Untraceable Links Resources

Total Page:16

File Type:pdf, Size:1020Kb

Untraceable Links Resources UNTRACEABLE LINKS RESOURCES Techno-Crime Institute 411 Walnut Street Suite 8111 Green Cove Springs, FL 32043-3443 972.768.4134 https://www.technocrime.com [email protected] September, 2020 411 Walnut Street, Suite 8111 Mobile: 972.768.4134 Green Cove Springs, FL 32043-3443 hps://www.technocrime.com Untraceable Links Resources Anonymous Operating Systems BlackArch Linux https://blackarch.org Discreete Linux https://www.privacy-cd.org IprediaOS http://www.ipredia.org/os Kali Linux https://www.kali.org Linux Kodachi3 https://www.digi77.com/linux-kodachi MOFO Linux http://mofolinux.com Parrot Security Linux https://www.parrotsec.org Qubes OS https://www.qubes-os.org Robolinux https://www.robolinux.org Saybayon Linux https://www.sabayon.org TAILS https://tails.boum.org/download/index.en.html Subgraph OS https://subgraph.com Whonix https://www.whonix.org/ or http://kkkkkkkkkk63ava6.onion BlackArch Linux https://blackarch.org Discreete Linux https://www.privacy-cd.org IprediaOS http://www.ipredia.org/os Kali Linux https://www.kali.org Linux Kodachi3 https://www.digi77.com/linux-kodachi MOFO Linux http://mofolinux.com Parrot Security Linux https://www.parrotsec.org Qubes OS https://www.qubes-os.org Robolinux https://www.robolinux.org Saybayon Linux https://www.sabayon.org TAILS https://tails.boum.org/download/index.en.html Subgraph OS https://subgraph.com Whonix https://www.whonix.org/ or http://kkkkkkkkkk63ava6.onion Page !2 411 Walnut Street, Suite 8111 Mobile: 972.768.4134 Green Cove Springs, FL 32043-3443 hps://www.technocrime.com Anonymous Calling, Email, Messaging, and Data Storage: Ano-Phone https://ano-phone.com Burner app https://www.burnerapp.com Signal app https://whispersystems.org Wickr app https://www.wickr.com Threema https://threema.ch/en/ Tox https://tox.chat Hushed https://hushed.com/ Phone app https://phonerapp.com/' CoverMe app http://www.coverme.ws/en/index.html Globfone https://globfone.com/call-phone/ Silent Circle https://www.silentcircle.com Telegram https://telegram.org/ 10-Minute Mail https://10minutemail.com/10MinuteMail/index.html CounterMail https://countermail.com Proton Mail https://protonmail.com Hushmail https://www.hushmail.com/ Mailfence https://mailfence.com/ Tutanota https://tutanota.com/ W3 Anonymous Remailer http://gilc.org/speech/anonymous/remailer.html Dust (formally Cyber Dust) https://www.usedust.com Chatcrypt https://www.chatcrypt.com/ Cyph https://www.cyph.com/ Silence https://silence.im/ Cyphr LifeSite (formally Mustbin) http://www.lifesite.co SecureSafe https://www.securesafe.com/en Storj https://storj.io SpiderOak https://spideroak.com/ Tresorit https://tresorit.com/ Page !3 411 Walnut Street, Suite 8111 Mobile: 972.768.4134 Green Cove Springs, FL 32043-3443 hps://www.technocrime.com Mesh Networks Serval Project http://www.servalproject.org/ Vojer App https://apps.apple.com/us/app/vojer-be-connected-conference-or-in-roaming- be-intouch/id913585553 How Wireless Mesh Networks Work http://computer.howstuffworks.com/how-wireless- mesh-networks-work.html It's Time to Take Mesh Networks Seriously (And Not Just for the Reasons You Think) https://www.wired.com/2014/01/its-time-to-take-mesh-networks-seriously-and-not-just-for- the-reasons-you-think Mesh Networking https://en.wikipedia.org/wiki/Mesh_networking BONUS INFORMATION: VPNs (Virtual Private Networks) Although we may not have covered Virtual Private Networks in the presentation, they can be one of the most important tools you can use for your own security and privacy. We are providing a link to three articles explaining what VPNs are and why they are valuable. We encourage you do to your own research and to look at even more VPN services and products to find the best solution for your needs, but please educate yourself about this technology, and consider VPN use on every device, especially mobile devices. Also consider anti-malware protection