Cyber Security

ColoHead

Well-Known Member
Thought I could give back to the RIU community by providing some ancillary knowledge that I've picked up over the years in my career that could help many of you keep your electronic activity as private as you would like it to be.

This will take a while to do right, so I'll start with an outline of topics I intend to cover. Hopefully, along the way other cyber security specialists that may have far more knowledge than me in specific domains, can come along and supplement.

Preface:

This isn't meant to encourage the use of electronics for illegal activity, but only serves to provide everyone with the necessary information to keep your private lives private...

Hopefully, this gets pretty detailed. Everyone needs to understand their own privacy needs and employ the approach that fits their particular security needs...

I guess i'll start with some of the obvious statements... We're all being watched, all the time. But not in a way that should arouse any real paranoia, unless you're an anti-government radical hanging out in the political forum. The current methods used to analyze and search online content for national security risk level information involve contextual searching technology. They're not actually looking at specific content as much as types of content and conversations that are occurring. I have no insight into what these search algorithms actually look like, but we're not coming up in too many of the nets, here on the pot forum.

Who is you, online? You are your IP address. Whatever your IP address does, you do. What this means, is that anything you look at, is recorded in a log with your ISP (Internet Service Provider). Given sufficient evidence of legal violations (what's watched can actually vary throughout the country), some municipality legal divisions have partnerships with law enforcement to report all sorts of activity. A report could trigger a warrant, which could expose the entirety of your online browsing endpoint history, and lead to a warrant on the physical property owned by the customer paying for the IP.

What can happen with electronic devices? You're the legal custodian of any physical item in your possession. Any accessible content on any of those devices will become evidence, should you be prosecuted.

Terms:

ISP - The company you buy internet access from.
IP - your address on the world wide interwebs.
VPN - virtual private network. This is like entering into a secure bunker to have a conversation. When using strong encryption technology, the only people aware of the conversation are those in the room and the facilitator, aka VPN provider. When you use the interwebs through a VPN, all your ISP can see is that you went into a bunker. What you're doing in there is unknown.
VM - this is a software application you can run that will emulate a computer with an OS (windows, osx, Linux). You can encrypt the entire thing... Anything stored or done on here will be irretrievable if done right.




Index:

1. General and Advanced Online Safety...
2. Workstation Security
a. Work behind the veil.
3. Mobile Security
a. Keeping your partners safe.

To be continued...
 
Last edited:

Bulletproof_Love

Well-Known Member
Yeah man, one look at my bank account statements and search history I'm basically federally fucked over. Nothing but stuff for goofy boots.
 

SoOLED

Well-Known Member
Yeah man, one look at my bank account statements and search history I'm basically federally fucked over. Nothing but stuff for goofy boots.
ive never had a bank account, I hate them: wells Fargo, Bank of America. I don't have any real reason not to like them other then what I hear happens to people I know.

I do work with chase, I hold a single credit card, so I guess I'm banking in a way and subject to all transaction recording anyway. I pay $0 if I pay it off every month.
 
Top