Advertisement
Guest User

Untitled

a guest
Oct 7th, 2016
268
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 29.21 KB | None | 0 0
  1. The greatest threats to your safety are A) social engineering and your behaviour and B) revealing your IP address.
  2.  
  3.  
  4. for A) see Social Threats
  5.  
  6.  
  7. for B) see Technical
  8.  
  9.  
  10. Try to follow as many of these suggestions as possible to ensure maximum privacy.
  11.  
  12.  
  13. '''Social Threats'''
  14.  
  15.  
  16. ''Basic rule: Blend in with the crowd, disperse into the stream. Keep a low profile. Don't try to be special. Remember, when in Rome, do as Romans do. Don't try to be a smart ass. FEDs are many, Anonymous is Legion, but you are only one. There are no old heros, there are only young heros and dead heros.''
  17.  
  18.  
  19. Do not give any personal information on the IRC chat as it is public, you mom could read what you write there and so could the Police. And don't mention your involvement with Anonymous in your real life.
  20.  
  21.  
  22. * do not include personal information in your screen name
  23. * don't discuss personal information, your address or where you're from
  24. * don't mention your gender, tattoos, scars, piercings, bodymodifications,
  25. * over-/underweight, physical or psychological (in)abillities (got the idea?)
  26. * don't mention your profession or hobbies
  27. * don't mention whether you're in a relationship
  28. * don't mention your involvement with other activist groups
  29. * musical taste/preferred literature/films is a good way, to know someone,<br/> don't mention any of these
  30. * don't use special characters, that are existent only in your language as
  31. * they would reveal where you are from
  32. * don't give even bogus info. Lot's of no's, make a yes.
  33. * Everything is completely seperate between your real life and online
  34. * life(s), don't blend anything from your real life with anon, don't talk
  35. * about Anon in real life except posting posters anonymously, etc
  36. * don't mention congresses that you have been at
  37.  
  38. * don't mention your school, university etc.
  39. * don't mention what time it is where you live, mentioning the time can reveal where you live
  40.  
  41. * Never connect at same time. Try to alternate.
  42. * Do not post on the public net while you are in the IRC, and definitely do not mention that you are posting something on Twitter. This is easy to correlate.
  43. * Don't discuss whether you personally are DDOSing or writing How-Tos or Nmap'ing the target, making graphics etc. or not, just discuss general strategy
  44. * Do not post pictures hosted on Facebook. The filename contains your profile ID.
  45. * Stagger your login & log out times on FaceBook, Twitter & IRC. They can be compared for user info.
  46.  
  47. '''Technical'''
  48.  
  49.  
  50. ''Basic Rule: Use as many security layers as possible. The question is not, wether you are paranoid, but wether you are paranoid enough.''
  51.  
  52.  
  53. A good beginning is to use a VPN and running Anonymous related Software from USB device or a Live CD. A proxy will do also, but is not as secure as a VPN.
  54.  
  55. Always use as much security layers as possible. Make sure to use them in the right way. If you don't know how to use them, learn it before you use them.
  56.  
  57. Most Anonymii use VPN to hide their traces, they use SSL encrypted connections and they use #vhost, when they are on irc.anonops.ru.
  58.  
  59.  
  60. '''VPN'''
  61.  
  62.  
  63. When thinking of a VPN service, think first about the legislation of the country. A USA VPN might provide user data upon warrant issue. In other countries, such as Sweden, and Iceland this is unlikely to happen. They have a strong privacy policy, wich makes it harder for law enforcement agencies to get access. In adition, some servers do not keep logs of users. Also try to get VPN services that accept anonymous payments (For those that keep user billing information)
  64.  
  65.  
  66. More info: https://secure.wikimedia.org/wikipedia/en/wiki/Vpn
  67.  
  68.  
  69. '''Guide for installing OpenVPN client'''
  70.  
  71. (taken from the FAQ by vpntunnel.se)
  72.  
  73. * Windows: http://www.vpntunnel.se/howto/installationguideVPNtunnelclient.pdf
  74. * Linux (Debian flavoured): http://www.vpntunnel.se/howto/linux.pdf
  75. * Mac: http://www.vpntunnel.se/howto/mac.txt
  76.  
  77. '''Free VPN''' -- Not recommended. (see explanation)
  78.  
  79. If they aren't selling you a service. They are selling you.
  80.  
  81.  
  82. * http://cyberghostvpn.com
  83. * http://hotspotshield.com
  84. * http://proxpn.com
  85. * https://anonymityonline.org
  86.  
  87. '''Commercial VPN providers'''
  88.  