for all of your devices. Do you need a VPN to keep your personal information safe? https://www.bizjournals.com/ bizjournals/how-to/technology/2017/05/do-you-need-a-vpn-to-keep-your-personal.html Privacy 101: Why You Need a VPN https://www.pcmag.com/news/what-is-a-vpn-and- why-you-need-one What Is a VPN and Why Do I Need One in 2020? https://techjury.net/blog/what-is-a-vpn/ Page 4 411 Walnut Street, Suite 8111 Mobile: 972.768.4134 Green Cove Springs, FL 32043-3443 hps://www.technocrime.com Cyber Ghost VPN http://www.cyberghostvpn.com/en_us ExpressVPN https://www.expressvpn.com Freedome VPN https://www.f-secure.com/en_US/web/home_us/freedome IPVanish VPN https://www.ipvanish.com Nord VPN https://nordvpn.com Privatoria https://privatoria.net Private Internet Access https://www.privateinternetaccess.com ProtonVPN https://protonvpn.com Strong VPN https://strongvpn.com Tunnelbear VPN https://www.tunnelbear.com Ultra VPN https://www.ultravpn.com Vyper VPN https://www.vyprvpn.com/ Surfshark https://surfshark.com NOTE: This information is provided for educational purposes only. The Techno-Crime Institute assumes no responsibility or liability for users who visit any of the sites listed in this document. The Techno-Crime Institute cannot guarantee your security when visiting any of the websites listed in this document. Page 5 411 Walnut Street, Suite 8111 Mobile: 972.768.4134 Green Cove Springs, FL 32043-3443 hps://www.technocrime.com DO YOU NEED MORE INFORMATION ABOUT TECHNO-CRIMES? Visit our website at https://www.technocrime.com Read our latest blog: The Techno-Crime Blog Join the Techno-Crime mailing list! You will receive: • Free access to our mini-course • Updates about new types of techno-crime • Notices about security tools and techniques to protect your data • How to protect your personal privacy • Information about our keynote speeches and training opportunities • New publications and online training as they become available We have a “no spam” policy, and operate on an “opt-in” basis only. We wish other marketers would show us this same respect, and that is how we treat our friends and clients. Techno-Crime Institute 411 Walnut Street Suite 8111 Green Cove Springs, FL 32043-3443 972.768.4134 https://www.technocrime.com [email protected].
Recommended publications
  • Backbox Penetration Testing Never Looked So Lovely
    DISTROHOPPER DISTROHOPPER Our pick of the latest releases will whet your appetite for new Linux distributions. Picaros Diego Linux for children. here are a few distributions aimed at children: Doudou springs to mind, Tand there’s also Sugar on a Stick. Both of these are based on the idea that you need to protect children from the complexities of the computer (and protect the computer from the children). Picaros Diego is different. There’s nothing stripped- down or shielded from view. Instead, it’s a normal Linux distro with a brighter, more kid-friendly interface. The desktop wallpaper perhaps best We were too busy playing Secret Mario on Picaros Diego to write a witty or interesting caption. exemplifies this. On one hand, it’s a colourful cartoon image designed to interest young file manager. In the programming category, little young for a system like this, but the it children. Some of the images on the we were slightly disappointed to discover it may well work for children on the upper end landscape are icons for games, and this only had Gambas (a Visual Basic-like of that age range. should encourage children to investigate the language), and not more popular teaching Overall, we like the philosophy of wrapping system rather than just relying on menus. languages like Scratch or a Python IDE. Linux is a child-friendly package, but not On the other hand, it still displays technical However, it’s based on Debian, so you do dumbing it down. Picaros Diego won’t work details such as the CPU usage and the RAM have the full range of software available for every child, but if you have a budding and Swap availability.
