What's new
  • Happy Birthday ICMag! Been 20 years since Gypsy Nirvana created the forum! We are celebrating with a 4/20 Giveaway and by launching a new Patreon tier called "420club". You can read more here.
  • Important notice: ICMag's T.O.U. has been updated. Please review it here. For your convenience, it is also available in the main forum menu, under 'Quick Links"!

How to be Secure & Anonymous Online for FREE!

H

hisser

Hello friends, the title explains it all! so lets get started :)

First a few rules you should ALWAYS follow:


  • Update your operating system & all software installed, most of the time the updates include security patches.
  • Go for Open source software over closed source ones, these tend to be more secure since they're community driven & get audited & patched way quicker than the rest.(plus it's always free)
  • Use a firewall, the ones that comes with windows aren't bad, if you are not sure what's on the allow list you can always reset the rules & let through what you trust from scratch.
  • Use peerblock to further strengthen your firewall by blocking suspicious/bad networks, you can add more lists to it by using iblocklist recommended ones are: level1, level2, level3, spam, spyware, badpeers, hijacked, dshield, Primary threats, spider, & malicious lists.
  • Use tor & a VPN when connecting to websites & with instant messaging clients if you want your chats to stay private (like skype or windows live messenger)
  • NEVER install bundled software such as toolbars that comes with something else(most of the time they're adware/spyware & wont help you at all)
  • Store your sensitive data in an encrypted folder or drive, you can do that by using something like truecrypt
  • Have an antivirus running with scheduled weekly automatic scans, recommended ones are Microsoft Security Essentials, CLAMAV, & Avast! antivirus Free edition & always update it.
  • Install anti adware/spyware/malware tools like Spybot Search & destroy & Antimalware from malwarebytes or windows defender to immunize & clean your system.
  • Always use a new blank browser TAB/Window when visiting another website, web servers know where you came from & where you left to!
  • Use HTTPS over HTTP, HTTPS is encrypted, HTTP traffic can be easily monitored since its sent & received in clear text.
  • Securely Erase content/free space by using tools such as Ccleaner.
  • Keep a sledgehammer handy incase all fails.
Now to be anonymous & prevent eavesdropping while browsing the net:

Use Firefox over other web browsers, even chrome since it tracks your browsing habits and there's no way yet to prevent this(EDIT: Check below about this). you will need some Add-ons for it to help you with this:


  • BetterPrivacy (Super-Cookie Safeguard)
  • FoxyProxy (allows you to set predefined proxy settings using tor for certain websites/patterns)
  • Ghostery (prevents tracking)
  • HTTPS-Everywhere (automatically use HTTPS encryption on sites that support it)
  • Adblock Plus & adblock plus pop-up add-on. (some ads are bad for you!)
Consider subscribing to a VPN server to prevent your ISP from knowing what you are doing. There are some free VPN services out there but they soon get overloaded and stop.

Oh and if you use WiFi make sure you use WPA2 with AES encryption, since WEP can be easily cracked & traffic on the network will be "sniffable"

Thank you PhenoMenal!:
just a few things off the top of my head
- there are websites like VirusTotal, Jotti's VirusScan etc where you can upload a file to have it scanned by dozens of different antivirus engines simultaneously. Free.
- use a strings viewer program to look for suspicious text in executable files, or a hex editor for more advanced users. Pretty much all Strings viewers are free cos theyre so simple, and theres plenty of free hex editors.
- use utilities such as NoScript that disable scripts at websites by default until you allow them. Free.
Looks like Google has finally made a permanent Opt-Out extension for tracking cookies, so here are the recommended extentions to use with it in case you prefer chrome over firefox:

  • ScriptNo: "Regain control of the web and surf more securely."
  • No History: "Stop Chrome from recording your browsing history."
  • Keep My Opt-Outs: "Permanently opts your browser out of online ad personalization via cookies."
  • HTTPS Everywhere: "Encrypt the Web! Automatically use HTTPS security on many sites."
  • Ghostery: "Protect your privacy. See who's tracking your web browsing with Ghostery."
  • FoxyProxy Standard: "FoxyProxy simplifies configuring browsers to access proxy-servers, offering more features than other proxy-plugins"
  • Flag for Chrome: "This extension displays country or region name, Geo, Google PageRank, Alexa Rank and WOT info for the websites you're visiting."
  • Click&Clean: "Deletes your browsing history, typed URLs, Flash cookies, all traces of your online activity to protect your privacy." <-- used to delete LSO cookies, you have to disable background apps when Google Chrome is closed for this to work, the option is under chrome's advanced settings.
  • Adblock Plus: "Ads were yesterday! The successful extension Adblock Plus is now available for Google Chrome™."
  • Referer Control: "Control the HTTP Referer on a per-site basis."

Stay safe & enjoy your freedom :tiphat:
 
If you're worried about security and have sensitive files/photos it is worth looking into the Imation USB flash drives powered by ironkey. Use truecrypt also for the files on there. 10 wrong passwords and all the data is wiped.

I'm trying to think of other security tips that didn't come from you...
 

oldone

Member
Those are all excellent points hisser, but I can add a few suggestions;

For the completely paranoid run your "grow" computer as virtual machine. You can download free "virtual appliances" from VMWare like a complete Ubuntu install ready to go. Run it in the (also) free VMWare player.

