Weaponized Internet and tracking techniques
#1
I just found this  https://www.zerohedge.com/news/2013-11-1...are-target 

an easy to understand description on how one can watch or even interfere with our cyber activities.
It is old, I don't have to know-how to properly evaluate the article, but sounds credible.

It is a clear de-routing tactic, amongst other things. Basically, it's no longer tapping (monitoring) but hacking into and changing our systems.

If possible, inserting a tracking package / signature is also a way to follow us along the way. I deduct they're moving on to put it in PCs subject to close inspection. So encrypted packages wouldn't be safe unless re-encrypted on checkpoints, thus the multi-multilayer scheme, like VPN-TOR-VPN would be required for practical security ? And what about system itself, updates, and apps ?

Is there any software / service to test for it, any vaccine or remedy besides using furtive channels ?
Reply
#2
In the end everything can be cracked or bypassed, or some known encryption happen to have hidden backdoor..

The only sure method to be really anonymous that I know is to use public/stolen wifi signal and even then you need:

.1 dedicated computer, preferably running FreeBSD that you won't use anywhere else.
.2 drive to the spot where you won't be visible from any CCTV / or some other BS.

* 1 - because your computer has a fingerprint
* 2 - because your signal can be physically traced down

And of course don't login anywhere with the same credentials you used normally.
Don't even use similar logins/passwords.

Be sure to smoke some weed too, as the latest tricks analyze your behavior and can trace you just by that.
And maybe drink something too. (or if you happen to be stoned and drunk seven days a week, stay clean for the couple hours)

* focused too much on anonymity, as to staying safe, linux+vpn are probably good start.. but we are always vulnerable to attacks mentioned in the article plus many more...
vpn+tor+vpn would be probably very slow most of the times.
Reply
#3
Good points! Behavioral camouflage would be difficult - I'm not into modifiers and maybe it wouldn't be worth just to mask my domestic user browsing.

Definitely I should be using a hacked 'ix box as Internet door, but movies and Windows games are the only concerns, so I guess no need for strict privacy.
I had an antenna on a hill top building, got a bunch of WiFis around a quarter mile. N/A where I'm now.
Reply
#4
Give a try to TAILS: https://tails.boum.org/
Reply
#5
(Mar 14, 2018, 23:26 pm)contrail Wrote: Give a try to TAILS: https://tails.boum.org/

I'd forget about it, thanks. Curious how the spyes gave us Tor and a Portable OS; they should have a backdoor.

Besides my damn ISP (wich definitely spyes),
this notebook has a UEFI BIOS (boot can be set to std mode, but the data is still there) and was bought with credit card on a big site. Blush
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Crypto is the best way to bust Internet censorship Ladyanne3 6 3,512 Mar 10, 2024, 15:52 pm
Last Post: maskaw
  Apple is tracking you even when its own privacy settings say it’s not Resurgence 4 13,862 Nov 11, 2023, 06:54 am
Last Post: lustrous
  US: Hidden anti-cryptography provisions in Internet anti-trust bills Resurgence 0 11,485 Jun 23, 2022, 00:57 am
Last Post: Resurgence
  US: Judge rules blanket cellphone location tracking is unconstitutional Resurgence 1 10,685 Mar 10, 2022, 02:12 am
Last Post: RobertX
  French privacy watchdog fines Facebook and Google over cookie tracking rules Resurgence 0 10,556 Jan 07, 2022, 00:40 am
Last Post: Resurgence



Users browsing this thread: 1 Guest(s)