    [Show full text]
  • Many Things Related to Qubesos
    Qubes OS Many things Many things related to QubesOS Author: Neowutran Contents 1 Wiping VM 2 1.1 Low level storage technologies .................. 2 1.1.1 Must read ......................... 2 1.1.2 TL;DR of my understanding of the issue ........ 2 1.1.3 Things that could by implemented by QubesOS .... 2 2 Create a Gaming HVM 2 2.1 References ............................. 2 2.2 Prerequise ............................. 3 2.3 Hardware ............................. 3 2.4 Checklist .............................. 4 2.5 IOMMU Group .......................... 4 2.6 GRUB modification ........................ 4 2.7 Patching stubdom-linux-rootfs.gz ................ 5 2.8 Pass the GPU ........................... 6 2.9 Conclusion ............................. 6 2.10 Bugs ................................ 6 3 Create a Linux Gaming HVM, integrated with QubesOS 7 3.1 Goals ................................ 7 3.2 Hardware used .......................... 7 3.3 Main steps summary ....................... 7 3.3.1 Detailled steps ...................... 8 3.3.2 Using a kernel provided by debian ............ 8 3.4 Xorg ................................ 8 3.4.1 Pulseaudio ......................... 11 3.5 Final notes ............................ 11 3.6 References ............................. 12 4 Nitrokey and QubeOS 12 5 Recovery: Mount disk 12 6 Disposable VM 13 6.1 Introduction ............................ 14 6.1.1 References ......................... 14 6.1.2 What is a disposable VM? ................ 14 6.2 Playing online video ....................... 14 6.3 Web browsing ........................... 15 6.4 Manipulating untrusted files/data ................ 16 1 6.5 Mounting LVM image ...................... 17 6.6 Replace sys-* VM ......................... 18 6.7 Replace some AppVMs ...................... 18 7 Building a new QubesOS package 18 7.1 References ............................. 18 7.2 Goal ................................ 18 7.3 The software ............................ 19 7.4 Packaging ............................. 19 7.5 Building .............................
    [Show full text]
  • Github: a Case Study of Linux/BSD Perceptions from Microsoft's
    1 FLOSS != GitHub: A Case Study of Linux/BSD Perceptions from Microsoft’s Acquisition of GitHub Raula Gaikovina Kula∗, Hideki Hata∗, Kenichi Matsumoto∗ ∗Nara Institute of Science and Technology, Japan {raula-k, hata, matumoto}@is.naist.jp Abstract—In 2018, the software industry giants Microsoft made has had its share of disagreements with Microsoft [6], [7], a move into the Open Source world by completing the acquisition [8], [9], the only reported negative opinion of free software of mega Open Source platform, GitHub. This acquisition was not community has different attitudes towards GitHub is the idea without controversy, as it is well-known that the free software communities includes not only the ability to use software freely, of ‘forking’ so far, as it it is considered as a danger to FLOSS but also the libre nature in Open Source Software. In this study, development [10]. our aim is to explore these perceptions in FLOSS developers. We In this paper, we report on how external events such as conducted a survey that covered traditional FLOSS source Linux, acquisition of the open source platform by a closed source and BSD communities and received 246 developer responses. organization triggers a FLOSS developers such the Linux/ The results of the survey confirm that the free community did trigger some communities to move away from GitHub and raised BSD Free Software communities. discussions into free and open software on the GitHub platform. The study reminds us that although GitHub is influential and II. TARGET SUBJECTS AND SURVEY DESIGN trendy, it does not representative all FLOSS communities.
