Jump to content

How To Browse The Internet Like "spies"


Pwnd2Pwnr
 Share

Recommended Posts

Try to keep the laughter down to a minimal. These people not know what they do; not until Foxnews says it. Regardless, I am sure most of the readers will just move on... lol

http://www.foxnews.com/tech/2012/10/13/browse-like-bond-how-to-surf-web-like-spy/?intcmp=trending

Link to comment
Share on other sites

Fox gets their news from this guy -

Oh, and Greg Evans...I mean seriously, Kim Komando can suck...neve rmind...G rating.

I hope someone takes her site off line, not hacked, but just in general for teaching BS she knows nothing about.

Edited by digip
Link to comment
Share on other sites

Theres one thing she forgot to mention thats the key here, because SOMEONE is going to read her article and think "oh, I can just use a proxy, TOR, or a VPN, and I'm safe and anonymous", which really isn't true. At the very basic, all traffic will come back to you physically to your end point encrypted or not, its going to leave a trail in the packets and your MAC address is going to be in there somewhere. Your ISP, working with any number of law enforcment agencies, if they were doing deep packet inspection, taking control of the networks you proxied or VPN through, or even the TOR exit nodes(want a list of them?) could still find ways to sniff your identity. The only way to stay truly anonymous is 1, NEVER do these things from your home, 2, NEVER use your real MAC address when connecting to ANY network when using a service like TOR or a VPN. 3, Never use the same access point more than once and never in public view, near cameras, etc. 4, use live discs and don't keep a HDD or any storage media with you or on the machine in use other than the RAM in the machine. Cold boot attacks can work to freeze memory and try to extract and dump them, but thats going to only work if you get caught while in the act. A machine with no drives, no external media, can't keep records of your information unless the device is powered on. 5, NEVER login or connect to sites that are tied to your personally. If you are going to be anonymous, you need to make sure you keep it that way, and if someone tracking you, sees one of your sites you use logged into from Chicago one day, and Kansas the next, they at least know you are access the internet, and will just monitor all the sites you use, the email addresses you setup, etc. And lastly, 6, don't speak with, either online, or offline, to anyone, if or when you decide to go online about anything you are going to do, nor ever speak of it before or afterwards to anyone. If you are planning to do something that is against the law, you never speak of it. Ever. That in itself, no matter what you've tried to do to cover your tracks, is why people end up in jail. You can't be connected to something unless someone knows you are connected to it, so make damn sure, no one ever does, whether it be while doing it online, or offline. Bragging and blabbing about it across twitter, pastebin, IRC and the like, is why half these kids who think their "anonymous" end up in jail.

Everything you do, generates a trail of bits, because if it didn't, traffic would have no way to know where to send it back to you. And while you can make it harder for people to put pieces of the puzzle together, you make it easier if you do all of this from your home, or the same location every tiime, even when using proxies, VPN's, TOR, SSH Tunnels and IRC bouncers, it can all be traced eventually, and if you stay in one place long enough, and someone with the time and resources truly wanted to get to you, they could.

Link to comment
Share on other sites

Theres one thing she forgot to mention thats the key here, because SOMEONE is going to read her article and think "oh, I can just use a proxy, TOR, or a VPN, and I'm safe and anonymous", which really isn't true. At the very basic, all traffic will come back to you physically to your end point encrypted or not, its going to leave a trail in the packets and your MAC address is going to be in there somewhere. Your ISP, working with any number of law enforcment agencies, if they were doing deep packet inspection, taking control of the networks you proxied or VPN through, or even the TOR exit nodes(want a list of them?) could still find ways to sniff your identity. The only way to stay truly anonymous is 1, NEVER do these things from your home, 2, NEVER use your real MAC address when connecting to ANY network when using a service like TOR or a VPN. 3, Never use the same access point more than once and never in public view, near cameras, etc. 4, use live discs and don't keep a HDD or any storage media with you or on the machine in use other than the RAM in the machine. Cold boot attacks can work to freeze memory and try to extract and dump them, but thats going to only work if you get caught while in the act. A machine with no drives, no external media, can't keep records of your information unless the device is powered on. 5, NEVER login or connect to sites that are tied to your personally. If you are going to be anonymous, you need to make sure you keep it that way, and if someone tracking you, sees one of your sites you use logged into from Chicago one day, and Kansas the next, they at least know you are access the internet, and will just monitor all the sites you use, the email addresses you setup, etc. And lastly, 6, don't speak with, either online, or offline, to anyone, if or when you decide to go online about anything you are going to do, nor ever speak of it before or afterwards to anyone. If you are planning to do something that is against the law, you never speak of it. Ever. That in itself, no matter what you've tried to do to cover your tracks, is why people end up in jail. You can't be connected to something unless someone knows you are connected to it, so make damn sure, no one ever does, whether it be while doing it online, or offline. Bragging and blabbing about it across twitter, pastebin, IRC and the like, is why half these kids who think their "anonymous" end up in jail.

Everything you do, generates a trail of bits, because if it didn't, traffic would have no way to know where to send it back to you. And while you can make it harder for people to put pieces of the puzzle together, you make it easier if you do all of this from your home, or the same location every tiime, even when using proxies, VPN's, TOR, SSH Tunnels and IRC bouncers, it can all be traced eventually, and if you stay in one place long enough, and someone with the time and resources truly wanted to get to you, they could.

Bravo Digip. Follow these steps and I am sure they will have a hard time finding you.

Link to comment
Share on other sites

Lets not forget the fact that VPN services, unless they are free, mean you have to sign up and pay for them. That ties you to an account. Free ones, are just like free proxies, you don't know who owns them, or if they purposely set them up, to sniff the proxy traffic, which for those who don't know, thats what a lot of them do. Especially ones, that were placed there by people who hacked or compromised a server, and set the proxy up without the site owner knowing.

You want to be anonymous online, then that means not speaking to anyone. Otherwise, you are non "anonymous". Your communication with any end point, or tied to any account, means someone can and will intercept it. People often say "How does the Jester do what he does then?" Anyone ever stop to think, maybe, he actually works for our government? How long was it before people realized they were talking to the feds, when Sabu was already arrested months earlier, yet people were still talking with him on IRC and Twitter, then suddenly, oh look, all these people from anonymous got arrested. Yeah, thats because you never know if the person on the other line is a supermodel, or 20/20 setting you up for pedophile shake down. Think about it. If you have to ask how or what to do to become truly anonymous, you're already doing it wrong. Just making yourself someone that "hey, this person wants to hide their tracks, they must be up to something, put them on our watch list". Don't think so? And its not even if YOU have done anything. Know someone who has? Yeah, chances are, if they are monitored, so are you. Check out Int0x80's talk from this year's Derbycon conference(and last years for the primer, but specifically this years talk about his 2600 history and neighbors). Paranoid? Thats called staying safe. Otherwise, throw out your tinfoil hats...

Link to comment
Share on other sites

Doin' it for the Louise!

:)

You have GOT to love int0x80's integration of massive amounts of 4chan content into the presentation. Kept me VERY entertained AND, as always, learned a LOT of great info from our friend and fellow /b/tard

Edited by hfam
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...