  89. * http://www.swissvpn.net
  90. * http://perfect-privacy.com
  91. * https://www.ipredator.se
  92. * http://www.anonine.se
  93. * https://www.vpntunnel.se
  94.  
  95. '''Free VPN direct downloads '''-- Not recommended. (see explanation)
  96.  
  97. If they aren't selling you a service. They are selling you.
  98.  
  99.  
  100. '''Mac'''
  101.  
  102. * Ultra VPN: https://www.ultravpn.fr/download/ultravpn.dmg
  103.  
  104. '''Linux'''
  105.  
  106. * UltraVPN: https://www.ultravpn.fr/forum/index.php?topic=204.0
  107.  
  108. '''Windows'''
  109.  
  110. * HotspotShield: http://hotspotshield.com
  111. * UltraVPN:''' '''https://www.ultravpn.fr/download/ultravpn-install.exeSoftware
  112.  
  113. '''Explanation'''
  114.  
  115.  
  116. 1.- Free VPN: It is not recommended, cause many features are capped, and in addition, many free VPN providers will hand user data upon warrant issue. Also, many free VPNs work with ad companies.
  117.  
  118.  
  119. 2.- Commercial pptp: It's been said, as telecomix pointed out, that some operating systems (Windows 7, Vista) might be vulnerable to an attack consisting in requesting p2p conns, wich could lead the malicious attacker to get the user real ip.
  120.  
  121. See https://www.ipredator.se/?lang=en For more information on this matter. Seems flaw has to do with ipv6 conns, so just ensure you use ipv4.
  122.  
  123.  
  124. 3.- Recommended VPN's. All that use the OpenVPN service. And that include specific policies on user data storage and policies regarding that data. (Best option, no data loggin + no user billing loggin, + safe payment methods ie: Ukash and similar services).
  125.  
  126.  
  127. '''I2P - Anonymizing Network'''
  128.  
  129.  
  130. I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
  131.  
  132. Many applications are available that interface with I2P, including mail, p2p, IRC chat, instant messaging and others. All anonymous.
  133.  
  134.  
  135. Make sure you start by launching I2P with the ''I2P Launcher'' button in the portable apps tray icon.
  136.  
  137. You can then use the integrated PChat client, it automaticaly connects to the I2P IRC server anonymously. Join <tt><nowiki>#anonops</nowiki></tt> for to keep track of Anonymous activity. Many Operation channels are relayed between I2P and anonops.ru.
  138.  
  139. Enjoy your anonymity and privacy!
  140.  
  141.  
  142. '''Websites'''
  143.  
  144. * http://geti2p.net
  145. * http://i2p2.de
  146.  
  147. '''I2P Tutorial for Windows Video'''
  148.  
  149. * https://www.youtube.com/watch?v=5J3nh1DoRMw
  150.  
  151. '''I2P Tutorial for Linux Video'''
  152.  
  153. * https://www.youtube.com/watch?v=QeRN2G9VW5E
  154.  
  155. '''How to set up your own website on I2P - Video'''
  156.  
  157. * https://www.youtube.com/watch?v=2ylW85vc7SA
  158.  
  159. '''IRC with I2P'''
  160.  
  161. * 127.0.0.1:6668
  162. * Channels: #anonops , #opegypt , #opitaly, #opmesh
  163. * Sites: (currently all down) anonops.i2p qr.i2p
  164. * Telecomix IRC allows i2p tunnel
  165.  
  166. '''For more and active I2P sites visit'''
  167.  
  168. * http://inr.i2p
  169.  
  170. '''The ports I2P is using'''
  171.  
  172. * http://www.i2p2.de/faq#ports
  173. * See also your router's configuration.
  174.  
  175. '''I2P installation and running on Linux'''
  176.  
  177. * Download and extract the installation files, no need for separate install (such as apt-get install).
  178. * Run the router from /i2p folder with <tt>sudo sh i2prouter start</tt>. In seconds, I2P should open a Konqueror-browser page of I2P-main console.
  179. * Configure your bandwith settings. You might also consider opening some ports on your firewall for optimising the use of your bandwith.
  180.  
  181. '''Portable I2P (windows only)'''
  182.  
  183. contains I2P, several plugins (email, torrentclient), preconfigured browser, preconfigured IRC client and messenger.
  184.  
  185. * http://portable-i2p.blogspot.com
  186.  
  187. Before you can use anything on I2P, you have to start the I2P router from the portableapps tray icon-menu with the button ''I2P Launcher''.
  188.  
  189.  
  190. '''Anonymous surfing with I2P'''
  191.  
