Difference between revisions of "Leaving no trace in a digital world"

From FreekiWiki
Jump to navigation Jump to search
Line 4: Line 4:
  
 
Purpose:  To learn how to communicate safely, to protect your data and to obfuscate your identity and browsing history online and on your computer.   
 
Purpose:  To learn how to communicate safely, to protect your data and to obfuscate your identity and browsing history online and on your computer.   
 +
 
Because of it's use within the TOR project, we will focus soley on using Firefox.
 
Because of it's use within the TOR project, we will focus soley on using Firefox.
 +
 +
This assumes the use of Ubuntu.  Most of these plugins and programs can be accessed through the Ubuntu Software Center, Synaptic Package Manager or terminal, but I will provide links when possible.
  
  

Revision as of 08:18, 25 July 2012

NOTE: I should have this formatted by the end of the day 7/24

Leaving No Trace In A Digital World

Purpose: To learn how to communicate safely, to protect your data and to obfuscate your identity and browsing history online and on your computer.

Because of it's use within the TOR project, we will focus soley on using Firefox.

This assumes the use of Ubuntu. Most of these plugins and programs can be accessed through the Ubuntu Software Center, Synaptic Package Manager or terminal, but I will provide links when possible.


Forms of snooping

Physical

  • Privacy screens
  • Not typing passwords or using sensitive sites that may reveal an identity in front of others
  • Physical keyloggers
    • Checking the back of the machine if possible
    • Using another keyboard (Roll-up)
    • On-screen keyboard

DNS/OpenDNS

  • Explanation of Domain Name System
  • How it can be tracked through things like OpenDNS
  • Tor vs. Tor Browser Bundle – DNS leaks

Computer Software

  • Malware or legitimate tracking software
    • Anti-spyware/root-kit/virus
  • Temporary files / Cookies / Browser History
    • Clearing in Windows
  • Universal privacy setting in Ubuntu

Route of Communications

  • Router Logs
    • VPNs – Privoxy/Hamachi/Proxy Switchy
  • Traceroute Example
  • ISP
  • Backbones
  • Government
  • End Site

Neutral Online Identity

  • Emails
  • User names
  • Firewalling real vs. nom-de-guerre
    • Never use “real” connection for alternate identity
  • What you write/release online


Portable TOR

Portable TOR is a program that runs without installation from USB or drive. It comes configured for pretty good anonymity out of the box – https://www.torproject.org/projects/torbrowser.html.en

  • Plugin caveat
  • TBB Firefox vs. regular Firefox


TAILS

TAILS is an amnesiac LiveCD/USB that writes nothing to the hard drive. It contains TOR, Pidgin, encryption tools and more - https://tails.boum.org/index.en.html


Suggested Firefox Plugins


Email Encryption

Thunderbird

GPG

Enigmail plugin


Miscellaneous

Pidgin – IM/IRC/Skype – On TAILS with OTR

  • OTR plugin - http://www.cypherpunks.ca/otr/
  • End to end encryption for chats
  • Pidgin TOR set-up
    • Accounts → Choose account → Proxy Tab → Use “Tor/Privacy (SOCKS5)” → Set host to 127.0.0.1 and port to 9050

Disk Encryption

Erasing Files

Environment Checks

Steganography

Ixquick.com – non-logging search engine