Privacy/Security is only relative

  • Thread starter ProGroWannabe
  • Start date
  • Tagged users None
P

ProGroWannabe

1,348
0
I found this after researching for most of the day. It's a long read, but if this guy is correct, there is no such thing as becoming invisible on the internet. Most know this, but some do not. Personally, I would just like to look like someone else, not necessarily attempt to be invisible. But what he suggests is even looking like someone else is not as easy as alot of us think it is. It's a bit conspiratorial, but judge for yourself. .................................................................................................................................. ....................................................................................................................................High-Traffic Colluding Tor Routers in Washington, D.C., and the Ugly Truth About Online Anonymity May 2nd, 2007 With the U.S. Government trying to shut down websites and stealing gold, I feel the need to discuss communications security, surveillance and anonymity as the U.S. collapses further into overt fascism. I need to get this off my chest, once and for all, because people, who don’t know much about computers, are being bombarded with nonsense, and they’re bombarding me with nonsense as a result. I want a single post that goes all the way, and this is it. .................................................................................................................................. .......................................................................................................................................“Have you heard about Tor?” I am routinely asked via clear text email. Yes, I know about Tor, but we need to take a much closer look at what remaining anonymous online really requires. First of all, since this is a long post, I don’t want to waste your time. If you’re a computer expert or network engineer, etc. you will already know this stuff. If, however, you’re a casual computer user who doesn’t know much about the underlying principles of information systems, this will be way over your head. If you’re a casual computer user who is thinking about anonymity online, this article might be useful for letting you know some more about what you don’t know. A lot of times, ignorant people refer to things they don’t understand as “tinfoil.” (The gatekeeper Left loves this term.) What follows, however, is so far out that it seems like tinfoil even to me. But then again, I haven’t been targeted by a death squad for my activities online, like some people are in many countries around the world. So, is it tinfoil? For you, maybe. For people struggling against repressive regimes, maybe not. When I use the term “tinfoil” below, I’m not making fun of you, I’m making fun of myself, and the roles I’ve had to play in corporate IT departments. You don’t know tinfoil unless you’ve worked in a corporate IT department. Corporate IT is a technocratic pyramid built on paranoia, surveillance and fiefdoms of specialized knowledge and privileges (rights and permissions). Since all modern fascist organizations are essentially the same, I hope that my grim experiences within these organizations will help you understand more about the nature of the dire situation that we’re all facing. ...........................................................................................................................................If you think that you’re thinking outside of the box, my main purpose in writing this is to inform you that there are actually boxes within boxes, and that if you plan on engaging an opponent as powerful as the American Corporate State (or any other maniac fascist regime), it’s not going to be easy. I don’t know how many boxes within boxes there are. What I do know is that the U.S. Department of Defense built the underlying technologies that make the Internet possible. They built “this” world. So, you want to be anonymous in a world that was thought up by the U.S. Department of Defense? ............................................................................................................................................. Most computer users don’t have what it takes, in terms of technical skills, or discipline, to pull it off. I’m sorry if that sounds harsh, but it’s absolutely true. I’m not claiming to be any kind of expert at all. If knowledge of computers and networks represented all the grains of sand on a beach, I’d say that I was familiar with about 5 of those grains of sand. I would like to hear from people who know more than me about any flaws in this information. A long time ago, as a sort of theoretical challenge to myself, I tried to define a reliable protocol for remaining anonymous online. Why? Ask any nerd, “Why?” and the nerd will usually respond: “Why not?” If the nerd is unusually honest, he or she might respond, “Because I can’t help it.” So, somewhere between, “Why not?” and “Because I couldn’t help it,” I set out on this quest. As you might already know, I studied information warfare in college and I did several years of time in corporate IT environments. I knew about the types of surveillance and control that are possible at the client, server and network levels. I looked at the challenge as all IT people look at all IT related challenges: Assume the absolute worst. I went even further with this. I made irrationally negative assumptions. I assumed that everything I did online was compromised. I assumed the worst tinfoil nightmares about commercial operating systems. I assumed that my ISP was a subsidiary of the NSA, etc. Got the idea? Let’s look at each level in a bit more detail (in no particular order): Servers: Potential Honeypots Many technologies that amateur anonymity fetishists are attracted to are actually designed to harvest information. Put yourself in the shoes of the NSA. If you wanted a concentrated haul of the most interesting information what would you do? You would