When you want to ensure your computer activities leave no trace on your computer, try Tails (https://tails.boum.org/). Tails is live booted on a computer on a CD or USB stick. As it runs in your computer's RAM, and shuts itself down automatically when physically removed in the case of an emergency, it cannot leave evidence on your computer's hard drive (unless you choose it to).
Tails by design is intended for anyone to use it with ease. This is a particularly useful tool for any activist who seeks to speak out online anonymously through Tor, but is not technologically adept enough to utilize and/or does not have the resources to dedicate a computer to run Whonix (https://www.whonix.org/).
Tails by design is intended for anyone to use it with ease. This is a particularly useful tool for any activist who seeks to speak out online anonymously through Tor, but is not technologically adept enough to utilize and/or does not have the resources to dedicate a computer to run Whonix (https://www.whonix.org/).
Forwarded from Opsec matters (Anshul)
Don't trust USB charging stations!
LA officials publish warning about the dangers of using public USB charging stations -- as they can hide malware
Their advice:
- use the AC charging socket, not the USB one
- bring your own USB charger from home
- use a cheap usb cable that doesn't support data transfer
Officials warn about the dangers of using public USB charging stations
via www.zdnet.com
forwarded from Digital Monkey Business
LA officials publish warning about the dangers of using public USB charging stations -- as they can hide malware
Their advice:
- use the AC charging socket, not the USB one
- bring your own USB charger from home
- use a cheap usb cable that doesn't support data transfer
Officials warn about the dangers of using public USB charging stations
via www.zdnet.com
forwarded from Digital Monkey Business
Telegraph
Officials warn about the dangers of using public USB charging stations
Travelers are advised to avoid using public USB power charging stations in airports, hotels, and other locations because they may contain dangerous malware, the Los Angeles District Attorney said in a security alert published last week. USB connections were…
A good way to prevent passive mass surveillance of your messages and emails is to use a website such as https://privatebin.net or https://privnote.com. These services encrypt your own self-destructing messages locally in your browser to be sent to your intended recipient.
It should be noted that third party websites should not be trusted to encrypt sensitive information. Both of the listed websites also use JavaScript to encrypt your messages, which is notoriously awful when it comes to exploits and vulnerabilities.
Everyone's threat model looks different. I personally only use this to relay information that is not overly confidential (in case the websites are compromised), my recipient does not use a trusted encryption method (such as PGP), and that I feel the surveillance on all members of the conversation is passive enough that we will all view and destroy the message before any adversary will have a chance to read it.
It should be noted that third party websites should not be trusted to encrypt sensitive information. Both of the listed websites also use JavaScript to encrypt your messages, which is notoriously awful when it comes to exploits and vulnerabilities.
Everyone's threat model looks different. I personally only use this to relay information that is not overly confidential (in case the websites are compromised), my recipient does not use a trusted encryption method (such as PGP), and that I feel the surveillance on all members of the conversation is passive enough that we will all view and destroy the message before any adversary will have a chance to read it.
Privnote
Privnote - Send notes that will self-destruct after being read
Share a confidential note via a web link that will self-destruct after it is read by your intended recipient.
De-anonymization (known in many online circles as doxing [from dox, abbreviated from documents. "Doxxing" is not the correct spelling]) is possible through connections and IP addresses but also via social threats.
Do not disclose identifying data online. Here are some simple tips on what NOT TO DO:
-include personal information or interests in usernames
-discuss personal information such as location, age, marital status, etc. Over time, discussions over inane topics like the weather could lead to an accurate idea of the user's location
-mention your sex, tattoos, physical capacities, disabilities
-mention hobbies, profession, or involvement in activist groups
-use special characters on your keyboard that only exist in your łåñĝűāĝę
-use Twitter, Facebook, and other social media networks at the same time
-post Facebook images without renaming the image. The image name contains a personal ID
-repeatedly connect online at the same time of day or night, which will show a pattern of work/sleep schedules
-forget that these chats are public arenas and have antifa/feds/other anti-Whites lurking around collecting every public post you make
-discuss anything personal whatsoever, even when securely and anonymously connecting with a group of strangers
->the group recipients are a potential hazardous risk ("known unknowns") and may be forced to work against you
->it only takes one informant to destroy a group
Most importantly, never forget that we are actively targeted because of what we are and what we seek: namely, the continued existence of our people.
I know most White people do not want to take sides in this war. Most just want to pretend that there is no war and get on with their lives. It's easier to follow the lead of the media and regard Timothy McVeigh, and Brenton Tarrant, and everyone else who takes a stand against our genocidal governments as monsters rather than soldiers fighting for our race in a holy war. But there is a war. This war has been going on since the Capitalists proved their allegiance to the Communists in WWII, and has been going on ever since. And in this war, the rule is: Whatever is good for our people is good, and whatever harms our people is evil. That is the morality of survival. Everything else comes second.