  192. * Go to your browser ''options/preferences ''(depending on your browser) -> ''network/connection settings''
  193. * Select ''manual proxy configuration''
  194. * In ''http'' insert <tt>127.0.0.1</tt>''' ,<tt> '''</tt>for<tt> </tt>''port'' insert<tt> 4444</tt>
  195. * In ''https'' insert <tt>127.0.0.1</tt>, for ''port'' insert<tt> 4445</tt>
  196.  
  197. Make sure that you have ''No proxy ''for as ''localhost, 127.0.0.1'' so you'll be able to reach your I2P configuration page. To test your anonymity, go eg. to: cmyip.com.
  198.  
  199.  
  200. '''Tor Onion Router'''
  201.  
  202.  
  203. ''Basic Rule: Tor does not encrypt the data you send. It just hides your IP by means of cascaded Proxies. Just installing Tor does not mean you're safe. For example, if you use Tor and log in to your real-life-email-account, you're doomed.''
  204.  
  205.  
  206. '''Download Tor'''
  207.  
  208. * https://www.torproject.org
  209.  
  210. '''Download Torbutton''' for Firefox (enable or disable the browser's use of Tor)
  211.  
  212. * https://www.torproject.org/torbutton
  213.  
  214. Anonymous provides a so called Care Package. It contains Tor as well as a bunch of other usefull things. If you cannot access the Torproject website, you may ask in the IRC channels for the Care Package.
  215.  
  216.  
  217. '''How to IRC'''
  218.  
  219.  
  220. ''Basic Rule: Use SSL Port (in this case 6697). Always. Use #vhost. Always. IRC is public, if don't want an information to be spread in public, don't give this information in the first place. Ignore trolls. Always.''
  221.  
  222.  
  223. What is IRC? IRC is a free chat program that people around the world can use to communicate. It features multiple rooms for different chat topics, and private messaging between users.
  224.  
  225.  
  226. When you join the Anonymous IRC network, do so only via SSL (point you IRC client to port <tt>6697</tt>). Port <tt>6697</tt> is an unusual SSL port, just checking the ''Always use SSL'' box will not function. By connecting to SSL-Port <tt>6697</tt> your IRC-Client may give you a warning, because the SSL-Certificate is self-signed. That is OK, you can trust the certificate.
  227.  
  228. After connection you register you nickname by using a fake email adress, then you <tt>/join #vhost</tt> and AFTER that procedure you join the channels.
  229.  
  230.  
  231. '''Basic list of IRC Commands'''
  232.  
  233. * <tt>/join #channelname</tt>Joins #channel
  234. * <tt>/part</tt> Parts active #channel
  235. * <tt>/query nick</tt>Opens private conversation with nick
  236. * <tt><nowiki>/msg nick <message></nowiki></tt><nowiki>Sends <message> to nick </nowiki>
  237. * <tt>/whois nick</tt>Displays info on nick
  238. * <tt>/msg nickserv identify <nowiki><</nowiki>password></tt>Identifys your nick
  239. * <tt><nowiki>/ignore <nick></nowiki></tt>to ignore a troll
  240. * <tt>/topic</tt>to see the topic of a channel
  241. * <tt>/list</tt>to see a listing of available channels
  242.  
  243. '''Extended commands'''
  244.  
  245. * http://www.ircbeginner.com/ircinfo/m-commands.html
  246.  
  247. '''Where to find current IRC information incase you can't connect'''
  248.  
  249. * http://www.anonnews.org
  250. * http://www.anonops.ru/?id=servers
  251. * Facebook (search Anonymous, Operation Tunisia) http://www.anonnews.org/chat (Loads web based IRC client with current server info)
  252.  
  253. '''Security'''
  254.  
  255. * Use SSL to connect to the IRC. Server port is 6697.
  256. * Use VPN software, or accounts to hide your IP. IRC servers are pretty secured, but not invulnerable. Tor software is NOT an option (It's banned in the network due to malicious abuse).
  257.  
  258. '''Extra security consists in getting a vhost (Virtual Host)'''
  259.  
  260. * Register your nick: <br/>  /msg nickserv register password fake@email.com
  261. * <tt>/join #vhost</tt>
  262. * when in <nowiki>#vhost</nowiki> type: <tt>!vhost any.fake.host</tt>
  263.  
  264. '''IRC-Clients'''
  265.  
  266.  
  267. '''Mac'''
  268.  
  269. Download Colloquy from one of these:
  270.  
  271. * http://colloquy.info/downloads/colloquy-latest.zip
  272. * http://files5.majorgeeks.com/files/aaea265a9054b3b8c5df99c64685ec2e/mac/messaging/colloquy-latest.zip
  273.  