establish a honeypot: a service (free or paid) that purported to provide an anonymous web browsing/email capability. Who knows what people might get up to if they thought nobody was looking? That, of course, is the idea with honeypots. If you’re relying on a proxy server, how will you know that it’s not simply recording your entire session for examination by acreages of the Homeland’s supercomputers that are running advanced statistical Magic 8 Ball algorithms? Because the company or individual providing your proxy service says that they don’t keep logs? HA Am I saying that all proxies are run by the NSA. No. Am I saying that some number of them are. I’d bet my life on it. How many of them are run by governments? I don’t know. Unless you know which governments are running which proxies, you must assume that all of them are compromised. In reality, the NSA would probably be the least of your worries when using a proxy server or open base station. Nerds with too much time on their hands get up to all kinds nonsense. Do they set up anonymous proxy servers and open base stations just to see what people do with them? Yes. Do criminals do it to find out personal information about you? Yes. So even if the proxy or base station you’re on isn’t run by the NSA, who is running it? And why? Maybe you’re eLitE and use several proxies. You can probably assume that the proxies aren’t colluding directly, but what about the networks? Which leads us to the next level… Networks: If You Feel Like You’re Being Watched, It’s Because You Are The network providers are keeping end to end records of every session. The question is: Are the network providers colluding with the U.S. Government? Since you can’t assume that they’re not, you must assume that they are. I would assume that the U.S. Government has end to end coverage of every IP session that starts and ends on U.S. networks. With corporate collusion and off the shelf hardware and software, this isn’t a stretch at all. For non U.S. networks, the NSA gets in with multi billion dollar tools like the U.S.S. Jimmy Carter, and who knows what else… There are dozens of off the shelf products that you would swear were designed for use by intelligence agencies, but they’re routinely peddled to—and used by—corporations. If corporations have and use these surveillance capabilities, what are the intelligence agencies running on the service providers’ networks? I’ll be buggered if I know, but I know it’s not good. That recent ATT/NSA thing is just a tiny/trivial tip of the iceberg. Clients: NSA Side Projects? Microsoft and Apple sought assistance from the U.S. National Security Agency. Evil Corporations Working with the NSA + Closed Source Binaries = Not Good. What is that thing actually doing? I don’t know. Thank you. That’s all I need to know. Countermeasures Access the Internet Using an Open Wireless Network, Preferably from Great Distance In terms of a threat assessment, for our purposes, I see the networks as posing the biggest problem. ............................................................................................................................................ People write to me all the time raving about the dreaded Google cookie. HA. “We must use scroogle!” for freedom and safety, etc. When I mention that their ISP is, most likely, keeping every URL that they visit in a database, at a minimum, and that NSA boxes are probably analyzing every FORM tagged submission, well, that’s a hard lesson for people. Go ahead, use scroogle. Maybe the people running it aren’t evil. So what. Scroogle might make you feel good, but it has nothing to do with security or anonymity, not when you consider the capabilities of the enemy on the network. Give any 14 year old hacker access to the right network switch and, unless you know what you’re doing, he or she will use a packet sniffer to find out what you had for breakfast. Now, the difference between most 14 year old hackers and the NSA is that the pimply faced kids don’t have physical access to the network that would allow them to conduct man in the middle surveillance on you. The NSA does. Again, that NSA/ATT thing is fly fart level. That’s nothing. That’s just the piece of the program that got outed. You need a false flag connection to the Internet. In other words, access the Internet via someone else’s open wireless router, preferably from great distance. Lots of organizations, businesses and individuals provide free, wireless Internet access; on purpose, believe it or not. Ideally, you would use a cantenna or a high performance parabolic antenna to authoritatively distance yourself from any surveillance cameras that are likely saturating your local coffee shop or other business that provides free Internet access. Hitting the base station from hundreds of meters away would be nice. If you were to carry the paranoia to an extreme level, you would assume that They would show up at your access point and use direction finding equipment to spot your physical location. “Tinfoil!” you say? Keychain WiFi access point finders have had crude DF capabilities for years. Then you have civilian grade WiFi network engineering stuff like the Yellow Jacket. Direction finding is as old as the hills and trivial to do. If you do happen to attract the wrong kind of attention on an anonymous base station, pinpointing your location would be a simple matter. Solution? If you are playing this game as if your life is on the line, don’t use the same open base station twice. Hey, this post is going out to those of you who send me the paranoid emails. You wanted to know, I’m telling you! I mean, it would suck to look toward your friendly anonymous WiFi provider with a pair of binoculars and see a guy in a suit looking back at you. Hint: if you see a van with several antennas arranged in some geometric pattern on the roof, that would not be a positive development. But that was 1980s era technology, the last time I dabbled with DF gear with a buddy of mine. Here’s a nice little