http://consumer.net/IPpaper.asp.


Once you have taken some precautions, you can browse the Web with relative reassurance of anonymity. There are some hang-ups however. If you need to go to an HTTPS area, your real ISP will be visible unless you put the anon proxy in the "Secure" proxy settings box, but then you probably will not be able to access that page.

Enough about anon browsing for now. Hippie3  already explained how to set up an anon email accounts in the Security thread. Anon Usenet posting and using remailers like JACK BE NIMBLE, etc. will be discussed later. For those who don't care to do all the legwork on the cheap, check out the for pay program at http: www.zeroknowledge.com. There’s a 30-day free trial offer. This program pretty much has it all of the above in a neat package, but can sometimes be incredibly slow or lose its connection while you're in the midst of a situation where you'd rather it didn't. It’s worth a free trial though, and is generally
more reliable and less labor intensive than any of the programs mentioned in this paragraph.


For those who just want to surf using free web based software and aren’t all that concerned about the web site offering the tools knowing your true ISP, here are a few usable links. Some are free; most offer a free trial basis. You might want to set use an anon proxy to go to these places if you’re paranoid, because they will know your ISP. It’s probably be a good idea to set up an anon email account too, as some services will require it.


http://www.cotse.com/anonimizer.htm (CGI based proxy)

http://www.the-cloak.com/homepage/index.php3 (another
pseudoanonymous proxy)

http://mail2web.com/
(retrieve mail from your POP3 account over the Web
through an SSL connection)

http://www.newzbot.com/search.html (find the newsgroups your
ISP won’t tell you about. Searches for open public news servers. Not secure.)

http://news.fu-berlin.de
(NNTP server based in Germany.

http://@nonymouse.com
(free anonymous web browsing, email, and Usenet tration required; most info may be fabricated. Highly recommended if you like to use Outlook Express.) posting. No choice of nyms though. All posts will read from “Anonymous”.)
« Last Edit: July 05, 2010, 05:51:54 AM by Vesp »

hypnos

  • Dominant Queen
  • ****
  • Posts: 402
Re: Internet Security
« Reply #1 on: October 14, 2009, 04:20:56 AM »
thanx heaps for this data- 8)
-
it never fails to amaze me how 'thinking about things' can often lead to them occurring--i was wanting to find pretty much what you have written....serendipity is my friend at d mo!!!

i have enjoyed a numjber of your posts so i had a peek at thiis and " bingo"

all the best with your endeavours llamabox-are you in the north or south of the planet? iam south- d reason for asking i coz i really llike what we here down under call "bush bud"(outdoor grown) some of which is as good as ANYTHING i have EVER had and i would be interested if you are an 'outie' or an 'innie'

ps, my old man considered his 'llb' stood for "lousy legal bastard"

cheers 

hypnos
"the two things you can give away and never lose, are what you know, and how you feel...."

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Internet Security
« Reply #2 on: October 14, 2009, 08:47:08 AM »
That's a good tutorial but dated since it leaves out the best anonymizing proxy system available nowadays among other things:

http://www.torproject.org/

as far as taking security to a higher level this freeware alternative called Incognito which uses TOR is available from:

http://www.browseanonymouslyanywhere.com/incognito/index.php

as far as open source encryption, this site provides the best resources:

http://www.gnupg.org/

 8)

Chemistry is our Covalent Bond

TooCold

  • Larvae
  • *
  • Posts: 32
Re: Internet Security
« Reply #3 on: February 06, 2010, 12:39:56 PM »
Tor is rather slow. I suggest using an openvpn compatible VPN service in a country with no treaties with your own. If you use torrents or other p2p make sure the vpn uses remote port forwarding.
« Last Edit: February 06, 2010, 12:44:17 PM by TooCold »

Vesp

  • Administrator
  • Foundress Queen
  • *****
  • Posts: 3,130
Re: Internet Security
« Reply #4 on: June 27, 2010, 12:12:10 AM »
This might as well be the main misc. security thread.

I thought some might be interested in this Firefox add-on that is called HTTPS Everywhere, here is a little news article on it: hxxp://news.cnet.com/8301-27080_3-20008217-245.html
and also: hxxp://www.eff.org/deeplinks/2010/06/encrypt-web-https-everywhere-firefox-extension

It also mentions that google allows for https searching, which may or may not be useful. https://www.google.com

However - hxxp://www.amvona.com/blog/google-ssl-beta.html
« Last Edit: June 27, 2010, 12:15:16 AM by Vesp »
Bitcoin address: 1FVrHdXJBr6Z9uhtiQKy4g7c7yHtGKjyLy

Dongle

  • Larvae
  • *
  • Posts: 47
Re: Internet Security
« Reply #5 on: July 04, 2010, 01:09:04 AM »
I would *never* use public proxies. They are more than likely "honeypots" (no pun intended) and are setup to entrap. I would recommend purchasing cheap domain space from an ISP in a privacy haven country (Sweden) and then set up GLYPE which is a simple, extremely user-friendly PHP proxy script that can be installed in literally 3 minutes. Password protect the site to allow only you to use it.