    [Show full text]
  • How to Use Encryption and Privacy Tools to Evade Corporate Espionage
    How to use Encryption and Privacy Tools to Evade Corporate Espionage An ICIT White Paper Institute for Critical Infrastructure Technology August 2015 NOTICE: The recommendations contained in this white paper are not intended as standards for federal agencies or the legislative community, nor as replacements for enterprise-wide security strategies, frameworks and technologies. This white paper is written primarily for individuals (i.e. lawyers, CEOs, investment bankers, etc.) who are high risk targets of corporate espionage attacks. The information contained within this briefing is to be used for legal purposes only. ICIT does not condone the application of these strategies for illegal activity. Before using any of these strategies the reader is advised to consult an encryption professional. ICIT shall not be liable for the outcomes of any of the applications used by the reader that are mentioned in this brief. This document is for information purposes only. It is imperative that the reader hires skilled professionals for their cybersecurity needs. The Institute is available to provide encryption and privacy training to protect your organization’s sensitive data. To learn more about this offering, contact information can be found on page 41 of this brief. Not long ago it was speculated that the leading world economic and political powers were engaged in a cyber arms race; that the world is witnessing a cyber resource buildup of Cold War proportions. The implied threat in that assessment is close, but it misses the mark by at least half. The threat is much greater than you can imagine. We have passed the escalation phase and have engaged directly into full confrontation in the cyberwar.
    [Show full text]
  • Paranoid Browsing
    Paranoid Browsing By Aaron Grothe NEbraskaCERT 1 Parnoid Browsing ● What is Paranoid Browsing? ● Why should I Paranoid Browse? ● How to be more Paranoid. 2 What is Parnoid Browsing? ● Paranoid browsing is where you want to make sure that you make it harder for people to connect your browsing to you 3 Why Should I Paranoid Browse ● You're looking up something medical that you want to make sure doesn't make it to the googleplex ● You're a whistleblower trying to make sure that something is traced back to you ● You want to learn more about tor or tails ● Because you want to and/or Because you can 4 Historical Paranoid Browsing ● This is how I used to do research ● Had a machine with two removable drives ● Would put drives into both Drives and boot off a cd-rom then DD the master to the use disk ● Shutdown machine remove CD and master drive and then boot and start browsing 5 Historical Paranoid Browsing (Cont) ● Would use a set of Open Proxies such as Proxies for all to do most of the browsing. ● Rules ● Always use at least two proxies in different countries with different laws and procedures and languages ● Pretty simple to do along the lines of http://firstproxy:portnumber/http://secondproxy:portnumber/ http://thirdproxy:portnumber/http://www.sitetoexamine.com ● 6 Historical Paranoid Browsing (Cont) ● Worked pretty well. Harder to find „safe proxies“ nowadays as you never know who is running one ● Has largely been replaced by ToR and VPNs 7 Paranoid Browsing Today ● Will want to use tor (The Onion Router) and a decent VPN for security ●
    [Show full text]
  • Diplomat: Using Delegations to Protect Community Repositories
    Diplomat: Using Delegations to Protect Community Repositories Trishank Karthik Kuppusamy, Santiago Torres-Arias, Vladimir Diaz, and Justin Cappos, New York University https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/kuppusamy This paper is included in the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’16). March 16–18, 2016 • Santa Clara, CA, USA ISBN 978-1-931971-29-4 Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’16) is sponsored by USENIX. Diplomat: Using Delegations to Protect Community Repositories Trishank Karthik Kuppusamy Santiago Torres-Arias Vladimir Diaz Justin Cappos Tandon School of Engineering, New York University Abstract software. Major repositories run by Adobe, Apache, Debian, Fedora, FreeBSD, Gentoo, GitHub, GNU Sa- Community repositories, such as Docker Hub, PyPI, vannah, Linux, Microsoft, npm, Opera, PHP, RedHat, and RubyGems, are bustling marketplaces that distribute RubyGems, SourceForge, and WordPress repositories software. Even though these repositories use common have all been compromised at least once [4,5,7,27,28,30, software signing techniques (e.g., GPG and TLS), at- 31,35,36,39–41,48,59,61,62,67,70,79,80,82,86,87,90]. tackers can still publish malicious packages after a server For example, a compromised SourceForge repository compromise. This is mainly because a community repos- mirror located in Korea distributed a malicious ver- itory must have immediate access to signing keys in or- sion of phpMyAdmin, a popular database administration der to certify the large number of new projects that are tool [79]. The modified version allowed attackers to gain registered each day.