integrated soup to nuts solution that is probably more like what They would be using. Surf Away: Just Don’t Do Anything That You Normally Do Online All of the stuff that you do with your “normal” online persona, you know, online banking, checking email, discussion groups, etc: You can’t do any of that. The second you associate a user profile on a server with your behavior, you’re back to square one. The Matrix has you. You would have to create what the intelligence business calls a “legend” for your new anonymous online life. You may only access this persona using these extreme communications security protocols. Obviously, you can’t create an agent X persona via your anonymous connection and then log into some site using that profile on your home cable modem connection. To borrow another bit of jargon from the people who do this for real, full time, you must practice “compartmentalization.” If you actually attract the wrong kind of attention on a server, OR a network, with your agent X persona, if you haven’t f@#$%& up in some way, all roads will lead back to the open base station. “After connecting through the open WiFi network, should I also use an anonymous proxy?” I would assume that even if the proxy is clean, and there is no way to know that it is, They will have that thing covered on the network, end to end. Physical disassociation from the access point is the best proxy. .................................................................................................................................................Client Side Never write anything to disk. Oh, you weren’t planning on using your Windows or MacOS laptop with all of those closed source binaries whirring away, were you? Man, I don’t know where you got your tinfoil hat, but that thing is obviously defective. You will have to learn about Live CD distributions of Linux. You boot that thing. Do your business. Turn off the computer. Nothing is written to the hard disk. “But I need to save my work?” If you want to save your work, the easiest way of routinely handling encrypted workflow is to use an encrypted volume and a tool that only decrypts your data on the fly, in RAM. The best tool I know of for handling encrypted volumes is TrueCrypt. Hint: Use cascading encryption algorithms. Do They have some technology, in an underground hanger at Area 51, that’s capable of breaking one of those cascading crypto schemes? I don’t know. I doubt it, but anything is possible when infinite budgets are involved. Hey, man, you wanted to save your work, right? That’s the score when you’ve got half a role of Reynolds Wrap® Aluminum Foil around your head. “But I need to send email.” For our purposes here, I wouldn’t. Email is locked down and heavily surveilled, partially because of the plague of spam, but read on… I don’t believe in web based email solutions that purport to provide strong encryption and/or anonymity. Who knows what their applets and servers are doing? Not me. And if they rely on SSL, well, that’s ok for buying a book online, but no tinfoiler in his right mind would bet his life on SSL. The Thunderbird/Enigmail/GPG solution is the best way to send and receive VERY secure email that I know of. But will your agent x persona be able to deliver email via SMTP? I wouldn’t count on it. And from which domain? Unless you are very naughty, you shouldn’t be allowed anonymous access to a SMPT server anyway. You might have to go with a throw-away web based email account and then cut and paste your encrypted messages into that. As a rule, however, never compose a message that you plan on encrypting in a web based form. Some of them use technologies that transmit what you’re typing over the web AS YOU TYPE. This is so you don’t lose what you typed if the session cuts out, but guess what? That’s right, you just blew it. Use open source tools that are running locally on your system to encrypt and decrypt messages. An effective way of communicating with someone, outside of email, would be via newsgroup or bulletin board that allows anonymous posting. (Note: If you try it here, I’ll just delete it.) You are, in effect, using the board as a numbers station. You’re not trying to hide the signal. You assume that it will be intercepted. You encrypt your message to the recipient, using his/her public key, and post the ciphertext to the board. The recipient goes on there, copies the message and decrypts it. I first encountered this in the mid 1990s on usenet. Of course, the person on the other end needs to have the same level of discipline and paranoia as you for this to work properly. Last but not least: Make sure that you spoof your MAC address EVERY time you go online. Funny story: I worked at a place that was locked down to the point that every MAC address was screened at the network level. Say, for example, that someone brought in a personal laptop from home, even though there was no chance of being able to use the network for much (domain sign on was required) the switch would alert a sys admin indicating that an alien device was plugged into the network, along with the jack/cube/desk number. MAC addresses are unique, and perfect for surveillance purposes. Always spoof your MAC address when you’re running in agent x mode. Well, that’s pretty much it. (Actually, I’m tired of typing.) I didn’t say it was going to be easy, and you should watch out for people and products that make those claims. Of course, evil people could use the above techniques to do evil things, and that is the argument that the government will use to convince you to submit to total surveillance of everything you do. In case you’re curious about how I get online: I use Windows XP on a five year old laptop, from home. While I’m running two firewalls, there’s no onion routing, proxies, live CD operating systems and I don’t bother with spoofing my MAC address. If you use a bank that knows where you live, They know where you live. Since I’m forced to use such a bank, I don’t bother with the rest. The Matrix has me.
 