  274. '''Get a webproxy, one of these. Make sure you connect with SSL. ("ipadress:port")'''
  275.  
  276. * 62.112.33.2:80
  277. * 200.125.243.122:8080
  278. * 120.39.24.156:808
  279. * 58.22.151.6:80
  280. * http://www.proxy-list.org/en/index.php?pp=any&pt=2&pc=any&ps=y&submit=Filter+Proxy
  281.  
  282. '''Usage'''
  283.  
  284. * Start Colloquy
  285. * Click on ''New''
  286. * Enter a Nickname (not your real name)
  287. * Enter a Chat Server, for our purpose, ''irc.anonops.ru''.
  288. * Click on ''Details''
  289. * Select the ''Secure Web'' proxy and check the ''SSL'' option, use port ''6697''
  290. * Don't put your real name in either User/Real Name. Invent something.
  291. * If you want, click: ''Remember Connection''
  292. * Hit ''Connect''
  293. * Click ''Join Room'' and enter the Chat Room <tt><nowiki>#tunisia</nowiki></tt>, for example.
  294. * Or, one of these: <tt><nowiki>#opTunisia #Lobby</nowiki></tt>View Macintosh instructions below.
  295.  
  296. '''Linux'''
  297.  
  298. '''Xchat (Gnome)'''
  299.  
  300. * Debian/Ubuntu/Knoppix... : <tt>sudo apt-get install xchat</tt>
  301. * Redhat/Fedora(64bit only): http://www.xchat.org/files/binary/rpm
  302. * Gentoo: <tt>sudo emerge --sync | sudo emerge -av xchat</tt>
  303.  
  304. '''Usage'''
  305.  
  306. * Start X-Chat
  307. * Click ''Add'' button on the network list, and rename to whatever you choose.
  308. * Click the ''Edit'' button with new network selected, change the server entry from ''newserver/6667'', to ''irc.anonops.ru/6697'' (or use one of the newer domains found from links below).
  309. * Then select the two check boxes that say ''Use SSL for all servers on this network'' and Accept invalid SSL certificate. <br/> Click ''Close'', then ''Connect'' http://konversation.kde.org
  310.  
  311. '''Konversation (KDE)'''
  312.  
  313. * Debian/Ubuntu/Knoppix... : <tt>sudo apt-get install konversation</tt>
  314.  
  315. '''Usage '''similar to X-Chat
  316.  
  317. '''Windows'''
  318.  
  319. '''X-Chat2'''
  320.  
  321. * Freeware version: http://www.silverex.org/download
  322. * Mirror: http://download.cnet.com/X-Chat-2/3000-2150_4-10972145.html
  323.  
  324. '''XChat'''
  325.  
  326. * http://xchat.org/download
  327.  
  328. '''Mirc'''
  329.  
  330. * http://www.mirc.com/get.html
  331.  
  332. '''Usage'''
  333.  
  334. * Download SSL Library: http://www.mirc.com/download/openssl-0.9.8q-setup.exe
  335. * Install it either in the mIRC folder (typically C:\Program Files\mIRC or C:\Program Files (x86)\mIRC ) or in the Windows System folder (typically C:\Windows\System32).
  336. * By running mIRC it should find and use the OpenSSL library automatically. To confirm whether mIRC has loaded the OpenSSL library, you open the ''Options'' dialog and look in the ''Connect/Options'' section to see if the ''SSL'' button is enabled.
  337. * Type <tt>/server irc.anonops.ru:6697</tt>
  338.  
  339. '''Webbased'''
  340.  
  341. '''http://01.chat.mibbit.com'''
  342.  
  343. * In the mibbit page, click on ''server'', and enter in the box:<br/>  webirc.anonops.ru:+6697
  344. * How do I know if it is working? Just do <tt>/whois your_nick</tt> and it should inform you that you are using a secure connection.
  345.  
  346. '''http://www.anonops.ru'''
  347.  
  348. * click ''Chans''
  349.  
  350. '''How to Vhost'''
  351.  
  352.  
  353. On the anon IRC servers you can ask for a Vhost. This will ensure that you are anonymous on the irc network.
  354.  
  355. By default you will have a host based from you ISP, something like this: ''mynick@theservicefrom.125.comcast.suck.net'' or a hash if you've logged in by SSL: ''mynick@6969E1A1T1COCK152.69.IP.''
  356.  
  357. After setting a desired vhost you could be identified as: ''mynick@myvhostRocks.org''.
  358.  
  359.  
  360. 1.- You must own a registered nick to get a vhost.
  361.  