    [Show full text]
  • A Framework for Identifying Host-Based Artifacts in Dark Web Investigations
    Dakota State University Beadle Scholar Masters Theses & Doctoral Dissertations Fall 11-2020 A Framework for Identifying Host-based Artifacts in Dark Web Investigations Arica Kulm Dakota State University Follow this and additional works at: https://scholar.dsu.edu/theses Part of the Databases and Information Systems Commons, Information Security Commons, and the Systems Architecture Commons Recommended Citation Kulm, Arica, "A Framework for Identifying Host-based Artifacts in Dark Web Investigations" (2020). Masters Theses & Doctoral Dissertations. 357. https://scholar.dsu.edu/theses/357 This Dissertation is brought to you for free and open access by Beadle Scholar. It has been accepted for inclusion in Masters Theses & Doctoral Dissertations by an authorized administrator of Beadle Scholar. For more information, please contact [email protected]. A FRAMEWORK FOR IDENTIFYING HOST-BASED ARTIFACTS IN DARK WEB INVESTIGATIONS A dissertation submitted to Dakota State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cyber Defense November 2020 By Arica Kulm Dissertation Committee: Dr. Ashley Podhradsky Dr. Kevin Streff Dr. Omar El-Gayar Cynthia Hetherington Trevor Jones ii DISSERTATION APPROVAL FORM This dissertation is approved as a credible and independent investigation by a candidate for the Doctor of Philosophy in Cyber Defense degree and is acceptable for meeting the dissertation requirements for this degree. Acceptance of this dissertation does not imply that the conclusions reached by the candidate are necessarily the conclusions of the major department or university. Student Name: Arica Kulm Dissertation Title: A Framework for Identifying Host-based Artifacts in Dark Web Investigations Dissertation Chair: Date: 11/12/20 Committee member: Date: 11/12/2020 Committee member: Date: Committee member: Date: Committee member: Date: iii ACKNOWLEDGMENT First, I would like to thank Dr.
    [Show full text]
  • Introduction to Fmxlinux Delphi's Firemonkey For
    Introduction to FmxLinux Delphi’s FireMonkey for Linux Solution Jim McKeeth Embarcadero Technologies [email protected] Chief Developer Advocate & Engineer For quality purposes, all lines except the presenter are muted IT’S OK TO ASK QUESTIONS! Use the Q&A Panel on the Right This webinar is being recorded for future playback. Recordings will be available on Embarcadero’s YouTube channel Your Presenter: Jim McKeeth Embarcadero Technologies [email protected] | @JimMcKeeth Chief Developer Advocate & Engineer Agenda • Overview • Installation • Supported platforms • PAServer • SDK & Packages • Usage • UI Elements • Samples • Database Access FireDAC • Migrating from Windows VCL • midaconverter.com • 3rd Party Support • Broadway Web Why FMX on Linux? • Education - Save money on Windows licenses • Kiosk or Point of Sale - Single purpose computers with locked down user interfaces • Security - Linux offers more security options • IoT & Industrial Automation - Add user interfaces for integrated systems • Federal Government - Many govt systems require Linux support • Choice - Now you can, so might as well! Delphi for Linux History • 1999 Kylix: aka Delphi for Linux, introduced • It was a port of the IDE to Linux • Linux x86 32-bit compiler • Used the Trolltech QT widget library • 2002 Kylix 3 was the last update to Kylix • 2017 Delphi 10.2 “Tokyo” introduced Delphi for x86 64-bit Linux • IDE runs on Windows, cross compiles to Linux via the PAServer • Designed for server side development - no desktop widget GUI library • 2017 Eugene