chuckz

chuckz

39
8
In case you’re curious about how I get online: I use Windows XP on a five year old laptop, from home. While I’m running two firewalls, there’s no onion routing, proxies, live CD operating systems and I don’t bother with spoofing my MAC address. If you use a bank that knows where you live, They know where you live. Since I’m forced to use such a bank, I don’t bother with the rest. The Matrix has me.

I coouldn't be bothered to read all that, sorry, it just started out on the wrong foot.

I scrolled down to see if there was any discussion, and noticed the quoted bit at the end. That kind of says it all really...
 
P

ProGroWannabe

1,348
0
I don't blame you for not reading it all chuckz. As was stated in the first paragraph, this was not written by me, but I saved it all because I thought it was a good perspective on security. Everywhere I've gone on the internet researching privacy/security it seems all I find are quick opinions. "This really works!" or "No it doesn't, THIS is what you should be doing."....blah blah...Rarely do I see someone explaining WHY most things don't work. That's why I thought it was worth posting here.
 
Devilsharvest

Devilsharvest

354
18
yes it will be verry handy some day if I have to go completly undergruond and have nothing better to do and live in a paranoid isolated world.
IM not the smarttest, but do the math. Somany hours in a day, somany people, somany people to watch the people. So much monney to pay the watchers. This guys saying its hard to defend your self against unlimited resources, which Im sure hes right, But in reallity these resources are spokken for, there bizzy, take a number. And unless you brake away from the "speedin' chain" (a gruop of cars on the highway all speeding), doing all that flimsy 2 firewall 5 year old computer thang your just a dot in computer land. Untill your caught and they want to know. But in that case your 5 year old computer allso wont help. Worry about small stuff, the big stuff ia out of your control.
 
chuckz

chuckz

39
8
Ok, maybe I should read it, because I work in IT and have specialised in data security (NOT identity security, which I only know the basics of). From what DH is saying it makes the same arguments, ie technology is not the problem, it is economics.

Ultimately, in IT, nothing is secure. We secure things for a period, and can be pretty sure somethng is safe for that period. ie I could encrypt a pice of data using a key that is likely to take the best computers in the world 10 years to crack. It woould do it by testing all possible keys, and ON AVERAGE it will take 10 years. However, once in a while (rarely, but it WILL happen), the cracker will find the key fiirst time!!! Think of it like a very complex combination bicycle lock. As time passes, the keys get longer and more complex.

So, after establishing nothing is totally secure, we look at how secure it needs to be. That comes down to cost and value. If it is worth a million, it needs million dollar security. Someone will happily spend half a million to crack data/identities that is worth a million!

I am generally not a worrier when it comes to weed. I've grown quite a bit in my time, and smoked far more. Some of it even came from police evidence cupboards :)

However, I do wonder at how cheap and easy it would be for us to be identified here. I know the police used to monitor a party site i used to belong to, and they only busted us when we got too big for our boots. I am figuring the same here, maybe? I think most of the 'Farmers are smokers that bceame growers/breeders/etc. Probably true enthusiasts, too small (most of us), and hopefully our dots don't blip the radar, just as DH implies they won't...
 