Do not disclose identifying data online. Here are some simple tips on what NOT TO DO:
-include personal information or interests in usernames
-discuss personal information such as location, age, marital status, etc. Over time, discussions over inane topics like the weather could lead to an accurate idea of the user's location
-mention your sex, tattoos, physical capacities, disabilities
-mention hobbies, profession, or involvement in activist groups
-use special characters on your keyboard that only exist in your łåñĝűāĝę
-use Twitter, Facebook, and other social media networks at the same time
-post Facebook images without renaming the image. The image name contains a personal ID
-repeatedly connect online at the same time of day or night, which will show a pattern of work/sleep schedules
-forget that these chats are public arenas and have antifa/feds/other anti-Whites lurking around collecting every public post you make
-discuss anything personal whatsoever, even when securely and anonymously connecting with a group of strangers
->the group recipients are a potential hazardous risk ("known unknowns") and may be forced to work against you
->it only takes one informant to destroy a group
Most importantly, never forget that we are actively targeted because of what we are and what we seek: namely, the continued existence of our people.
I know most White people do not want to take sides in this war. Most just want to pretend that there is no war and get on with their lives. It's easier to follow the lead of the media and regard Timothy McVeigh, and Brenton Tarrant, and everyone else who takes a stand against our genocidal governments as monsters rather than soldiers fighting for our race in a holy war. But there is a war. This war has been going on since the Capitalists proved their allegiance to the Communists in WWII, and has been going on ever since. And in this war, the rule is: Whatever is good for our people is good, and whatever harms our people is evil. That is the morality of survival. Everything else comes second.
❤🔥3
Concerned that someone may be listening in to your cell phone’s microphone without your permission?
There are countless spy programs out there to allow others to remotely listen in on your phone at any time.
If you’re using Android and carelessly install apps you are at greater risk for this sort of spying.
But most of us are vulnerable to the spying capabilities of the alphabet soup agencies of both foreign and domestic governments.
In the event you think that your device may be, or may become compromised, it is advised to desolder the microphone within your device.
From there you can purchase a splitter like this:
https://www.amazon.com/gp/product/B004SP0WAQ
Then purchase a lapel microphone like this...
https://www.amazon.com/gp/aw/d/B07M6JBJ1G/
Plug in your head phones and you’re ready to go. Now any time you don’t want to be spied on simply remove the splitter from your headphone jack on your phone. Since your internal mic is gone you’re safe.
Note: There may also be a microphone specifically for your camera when recording videos.
There are countless spy programs out there to allow others to remotely listen in on your phone at any time.
If you’re using Android and carelessly install apps you are at greater risk for this sort of spying.
But most of us are vulnerable to the spying capabilities of the alphabet soup agencies of both foreign and domestic governments.
In the event you think that your device may be, or may become compromised, it is advised to desolder the microphone within your device.
From there you can purchase a splitter like this:
https://www.amazon.com/gp/product/B004SP0WAQ
Then purchase a lapel microphone like this...
https://www.amazon.com/gp/aw/d/B07M6JBJ1G/
Plug in your head phones and you’re ready to go. Now any time you don’t want to be spied on simply remove the splitter from your headphone jack on your phone. Since your internal mic is gone you’re safe.
Note: There may also be a microphone specifically for your camera when recording videos.
👍2❤1
Hopefully none of you are using (((WhatsApp))) at this point.
WhatsApp Confirms a New Threat; Android And iOS Users at Risk From Malicious Video Files
https://www.solutionfactory.in/whatsapp-confirms-a-new-threat.html
WhatsApp Confirms a New Threat; Android And iOS Users at Risk From Malicious Video Files
https://www.solutionfactory.in/whatsapp-confirms-a-new-threat.html
Sharing screenshots can be really bad opsec. If you’re not careful you can reveal missing bits of information that can help narrow down or confirm your identity such as...
1. Your time zone. If you post a screenshot and your clock says 3:14PM and you’ve posted the screen shot at 5:14PM my time then I know you’re likely 2 hours behind me.
2. The make/model of your device. Judging by the contents on the screen one could identify your make and model of your device which could later be used to tailor an exploit specifically to your device.
3. Your name, number, friends, location, etc... depending on the details within the screen shot you may be giving away friends real names, your real name, number, or location.
4. The resolution of the image may be used to identify or narrow down the device used to take the screen shot.
5. Active services on your phone. This can let the enemy know things like what email provider you use and what apps you use.
6. If the battery was recently charged judging by the battery percentage one could get the assumption that you’ve just woke up not long before. This establishes the beginning of mapping out your daily routine.
Tips...
Posting screen shots is a bad idea. If you must do it, always at the bare minimum crop out the info bar at the top of the screen and show only the required information.