    [Show full text]
  • Tails Free Download Tails Nightmare Game Free Download
    tails free download Tails nightmare game free download. Most people looking for Tails nightmare game free downloaded: Sonic - The Tails Nightmare. This is a Sonic fan-based game. The characters in this game are copyright to Sega and Sonic Team. Similar choice. › Ww2 tail gunner game download pc › Tails nightmare download. Programs for query ″tails nightmare game free download″ Naruto World Screensaver. Naruto is a carrier of nine-tails demon-fox sealed up in his body and he has incredible abilities. of nine- tails demon-fox . Ultimate Sonic. Ultimate Sonic is an amazing remake of the Sega genesis game Sonic the Hedgehog. Sega genesis game Sonic the . Select Sonic, Tails , Knuckles or . a life. The game ends once . SPL De-Verb. SPL De-Verb is a program that provides support for dynamic sound processing. and reverb- tails . De-Verb . Sonic Compilation. Save the world from destruction by defeating the evil Dr. Robotnik with your choice of Sega's best heroes. , Knuckles and Tails ! Blast through . enter a video game , this is . Perfect Cut. This application gives you the possibility of entering cutting orders even with different material families, with automatic decomposition into sub- problems. obtain reusable tails and sectioning . can reduce tails significantly) and . Rainbow Web. In the heart of a wonderland, surrounded by crystal clear lakes, mighty stone, and age-old forests there existed the Rainbow Kingdom. all fairy tails , there appears . all fairy tail creatures and . you must free letters from . Let's Ride Friends Forever. In Let's Ride Friends Forever you need to groom, train and care for your horse and practice hard to perfect your riding .
    [Show full text]
  • Debian \ Amber \ Arco-Debian \ Arc-Live \ Aslinux \ Beatrix
    Debian \ Amber \ Arco-Debian \ Arc-Live \ ASLinux \ BeatriX \ BlackRhino \ BlankON \ Bluewall \ BOSS \ Canaima \ Clonezilla Live \ Conducit \ Corel \ Xandros \ DeadCD \ Olive \ DeMuDi \ \ 64Studio (64 Studio) \ DoudouLinux \ DRBL \ Elive \ Epidemic \ Estrella Roja \ Euronode \ GALPon MiniNo \ Gibraltar \ GNUGuitarINUX \ gnuLiNex \ \ Lihuen \ grml \ Guadalinex \ Impi \ Inquisitor \ Linux Mint Debian \ LliureX \ K-DEMar \ kademar \ Knoppix \ \ B2D \ \ Bioknoppix \ \ Damn Small Linux \ \ \ Hikarunix \ \ \ DSL-N \ \ \ Damn Vulnerable Linux \ \ Danix \ \ Feather \ \ INSERT \ \ Joatha \ \ Kaella \ \ Kanotix \ \ \ Auditor Security Linux \ \ \ Backtrack \ \ \ Parsix \ \ Kurumin \ \ \ Dizinha \ \ \ \ NeoDizinha \ \ \ \ Patinho Faminto \ \ \ Kalango \ \ \ Poseidon \ \ MAX \ \ Medialinux \ \ Mediainlinux \ \ ArtistX \ \ Morphix \ \ \ Aquamorph \ \ \ Dreamlinux \ \ \ Hiwix \ \ \ Hiweed \ \ \ \ Deepin \ \ \ ZoneCD \ \ Musix \ \ ParallelKnoppix \ \ Quantian \ \ Shabdix \ \ Symphony OS \ \ Whoppix \ \ WHAX \ LEAF \ Libranet \ Librassoc \ Lindows \ Linspire \ \ Freespire \ Liquid Lemur \ Matriux \ MEPIS \ SimplyMEPIS \ \ antiX \ \ \ Swift \ Metamorphose \ miniwoody \ Bonzai \ MoLinux \ \ Tirwal \ NepaLinux \ Nova \ Omoikane (Arma) \ OpenMediaVault \ OS2005 \ Maemo \ Meego Harmattan \ PelicanHPC \ Progeny \ Progress \ Proxmox \ PureOS \ Red Ribbon \ Resulinux \ Rxart \ SalineOS \ Semplice \ sidux \ aptosid \ \ siduction \ Skolelinux \ Snowlinux \ srvRX live \ Storm \ Tails \ ThinClientOS \ Trisquel \ Tuquito \ Ubuntu \ \ A/V \ \ AV \ \ Airinux \ \ Arabian