  362. * Command <tt>/msg nickserv register password fake@email.com</tt><br/> Explanation: This will tell the register service to reserve your nickname for later use
  363.  
  364. 2.- You must identify on that nickname to get it working.
  365.  
  366. * Command: <tt>/msg nickserv identify password</tt>.<br/> Explanation: Once you do this step you are ready to set up a vhost.
  367. * Output: ''services.anonops.net sets mode +r Yournick''<br/> Explanation: The +r flag states a given nick is effectively registered and identified.
  368.  
  369. 3.- Join the #vhost channel in order to get the vhost working.
  370.  
  371. * Command (in channel): <tt>!vhost fake.host.here</tt><br/> Explanation: After you apply for a vhost, the service will ban your nick from that channel for a given ammount of time. Reasons are many. Lurkers can get real ip's from people. Switching vhosts each 2 seconds might lag the server, and so on.
  372.  
  373. 3.b.- Eventually you can directly ask for the vhost via command without getting in the specific channel.
  374.  
  375. * Command: <tt>/hs request vhost@hosthere</tt><br/> Explanation: this will avoid getting into the specific channel. But is not enough to get it working. The <tt>vhost@</tt> part is optional, the important part is the <tt>hosthere</tt> part.
  376.  
  377. Considering the previous explanation, use the following: <tt>/hs request hosthere</tt>
  378.  
  379. * Command 2: <tt>/hs on</tt><br/> Explanation: This will effectively activate the vhost.
  380.  
  381. '''Vhost Trouble Shooting'''
  382.  
  383.  
  384. Q: I have registered my vhost, but once I log in it doesnt activate.
  385.  
  386. A: Have you identified with your nick? You will only get your regular vhost back once your nick is correctly identified, redo step 2.
  387.  
  388.  
  389. Q: I just changed my vhost but it wont apply, why?
  390.  
  391. A: You need to update your status, in order to make it fully working. Use this:
  392.  
  393. <tt>/msg nickserv update</tt>
  394.  
  395. * Output: ''HostServ- Your vhost of hosthere is now activated''.
  396. * Output: ''NickServ- Status updated (memos, vhost, chmodes, flags''
  397.  
  398. Once you do that, you normally should have a fully functional vhost.
  399.  
  400.  
  401. '''General Browsing Safety'''
  402.  
  403.  
  404. ''Basic Rule: Always browse in "Private Mode" so that fewer traces of your web history remain on your HDD. Opera, Chrome, Firefox, Safari, and Internet Explorer all include a form of Private Browsing.''
  405.  
  406.  
  407. Using a free VPN will ensure your privacy in most situations online. If possible, use USB drives. You can nuke them if needed and if leaves no traces on your harddrive
  408.  
  409.  
  410. Use a different VPN for each of your online personas. When checking real email accounts, FaceBook, use a different VPN than from the one you use for Anonymous activities.
  411.  
  412.  
  413. Recycle your online accounts as needed. A virtual name is just that, something people use to refer to you in given situations.
  414.  
  415.  
  416. When creating accounts, use VPN or TOR bundle, that will give a bogus origin as well and make use of the Throw-away-emails.
  417.  
  418.  
  419. '''Useful (mandatory) plugins/extensions for Firefox'''
  420.  
  421. * BetterPrivacy (Removes persistent cookies from flash stuff >> *.sol)
  422. * NoScript (blocks Javascript)
  423. * AdBlock Plus (blocks Ads) (Subscribe to Easylist and Fanboy's List)
  424. * Element Hider for Adblock Plus
  425. * Ghostery (tracking pixels)
  426. * TACO (More adblocking)
  427. * Redirect Controller
  428. * Refcontrol
  429. * WorldIP (know your country, know your rights)
  430. * Flagfox
  431. * GoogleSharing (GoogleProxy, i use it because Google is censored where i live, anonymizes the search) - Scroogle.org is also a very viable (and worthwhile) alternative
  432. * User Agent Switcher: Sends bogus browser identity to servers.
  433. * Optimize google: Allows to block loads of scum google uses to track searchs.
  434. * Outernet explorer (MacOS) : Searches for a whole pile of shit on the net every 10 seconds or so, ensures anyone tapping packets will have a hell of a time.
  435. * https://www.eff.org/https-everywhere: automatically loads https on a site if avaliable.
  436. * Scroogle SSL search (Google anonymously): https://ssl.scroogle.org
  437.  
  438. '''System Safety'''
  439.  
  440.  
  441. ''Basic rule: Security is a continuing process, not a state. Do audits on a regular and scheduled basis. And do encrypted backups. Backups are important, as there are two types of people, those who have backups and those who have lost their data.''
