Dominathan's Guide To Digital Security

Dominathan

Well-Known Member
Forward
With great power comes great responsibility, and knowledge is power. Remember that 100% anonymity allows you to do whatever you want, but it doesn't mean you should. Using anonymity is a great way to work around laws, but please remember that laws exist for a reason. Crimes against another human are still crimes, whether you get caught or not. Using this knowledge to cause chaos is counterproductive, and will prove that humans aren't responsible enough to handle full anonymity. If you can't, then please don't even read on. I hope that all usage of the following information will only be used ethically, and not to cause harm.


Digital security is the practice of protecting yourself for any reason, in a purely digital environment. Although we all use the internet, not all of us are aware of what steps we can take to protect our physical identity from being extracted by our digital identity. In this thread, I'll cover the basics of protecting yourself against "Eaves-droppers" (Spammers, Hackers, Law Enforcement, etc*).

Contents:

I. Tor
II. Bitcoins
III. PGP
IV. Proxies


I. Tor

Oh jeez, how do I explain this? Lemme give it a shot:

Imagine the internet as a piece of paper, with tons of dots randomly put all over it to represent computers. Now imagine a black circle in the middle of the paper. This black circle is a lot like Tor. By running web traffic through Tor on your computer, you are moving your little dot into the black circle. Browsing through Tor bounces all information back and forth before it goes out of an "Exit Node" (it's important to understand that there is a finite number of exits from Tor and to the "normal" internet) and into the free and uncovered dots. Not only is this useful for navigating to all those dots outside of the black circle, but now imagine if your destination was in the black circle itself!

This is a very clever to host a sensitive website, too. Since nobody in the world will ever be able to pinpoint where you are running your web service from, you are able to create a digital page that can not be physically tied to you. Tor proved itself extremely useful during the revolutions in both Egypt and Libya, and has a myriad of other uses.

NOTE : The fastest way to get somewhere is "as the crow flies", and Tor DOES NOT fly the fastest route. Normal web pages load slightly slower in Tor. Using Tor to connect to a Tor hosted site can be very slow, but it's the price you pay for anonymity.

So how can you use Tor?

  1. Download Firefox 3.6 (The Tor extension doesn't work in firefox 4...yet)
  2. Install Torbutton
  3. Enable Torbutton
  4. Check to make sure you're running Tor by visiting here
  5. Browse the internet!

IMPORTANT:
Tor will not anonymize all of your internet traffic. Configuring Firefox to run Tor will only anonymize traffic going through Firefox, and only while Tor is enabled. Eventually, I will include a segment on running other applications through Tor.

II. Bitcoins

Bitcoins is a form of currency specifically designed to meet the needs of a global economy. Instead of using paper bills, many prefer bitcoins for the instant digital transfer it provides. So how much is a BTC (Bitcoin) worth? Whatever people are will to pay for them! The idea seems funny at first, because it's something with no value whatsoever. That's what currency is though. It's an otherwise useless measuring stick on which we value everything else in our lives. Due to their rise in popularity, BTC have now become worth more per unit than the US dollar.

Some advantages to using BTC:
  • 100% anonymous if used with Tor
  • Instant transfers
  • Impossible to counterfeit
  • Is Peer2Peer (Meaning there is no central issueing unit, so no chance of corruption)

First time users may find it hard to obtain BTC, however. Mtgox.com is the only TRUSTED Bitcoin currency exchanger I know of. However, users will still find they can't simply enter a credit card number and buy BTC (yet).

Some uses for BTC would be:
  • Anonymously making donations
  • Buying illicit or "black market" goods or services
  • Buying legal goods or services

So how can you use Bitcoins?

  1. Download the application here.
  2. After downloading and installing, you'll automatically be given a bitcoin address. For example, one of my addresses is "15aS6tvdBWASoTSgkcBHkmKghuBx9NJWyV". If you want to practice sending money, that'd be a great start :lol:. For the techno-impaired, remember that you're bitcoin address is no more private than you're public address.
  3. Use Bitcoins as you would any other currency!

Special notes:

Users who would rather have their Bitcoin wallet in the cloud (accessible by your computer, but not stored on your computer) have the option of doing so too. MyBitcoin is a great site to have a bitcoin wallet on. It allows you to send and receive payments instantly, and being on another computer means that you could access it through Tor for yet another layer of security. Best of all? 100% free.

IMPORTANT:
Bitcoins a completely digital currency, and as such is subject to fluctuation in value. Also, it is extremely important that you back up your bitcoin wallet if stored on a personal computer. If for some reason the hard drive fails, you don't also want to lose all your e-currency.

