Difference between revisions of "Leaving no trace in a digital world"

From FreekiWiki
Jump to navigation Jump to search
Line 32: Line 32:
 
Computer Software
 
Computer Software
 
* Malware or legitimate tracking software
 
* Malware or legitimate tracking software
** Anti-spyware/root-kit/virus
+
** Spyware, virii and root kits
 
* Temporary files / Cookies / Browser History
 
* Temporary files / Cookies / Browser History
** Clearing in Windows
+
** Instructions for clearing Firefox
* Universal privacy setting in Ubuntu
+
*** Tools -> Clear Recent History -> Time Range To Clear : Everything -> Check all for most privacy
 +
* Private Browsing mode
 +
* Universal privacy setting in Ubuntu (Ubuntu 12.04)
 +
** Deleting histories globally
 +
** Setting applications and types of applications to not log
  
 
Route of Communications
 
Route of Communications

Revision as of 10:07, 25 July 2012

Leaving No Trace In A Digital World

Purpose: To learn how to communicate safely, to protect your data and to obfuscate your identity and browsing history online and on your computer.

Because of it's use within the TOR project, we will focus soley on using Firefox.

This assumes the use of Ubuntu. Most of these plugins and programs can be accessed through the Ubuntu Software Center, Synaptic Package Manager or terminal, but I will provide links when possible. While we may be able to answer questions regarding Windows specific issues, this will not be included here.


Forms of snooping

Physical

  • Writing passwords down
  • Using computers in view of others
    • Privacy filters are polarized pieces of plastic that make it where it is only possible to see your screen if you are directly in front of it
    • Not typing passwords or using sensitive sites that may reveal an identity in front of others
  • Physical keyloggers
    • Checking the back of the machine if possible
    • Using another keyboard (Roll-up)
    • On-screen keyboard

DNS/OpenDNS

  • Explanation of Domain Name System
    • DNS translates sites typed in as words (ie: freegeek.org) into their actual IP addresses (ie: 67.23.3.45)
    • Think of it as a phone book for the internet
  • How it can be tracked through things like OpenDNS
  • Tor vs. Tor Browser Bundle (TBB) – DNS leaks
    • While it is possible for your traffic to be encrypted, without proper set-up, your DNS can go in "the clear" and reveal what sites your encrypted traffic is going to
    • This is why the TBB is preferred over manually configuring TOR

Computer Software

  • Malware or legitimate tracking software
    • Spyware, virii and root kits
  • Temporary files / Cookies / Browser History
    • Instructions for clearing Firefox
      • Tools -> Clear Recent History -> Time Range To Clear : Everything -> Check all for most privacy
  • Private Browsing mode
  • Universal privacy setting in Ubuntu (Ubuntu 12.04)
    • Deleting histories globally
    • Setting applications and types of applications to not log

Route of Communications

  • Router Logs
    • VPNs – Privoxy/Hamachi/Proxy Switchy
  • Traceroute Example
  • ISP
  • Backbones
  • Government
  • End Site

Neutral Online Identity

  • Emails
  • User names
  • Firewalling real vs. nom-de-guerre
    • Never use “real” connection for alternate identity
  • What you write/release online


Portable TOR

Portable TOR is a program that runs without installation from USB or drive. It comes configured for pretty good anonymity out of the box – https://www.torproject.org/projects/torbrowser.html.en

  • Plugin caveat
  • TBB Firefox vs. regular Firefox


TAILS

TAILS is an amnesiac LiveCD/USB that writes nothing to the hard drive. It contains TOR, Pidgin, encryption tools and more - https://tails.boum.org/index.en.html


Suggested Firefox Plugins


Email Encryption

Thunderbird

GPG

Enigmail plugin


Miscellaneous

Pidgin – IM/IRC/Skype – On TAILS with OTR

  • OTR plugin - http://www.cypherpunks.ca/otr/
  • End to end encryption for chats
  • Pidgin TOR set-up
    • Accounts → Choose account → Proxy Tab → Use “Tor/Privacy (SOCKS5)” → Set host to 127.0.0.1 and port to 9050

Disk Encryption

Erasing Files

Environment Checks

Steganography

Ixquick.com – non-logging search engine