Prepuce

  • Mighty Bhagwan
  • Subordinate Wasp
  • ***
  • Posts: 100
Re: Internet Security
« Reply #6 on: July 05, 2010, 04:18:29 AM »
As Lugh stated, the information in this article is quite dated. In fact (almost?) all of the referenced software is obsolete. Some of the information still applies, but doesn't come close to addressing state of the art. It must have been written about ten years ago.

PP
Support the never ending quest for new and better hedonicants. Send your gift today to:

 N & B H Foundation, Attn. Bhagwan SP
 University of Massachusetts at Los Angeles
 PO Box 6.02 X 10^23
 Houston, MD 884411

Vesp

  • Administrator
  • Foundress Queen
  • *****
  • Posts: 3,130
Re: Internet Security
« Reply #7 on: July 05, 2010, 05:53:02 AM »
yeah, how about some really well done up-to-date info? I haven't seen many websites with that information floating around, but lots of good bits and pieces.
Bitcoin address: 1FVrHdXJBr6Z9uhtiQKy4g7c7yHtGKjyLy

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Internet Security
« Reply #8 on: July 05, 2010, 12:52:07 PM »
A couple of useful up to date sites are:

http://www.cert.org/tech_tips/home_networks.html

http://epic.org/privacy/tools.html

Unfortunately the best ones don't last for long and the Wayback machines can't keep track of the entire internet  8)

Chemistry is our Covalent Bond

hypnos

  • Dominant Queen
  • ****
  • Posts: 402
Re: Internet Security
« Reply #9 on: July 06, 2010, 08:49:24 AM »
what about "John Do Fox" I have heard some good things about this method..I reckon that if 'they' want to decrypt ANY files I doubt its beyond their capacity,,however as we have discussed here before,,ANYTHING that hinders,impedes or takes "extra effort" for LE to 'investigate' anyone here is worth the effort.
  personally I am attempting to keep any 'compromising material' on a memory stick......much of the "chemistry" we discuss is only illegal IF used in the wrong way!!! ;)
"the two things you can give away and never lose, are what you know, and how you feel...."

mumbles

  • Larvae
  • *
  • Posts: 42
Re: Internet Security
« Reply #10 on: July 07, 2010, 02:50:01 PM »
Its way easier to recover data from Flash memory than traditional hard drives. Transfer and destroy. Look into tor, truecrypt. Check wilders security forum for good info on this topic.

Prepuce

  • Mighty Bhagwan
  • Subordinate Wasp
  • ***
  • Posts: 100
Re: Internet Security
« Reply #11 on: July 08, 2010, 02:25:17 PM »
You can easily use TrueCrypt on a flash, retaining the portability but making it secure.

I agree that Tor (actually the Vidalia package used with Firefox) is the best internet anonymity solution at the moment.

PP
Support the never ending quest for new and better hedonicants. Send your gift today to:

 N & B H Foundation, Attn. Bhagwan SP
 University of Massachusetts at Los Angeles
 PO Box 6.02 X 10^23
 Houston, MD 884411

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Internet Security
« Reply #12 on: July 28, 2010, 01:01:39 PM »
Incognito/Amnesia is a Debian based operating system that includes True Crypt, GPG and TOR  ;D  It supports wireless networking including USB wireless cards  :D  It can be run as a Live CD or installed onto a USB drive  ;)  It can be obtained as a Torrent or downloaded from:

h**ps://amnesia.boum.org/

One could configure Damned Small Linux to do these things pretty easily, but this is an out of the box solution to internet security that works very well 8)
Chemistry is our Covalent Bond

igotthere

  • Pupae
  • **
  • Posts: 61
Re: Internet Security
« Reply #13 on: July 18, 2012, 06:32:08 AM »
Thought I'd mention a lovely little device called 'ironkey'

It's a removable memory stick that comes in 1, 4, 8, 16 and 32gb sizes.

Its has built in firefox with tor for unrivaled online anonymity.  You can toggle the features on/off while surfing and you have plenty of storage for sensitive data.

Its portable, waterproof, virtually indestructable, plus it has military grade encryption. Also it has a cool 'James Bond' style remote self destruct feature!!

Well worth a look and very easy to use.

igt

fractal

  • Subordinate Wasp
  • ***
  • Posts: 110
Re: Internet Security
« Reply #14 on: July 28, 2012, 01:11:15 PM »
Seems like they are mainly selling technology that is freely available, basically has everything lugh mentioned but adds a few factors to worry about. Without the source code being viewable publicly it's not peer reviewed like most free software is. That's why I'd never trust microsoft's encryption software. I wouldn't bet a chunk of my life on it.
« Last Edit: July 28, 2012, 01:15:26 PM by fractal »

faust.motion

  • Larvae
  • *
  • Posts: 11
Re: Internet Security
« Reply #15 on: July 30, 2012, 01:54:51 PM »
Greate link on arming yourself safer Internet-surfing technology and knowledge -- http://boingboing.net/censorroute.html

Safe Internet browsing practises are all good and well but I think it alludes to a larger problem which not many people taking on our craft seem to fully appreciate the consequences of - getting caught. The illegal situations some of us put ourselves in are multi-facetted, with so many angles to consider, angles that massive government bodies, much bigger than 'we the minority', spend a lot of time & energy on covering to their advantage and our disadvantage.