Posting screenshots that aren’t yours while pretending they are can be great opsec. Keep in mind the time of the screenshot vs when you’re posting it.
1. Your time zone. If you post a screenshot and your clock says 3:14PM and you’ve posted the screen shot at 5:14PM my time then I know you’re likely 2 hours behind me.
2. The make/model of your device. Judging by the contents on the screen one could identify your make and model of your device which could later be used to tailor an exploit specifically to your device.
3. Your name, number, friends, location, etc... depending on the details within the screen shot you may be giving away friends real names, your real name, number, or location.
4. The resolution of the image may be used to identify or narrow down the device used to take the screen shot.
5. Active services on your phone. This can let the enemy know things like what email provider you use and what apps you use.
6. If the battery was recently charged judging by the battery percentage one could get the assumption that you’ve just woke up not long before. This establishes the beginning of mapping out your daily routine.
Tips...
Posting screen shots is a bad idea. If you must do it, always at the bare minimum crop out the info bar at the top of the screen and show only the required information.
Posting screenshots that aren’t yours while pretending they are can be great opsec. Keep in mind the time of the screenshot vs when you’re posting it.
If you're interested at all in learning more about governments spying on their own citizens and mass surveillance, watch Edward Snowden in Citizenfour.
https://invidio.us/watch?v=EDhB-A23IUk
https://invidio.us/watch?v=EDhB-A23IUk
Take a picture or load a photo/video from the Gallery, and ObscuraCam will automatically detect faces that you can pixelate, redact (blackout) or protect with funny nose and glasses. You can also invert pixelate, so that only the person you select is visible, and no one in the background can be recognized.
This app will also remove all identifying data stored in photos including GPS location data and phone make & model. You can save the protected photo back to the Gallery or share it directly to any other “Share” enabled app.
https://guardianproject.info/apps/obscuracam/
This app will also remove all identifying data stored in photos including GPS location data and phone make & model. You can save the protected photo back to the Gallery or share it directly to any other “Share” enabled app.
https://guardianproject.info/apps/obscuracam/
Guardian Project
ObscuraCam: The Privacy Camera
Blur faces and remove camera and location metadata with this privacy camera app
Something as trivial as printing something on a piece of paper can be traced back to you. Thanks to machine identification code many printers leave a unique microscopic identification on every sheet of paper they print.
This list is no longer updated and I cannot personally vouch for the results found so take that for what it is. But here is a list of printers and wether or not they display an identifying code.
https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots
I would assume that all modern printers do this on some level and that your ink and paper will be scrutinized if what you're printing strikes a chord with the right people. Keep in mind these dots are mainly used to catch counterfeiters.
See this project which attempts to defeat the MIC
https://github.com/dfd-tud/deda
This list is no longer updated and I cannot personally vouch for the results found so take that for what it is. But here is a list of printers and wether or not they display an identifying code.
https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots
I would assume that all modern printers do this on some level and that your ink and paper will be scrutinized if what you're printing strikes a chord with the right people. Keep in mind these dots are mainly used to catch counterfeiters.
See this project which attempts to defeat the MIC
https://github.com/dfd-tud/deda
Electronic Frontier Foundation
List of Printers Which Do or Do Not Display Tracking Dots
Warning (Added 2015) Some of the documents that we previously received through FOIA suggested that all major manufacturers of color laser printers entered a secret agreement with governments to
For those who want to use a VPN without paying for it, here is a free download for ExpressVPN (with unlimited trials).
[I am not endorsing the use of ExpressVPN or this .apk file over any other VPN and make no claims to its safety in using this.]
[I am not endorsing the use of ExpressVPN or this .apk file over any other VPN and make no claims to its safety in using this.]
Forwarded from Modded Central Channel (彡[ ᏨLᎧᎠᎧUX]彡 Private Message = BAN Now you know it!)
Please open Telegram to view this post
VIEW IN TELEGRAM
For those living in the USA: If you’re concerned about being in local government databases you can help yourself out by putting your home and property in a trust. You don’t have to be rich and you don’t have to pay (((Goldberg))) thousands of dollars to get started. Using something like this free template can get you started.
How your cell phone spies on you. Straight from the horses mouth.
https://youtube.com/watch?v=VFns39RXPrU
https://youtube.com/watch?v=VFns39RXPrU
YouTube
Edward Snowden: How Your Cell Phone Spies on You
Taken from JRE #1368 w/Edward Snowden: https://youtu.be/efs3QRr8LWw
SecureShare is an open-source website that utilizes 128-bit client-side AES encryption and sitewide SSL encryption to securely store files that expire when you want them to (all files being automatically purged after 7 days).
It doesn't utilize full 256-bit AES encryption, and uses Javanoscript, but is open source and simple enough for anyone to use.
It doesn't utilize full 256-bit AES encryption, and uses Javanoscript, but is open source and simple enough for anyone to use.