In computer security, a threat is a potential event that could undermine your efforts to defend your data. You can counter the threats you face by determining what you need to protect and from whom you need to protect it. This is the process of security planning, often referred to as “threat modeling.”
This guide will teach you how to make a security plan for your digital information and how to determine what solutions are best for you.
https://ssd.eff.org/en/module/your-security-plan
This guide will teach you how to make a security plan for your digital information and how to determine what solutions are best for you.
https://ssd.eff.org/en/module/your-security-plan
Surveillance Self-Defense
Your Security Plan
Trying to protect all your data from everyone all the time is impractical and exhausting. But, have no fear! Security is a process, and through thoughtful planning, you can put together a plan that’s
When you send a normal SMS text message to your friends, that message is available for anyone to read along the way. It has become extremely obvious that all forms of communication have been compromised by the Federal government and there have been recent instances where a (((foreign government))) has also set up imposter cell towers in order to intercept communications.
Reference: https://www.politico.com/story/2019/09/12/israel-white-house-spying-devices-1491351
To protect your messages (and your phone calls) you should switch to Signal.
Link: https://signal.org/
Signal is an encrypted messenger that replaces your native texting app. All messages that you send to other Signal users will be encrypted and delievered safely to the intended target. This method may not be 100% fool-proof but it is an improvement over the current state if you're sending unencrypted messages through the air.
Reference: https://www.politico.com/story/2019/09/12/israel-white-house-spying-devices-1491351
To protect your messages (and your phone calls) you should switch to Signal.
Link: https://signal.org/
Signal is an encrypted messenger that replaces your native texting app. All messages that you send to other Signal users will be encrypted and delievered safely to the intended target. This method may not be 100% fool-proof but it is an improvement over the current state if you're sending unencrypted messages through the air.
Time to switch search engines to something that respects your privacy and doesn't track your movements all over the internet. Everyone knows about the popular privacy search engine DuckDuckGo, but not a lot of people know about the most convenient feature that comes with DuckDuckGo, called "Bangs". There are over 13,000 of them built in to DDG and they make finding what you're looking for super easy!
For example if you wanted to search 'Zyklon' on Amazon from the DuckDuckGo search engine you would just type: Zyklon !a
Now DDG will query Amazon for you and return the results. This can be done for thousands of websites including !img for images and !maps for maps. For more information about this amazing feature check out this link...
https://duckduckgo.com/bang
For example if you wanted to search 'Zyklon' on Amazon from the DuckDuckGo search engine you would just type: Zyklon !a
Now DDG will query Amazon for you and return the results. This can be done for thousands of websites including !img for images and !maps for maps. For more information about this amazing feature check out this link...
https://duckduckgo.com/bang
DuckDuckGo
DuckDuckGo !Bangs
Search thousands of sites directly from DuckDuckGo.
🤨1
Want to buy something online with your credit card but don't want to give up your credit card information? Don't completely trust a seller online? Check out the virtual credit card service offered for free by https://privacy.com
You can fill out the payment information as anyone you'd like and the information will be accepted. Now you can stay anonymous and safe in the event of a scam or data breach.
You can fill out the payment information as anyone you'd like and the information will be accepted. Now you can stay anonymous and safe in the event of a scam or data breach.
Privacy
Privacy.com Virtual Cards – Secure, Temporary Cards
Protect your financial life with Privacy.com Virtual Cards. Create secure, temporary card numbers to prevent fraud and control your online spending.
Want to remove yourself from data brokers online? These lists provide a good place to start...
Link: https://www.stopdatamining.me/opt-out-list/
Link: https://docs.google.com/document/d/1ElB7VXmr5JEkFaLJpO7YLGrAuasedmq-rZC-8TUMxTM/edit
Link: https://justdelete.me
Link: https://www.stopdatamining.me/opt-out-list/
Link: https://docs.google.com/document/d/1ElB7VXmr5JEkFaLJpO7YLGrAuasedmq-rZC-8TUMxTM/edit
Link: https://justdelete.me
I hope you're encrypting your hard drives as well as individual files of a sensitive nature. Use a trusted, open source encryption program such as VeraCrypt, available on your operating system of choice (which better not be Windows or Mac 👀).