Now I know this thread is specific to risks taken on when surfing the Internet for juicy knowledge on our treasured subject but what I would like to see, and which I haven't really seen so far, is a thread of discussion that goes intimately into every facet and remotely-risky form of behaviour that we may potentially carry out in the way of performing our hobby. Maybe I'm naive and the sharing of that kind of information is 'taboo' in the underground.But it would seem more naive and irresponsible not to openly discuss the risks and share methods to mitigate said risks. The authorities definitely know the risks, they deal with them every time they bust someone and get the full dirt on their whole operation, it would appear they're more armed with information than we are.
I get the impression that a lot of cooks don't care to full realize the much bigger, powerful, highly-funded, damaging beast that can come crashing down on us and turn our lives upside should we happen to make a single damning mistake.

It's great to see a thread on security insofar as it has people thinking about security - their personal security; how secure their freedom is; the actions they take which can lead to that freedom evaporating; alternatives to risky actions.. the list goes on. If you can't think of a few more things to add off the top of your head then you're not taking your own safety seriously enough.

How many of you are aware of local and state laws pertaining to the manufacture of specific kinds of illegal drugs? What kinds of sentences do judges hand out for breaking those laws? What about even just having a lab set up and some precursors? No precursors? Conspiracy to break the law can but just as painful to beat in court as having the dirt in your posession.
Have you looked up any court recordings of cases similar to a hypothetical legal situation you could very well find yourself in one day? How did the defendant get busted? How lightly did they get off? Could you imagine yourself in their shoes?

To me, security starts a hell of a lot earlier in the cooking endeavour. Before looking for glassware, before scouring the Internet for precursors, before dreams of mad ketone amounts, and if it isn't considered seriously and with a great, great amount of thought and brainstorming and consideration, then your foundation is looking a lot shadier than your HDPE-bucket mass ghetto Al/Hg setup wrapped together generously and precariously with teflon tape!

At every point in the process - research, online discussion, glass acquisition, precursor acquisition, precursor synthesis, amine synthesis & cleanup, distribution, money-laundering, income expenditure below tax-agency radar - all of the actions that make up these processes carries with it numerous risks, risks which I don't see a lot of open discussion on.

What's the point in sharing your latest Wacker run if you flake out and the cops bust you? Life fucked. Temporarily or permanently? You might just get a conviction and avoid jail time. A lot of countries won't allow you in if you have a drug charge. Employers screen interviewees and run criminal history records. How will these things affect your ability to even basically live and earn a crust, let a lone side-funnel to cash toward your clandestine ambitions?

Security runs deep. The risks are many and always lurking. It only takes one fuckup to ruin your life and that of those who care about you.

I'll close this side-stream topic with this rather relevant and now favorite quote of mine for you to ponder on..

On a long enough timeline the survival rate for everyone drops to zero.
« Last Edit: July 30, 2012, 03:26:06 PM by faust.motion »
build from scratch - flow below

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Internet Security
« Reply #16 on: July 30, 2012, 02:58:12 PM »
Numerous threads have been and still are posted here and elsewhere by various dimwitted members asking about applicable laws in their particular jurisdiction when they should have known that members of investigatory agencies can read those threads too  ::)   Most people simply refuse to make such an effort for themselves due to inherent laziness, and thus suffer the consequences  :-X  As far as the topic of this thread, a very good ebook:

h**p://www.howtobypassinternetcensorship.org/files/bypassing-censorship.pdf

is freely available in many languages since Internet Censorship is so popular around the world  ;)  A few pages are attached  8)
Chemistry is our Covalent Bond

faust.motion

  • Larvae
  • *
  • Posts: 11
Re: Internet Security
« Reply #17 on: July 30, 2012, 03:36:11 PM »
Numerous threads have been and still are posted here and elsewhere by various dimwitted members asking about applicable laws in their particular jurisdiction when they should have known that members of investigatory agencies can read those threads too  ::)   Most people simply refuse to make such an effort for themselves due to inherent laziness, and thus suffer the consequences  :-X

It should be a given for anyone using forums like this that government agencies will be patrolling them. That shouldn't stop the spread of quality information. The gain is there to be had by us, becoming well-informed and safer - the government agencies already know the law, but do we? Obviously not if various "dimwitted member"s are creating numerous threads on the topic still.

What of the people who have done their homework? Isn't it the responsibility of humans to share information with others that would prevent those others from coming to harm? You may not be able to instil the lesson in them, just as you can lead a horse to water without it choosing to drink. However you can at the least make the information available to them which is much better than the alternative, i.e. not having any water to drink from at all and remaining ignorant of the dangers of dehydration.
build from scratch - flow below