  442.  
  443.  
  444. * use the operating system you are familiar with (Linux and Unix are better though)
  445. * uninstall everything you not need
  446. * disable all remote tools
  447. * shred or encrypt /temp, /var/temp and all world-readable files
  448. * Encrypt your hard disk (Truecrypt : www.truecrypt.org)
  449. * Debian and other linux distros offer to encrypt the harddrive during installation. Use it.
  450. * Use a distro that boots from DVD/CD/USB
  451. * Never ever keep logs
  452. * Shutdown all unneeded services
  453. * Use a firewall
  454. * Public access points are perfect - just about. (correlating logins with CCTV could prove disastrous so security cameras should be avoided while using such 'free' services. Cyber caf.s, Mc Donalds, and many companies offer Free internet access, remember though, not to surf those nets without a VPN and/or Tor.
  455. * Keep private keys (pgp/gnupgp) in a removable device, and that removable device away from curious eyes. Encrypt the private key before doing this.
  456. * Keep VPN certs away from curious eyes via removable device, or common hidden folders.
  457. * Never use the same users/passwords on reinstall. Take the time to create a new one each time. Use password generators.
  458. * BE paranoid. All rare activity in your computer must be checked and monitored. That will provide 2 things: knowledge once you identify it, and added safety.
  459.  
  460. '''Detecting potentially security flaws on *Nix'''
  461.  
  462. But be careful, if you don't know how to read Lynis' output, you'll become paranoid deluxe.
  463.  
  464. * http://www.rootkit.nl/projects/lynis.html
  465.  
  466. '''Scanner for rootkits, backdoors and local exploits on *Nix'''
  467.  
  468. Again, if you don't know how to read Rootkit Hunters output, you'll get paranoid.
  469.  
  470. * http://www.rootkit.nl/projects/rootkit_hunter.html
  471.  
  472. '''Destroying data securely'''
  473.  
  474.  
  475. '''Unix/Linux'''
  476.  
  477. To securely destroy data under *Nix you have some possibillities. The command <tt>shred -u</tt> overwrites singe files and deletes them finally, with <tt>wipe -rcf </tt>you overwrite and delete directories. Be carefull because the shredded/wiped data cannot be recovered.
  478.  
  479.  
  480. Open a Terminal and type
  481.  
  482. * <tt>shred -u</tt><nowiki> <filename></nowiki>
  483. * <tt>wipe -rcf </tt><nowiki><directory></nowiki>
  484.  
  485. If you feel the need to wipe the whole harddrive, the command is as follows for IDE-HDs (/dev/hda is the first HD)
  486.  
  487. *  wipe -kq /dev/hda
  488.  
  489. For SATA and SCSI HDs you type (/dev/sda ist the first HD)
  490.  
  491. *  wipe -kq /dev/sda
  492.  
  493. If <tt>wipe</tt> is not available to you, you can use <tt>dd</tt>. (again the first HD)
  494.  
  495. *  dd if=/dev/zero of=/dev/hda
  496. *  dd if=/dev/urandom of=/dev/hda
  497.  
  498. Use *both* commands, one after the other, if especially paranoid. Use them multiple times.
  499.  
  500.  
  501. '''Mac'''
  502.  
  503. Anonymous' Privacy Pack for Mac users. It includes a Top Secret Docs secure Shredder & AES-256 Encryption tool (and some Design as extra stuff)
  504.  
  505. * http://www.megaupload.com/?d=L2VQBEFE
  506.  
  507. or
  508.  
  509. * http://www.mediafire.com/?1xmu0m8jpy9b2a1
  510.  
  511. MD5 (Anonymous-MacPackage-Privacy.dmg) = 36e9ea524a86b94a451577ca46d3e15f
  512.  
  513.  
  514. '''Windows'''
  515.  
  516. * AxCrypt http://www.axantum.com/AxCrypt
  517.  
  518. FAQ (in no particular order)
  519.  
  520.  
  521. Q:Can you help us?
  522.  
  523. A:See http://www.anonops.ru/?id=contact or join irc.anonops.ru, join a channel and contact an operator. Or contact Anonymous on Twitter, Facebook.
  524.  
  525.  
  526. Q:Do you guys have a website?
  527.  
  528. A:http://www.anonops.ru
  529.  
  530.  
  531. Q:How do I know what's hot?
  532.  
  533. A:Lurk in the IRC channels or go to http://www.anonnews.org
  534.  
  535.  
  536. Q:Is the news on Anonnews official?
  537.  