VeraCrypt also provides plausible deniability, in case an adversary forces you to reveal the password with the ability to make hidden volumes (steganography) and hide other operating systems.
https://www.veracrypt.fr/
VeraCrypt also provides plausible deniability, in case an adversary forces you to reveal the password with the ability to make hidden volumes (steganography) and hide other operating systems.
https://www.veracrypt.fr/
veracrypt.io
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid
VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt…
We used to be identified on the web by our IP address or a Cookie set in our browser.
Nowadays technology has evolved beyond those basic and often unreliable user identification schemes.
Today one third of all websites you visit are likely using an advanced technique, called fingerprinting, to identify your unique browser. This gives advertisers and malicious actors the ability to track you across the web.
Read more: https://pixelprivacy.com/resources/browser-fingerprinting/
Nowadays technology has evolved beyond those basic and often unreliable user identification schemes.
Today one third of all websites you visit are likely using an advanced technique, called fingerprinting, to identify your unique browser. This gives advertisers and malicious actors the ability to track you across the web.
Read more: https://pixelprivacy.com/resources/browser-fingerprinting/
Pixel Privacy
What is Browser Fingerprinting? What It Is And How To Stop It.
Browser fingerprinting identifies you and collects data about your online travels. In this article, we'll discuss how browser fingerprinting works and how you can prevent it.
A subscriber mentioned this list as well as a good place to remove your data.
This process can take some time at first but after you have completed it it’s just a matter of basic maintenance and if you want to take it a step further, deception.
If you want a more detailed approach or have something to add that could help our goys join the chat and let us know.
This process can take some time at first but after you have completed it it’s just a matter of basic maintenance and if you want to take it a step further, deception.
If you want a more detailed approach or have something to add that could help our goys join the chat and let us know.
Forwarded from Deleted Account
I used this list https://www.privacyduck.com/resources/
Since Google gained ownership of YouTube, it's been a privacy nightmare to use the website anonymously. You can use Invidious (https://invidio.us) instead to view and download videos hosted on YouTube servers without being datamined. It also allows you to view content that is behind a parental block (so you can view 18+ content without signing in) or blacklisted countries.
Additionally all videos utilize the same URL so it's easy to remove "youtube" and put "invidious" in its place.
Example:
From
https://youtu.be/XWY8T3ujxNw
To
https://invidio.us/XWY8T3ujxNw
Additionally all videos utilize the same URL so it's easy to remove "youtube" and put "invidious" in its place.
Example:
From
https://youtu.be/XWY8T3ujxNw
To
https://invidio.us/XWY8T3ujxNw
❤1
In order to avoid the spying eye of your ISP, Trackers, Advertisers, Scumbags, and others it is important to run a VPN but did you know you can run that VPN service at the router level? This way you can be sure that no internet traffic leaving your home can do so without first going through the encrypted VPN connection. Learn more here: https://www.pcmag.com/article/365618/how-to-install-a-vpn-on-your-router
PCMAG
How (and Why) to Install a VPN on Your Router
Setting up a VPN on your router is a convenient way to secure your whole house or office, but it can be a tricky process. We detail why you might want one on your router and how to get one up and running.
States have admitted to making millions of dollars each year by selling your information off of your drivers license. Many states are doing this and once the others see how much these states are making it won’t be long before all 50 states will be selling this data
Why does this matter? This data can be bought by all sorts of people and you can be sure that this data will be put in a data brokers website at some point.
The solution here is to not list your home address on your drivers license. Some states will allow you to put a PO Box on the drivers license itself but then request your physical address in the paper work only. Check your states laws to learn more about that.
Another viable option is to subscribe to a mail forwarding service that offers locations in your area. Use that location and they will give you a physical address that you can use as your own. This will keep your real personal information private.