    [Show full text]
  • Slides Ndh2k16.Pdf
    Tails: Security, Maintainability and Usability Pick three! Julien Voisin Jérôme Boursier July 4, 2016 Nuit du Hack Who are we ? Who are we ? Julien Voisin Jérôme Boursier • Radare2 • AdwCleaner • NBS-System • Student • dustri.org • fr33tux.org 1 Who are we ? Julien Voisin Jérôme Boursier • Radare2 • AdwCleaner • NBS-System • Student • dustri.org • fr33tux.org 1 Tails - The Amnesic Incognito Live System Tails - The Amnesic Incognito Live System What is Tails? Tails, born in 2009, is a live operating system, aiming at preserving your privacy and anonymity. 2 Tails - The Amnesic Incognito Live System What is Tails? Tails, born in 2009, is a live operating system, aiming at preserving your privacy and anonymity. • All connections to the Internet are forced to go through the Tor network; • It leaves no trace on the computer you are using unless you ask it explicitly; • It provides cryptographic tools to encrypt your files, emails and IM. • Secure and usable by default 2 Tails - The Amnesic Incognito Live System According to the NSA (S//REL) Tails: Complete Bootable OS on CD for anonymity - includes Tor (S//REL) Adds Severe CNE1 misery to equation 1Computer Network Exploitation 3 Tails - The Amnesic Incognito Live System According to the NSA (S//REL) Tails: Complete Bootable OS on CD for anonymity - includes Tor (S//REL) Adds Severe CNE These variables define terms and websites relating to the TAILs (The Amnesic Incognito Live System) software program, a comsec mechanism advocated by extremists on extremist forums. 3 Tails - The Amnesic Incognito Live System According to the NSA1 (S//REL) Tails: Complete Bootable OS on CD for anonymity - includes Tor (S//REL) Adds Severe CNE These variables define terms and websites relating to the TAILs (The Amnesic Incognito Live System) software program, a comsec mechanism advocated by extremists on extremist forums.
    [Show full text]
  • Online Self Defense – Black Belt Level
    Online Self Defense – Black Belt Level Review - White Belt Level 1.Do your updates 2.Use good antivirus/antimalware software 3.A long password is a strong password 4.Be suspicious of all emails, particularly those asking you to click on links, or that have attachments. Review – Yellow Belt 1.Always verify t!at you are on the we#site you mean to be 2.$et #rowser to more secure settings 3.Use privacy enhancing browser plugins 4.$can everything you download %.Only download programs from the official we#site Review - Green Belt Level ● (nformation is the currency of the internet ● )rivacy has finincial as well as ethical implications ● *a"e sure that your connection is encrypted +,--)$. ● Anonymizing we# proxies can help ● 1)Ns are better ● -or Browser is even better Review – Brown Belt Level 1.Unencrypted email is like sending a postcard instead of a letter 2.-o encrypt email use *ozilla -!under#ird with the 3nigmail plugin 3.-o encrypt chat use Pidgin with the OTR plugin Threat Modeling Decide what your most likely t!reats and plan your defense based on the following questions. 1. What is the most vulnerable/exploitable? 2. What is the most valuable? 3.How can I mitigate my vulnerabilities? 4. What can I o to limit amage i! an attac" is success!ul? Segregation of Identity ● Limit ability of a t!ird party to connect di'erent aspects of your life. 7or e0ample casual we# #rowsing and !ome #anking. ● 8roup activities wit! similar security re5uirements. ● Be self disciplined a#out t!is segregation.
    [Show full text]