  538. A:Well, in some way, it is official, on the other hand, it is .official. and on the third hand the more people support an operation, the more official it becomes.
  539.  
  540.  
  541. Q:Why not attack that newspaper/TV/Radiostation?
  542.  
  543. A:Anonynmous does not attack media.
  544.  
  545. Q:That is no media! It only spreads lies and propaganda!
  546.  
  547. A:Freedom of speech counts for assholes too.
  548.  
  549. Q:But, but...
  550.  
  551. A:As Evelyn Beatrice Hall said, .I disapprove of what you say, but I will defend to the death your right to say it..
  552.  
  553.  
  554. In the words of Noam Chomsky: .Either you believe in freedom of speech precisely for views you do not agree with, or you do not believe in freedom of speech at all..
  555.  
  556.  
  557. Freedom of speech. Got it?
  558.  
  559.  
  560. Q:What are DDoS and defacements good for anyway? It doesn't help the people.
  561.  
  562. A:DDoS is all about steering media's attention towards the problems of the people. If media takes notice, this will help the people.
  563.  
  564. The fine art of defacing a website is about sending a message to the people and the owner of that website. Besides that Anonymous provides the people with information and guides and software to circumvent censorship, also know as .The Care Package.
  565.  
  566.  
  567. Q:What's in the Care Package?
  568.  
  569. A:Software like Tor Onion Router, a Circumventing Censorship Manual, more software, other guides and usefull stuff.
  570.  
  571.  
  572. Q:Can you give me a How-To about building botnets?
  573.  
  574. A:Such how-to does not exist.
  575.  
  576.  
  577. Q:I have seen this downloadlink in the channel, can I trust it?
  578.  
  579. A:Anonymous recommend to not trust links spread in the chans. The only trustworthylinks are those spread by Admins, Operators and those in topic.
  580.  
  581.  
  582. Q:Some guy asked me in the IRC where I live and what my name is.
  583.  
  584. A:Do NOT provide personal information in IRC. Instead contact an operator and tell him what happened. Same goes for other suspicious behaviour.
  585.  
  586.  
  587. Q:How can I join your club?
  588.  
  589. A:Anonymous is not a club.
  590.  
  591.  
  592. Q:What is Anonymous?
  593.  
  594. A:Anonymous is a very general movement. It is not a group with fixed members or rigid objectives. It is a fluid movement which anybody can become part of, simply by participating. To become part of 'Anonymous' all you have to do is join in with some of Anonymous' activities.
  595.  
  596.  
  597. Q:But how does that Anonymousthingy function anyways?
  598.  
  599. A:Best way to find out is, to join a channel, lurk around and get an impression of it. Anyone who thinks that the freedom of speech is a remunerative goal can fly under the flag of Anonymous.
  600.  
  601.  
  602. Q:I am not a hacker, how can can I help you?
  603.  
  604. A:If you
  605.  
  606. * can collect/spread information
  607. * can organize things
  608. * can make contacts
  609. * can provide insights
  610. * can share experiences
  611. * can push the ''IMMA FIRING MA LAZOR'' button
  612. * can write guides
  613. * can do artwork
  614. * can speak a foreign language and/can translate
  615. * ...
  616.  
  617. you can be helpfull.
  618.  
  619.  
  620. Q:Is there a Hive???????????????????
  621.  
  622. A:1. N00b, look at the topic by typing <tt>/topic</tt>
  623.  
  624. 2. Probably not, but you don't need a hive, you can fire manually, as you wish.
  625.  
  626.  
  627. Q:Where can I download LOIC???????????????
  628.  
  629. A:N00b, see topic in channel by typing <tt>/topic</tt>
  630.  
  631. Or go directly to https://github.com/NewEraCracker/LOIC/downloads
  632.  
  633.  
  634. Q:What's the target??????????????????????
  635.  
  636. A:N00b, look at the topic by typing <tt>/topic</tt>
  637.  
  638.  
  639. Q:Is the target down????????????
  640.  
  641. A:Got to www.watchmouse.com and ask there.
  642.  
  643.  
  644. Q:Some guy keeps saying, there were danish girls in #channel.
  645.  
  646. A:This is obviously a lie, there are not girls on the internet.
  647.  
  648.  
  649. Q:What is a netsplit?
  650.  
  651. A:A netsplit is Internet-Darwin doing evolution.
  652.  
  653.  
  654. Q: Why can't I join the Anonymous' IRC when on Tor?
  655.  
  656. A:Because of some vandalism *not looking at anyone*, Tor is not allowed on Anon's IRC chans anymore. You may use I2P instead, for help ask a user named .munnin..
  657.  
  658.  
