Difference between revisions of "Leaving no trace in a digital world"

From FreekiWiki
Jump to navigation Jump to search
Line 5: Line 5:
 
Because of it's use within the TOR project, we will focus soley on using Firefox.
 
Because of it's use within the TOR project, we will focus soley on using Firefox.
  
This assumes the use of Ubuntu.  Most of these plugins and programs can be accessed through the Ubuntu Software Center, Synaptic Package Manager or terminal, but I will provide links when possible.
+
This assumes the use of Ubuntu.  Most of these plugins and programs can be accessed through the Ubuntu Software Center, Synaptic Package Manager or terminal, but I will provide links when possible.  While we may be able to answer questions regarding Windows specific issues, this will not be included here.
  
  
Line 12: Line 12:
  
 
Physical
 
Physical
* Privacy screens
+
* Writing passwords down
* Not typing passwords or using sensitive sites that may reveal an identity in front of others
+
* Using computers in view of others
 +
** Privacy filters are polarized pieces of plastic that make it where it is only possible to see your screen if you are directly in front of it
 +
** Not typing passwords or using sensitive sites that may reveal an identity in front of others
 
* Physical keyloggers
 
* Physical keyloggers
 
** Checking the back of the machine if possible
 
** Checking the back of the machine if possible
Line 20: Line 22:
  
 
DNS/OpenDNS
 
DNS/OpenDNS
* Explanation of Domain Name System  
+
* Explanation of Domain Name System
 +
** DNS translates sites typed in as words (ie: freegeek.org) into their actual IP addresses (ie: 67.23.3.45)
 +
** Think of it as a phone book for the internet
 
* How it can be tracked through things like OpenDNS
 
* How it can be tracked through things like OpenDNS
* Tor vs. Tor Browser Bundle – DNS leaks
+
* Tor vs. Tor Browser Bundle (TBB) – DNS leaks
 +
** While it is possible for your traffic to be encrypted, without proper set-up, your DNS can go in "the clear" and reveal what sites your encrypted traffic is going to
 +
** This is why the TBB is preferred over manually configuring TOR
  
 
Computer Software
 
Computer Software

Revision as of 09:43, 25 July 2012

Leaving No Trace In A Digital World

Purpose: To learn how to communicate safely, to protect your data and to obfuscate your identity and browsing history online and on your computer.

Because of it's use within the TOR project, we will focus soley on using Firefox.

This assumes the use of Ubuntu. Most of these plugins and programs can be accessed through the Ubuntu Software Center, Synaptic Package Manager or terminal, but I will provide links when possible. While we may be able to answer questions regarding Windows specific issues, this will not be included here.


Forms of snooping

Physical

  • Writing passwords down
  • Using computers in view of others
    • Privacy filters are polarized pieces of plastic that make it where it is only possible to see your screen if you are directly in front of it
    • Not typing passwords or using sensitive sites that may reveal an identity in front of others
  • Physical keyloggers
    • Checking the back of the machine if possible
    • Using another keyboard (Roll-up)
    • On-screen keyboard

DNS/OpenDNS

  • Explanation of Domain Name System
    • DNS translates sites typed in as words (ie: freegeek.org) into their actual IP addresses (ie: 67.23.3.45)
    • Think of it as a phone book for the internet
  • How it can be tracked through things like OpenDNS
  • Tor vs. Tor Browser Bundle (TBB) – DNS leaks
    • While it is possible for your traffic to be encrypted, without proper set-up, your DNS can go in "the clear" and reveal what sites your encrypted traffic is going to
    • This is why the TBB is preferred over manually configuring TOR

Computer Software

  • Malware or legitimate tracking software
    • Anti-spyware/root-kit/virus
  • Temporary files / Cookies / Browser History
    • Clearing in Windows
  • Universal privacy setting in Ubuntu

Route of Communications

  • Router Logs
    • VPNs – Privoxy/Hamachi/Proxy Switchy
  • Traceroute Example
  • ISP
  • Backbones
  • Government
  • End Site

Neutral Online Identity

  • Emails
  • User names
  • Firewalling real vs. nom-de-guerre
    • Never use “real” connection for alternate identity
  • What you write/release online


Portable TOR

Portable TOR is a program that runs without installation from USB or drive. It comes configured for pretty good anonymity out of the box – https://www.torproject.org/projects/torbrowser.html.en

  • Plugin caveat
  • TBB Firefox vs. regular Firefox


TAILS

TAILS is an amnesiac LiveCD/USB that writes nothing to the hard drive. It contains TOR, Pidgin, encryption tools and more - https://tails.boum.org/index.en.html


Suggested Firefox Plugins


Email Encryption

Thunderbird

GPG

Enigmail plugin


Miscellaneous

Pidgin – IM/IRC/Skype – On TAILS with OTR

  • OTR plugin - http://www.cypherpunks.ca/otr/
  • End to end encryption for chats
  • Pidgin TOR set-up
    • Accounts → Choose account → Proxy Tab → Use “Tor/Privacy (SOCKS5)” → Set host to 127.0.0.1 and port to 9050

Disk Encryption

Erasing Files

Environment Checks

Steganography

Ixquick.com – non-logging search engine