Here are some examples of providers of this service. I cannot vouch for any of them so do your own research here.
https://www.postscanmail.com/
https://www.anytimemailbox.com/
https://www.northwestregisteredagent.com/washington/mail-forwarding
Why does this matter? This data can be bought by all sorts of people and you can be sure that this data will be put in a data brokers website at some point.
The solution here is to not list your home address on your drivers license. Some states will allow you to put a PO Box on the drivers license itself but then request your physical address in the paper work only. Check your states laws to learn more about that.
Another viable option is to subscribe to a mail forwarding service that offers locations in your area. Use that location and they will give you a physical address that you can use as your own. This will keep your real personal information private.
Here are some examples of providers of this service. I cannot vouch for any of them so do your own research here.
https://www.postscanmail.com/
https://www.anytimemailbox.com/
https://www.northwestregisteredagent.com/washington/mail-forwarding
PostScan Mail
PostScan Mail: Virtual Mailboxes, Forwarding & Scanning Services
PostScan Mail offers virtual mailboxes and mail forwarding services. Manage and access your mail online, anytime, from anywhere. Perfect for businesses and travelers.
The onion router, TOR, is a SOCKS proxy that will encrypt your internet traffic, bounce it across three different nodes, and then return that data back to you in an encrypted fashion so that only you can read it.
If you aren't using the Tor browser already it is highly recommended. Do not use Tor with your social media or other accounts linked to your identity but do use it for everything else especially if you don't want to be tracked or targeted.
You can run most applications through tor as well. Telegram is one such application, here's how....
1. Start the tor service on your device
2. Go Telegram Settings —> Advanced
3. Click "Connection Type"
4. Select "Use custom proxy"
5. Select Type as SOCKS5 Hostname as 127.0.0.1 Port as 9150
6. Save and you're finished!
Now all of your Telegram traffic will be routed through Tor.
If you aren't using the Tor browser already it is highly recommended. Do not use Tor with your social media or other accounts linked to your identity but do use it for everything else especially if you don't want to be tracked or targeted.
You can run most applications through tor as well. Telegram is one such application, here's how....
1. Start the tor service on your device
2. Go Telegram Settings —> Advanced
3. Click "Connection Type"
4. Select "Use custom proxy"
5. Select Type as SOCKS5 Hostname as 127.0.0.1 Port as 9150
6. Save and you're finished!
Now all of your Telegram traffic will be routed through Tor.
Instead of using non-free (as in freedom) navigation software like Apple or Google Maps, try https://openstreetmaps.com/ for your browser or https://osmand.net/ for your mobile device. OsmAnd saves maps of your preferred state or province to your phone so there's no need to waste your phone's data when commuting.
OsmAnd is also available on the F-Droid client if you want to avoid the Google App store botnet.
OsmAnd is also available on the F-Droid client if you want to avoid the Google App store botnet.
Services like Telegram require a phone number for verification but giving out your personal phone number is a very risky proposition and a violation of your privacy. All it takes is one wrong move and your number is out in the public eye. It doesn't take long from there to link a phone number to an identity and then to a face.
To avoid all of this I highly recommend none of you use Telegram with your real phone number. There are a million different ways to gain access to another phone number for long enough to validate your Telegram account. Once validated you will never need access to this number again.
Below are some links to places where you could get a throw away phone number for Telegram and other services...
Burner App: https://www.burnerapp.com
Mint SIM: https://www.amazon.com/Mint-Mobile-Starter-Verify-Compatibility/dp/B0786RD524
Google Voice: https://voice.google.com/
Free SMS: https://quackr.io/
Free SMS: https://smsreceivefree.com/
SMS for Bitcoin: https://smsprivacy.org/
To avoid all of this I highly recommend none of you use Telegram with your real phone number. There are a million different ways to gain access to another phone number for long enough to validate your Telegram account. Once validated you will never need access to this number again.
Below are some links to places where you could get a throw away phone number for Telegram and other services...