This leaves your real computer (called the host) with no incriminating evidence at all. The Virtual Machine can be stored on and run from a USB stick.

I can provide more complete instructions if anyone wants it.

Good thread, thanks,
OO
 
H

hisser

Thanks for the tips nickdiaz209 & oldone

There are a couple of live linux distros specialized for this purpose such as Privatix & Tails.

Cheers.
 
H

hisser

Most of it applies to OS X, for an antivirus use ClamAV, and there's firefox for OS X too, so all addons will work on it. Sadly there's no PeerBlock alternative for it, one way to resolve this is to install pfsense (a firewall distribution) on a virtual machine (which has a peerblock functionality) and route all your traffic through it. Or simply configure the built-in firewall & block all incoming connections and allow the trusted ones only. Also there's TOR for OS X.
 

Scottish Research

Senior Member
ICMag Donor
Veteran
Looked at all of this stuff. May upgrade in future.

Secure connection. I just use google chrome incognito mode with a great virus protection program. I also don't surf porn anymore.

If it gets to the point that someone in authority is trying to look at me digitally, I'm probably already fucked, not matter what.

R.Fortune
 
H

hisser

Hi Robert, chrome's Incognito mode doesn't protect you from anything except hiding your local browsing history from showing up. There's a thread in this sub-forum explaining it in detail. you'll only get fucked if you allow it :)
 
C

CulturedHeathen

Use a computer acquired for cash at a number of free wireless spots and use for no other purposes... any drawbacks to this method?
 
H

hisser

This can be very dangerous since the computer owners can monitor your activities, plus any other person on the same network will be able to sniff your traffic, including your passwords, unless you do everything mentioned above before you do anything. More info on this here: https://en.wikipedia.org/wiki/Packet_analyzer
 

EverLast

Active member
Those are all excellent points hisser, but I can add a few suggestions;

For the completely paranoid run your "grow" computer as virtual machine. You can download free "virtual appliances" from VMWare like a complete Ubuntu install ready to go. Run it in the (also) free VMWare player.

This leaves your real computer (called the host) with no incriminating evidence at all. The Virtual Machine can be stored on and run from a USB stick.

I can provide more complete instructions if anyone wants it.

Good thread, thanks,
OO


I want it mate:biggrin:


@hisser
:thank you: mate
 

joe schmo

New member
if your that worried then just install tor and only browse through the tor browser and anything you save don't open on a computer that is linked to the net....
 

Andyo

Active member
Veteran
paranoia

paranoia

Not smoking strong haze helps,also lol i wonder how many destroyed lap tops due to haze.
Check under your bed before sleep !.A
 

krunchbubble

Dear Haters, I Have So Much More For You To Be Mad
Veteran
Those are all excellent points hisser, but I can add a few suggestions;

For the completely paranoid run your "grow" computer as virtual machine. You can download free "virtual appliances" from VMWare like a complete Ubuntu install ready to go. Run it in the (also) free VMWare player.

This leaves your real computer (called the host) with no incriminating evidence at all. The Virtual Machine can be stored on and run from a USB stick.

I can provide more complete instructions if anyone wants it.

Good thread, thanks,
OO

This is the news, and what I do....

Grab the USB stick and do my shit, pull it out when im done, cant find out what im doing!!!
 
H

hisser

Doesn't matter what Computer you're using, virtual or not, it will still be traceable if you don't cover your tracks.
 

oldone

Member
I want it mate:biggrin:
You sorta caught me by surprise EverLast. I have been thinking of how much detail to go into. This can be a very complicated subject depending on a person's differing requirements and situation. Think of a 1 plant guy like me vs a warehouse grow or anything in between.

So give me a little idea of what you're looking for and I'll be glad to help.

OO
 

PhenoMenal

Hairdresser
Veteran
This is a major one, im disappointed in myself for having it slip my memory earlier...

EXIF metadata, stored in JPEG files, is automatically added by most digital cameras and phones, and some graphics programs. There are several programs that allow you to easily view this 'hidden' data, for Windows users I recommend this freeware: http://www.takenet.or.jp/~ryuuji/minisoft/exifread/english/

Normally EXIF metadata just contains things like the name/type of camera, the date/time, and the camera settings, and if you're not careful then simply the combination of the camera model + date/time + photo can be incriminating.

Here's a sample:
window.gif


But it can get worse... EXIF is a flexible format, and some smartphones, cameras etc are now also storing GPS co-ordinates...

From http://en.wikipedia.org/wiki/Exchangeable_image_file_format ...
The Exif format has standard tags for location information. As of 2012 a few cameras and a growing number of mobile phones have a built-in GPS receiver that stores the location information in the Exif header when a picture is taken. Some other cameras have a separate GPS receiver that fits into the flash connector or hot shoe. Recorded GPS data can also be added to any digital photograph on a computer, either by correlating the time stamps of the photographs with a GPS record from a hand-held GPS receiver or manually by using a map or mapping software. The process of adding geographic information to a photograph is known as geocoding. Photo-sharing communities like Panoramio, locr or Flickr equally allow their users to upload geocoded pictures or to add geolocation information online.

There are many programs to delete EXIF metadata from images depending on your operating system - as always, Google is your friend :)
 
Last edited:

Latest posts

Latest posts

Top