P

ProGroWannabe

1,348
0
Yeah you both make excellent points. This is why I kinda consider it all a bit relative. Personally, the reason I attempt to cover my tracks is not because I think they might "discover me" in cyber space, but rather so they cannot easily add to their evidence by watching me online. For the coppers, informants are far more consistent, manipulatable, and work really cheap (usually on fear). So they use informants to find out about most grows and deals. But once they "hear" something, they'll begin their investigative work. I don't want my ISP to say "yeah guys, we've got this IP log that says he/she frequents marijuana websites daily." Cuz, then the process of watching will certainly begin. Yeah, I may have a touch of paranoia, but I know guys that grow that are scared to death to do ANYTHING weed related online. To me, THATS paranoid. lol
 
A

amsterdameyes

Guest
My security has been desecrated by somebody I once attempted to admire.
This "person" is the typical nosy snoop.....who thinks he is doing it for some valid reason..
I have only loathing for this archetypal hypocrite who once called me a NAZI!!
whilst employing Gestapo tactics ..all the while.........................

Love has a nasty habit of disapearing overnight.........................................
 
P

ProGroWannabe

1,348
0
Wow amsterdameyes! That really sucks. Care to elaborate? Or would you rather not?
 
J

julsbagell

Premium Member
Supporter
171
0
I never get paranoid if someone is looking at what im doing online I dont grow where I live thats the only way to be safe in my opinion anyone can be tracked online.
 
P

ProGroWannabe

1,348
0
I cheerfully envy your ability to grow somewhere other than where you live. I'd love to be able to do that. But other than outdoors (which I'm working on) I don't have the option(s) that you do.
 
Devilsharvest

Devilsharvest

354
18
We all grow somewhere else here (didnt you get the memo?) So none of us have to worry:laugh:
 
P

ProGroWannabe

1,348
0
Oh yeah, that's right! I just got it this morning. I'm always the last to get the memos. lol
 
Devilsharvest

Devilsharvest

354
18
Look at it in a hollywood B film interpetation of the situation: "Sir, sir I tracked the IP address of this closet grower on an internet grow site!". Then an overweight middle age man with a moustache, stands up takes a deep breath, and with a red face replies: "You mean you have been wasting this department valuable computers and your hourly sallary to find me a pot-head who supllies himself. Im gonna call the DA and the judge. Throw this man a way and the key to, Im gonna tell 'm, hell we should get the DEA to the bust for us, cause this is way over our head. And scince im on the phone so much any way Im gonna get yuo a promotion!".

There enough people fucking up with grows to keep a certain percentage of the popo bizzy and there arent more popo gonna be assighned to that percentage, unless media and politics cry out for it.
 
H

herby

Guest
Interesting thread. I cant really add much except that i watched the appeal in the 9th circuit with AT&T and i was very interesting. Lots of secret stuff and basically an admission that everything going through AT&T was also routed through something the government had. Even the Judges couldnt get an answer in public (Although they were probably privy to the info in private) Thi is all done in the name of national security. Thats why I laugh whenever I hear the US spout on about how we are spreading democracy. The only thing spreading is tyranny and oppression.

IMO there is no security, if they want you they will get you. For now I think the numbers are just to overwhelming for them to try and crackdown.
 
I

indodoja

183
0
correct me if i am wrong, but you could use a laptop and a free wifi connection at starbucks to remain anonymous.
 
P

ProGroWannabe

1,348
0
Only if Starbucks isn't monitoring the traffic that uses their wi-fi. I'd bet there is a log of some type being kept, just not sure if it would contain IP data or not. I'm no expert either, just my guess.
 
H

HolliHerb

59
0
even if they dont monitor traffic. Every device that accesses the internet has a mac address. This address is unique on every device. All they need is a track record of that mac id and narrow it down. Sadly... all in that post is true. Everything in today's US is controlled to an extent.
 
D

drpressure600

Guest
& the bottom line is ? . .

could someone please tell me if it is dangerous to be using this site now or what, i'm getting to the point i won't be able to sleep thinking about some copper setting himself up with a user name monitoring everyone & somewhere along the line busted everyone, paranoid i am, but at the end of the day, i do believe that they are indeed to busy to check small rooms when they are taking out old schools, hotels, pubs, wharehouses, full of weed everyday in all countrys, ''any opinions'' . .

p.s, yo pro, i've 1 week left 4 1 of my crops & the buds are that heavy, they are falling over now, ha ha, ''anxious i am'' . .
 
P

ProGroWannabe

1,348
0
Don't worry to much about the coppers here. They have more reliable ways of busting growers.....called narcs..lol. Ya know, those lil bastards that get in trouble, then bust all their friends to save their own asses.

LOL @ "anxious I am"..
 

Latest posts

Top Bottom