Burner App: https://www.burnerapp.com
Mint SIM: https://www.amazon.com/Mint-Mobile-Starter-Verify-Compatibility/dp/B0786RD524
Google Voice: https://voice.google.com/
Free SMS: https://quackr.io/
Free SMS: https://smsreceivefree.com/
SMS for Bitcoin: https://smsprivacy.org/
Burnerapp
Get Temporary Phone Numbers for Privacy & Calls - Burner
Use a temporary phone number and get a 7-day free phone number trial, now with unlimited calling and texting! Sign-up today!
👍2
Whether or not your identity has been compromised you should consider a credit freeze.
Why: Unless you are going to be applying for a credit card or loan in the very near future it is advisable to place a credit freeze on your account at the three credit bureaus (Experian, Equifax, and TransUnion). This will protect you from someone trying to steal your identity and open lines of credit in your name which can take a lot of time and money to recover from.
Thanks to Federal law it is required that these credit bureaus provide you with the free ability to place such a credit freeze on your account and it can be done very easily online or over the phone. Links and phone numbers provided at the bottom of this message.
A credit freeze trumps all forms of credit monitoring and can even be placed on your kids credit too. Your job is to protect and provide for them so this is a logical step in protecting your kids whom are often the targets of identity theft from these criminal scumbags.
Another note: if at any point you need to apply for a line of credit these companies offer you the ability to temporarily release this credit freeze.
Experian Credit Freeze Link: https://www.experian.com/freeze/center.html
888-EXPERIAN (888-397-3742)
Equifax Credit Freeze Link: https://www.equifax.com/personal/credit-report-services
800-685-1111
TransUnion Credit Freeze Link: https://www.transunion.com/credit-freeze
888-909-8872
Why: Unless you are going to be applying for a credit card or loan in the very near future it is advisable to place a credit freeze on your account at the three credit bureaus (Experian, Equifax, and TransUnion). This will protect you from someone trying to steal your identity and open lines of credit in your name which can take a lot of time and money to recover from.
Thanks to Federal law it is required that these credit bureaus provide you with the free ability to place such a credit freeze on your account and it can be done very easily online or over the phone. Links and phone numbers provided at the bottom of this message.
A credit freeze trumps all forms of credit monitoring and can even be placed on your kids credit too. Your job is to protect and provide for them so this is a logical step in protecting your kids whom are often the targets of identity theft from these criminal scumbags.
Another note: if at any point you need to apply for a line of credit these companies offer you the ability to temporarily release this credit freeze.
Experian Credit Freeze Link: https://www.experian.com/freeze/center.html
888-EXPERIAN (888-397-3742)
Equifax Credit Freeze Link: https://www.equifax.com/personal/credit-report-services
800-685-1111
TransUnion Credit Freeze Link: https://www.transunion.com/credit-freeze
888-909-8872
Experian
Freeze or Unfreeze Your Credit File for Free - Experian
A security freeze, often known as a credit freeze, will limit access to your Experian credit report. Here’s how to freeze and unfreeze your Experian credit report for free.
To truly stop your cell phone from tracking you, you must remove the battery. Many new phones feature a unibody design making battery removal near impossible.
To eliminate tracking without removing the battery try a faraday bag.
Faraday bags completely block all signals to and from your devices including Bluetooth and WiFi.
I typically power my cell phone down, and place it in the faraday bag any time I leave my home to avoid tracking. Texting and calling via Signal also works quite well on an iPod touch and they do not contain cell phone or gps capabilities.
https://silentpocket.com offers some great faraday bags.
To eliminate tracking without removing the battery try a faraday bag.
Faraday bags completely block all signals to and from your devices including Bluetooth and WiFi.
I typically power my cell phone down, and place it in the faraday bag any time I leave my home to avoid tracking. Texting and calling via Signal also works quite well on an iPod touch and they do not contain cell phone or gps capabilities.
https://silentpocket.com offers some great faraday bags.
SLNT®
SLNT® Faraday Bags
At SLNT, we create Faraday bags & RFID wallets trusted by Google, and US Army that effortlessly fit into your daily routine for continuous data protection.