III. PGP

PGP, or "Pretty Good Privacy" is an idea used to encrypt and decrypt messages that were intended for only one recipient. PGP works by generating two separate "keys". The keys are paired algorithms, with one key requiring a "Pass phrase" to work. This key is called the "Private Key". Users of PGP make their public key widely available (generally have it posted in profiles on anonymous forums, or e-mail it to their correspondent). In fact, the more people that have your public key, the safer you are. Using the public key to encrypt a message is easy, and only requires two fields (Public key, message). However, decrypting can ONLY be done with the paired algorithm ("Private" key) and pass phrase. Many pass phrases are simply a sentence highlighted from a book.

How do I actually use PGP?
Well, PGP is software, and must be paid for. Like everyone else though, I hate paying for what isn't tangible. GnuPG is a free replacement that one can use for PGP security.

Why use PGP?
  • Protect trade secrets
  • Have a truely "one on one" conversation online
  • Sending private messages in an unsecure network
  • Encrypt entire hard drives

Many anonymity networks operating on Tor require users to send messages in PGP. This way, even if they are intercepted, they cannot be read.

Free PGP programs:

GPGWin (Windows)
GNU Privacy Guard (Mac)
PGP mirror (Linux)

IV. Proxies

Though this may seem novice to some of use, proxies are a great stepping stone into private browsing. Proxies are pretty simple to use and understand. Basically, put a computer between you and where you are going on the internet. Proxy servers are numerous, but also very slow. It's important to note that your proxy is not hidden, and serious violations can result in a subpoena forcing the proxy server to reveal you're information. That's why it's important to use a proxy server that runs on a machine that is physically housed in another country.

Different types of proxies include :

Socks : A fairly new type of proxy that allows for more types of data transfer.
Anonymous : Proxy does not reveal information about the computer making requests.
Transparent : These are the snitches of the proxy world. Avoid them.

So how can you use Proxies?

  • For general proxy browsing, a site such as this would work
  • For a full list of proxies, check this.

IMPORTANT:
Using a proxy does not guarantee anonymity. Proxy servers in your country can be court ordered to give out your IP address. Even if the proxy is physically housed in another country, your activity can still be connected to you. If they have a court order for your internet activity (meaning whatever you did had an obvious connection to you), and the receiving internet activity, they can match yours going to the proxy, and the receiving coming from the proxy.


I hoped you all enjoyed reading this as much as I enjoyed writing it! And remember to mouse-attack my reputation!

-DomiNate bongsmilie
 

Dominathan

Well-Known Member
Thanks for all the positive feedback! I'm continuing to write on this article, but in a notepad. I'll try to update it regularly, until I feel it's reached a suitable size.

One love!
 

neosapien

Well-Known Member
Sweet. I've used Tor for awhile now. I'd setup a relay if I had more bandwidth. Its fun to run the web browser through it and do an IP search, I usually end up in Germany or Russia- suckers. Anywho nice collaboration of tools. Its pretty easy to acquire another's IP- you can never be too careful.
 

Dominathan

Well-Known Member
Sweet. I've used Tor for awhile now. I'd setup a relay if I had more bandwidth. Its fun to run the web browser through it and do an IP search, I usually end up in Germany or Russia- suckers. Anywho nice collaboration of tools. Its pretty easy to acquire another's IP- you can never be too careful.
I've seen some webhosting services located in Panama that offer decent rates and allow you to host using Tor. I'd be willing to help create a collaboration fund to run a Tor site.
 

Beansly

RIU Bulldog
If only I knew what the hell you were talking about...
*sigh
lol

I use Linux. Is there any safety inherent when surfing the Internet in that?
 

forgetfulpenguin

Active Member
What no love for i2p or freenet ;). They both offer distributed file storage so they are a great way to keep guides alive even as people and forum go offline. Freenet doesn't offer any outproxies and beware that if you use something like tor or i2p to obfuscate your ip address on a site without proper encryption for login credentials you are basically handing that information to the outproxy operator. Still glad to see people are realizing that proactive measures should be taken to insure private communications stay that way. Nice job Dominathan!

edit: beansly linux gives you more inherent security and privacy because they are based on open-source software that can be audited by anyone. That said if you want your internet browsing to be more anonymous you will have to use something like tor or i2p.
 

grizlbr

Active Member
Yes BUT: is your browser 100% compatible with all sites? Some places open weird like you are superuser?? Use a non admin login to prevent escalation of process rights. <no program can get to root folder.
 
Top