  659. Q:I am a Media-Guy, how can I contact you?
  660.  
  661. A:See http://www.anonops.ru/?id=contact or send an email to ''press@anonops.ru''.
  662.  
  663.  
  664. Q:I am a Media-Women, how can I contact you?
  665.  
  666. A:Please see http://www.anonops.ru/?id=contact or send an email and pics to ''press@anonops.ru''.
  667.  
  668.  
  669. Q:Ok, I am from the media and need to talk to Anonymous' spokesperson/leader/strategist then.
  670.  
  671. A:Anonymous has no leader, nor a spokesperson or strategist.
  672.  
  673.  
  674. '''Some Links'''
  675.  
  676.  
  677. '''Throw-away-emails'''
  678.  
  679. Use them for registering activist related email-/Facebook-/... accounts.
  680.  
  681. * http://10minutemail.com
  682. * http://www.sofort-mail.de
  683. * http://www.trash-mail.com
  684. * http://www.guerrillamail.com
  685. * http://www.spam.la
  686.  
  687. '''Portable Software'''
  688.  
  689. Portable software is software, that you can run from an USB drive, so that it leaves nearly no traces on your computer.
  690.  
  691. * http://portableapps.com
  692. * http://portableapps.com/apps/internet/firefox_portable
  693. * http://portable-i2p.blogspot.com
  694.  
  695. '''Proxies'''
  696.  
  697. You may use them in conjunction with a VPN.
  698.  
  699. * http://www.freeproxies.org
  700. * http://www.socks24.org
  701. * http://www.samair.ru/proxy
  702.  
  703. '''VPN'''
  704.  
  705. * http://cyberghostvpn.com
  706. * http://hotspotshield.com
  707. * http://proxpn.com
  708. * https://anonymityonline.org
  709.  
  710. * http://www.swissvpn.net
  711. * http://perfect-privacy.com
  712. * https://www.ipredator.se
  713. * http://www.anonine.se
  714. * https://www.vpntunnel.se
  715.  
  716. '''I2P'''
  717.  
  718. * http://geti2p.net
  719.  
  720. '''Chat for more info about I2P'''
  721.  
  722. The channels <nowiki>#i2p</nowiki>, <nowiki>#i2p-chat</nowiki> and <nowiki>#irc2p</nowiki> are supported.
  723.  
  724. * https://www.awxcnx.de/i2p-irc-en.htm
  725.  
  726. '''Tor Onion Router'''
  727.  
  728. * http://www.torproject.org
  729.  
  730. '''Privacy Box'''
  731.  
  732. The PrivacyBox provides non-tracked (and also anonymous) contact forms. It is running primarily for journalists, bloggers and other publishers. But it is open for other people too. Think electronic mailbox.
  733.  
  734. * https://privacybox.de/index.en.html
  735.  
  736. '''Sending anonymous email'''
  737.  
  738. * https://www.awxcnx.de/mm-anon-email.htm
  739.  
  740. '''Free and uncensored DNS-Servers'''
  741.  
  742. * 87.118.100.175 (Ports: 53, 110)
  743. * 94.75.228.29 (Ports: 53, 110, HTTPS-DNS, DNSSEC)
  744. * 62.75.219.7 (Ports: 53, 110, HTTPS-DNS, DNSSEC)
  745. * 87.118.104.203 (Ports: 53, 110, DNSSEC)
  746. * 62.141.58.13 (Ports: 53, 110, HTTPS-DNS, DNSSEC)
  747. * 87.118.109.2 (Ports: 53, 110, DNSSEC)
  748.  
  749. To see wether you're using them properly, open your browser and type <tt>http://welcome.gpf </tt>into the the adressbar. If you're using them you should see a website saying .''Congratulation You are using a censorship free DNS server!''.. Else, you failed.
  750.  
  751.  
  752. If you're a hax0rz you can use a terminal. Open it and type <tt>nslookup welcome.gpf</tt>
  753.  
  754. this should result in the following output:
  755.  
  756.  
  757. Non-authoritative answer:
  758. Name: welcome.gpf
  759. Address: 62.75.217.76
  760.  
  761.  
  762. Else, you failed. (Else is General Failure's sister. Avoid meeting them at all costs.)
  763.  
  764. '''Send free faxes'''
  765.  
  766. * http://sendfreefax.net (Text only)
  767. * http://www.freefax.com/ff_snd.html (Text only)
  768. * http://www.eztel.com/freefax/ (Text only)
  769. * http://www.popfax.com
  770.  
  771. (.pdf-capable; 2 free faxes when signing up for free trial, no credit card/payment details needed)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement