Advertisement
Guest User

31ve41234G53F125dgd

a guest
May 12th, 2016
250
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 62.56 KB | None | 0 0
  1. "AWOL" guide 00.001 by Jens Johansson
  2. (Anonymous While On-Line = AWOL)
  3.  
  4. email: jensj329@sigaint.org
  5.  
  6. Tox: 57560F93AC61509CB326286F28ECC46C7B8B0B6DF862E772F8F3757EB258444B3AA84EF8B3C9
  7.  
  8. bitmessage address: BM-NBsMte9dQZFpfWrJnMqyc9fY9dbUksML
  9.  
  10. twister: @jensj329
  11.  
  12. -
  13. Intro
  14. -
  15.  
  16. This guide was created through necessity to help enlighten people in the general sense on the topic of anonymity online and beginner cyber-security. It is in no way fully comprehensive and only suited as an overview of the methods employed. It is up to you the reader to discover the many guides available online and implement more advanced methods for securing your devices. Nothing provided in this guide is intended to encourage, promote, or condone illegal activity. What you do with your knowledge is on you. Stay safe. Stay anonymous.
  17.  
  18. The main purpose of this guide is to cover computers in general. We recommend people switch to whatever linux flavor they desire and begin securing the system for themselves. If you want to get started on your research right away but don't know how to get started, go ahead and download a copy of tails through the TOR browser and read up. You can perform cross platform encryption within tails using xxx and then access the information later after saving to a flash drive or other storage media of your choice.
  19.  
  20. https://newblood.anonops.com/
  21.  
  22. Anybody should learn and implement these methods and others. If you have friends who think that data security is not necessary, you may want to kindly mention in a nonchalant manner that you think personal privacy is being intruded upon too greatly and exercise of our rights is being slashed at from all sorts powers. You probably won't want to mention anonymity to them directly but attempting to enlighten them is worth a shot.
  23.  
  24. I am the man in the mask. Ultimately, I do not care if you are good or bad. As to what this means, I leave those of who are good to counter those of you who are bad, for me it is tiring and a near sore effort to sift out everybody on account of their merit to receive such information.
  25.  
  26. This guide is being released in hopes that it will aid true gentlemen in their pursuit of becoming anonymous. One must be and always remain a gentleman. Being a gentleman is about your mannerisms and actions, defining the way you think and interact.
  27.  
  28. It is up to you to learn good OPSEC (operations security) and to apply it diligently.
  29.  
  30. We advocate for open source hardware and software; Governments and businesses should be transparent with the public, not forcing people to loose their privacy and rights to the cause of "security" for the 'greater good'.
  31.  
  32. I myself would not always expect this guide to be available, if you do find it useful, I recommend you back it up and continue redistributing at your leisure. Takedowns do happen and I do not rigorously maintain links to material unless I have been made aware the resource is too valuable to be lost. Since it is hard for me to assure this resource will stay where I put it, if you think it is valuable information or needs expansion in some area or to patch a gaping hole, let me know by getting in contact with me.
  33.  
  34. -
  35. Opening words to the wise
  36. -
  37.  
  38. I know most people obtain the position of "You can't tell me what to do", but I am going to say this anyways in an attempt to deter anybody thinking they might abuse their new found power; Do not use your anonymity to break the law. Not only is it stupid but it is the wrong way to go. Use your common sense, if there is any left these days...
  39.  
  40. Being a gentleman is of the utmost importance, especially with all that is involved, one must make the highest pursuit of theirs to always remain a gentleman. You are to be a gentleman and have an accurate code of ethics to navigate with your moral compass. Do not boast or place yourself above others, be as you should be, a gentleman.
  41.  
  42. Its not paranoia if there is a real reason to feel that way. paranoia to the cautious can be a proactive means of protection, even if it is too superstitious at times.
  43.  
  44. Remember the first rule of f*g*t c*u*.
  45.  
  46. The power of anonymous is with you and all others, to perform your duties as your person, and to help support the rights of all people in an empowering way. an anonymous person may attempt break your anonymity for any given purpose, it is on you what you do. Don't give another person a reason to break down your walls, as anything you do or say is taken into account, learn and speak anonymously as anonymous.
  47.  
  48. -
  49. Operating system
  50. -
  51.  
  52. An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs. The operating system is a component of the system software in a computer system. Application programs usually require an operating system to function. For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer – from cellular phones and video game consoles to web servers and supercomputers.
  53.  
  54. If you are going to use windows then you need to be aware that it is a boat with many holes of which even the smallest may send it sinking. plugging up the holes is a good place to start (not enough), but remember, windows is not open source and cannot be audited by the community. You are going to want to use windows 7, avoiding vista, 8 and 10 (windows xp is ok, to be fair). Windows does have known backdoors pre-configured by the NSA, which are also suspected to exist in macintosh. windows is also extremely vulnerable to attack. don't think windows is secure in any fashion and if you use it, exercise all interactions with extreme caution. (don't use windows!)
  55.  
  56. Macintosh is a good platform to already own if you are stuck in your ways, because it is more secure than windows and also quite easily relate-able in fundamental nature to linux. The problem is that dual booting a mac is not nearly as easy as dualbooting any other brand pc (macs are technically a pc) Need I mention that mac hardware though not unique in architecture is unique in hardware provide pretty exclusively, you will not blend in well given more layers of security are stripped to fingerprint.
  57.  
  58. Linux is better than mac osx which is better than windows, hands down. to understand, compare security of the systems in different breakdowns. I don't like to do this much, but to save space, here is a link:
  59. http://lifehacker.com/mac-vs-windows-your-best-arguments-486125257
  60.  
  61. All operating systems are vulnerable to malware, but the worst has got to be windows. Such a large amount of malware is developed towards windows that it is the very worst system to use attempting to be an anon. macintosh has many strengths over windows, but people have gotten too comfortable telling themselves that there are no 'viruses' for mac and other types of obscure mythical protections that macintosh has. even linux is not entirely secure, yet, the aility to audit the code from source and also the largest flexibility in configurational security, linux is your best bet all around. The worst bit for beginners is learning the alternative pieces of software that work for linux over windows, which is the most drastic change. Linux will be more familiar to MAC OSX users given the akin nature to eachother they have through a relation in their past. It is possible to multiboot these systems but let it be known that an infection through BIOS attack for example could destroy security on your end.
  62.  
  63. Security is a cornerstone of the Linux OS, and one of the principal reasons for its popularity among the IT community. This reputation is well deserved, and stems from a number of contributing factors.
  64.  
  65. One of the most effective ways Linux secures its systems is through privileges. Linux does not grant full administrator – or ‘root’ - access to user accounts by default, whereas Windows does. Instead, accounts are usually lower-level, and have no privileges within the wider system. This means that when a virus gets in, the damage it can do is limited, and restricted mainly to files and folders on the individual machine. This can be greatly beneficial from a damage control standpoint, since it’s far easier to simply replace one machine than scour the entire network for malware traces.
  66.  
  67. There’s also the fact that open source code such as Linux software is generally thought to be more secure and better maintained, due to the amount of people scanning it for flaws. Similar to the ‘infinite monkeys’ principal, ‘Linus’ Law’ (named after Torvalds), states that “given enough eyeballs, all bugs are shallow”.
  68.  
  69. Possibly most important, however, is the issue of compatibility. As we mentioned earlier, virtually all software is written for Windows, and this also applies to malware. Given that the number of Windows machines in the world vastly outnumbers the number of Linux ones, cyber attacks targeting Microsoft’s OS are much more likely to succeed, and therefore much more worthwhile prospects for threat actors.
  70.  
  71. This isn’t to say that Linux machines are totally immune from being targeted, of course, but statistically, you’re definitely safer than with Windows, provided you stick to best practices.
  72.  
  73. If you finally decided to use linux, the best of the best are with you with you now. Though you will not find most of the common software that day to day users consider with windows, you are going to be happy that most opensource software you may have been using is pretty much capable of being run on linux, and better yet, that software is cross platform to a large degree in linux, which customizations through technical knowledge yeild even more amazing benefits. You will need to go ahead and anonymously download an ISO of linux if you plan on doing an install. I am inconclusive if data forensics can tell which disk drive created a dvd but I believe if you are reasonable with your use of dvd's you don't need to worry too much about that; The only workaround seems to be re-flashing with a custom firmware on the disk burning drive.
  74.  
  75. -
  76. Computer basics walk-though and tcp ip
  77. -
  78.  
  79. You will eventually need to understand computers at least to a CompTIA certification level, even if you never attain the certification. CompTIA for all levels is advised, for beginners, focus on A+, Linux+, Network+, Security+, and Server+. This should get you on the right track
  80.  
  81. Once you understand the inner-workings of computers and the network protocol stack, you may want to dive into programming. The best place to start is debatable, but I advocate for beginners to start with python or other flexible multi-level of entry language that will serve you well for all your years, as well as learning at least the command shell of whatever operating system you use. Other good languages to learn in general are XHTML, Java/Script, C++, and openGL/webGL.
  82.  
  83. -
  84. Customizations/Optimizations
  85. -
  86.  
  87. You are going to run a smooth machine that you have specifically modified to your needs, but at the same time, you do not want the customizations to be obvious in a way that reflects the addition of finger-printable details regarding your device. Tweaking windows is in itself a bit of a joke, and if you are serious about anonymity, you will switch over to linux as soon as possible. Tweaking windows is easy enough to gain a bit more performance out of your system and potentially close up a few security holes like desktop widgets that come bundled with windows 7, but you do not want to rely on these small customizations to secure your computer. As far as what changes to make, you will need to research the history of vulnerabilities and performance hits your system is known to have, and adjust your settings accordingly. Disabling special effects in your GUI might make it less pretty to look at, but it will be worth the performance gain and potential security increase. Read up on this for yourself.
  88.  
  89. -
  90. General security
  91. -
  92.  
  93. Do not use your ISP provided router (if you have one) for anything if you can avoid it, that will be the weakest piece of hardware in your setup. Make sure to run your own firewall and router from whatever your connection to the internet is. WIFI is a bad idea if there is anything you need to keep seriously hidden from an unknown outside observer, but if you are going to go ahead and go against this warning, use at least a 16-20 character password and change it every 3-6 months to prevent brute forcing attacks being successful. it may be helpful for you to do research on ISP level logging/tracking and WIFI security cracking to help understand. On the other hand, WIFI can be valuable to not disclose your physical location and identify your person depending on the circumstances, given you take efforts to protect your privacy and security. The NSA is also pushing backdoor configurations in all new hardware licensed by the FCC, whether it be software or hardware backdoors; This has supposedly already happened in CPU's released by intel, and there is reason to suspect any integrated bluetooth(wireless)/cpu will be vulnerable in such a way.
  94.  
  95. Offline password generators and random name creation scripts are your friend. practice your random passwords and do not use any weak password for offline or online purposes. your password safe should be stored offline with at least a 16char password (NEVER less than 8-10 characters).
  96.  
  97. Always make sure to to enter the correct web address in the browser and to use HTTPS when available, do not submit any sensitive form data without https enabled or you risk discovery of potentially sensitive information.
  98.  
  99. Do not enter personally identifiable information anywhere on the internet and always be careful who and what you trust to have this information.
  100.  
  101. Your computer, especially windows, will keep all sorts of records regarding your activities, such as software caching entered data and creating registry keys revealing fingerprints of what you thought may have been harmless details. know how these systems work and what details each piece of software leaves on your computer through installation/de-installation and regular use. the swapfile and ram are also sensitive parts of your system vulnerable to certain types of attacks; always erase your swapfile at shutdown and choose software that encrypts plain values in ram to gain security in these areas.
  102.  
  103. It is not wise to use TOR over TOR, issues can come about and there is not enough information on the consequences of doing so, not to mention it may actually harm your anonymity. If you decide to hack a router to use TOR as a proxy to the internet, be warned, not only will the connection need to be scripted to periodically reset and establish the TOR pathway but any personally identifiable activity will also indicate you as being a TOR user.
  104.  
  105. It is entirely possible that it will not be you but somebody else who breaks the OPSEC of your network and computer system integrity; bringing people you know over who ask for the wifi password or even just link into the ethernet can leave traces of their connection to you, at the very least, leave footprints clear as day that they are associated with yourself in any way. MAC address logging on the router is one example as well as phoning home from a piece of service provider equipment. If you understand that somebody else may inadvertently correlate your behavior which you tried to strictly regulate, you may find ways to prevent them from violating your security measures. Somebody may also attempt to actively attack you in your own network if you give away the keys or otherwise allow access. In the case of this, the only preventative is to know anybody can be a potential adversary, and you don't want to give them any measure power over you. If you are worried about being snitched on for being anonymous and having people breach your trust, a slightly offtopic but interesting read is RATS! by Claire Wolfe.
  106.  
  107. Software on your computer can be a vulnerability. Services like steam, flashplayer, serverware and anything else that established a network connection or phones home (even "offline" software can be used in bridging an exploit) can break your attempts of anonymity and even be a security hole. You need to know that automatic updates can also induce this type of issue by making an easily identifiable pattern appear while are using anonymity networks. Disabling automatic updates may not be as convenient but having control over the environment you operate in is to your advantage in the pursuit of anonymity and security maintenance.
  108.  
  109. Writing down passwords on paper and tacking them to the pc or leaving it in a stack of papers is unwise. If you decide write passwords, you need to place it in a safe until it is no longer needed, shred it and BURN or otherwise destroy it properly.
  110.  
  111. Biometrics are not yet secure and indeed may never be. Your fingerprints for example are so easy to attain for anybody that may have physical access to your system that relying on anything short of extortion to get them from you is ridiculous. Don't use biometrics for anything but a soft layer of access control, never guard under biometrics alone.
  112.  
  113. Use different passwords for each site, never use the same password twice unless you want an adversary to potentially learn it, use strong passwords, use skeptical trust distribution for your password schemes that has contingency, common keys can make implementations a bit easier or far riskier.
  114.  
  115. Reduce your online footprint and learn anonymity without breaking it; the services that used to track you will still try but be less likely to make connections if you are smart about your electronic habits.
  116.  
  117. Begin sorting data by necessity and content, protect long term data under encryption even if you decide to use common keys.
  118.  
  119. Know your rights and how to protect yourself preventatively.
  120.  
  121. Do not use your knowledge or technological resources to break the law, use them as a force for good. I am not here to condone illegal activities but to offer advice and information. What YOU do with that knowledge is on you. Stay Anonymous.
  122.  
  123. There is no truly anonymous method of accessing the internet (anymore); don't get caught up in thinking of silver bullets. furthermore, your anonymity is only as strong as your weakest link and vulnerable to user error.
  124.  
  125. -
  126. Anonymity
  127. -
  128.  
  129. A device fingerprint or machine fingerprint or browser fingerprint is information collected about a remote computing device for the purpose of identification. Fingerprints can be used to fully or partially identify individual users or devices even when cookies are turned off. Fingerprints in general describe any of the identifying characteristics of a user or machine, so it is important to be aware of their significance and how to shield from them.
  130. https://panopticlick.eff.org/
  131.  
  132. Now you may begin to grasp what indeed your job of being anonymous entails. Leave no trace. You may even choose to not use aliases seeking absolute protection. When conversing with people, it seems to assure them to have any name worth communicating with, but be aware, doing such is incognito and not the strength or armor in truth of an anonymous person.
  133.  
  134. People and data harvesting services either inadvertently or intentionally breach the anonymity of massive amounts of data all the time. Realize that these systems are often running on servers and unless you know your data is not being pooled, don't trust that it isn't being gathered (in any part).
  135.  
  136. Anything you ever did when not anonymous that you now do anonymously may break your anonymity. Exampled range from signing into old user accounts to re-posting old material you released onto the internet at any time. It is absolutely important that you do not release any picture of yourself, others, or reveal any locations that you may be found to have a connection with, unless you want those connections to be made. Remember, an ounce of preventative is worth a pound of cure.
  137.  
  138. Generation of information that is unique to you can be verified as such. Lingo and slang can also be used to identify you. You need to begin to think on the account that if an attacker was socially engineer you by entraining responses through tailored questions, your use of slang could be used as a positive point creation of ID or even to unmask you entirely, depending on the circumstances. Be aware that the risks are ever present, you need to need to be careful about anything you do or say.
  139.  
  140. You may go as far as creating alter egos that for the most part, act nothing like you, and as such, makes it harder to profile and statistically determine your person. Talking about food you like isn't a good idea, but talking about hobbies you don't care for may help draw attention away from you. It is all on your discresion what you choose to share; Understand that simple deceptions must occasionally can be used protect your identity. People may go as far as to actively socially engineer you while you are conversing or doing anything else, you need to take an active stance in not being too open and inadvertently disclosing private/personal information.
  141.  
  142. Do not break your anonymity for any reason at any moment. If you are having questions to yourself about should I do something that I think would be better if I don't, listen to your intuition and GTFO. Your ability to reason with caution should provide some protection, also ensuring the correct choices are made needs to be a continual process of upkeep. If you were to for example say that you enjoy a certain activity, such may be linked to your alias or even just the digital identifications databases around the world. How vague you are may make or break a conversation you are having with somebody else, but choosing not to disclose personal interests is necessary at times, you will find that over time once trust has been established you can speak more freely as long as you are off the record. You are to pay due diligence to your actions being anonymous, don't do anything stupid or it will be up for review of the seekers.
  143.  
  144. You are going to need to learn to change your browsing habits in many ways to make sure you always keep your anonymity. For example, do not let down a thread in your security net, to browse websites that say you cannot access them, due to some IP ban or other similar blocking method. You will need to find workarounds for certain situations but never remove any layers of existing protection nor leave any unique trace of what you are doing online. If you search for boats on your regular connection alot and then look up schematics of boats on tor, if the adversary who is amassing a database of all interlinked connections notices that a boat was viewed on the 'clear' connection and that within a time correlating the events, schematics for boats and even of those boats will be linked back to you. You need to discover that disappearing into the crowd and only coming back in unidentifiable manner is the most proficient way to prevent profiling.
  145.  
  146. If you have questions and want to speak with anonymous members, have a look at anonboards and anonhq. I do believe anonboards can be a good resource, but the wealth of information is found within the conversations you can have one on one with anonymous members. Please be polite and not make demands of them; You are sure to find a buddy somewhere on there. Some people think that anonboards is total crap; unless you understand, anonboards is a resource with limits, you may find yourself lost. When in doubt, study greyhat H@X0R and use your knowledge on your own personal equipment to simulate the state of your comprehension (don't practice on systems unless you have explicit permission to do so, fuck the TPP, use the hardware you own with itself as you see fit and go wild).
  147.  
  148. Sometimes the best manner of providing advice to somebody is in an anonymously, whether that be an anonymous account on a public messaging board or one on one encrypted OTR chat system. If you are going to be anonymous, put your skills to good use and help by educating people on anonymity from experience. Don't be afraid to admit you do not know an answer, but be careful about what details you may inadvertently leave along with any anonymous interaction you may have.
  149.  
  150. I don't know what all to say here, but this should help you understand a fraction of the sayings and wisdom behind becoming anonymous.
  151.  
  152. http://anonhq.com/be-anonymous/
  153.  
  154. -
  155. Antiseptics
  156. -
  157.  
  158. Anti-septics can be thought of as leaving the computer without a trace of your presence, or in the case of the unavoidable, sanitizing the information as thoroughly as possible.
  159.  
  160. The first step in all of this is to make sure your computer does not save any state information when 'shut down'. doing this will require you to disable hibernation and if you use windows, to disable shadow copies.
  161.  
  162. Go ahead and secure erase everything you would normally mark for deletion (moving to trash on your computer isn't a secure wipe). to clear free space, a secure erasure program such as bleachbit is a good idea to run at least once a week and schedule a deep clean at least once a month to make sure any previous deleted information is irrecoverable.
  163.  
  164. You should encrypt your swapfile and have it clear itself on system shutdown with random 0's and 1's.
  165.  
  166. If you are especially paranoid, you can also find a way to wipe ram on shutdown and encrypt it. The video memory can be enumerated as a device in linux and written over with dev random at shutdown by creating a custom script.
  167.  
  168. In microsoft windows, the system recods artifacts when USB removeable storage devices are connected to the system. as far as I know, the only way to remove them is to modify the registry. go ahead and do your own research or download the zipped portfolio for more information.
  169.  
  170. You will want to strip all your files of meta-data any time they are put into your long term storage (this may even be too late), and always before uploading onto a network of any kind. An example would be overwriting the exif data in a photo with random nonsense or deleting all the exif data itself. You may even go as far as stripping the files immediately of any identifying information.
  171.  
  172. -
  173. Securing your network connection
  174. -
  175.  
  176. The first order of buisness before you go ahead and use your computer on any network is to apply protective countermeasures (even your personal non-internet connected systems). The first order of buisness is to spoof the MAc addresses on your hardware, set up an alternate dns perhaps through OpenNIC, then apply a VPN (no logs; free will do to start, but remember paid VPNs like TorGuard are better; always select VPNs based on their support of encryption and use it!) and proceed to route all system connections through TOR or other suitable anonymous non-logging proxy service. Next order of buisness ot to enable TCPcrypt and DNScrypt if you want to get more serious with your security.
  177.  
  178. There are ways to expand your network connection protection by combining TOR with I2P and even freenet, but you are going to want to be careful as to how much trust you place in any one of these systems alone (also, I2P was vulnerable to an exploit in tails a while back). By combining these I of course mean setting up their automatic routing of any information your computer will transmit back and forth between the internet.
  179.  
  180. Learn and use TLS and IPsec which are internet security systems. Get well aquainted with them. Stay anonymous by encrypting your web traffic and keeping up a strong OPSEC.
  181.  
  182. the TOR browser is quite secure, but you still do not want to link any information identifyable to your person within any of the system you can access through tor (even regular websites). In addition to this, cross site behaviour can be analyzed though the temporary cookies that exist within tor (don't worry so much about traces of them), the main issue is that the TOR browser at the time being may inadvertantly reveal your activity, and to avoid this, use it within sessions and then get a new identity on TOR each time you do different types of activity. Also, NEVER sign into any of your incognito accounts without doing this. Also, I never advise visiting a government website with tor, as it may be used directly to identify you through browser and network attacks.
  183.  
  184. If you are wondering if tor is really anonymous and secure, it is not completely, though it is decent as a thread to your security net:
  185. http://www.howtogeek.com/142380/htg-explains-is-tor-really-anonymous-and-secure/
  186.  
  187. Packets are logged, brute forced when they are found interesting enough, and meta-data can be used to link your activities digitally
  188.  
  189. -
  190. Communications
  191. -
  192.  
  193. Aliashood is a mannerism of going incognito. within aliashood are rules to live by such as never disclosing your name, age, or geographic location (even saying what continent you are on can be too much!). any additions like a code with symbolic meaning disclosed on the record can be used as fingerprints to track your digital movements. common aliases should never link into themselves, this can go as far as server separation when using multiple emails from different providers for service registrations or social networking to messenger IDs, there are of course more ways and reasons to understand why separation is important.
  194.  
  195. Information you learn under one alias and share with another can be used to draw correlations linking their activities.
  196.  
  197. Your first alias may be your most unique, but uniqueness though appealing, should never be your reason for breaking separation and situational awareness of your alter ego. if your name which is unique to you is compromised in any integrity, do not go back to use the same user sign again.
  198.  
  199. Use a different login and password for all systems, do not interlink between systems if your trust authentication could be compromised in any circumstance. Its not a good practice to share usernames or passwords unless you want it to be easier for somebody to identify you and potentially lift your access keys.
  200.  
  201. A random name and password generator come in great handy for the creation of nearly unlimited different username and keycode credentials, but if you use an online service to make then, they may and thereby will be logged. Take this into account for any tracing done to your feeds by an analysis program.
  202.  
  203. Go ahead and wrap your login details in encryption if you cannot remember the many passwords that you will require. Your security is only as strong as your weakest link.
  204.  
  205. Email is a good place to start communicating but it is also one of the least secure by default. you can password protect your account from authorization but an admin can essentially gain access to communications and their metadata, revealing the contents or source destination and transit of an email. Always make sure your emails are generated using encryption for anything that could ever become sensitive (for any reason) using PGP or another secure transport methodology like encrypted containers loaded with password protected stenographic files.
  206.  
  207. Another way to communicate is VOIP and after some obfuscation is done. You are going to seriously consider for what and how you will use this voice communication service. Linphone is among the best opensource VOIP softwares especially to begin and works on mobile as well as computers, but you are going to have to activate SRTP to encrypt audio and video conversations.
  208.  
  209. Public chat-rooms can be convenient to meet large groups of people at once, but they also can break your anonymity to at least whatever logs are being kept. do not think that so called private chats are actually invisible. anything you do can be used to fingerprint the session, or different activities that have traces left behind that a computer might link to you in statistical tracking databases. IRC is considered public and if you want to get started, go ahead and use Hexchat:
  210. https://anonops.com/xchat.html
  211.  
  212. Private chatrooms come in many varieties, but the mostly highly praised for its security is XMPP with OTR enabled; this can be done with the pidgin messenger using an OTR plugin. Selecting the right XMPP is really up to you, but is is always advisable to run the messenger client connections through tor to obscure their origin and destination. many other methods than pidgin with OTR XMPP can be employed, such as bitmessage and Tox. These two services are also route-able through proxy (e.g. TOR socks5) and are quite a bit more secure than pidgin OTR XMPP. Getting on bitmessage and Tox are steps you can take to begin securing your private communications.
  213.  
  214. Sending files is a bit difficult but can be achieved easily enough for anything under 100mb, if you have a larger file to share, onionshare (a tor hidden server software) can be used to start, also sharing files over i2p can be done relatively easily. the packets will be placed under a trace at any point a data transfer begins and by for example using strategic network squeezing attacks, traffic analysis, or being used to profile an individual; the source and destination can be determined depending on the scope and scale of an operation, remember this when sending sensitive files, and try to keep file sizes down in security intense operations. You are definitely going to want to find ways to securely send files through performing research on what methods exist and how to keep your OPSEC strong in one of the more vulnerable pursuits. Any file you create may have unique indicators that can be used to identify you.
  215.  
  216. Social networks are just a really bad idea in general if you are wanting to remain maximally anonymous, but for those 'brave' enough to venture on them, do not break the code of anonymity anywhere on any system. You are in much better hands to find your contacts on them, establish trust, and communicate personal messages in a truly secure channel, and social media just isn't one of them. If you have used social networks before, deleting them now is a good idea. If you have friends who still desire to use social media, look at mentioning the Diaspora or freindica social network to them. Social number has some benefits if you wish to continue to remain anonymous and still use a social network. Your best bet though is to only use decentralized networks if you desire to continue with them, and of course, there are disadvantages to these. Hosting your own social network is risky and not for the fool hardy to embark upon.
  217.  
  218. There are many more methods and facets to cover regarding communication, but for the sakes of this guide, that about wraps up the basics.
  219.  
  220. -
  221. Choosing online services
  222. -
  223.  
  224. The hype of internet services has drawn many users into their centralized and fully logged systems. Many people are unaware or apathetic to big brother peeping on every bit of digital data they can attain, where the logs ammased are kept for 7-10 years or longer to fuel the warrant-less laws of pre-crime society.
  225.  
  226. Lots of people use facebook, gmail, or skype for example, tending to enjoy the popularity of the service as a rendezvous. do not fall under an illusion believing that these services ever have or ever will truly respect any of your privacy. not only do these types of services sell your data directly to advertising companies, they also will surrender any data they contain to big brother on request even if there was no warrant issued. given that these companies are in the business of linking profile activities statistically to their massive databases, if you have ever used their services, your anonymity has already been breached internet-wide, now content seeker-bots will attempt to determine who created any piece of data they might find interesting (for any reason) and attempt to link activities to you or others who exhibit a similar trait in content creation. The manner in which one creates a sentence and other things like pictures of the interior of your house will be used in the tracking database search and linkage index.
  227.  
  228. You should make your first duty while your online identity is still publicly know to go ahead and erase as many traces of your online presence as possible (you cannot erase them all, they are spread to widely), and to never again enter your personal information onto the internet. This may be an inconvenience at first and you may even be asked by people why you are doing this. The answer is simple, your privacy is worth more than the 'convenience'. If there is anybody who you need to stay in contact with, send them an email requesting they write you back and gather their contact details as you prepare to plunge into incognito with them. Begin deleting yourself from the face of the internet.
  229.  
  230. When choosing an online service, your first questions should be about necessity of using the service, the possible connections that could be made to you for using them or employing their capabilities in certain ways, does the service pledge full protection of privacy or will they roll over given the pressure applied in the right places.
  231.  
  232. Alternatives to traditional services such as forums and micro-blogging can be found using secure software such as syndie and twister; you will need to look for these pieces of software and perform due diligence in your choice of alternative platform.
  233.  
  234. If you decide to host your own service, know that there will always be potential vulnerabilities present. You could leak your IP or somebody could infect your system and watch it spew sensitive details though the IP of your server may still be secret. Remember that there are loads of attacks that can be performed and if you are visible on the internet, in any way (even just plain accessing), you can be vulnerable to attacks on your system.
  235.  
  236. Hosting open source alternatives to common centralized systems can be a great joy for anybody that is security minded and technically inclined. The main drawback after general systems security is finding a way to allow you and your users to both remain anonymous. IP and DNS leak as well as unencrypted responses and anti-crypto analysis attacks though ever present, may plauge your server with attacks if anybody but your circle of trust know about it, even if the method is trust-less, a skilled enough adversary with enough resources and knowledge of your system could facilitate an attack on your system. Need I remind you of famous bandwidth and node squeezing attacks that track packet flows through undersea cables and the like to expose the geographic location of the system. Another issue is having your details snooped by a link phishing attempt. If you are thinking about hosting a service of any kind on the web, a good linux distro to choose would be CentOS, based on fedora core linux.
  237.  
  238. -
  239. Encryption
  240. -
  241.  
  242. It is of utmost importance your devices are encrypted in case they ever fall into the hands of another who may attempt to breach your privacy and security with them. Not only does it serve as an added layer of device access authentication, your files inside which if they are wrapped properly in additional layers of encryption, are nearly impossible to gain access, so implementing multiple layers of security is essential.
  243.  
  244. If you are dualbooting, use truecrypt for your windows partitions and LUKS for your linux partitions
  245.  
  246. Truecrypt, EncFS, LUKS, or GnuPG will do, but remember that truecrypt is no longer maintained. You will also need to diligently use encryption, never leaving sensitive data un-encrypted.
  247.  
  248. You may decide to use your encryption program instead of a password safe, which I recommend since worrying about the passwordsafe being breached could be a serious issue, but here is the caveat; All your passwords in an encrypted contained could be swept up through copying your clipboard or in swapfile, even exploiting a vulnerability to traces left in ram. make sure your OPSEC incorporates these vulnerabilities are covered in your contingency plan.
  249.  
  250. -
  251. H@X0R
  252. -
  253.  
  254. Security through education. Learn grey hat hacking and practice with yourself on your own equipment.
  255.  
  256. An essential component of your training will include social engineering.
  257.  
  258. You will probably want to read phrack magazine online and browse blackhat world forums. Cybrary is also a good resource along with deep dot web.
  259.  
  260. A method you may choose to implement could be creating a SSH tunnel on your LAN to an ARM dev-board and running TOR as an entry proxy for the internet with your deviced loaded up on ARCH or some other linux. DD-WRT running custom security services may serve as a valuable asset in your network layering. For beginners, it is never to late to learn some entry level hardware hacking.
  261.  
  262. -
  263. Legal issues
  264. -
  265.  
  266. If in the event you ever run into legal trouble, remember as you know from this guide, that what you do is on you. That being said, you have the right to not self incriminate, and mentioning this guide to officers is definitely a bad idea, though there is no illegal content within it.
  267.  
  268. This section does not constitute binding legal advice, it is simply a description of procedures one should keep in mind in case you end up having trouble with law enforcement. You should contact your lawyer right away if you are expecting legal issues and begin working things out with them. At the very least, you should write down their number on a small card in you wallet and make sure you work on memorizing it; In some cases, police will allow you to access this 'calling card'.
  269.  
  270. Even if you do nothing wrong, most LE wants to screw you. The majority of them are not trying to protect and serve, but are trying to meet some alpha male requirement they subconsciously have. They feel important when they bring you down. Also, people tend to minimize what they do, so you are probably bigger than you would like to admit.
  271.  
  272. Cops do not have to tell you they are cops, neither do feds. Undercovers lie all the time. So do confidential informants. Be careful who you trust, even friends you have known your entire life can turn.
  273.  
  274. Know your rights and exercise them, otherwise they may be violated if you do not stand with them in your defense.
  275.  
  276. Never consent to be searched or have your vehicle or house searched. Make them get a warrant.
  277.  
  278. Always retain your right to remain silent and state that you do not speak to officers of the law without your lawyer present.
  279.  
  280. Keep calm and cool.
  281.  
  282. Get a solicitor so that you have someone know where you are and to show the cops you are not going to be a soft target; they may back off a bit.
  283.  
  284. It is advisable to avoid using the duty solicitor as they are often either crap or hand in glove with the cops. It’s worth finding the number of a good solicitor in your area and memorizing it. The police are wary of decent solicitors. Also, avoid telling your solicitor exactly what happened; this can be sorted out later. For the time being, tell them you are refusing to speak. Your solicitor can come into the police station while the police interview you: you should refuse to be interviewed unless your solicitor is present.
  285.  
  286. Never make a statement. Don't get drawn into conversations with the police.
  287.  
  288. An interview is a no-win situation. You are not obliged to speak. If the police want to interview you, it shows you’re in a good position. The only way to stay in that position is to refuse to be drawn into any conversation and answer “No Comment” to any questions.
  289.  
  290. An interview is the police questioning you about the offenses they want to charge you with. The interview will usually take place in an interview room in the police station. An interview is only of benefit to the police. Remember they want to prosecute you for whatever charges they can stick on you. An interview is a no-win situation. For your benefit, the only thing to be said in an interview is “No Comment”. Remember, they cannot legally force you to speak.
  291.  
  292. If you are roughed up, see a doctor immediately after being released. remember the officer's names and numbers if possible.
  293.  
  294. There are many laws that constitute victimless crimes; Being anonymous is not illegal in the sense that it is a criminal act, instead, the prohibition of anonymity in certain jurisdictions is a type of pre-crime tactic.
  295.  
  296. In the US, you will want to remember the following, as they are rights of yours as a defendant in criminal cases:
  297. a speedy and public trial;
  298. a trial by an impartial jury composed of twelve Citizens;
  299. to be informed of nature and cause of the accusation;
  300. to confront witnesses and to compel witnesses to appear in court;
  301. the assistance of legal counsel free of charge where appropriate;
  302. to be presumed innocent until proven guilty;
  303. not to be compelled to be a witness against himself or herself;
  304. not be deprived of life, liberty, or property, without due process of law.
  305.  
  306. Remember, anything you do or say can and will be used against you in the court of law (for any reason they can conceive).
  307.  
  308. Officers cannot demand key disclosure by law unless they have a warrant. The law is a bit hazy on the subject, but if there is not a warrant issued for you and especially if it does not disclose probable cause to knowledge of the encrypted device in addition to its contents, you do not need to disclose the encryption key. Again, you need to speak with a lawyer to be sure.
  309.  
  310. Be sure to research the laws and regulations in your locality so you know what they are (ignorance is not innocence). Be aware that searching for information specific to your geographic region can be used as an indicator of your presence and activities. Be very careful about what you search for and how you search for it.
  311.  
  312. At the end of all this, to protect yourself, all that is really left to be said in your benefit is don't break the law; Never give them a reason to come for you.
  313.  
  314. https://www.eff.org/issues/know-your-rights
  315.  
  316. -
  317. Privacy
  318. -
  319.  
  320. You will need to make sure privacy starts with you. If you are being anonymous, telling anybody you know about it is just a bad idea. They may even just be confused and believe you commencing in an illegal activity, alerting the authorities and killing your best chances at staying anonymous.
  321.  
  322. Things like screen view protectors are a good idea if you think anybody could walk into a room and see what you are doing or may be reading over your shoulder, such as at home or in a coffee shop.
  323.  
  324. Talking about anything you have done as anonymous can end up having it lead back to you, which may look bad if nothing else. Just as bad as talking or even worse can be bragging/boasting about things. If somebody asks you, just deny them any (additional?) information, affirm plausible deniability if a minimal response is required, and don't react to the things people say believing that your response is actually going make things better.
  325.  
  326. If somebody you know is with you, put away your anonymous mask so that they are not aware of your incognito alter ego. You wouldn't be anonymous if they knew what you were doing. This may be hard to hear, brace yourself, you may have to tell a white lie from time to time if you are anonymous. Be prepared for questions about your day or what are you doing and being ready to pull the plug on your work if somebody surprises you with a visit.
  327.  
  328. Privacy starts at home and with who you invite in to your home. Next, retaining absolute privacy in a house with electronics is nearly impossible, even your offline xbox/psX accounts will show what games were played, applications installed, and usernames on the system; this plus more information may be phoned home if you connect your xbox/psX to the internet. Once you are at work, expect your privacy to be mostly gone; Watch what you do and say everywhere, especially at work. You are given a choice to share what you want, so exercise that freedom.
  329.  
  330. http://www.wired.com/2013/06/why-i-have-nothing-to-hide-is-the-wrong-way-to-think-about-surveillance/
  331.  
  332. "Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say". - E. Sno.
  333.  
  334. https://www.osalt.com/security-and-privacy
  335.  
  336. http://privacy-software-review.toptenreviews.com/
  337.  
  338. -
  339. Safety
  340. -
  341.  
  342. Use your commonsense and avoid mistakes in the first place, because once you make one, its most likely too late. Be per-medtative about your actions, their implications, and consequences; listen to the voice of reason when you hear it.
  343.  
  344. Learn survival skills such as offgrid living, urban disaster mitigation, first aid, and martial arts to help you in case the worst happens and we loose all infrastructure. Use your skills to stay alive and out of harms way. Best luck!
  345.  
  346. -
  347. Security
  348. -
  349.  
  350. If you are using linux, make sure your distribution includes SElinux. Though the code was contributed by the NSA, it has been audited by the community and not believed to contain any backdoors. Using SElinux will definitely ensure that your software permissions do not allow an attacker to over-run
  351.  
  352. You need to read up on security vulnerabilities for whatever system you ultimately decide to use and understand that no system is truly secure. Some people may think that their off-grid powered offline computer is secure, thou has TEMPEST the government; Read up on van eck phreaking if you are not sure what I am talking about.
  353.  
  354. Using a 'burner' laptop is a good idea in that the computer is relatively self contained and should be easy enough to scrub in the event of being attained, since a DBAN erasure disk will easily boot and cleanse it if necessary for OPSEC. You will want to be careful given that all devices are integrated on the board and disassembling is less meaningful in a timely manner when considering laptops over desktops, for any work you do that often connects to the internet, you should probably focus on using a laptop. Indeed, there are even different behaviors one should engage in when using a laptop over a desktop to help lower your profile.
  355.  
  356. -
  357. Countermeasures
  358. -
  359.  
  360. You are going to need to learn H@X0R techniques and then cover security protocol on your own terms (obscurity is not security). If you aren't sure where to start, have a look at intrusion detection, then perhaps code yourself some intrusion diagnostic and alarm system that has contingency in the event of a complete takeover, a panic button to initialize your countermeasures will serve you well in the event you ever need it. Make sure to drill your techniques in the event of a real life scenario.
  361.  
  362. http://www.binary-zone.com/course/BZ-Backtrack.usage.pdf
  363.  
  364. -
  365. Platform specific recommendations
  366. -
  367.  
  368. Windows (xp/7) computer (insecure; 'burner laptop'):
  369. qTox
  370. Tor
  371. WinPassGen (defuse cyber-security's high-security offline password generator)
  372. Bitmessage
  373. truecrypt
  374. bleachbit
  375.  
  376. linux (mint/fedora/debian/suse/arch/kali/tails/qubes-whonix) computer (secure; 'burner laptop')
  377. qTOX
  378. TOR
  379. Defuse PassGen (https://defuse.ca/passgen.htm)
  380. pyBitmessage
  381. Realcrypt
  382. bleachbit
  383.  
  384. For a good list of software to combat big-data and mass-surveillance, go ahead and swing by prism-break.org and check out the information they provide.
  385.  
  386. ~
  387. ~
  388.  
  389. -
  390. Chromebook section
  391. -
  392.  
  393. Using a chromebook with chromeOS is a bad call for attempting to be anonymous. You can search online to implement methods described in this guide but be aware that you will be more or less exposed in the manner that data collection is going on in. At least it is better in so many ways than owning a 'platform locked' windows 10 computer. Many of the procedures covered in the android part of this guide will apply to you securing and anonymizing your chromebook.
  394.  
  395. The NSA loves googles fancy chromebook:
  396. http://arstechnica.com/information-technology/2013/09/why-the-nsa-loves-googles-chromebook/
  397.  
  398. To get the most out of your efforts of anonymity, you need to consider installing linux on your chromebook and understand that there are some limits to this approach that would not affect regular pc users in the same way.
  399.  
  400. -
  401. Android smartphone section
  402. -
  403.  
  404. I advise using android smartphones due to their open source nature and ease of customization, making them potentially a better candidate secure mobile device, but there are some drawbacks to android devices as well as general vulnerabilities of using mobile networks with your PDA.
  405.  
  406. Begin your anonymous mobile streak by researching and ordering the supplies you need to begin your new digital life; this will be your first test in anonymity. using the information in this text will help you with a starting push.
  407.  
  408. Choose a phone (GSM is best...) compatible either between replicant, 'Guardian ROM' (secure android ROM), or CyanogenMod, make sure the phone you are getting will suit your desired needs such as running kali linux through android terminal, choose an unlocked phone through your choice of online ordering service and use bitcoin or anonymous credit card (research these first) to purchase it and have it mailed to a different address, such as a friend's house or P.O. Box that is unrelated to the one where your item will be kept. Once the item arrives, transport it discreetly to its final destination. Avoid abandoned buildings or any place where it would be suspicious to have mail delivered. Do not sign for your package. If you are expecting a package, do not answer the door for the postman, let him leave it there and then transport it as described above. Do not use your real name. This tactic doesn't work in some places because deliveries won't be made to names not registered with the address. If you think this is a problem, send yourself a test letter with the fake name and see if it arrives.
  409.  
  410. Select a pay as you go service that will accept your payment from the anonymous money source you choose. make sure that you do not use your real name or any other information that may be tracked to you. you may need to use a anonymized VOIP service to activate your payment method or phone service; learn how to set up an anonymous VOIP before continuing.
  411.  
  412. Anonymously acquire the guide to root your phone and flash the CWMR Touch recovery to the device, backup your original rom (store in truecrypt or other encrypted container if you want), flash the new "secure" android rom to the device.
  413.  
  414. If you decide to use any google account related service, go ahead and use a fake name generator to create your alternate personality and use the device knowing you are being tracked at least by the relations under this account (never give your real name to the services or companies you use).
  415.  
  416. Use link2sd or similar app managing program and freeze all google services, begin removing any software that may need to, install all android software in list from f-droid or alternative app market (warning, some applications may not work without google services installed and unfrozen!).
  417.  
  418. (Continuously make rom "save states" to revert to in case you make a mistake)
  419.  
  420. Go ahead and install any additional software you need, but keep in mind that every additional piece of software can make your phone more insecure. You can help control these permissions with PDroid.
  421.  
  422. Android software:
  423. (android system encryption), F-Droid, Chatsecure, Wickr, Signal, orbot, orwall, orweb, orfox, Bitmessage, Pixelknot, Obscuracam, SecureWipe, PasswdSafe, APG, CCleaner, GnuPrivacyGuard, I2P, K9 mail, OpenKeychain, Silence, HashPass, OI safe, OI notepad, OI file manager, ring, cryptonite, PDroid, ostel (guardian project).
  424.  
  425. Once you are satisfied with the rom enough to call it good, save the state in an encrypted container and then go ahead and encrypt the entire android device using the inbuilt capabilities (use at least a six character mixed alphanumeric random password).
  426.  
  427. If you are confident about your rom and have scrubbed it to antiseptic purity, ensuring at a minimum it has no personally identifying details within it, you may choose to release it upon a forum. make sure you are wise about this decision, as though it is true you may help others like yourself out, the rom itself can be potentially used to uniquely identify you. if you do release the rom to the public, it would be wise to only state that it is for security minded android beginners and don't make claims to the rom regarding anonymous or H@X0R purposes. You may even just want to leave this to more experienced individuals.
  428.  
  429. Set up VPN, whether it be with a free or paid provider, make sure it is anonymous with no logs (search online for lists of providers)
  430.  
  431. In the settings of the android rom and within the phone application, disable location reporting and GPS tagging of photos. Always strip exif data from any picture that may have been taken with your phone or other device.
  432.  
  433. Remember your phone may be more secure now but there are still ways that your anonymity or security could be compromised; don't use the device for anything your wouldn't be cool with an adversary knowing and using against you later, but feel safe in knowing you are diminishing the powers at be.
  434.  
  435. Spread this paste with your friends using an encrypted OTR self-destructing messaging system and help other learn about becoming anonymous.
  436.  
  437. Perhaps the first order of business now should be learning how your anonymization measures work and their limits, then go ahead and load up on field manuals and survival information in case you ever need them (disasters can happen!) Maybe buy yourself a solar backup battery (5v li-ion charging bank) and a usb solar panel in itself to charge the battery.
  438.  
  439. Learn to reduce the ability of being tacked/profiled and leaving fingerprints on the network.
  440.  
  441. You may want to use an IMEI and MAC generator-spoofer method to further reduce the tracking of your device; sending false GPS coordinates may be helpful as well, you should pick a random location on your planet. Your device may still be tracked and profiled by the cellular towers; It is advisable to spoof your device hardware from the beginning and change the spoofed values at least every 6 months. To prevent being tracked you will have to remove the battery from your device when not in use and only use the device in an area that will not compromise your identity.
  442.  
  443. Recommended phones (most compatible):
  444. Nexus S
  445. Samsung Galaxy S
  446. Samsung Galaxy SII
  447. Galaxy Nexus
  448. Samsung Galaxy Tab 2 (7.0) & (10.1)
  449. Samsung Galaxy SIII
  450. Samsung Galaxy Note 2
  451. Goldelico OpenPhoenux GTA04
  452.  
  453. Services:
  454. sigaint (tor)
  455. mail2tor
  456. protonmail
  457. bitmessage.ch
  458.  
  459. There are other resources available all over the internet, while using tor, that can help you learn. Using startpage/duckduckgo/search.disconnect.me and 'not evil' as well as the hidden wiki are good places to start. Use common sense when accessing anything on the internet. Remember that backdoors could potentially be installed and active in your system, rootkits and trojans are not difficult to implement, and platform attacks can de-anonymize you. If your hardware has been physically compromised then there is little you can do but remove the modifications and hope none of your private information has been keylogged or swept up by a bug.
  460.  
  461. -
  462. iPhone smartphone section
  463. -
  464.  
  465. This section may be filled in some other time
  466.  
  467. -
  468. Source lists
  469. -
  470.  
  471. (CHAT) XHTML:
  472. https://www.chatcrypt.com/
  473. http://www.tohla.com/
  474. http://www.publicchat.org/
  475. https://www.anonboards.com/
  476.  
  477. (CHAT) XMPP:
  478. https://www.calyxinstitute.org/
  479. ijeeynrc6x2uy5ob.onion
  480. https://jabberpl.org/
  481. http://www.swissjabber.ch/
  482. https://www.neko.im/
  483. jabber.tf-network.de
  484. na-di.de
  485. fritz-elfert.de
  486. jabberon.ru
  487.  
  488. (CHAT) IRC:
  489. https://anonops.com/
  490. https://search.mibbit.com/channels/HackThisSite
  491.  
  492. Email services:
  493. https://www.guerrillamail.com
  494. https://www.mailoo.org/
  495. https://posteo.de/en
  496. https://cock.li/
  497. https://www.openmailbox.org/
  498. https://protonmail.com/
  499. https://teknik.io/
  500. https://tutanota.com/
  501. https://www.yandex.com/
  502. http://www.theanonymousemail.com/
  503. http://discard.email/
  504. http://mailnesia.com/
  505. http://www.mytrashmail.com/
  506. https://vfemail.net/
  507. https://www.ghostmail.com/
  508. https://www.autistici.org/services/?_lang=en
  509. https://so36.net/
  510. https://scryptmail.com/
  511. http://notsharingmy.info/
  512. https://bitmessage.ch/
  513. http://mail2tor2zyjdctd.onion/
  514. http://sigaintevyh2rzvw.onion/
  515. https://344c6kbnjnljjzlz.onion/
  516.  
  517. learn H@X0R:
  518. https://www.lynda.com/HTML-training-tutorials/224-0.html
  519. https://www.khanacademy.org/computing/computer-science
  520.  
  521. Onion sites:
  522. http://xmh57jrzrnw6insl.onion/
  523. http://hss3uro2hsxfogfq.onion/
  524. http://zqktlwi4fecvo6ri.onion/wiki/The_Hidden_Wiki
  525. http://allyour4nert7pkh.onion/wiki/index.php?title=Main_Page
  526. http://chatrapi7fkbzczr.onion/
  527. http://7rmath4ro2of2a42.onion/submit.pl
  528.  
  529. Pastebins:
  530. http://loafer.tk/
  531. https://ghostbin.com/
  532. http://uhiwoomhaddtjnse.onion/
  533. http://54ogum7gwxhtgiya.onion/insertor/
  534. http://ypbnurlwfis7xsei.onion/
  535. http://uploadereqo2cmg7.onion/
  536. http://upfileylrcrdnmxc.onion/
  537. https://titanpad.com/
  538. http://padrrxk4lt2x4deo.onion/
  539.  
  540. Private search engines:
  541. https://ixquick.com
  542. https://startpage.com/
  543. https://duckduckgo.com
  544. https://www.searchlock.com
  545. https://searx.laquadrature.net
  546. https://www.qwant.com
  547. https://search.disconnect.me/
  548. https://metager.de/en/
  549. https://www.unbubble.eu/
  550. http://hss3uro2hsxfogfq.onion/
  551. http://3g2upl4pq6kufc4m.onion/
  552. http://5plvrsgydwy2sgce.onion/
  553.  
  554. Security testing webservices:
  555. https://www.whatismyip.com/
  556. http://www.ipaddresslocation.org/
  557. https://www.vpnme.me/checkip.html
  558. http://ip-check.info/?lang=en
  559. https://whoer.net/
  560. https://ipleak.net/
  561. http://dnsleak.com/
  562. https://check.torproject.org/
  563. https://www.browserleaks.com/
  564. https://panopticlick.eff.org/tracker
  565. http://browserspy.dk/
  566. http://noc.to/
  567.  
  568. Webhosting:
  569. https://gofile.io/
  570. https://anonfiles.com/
  571. https://mega.nz/
  572. https://neocities.org/
  573.  
  574. -
  575. final words
  576. -
  577.  
  578. I know this brief guide is nowhere near close to covering everything, and though I have attempted to enlighten beginner users for taking their first steps, there is little I can do to assure them that they have done all that is necessary. Even advanced anons wonder at times if they have taken all known precautions.
  579.  
  580. Thank you for taking the time to look over and read this guide. If you found this information useful, spread the good word of anonymity, in your circle and abroad, as you see fit.
  581.  
  582. There is a lot more information than available in this guide available for download. It is mostly a collection of webpages and PDFs that were generated to help people become more enlightened on the topic. Ultimately it is up to you if you want to be a cyber security expert, and though I advocate for people learning how to use computers with maximum exercise of knowledge, most end users who will read and even implement measure defined in this brief guide will not study adequately and could potentially see their anonymity slipping up. The links to this guide are at the top and the additional compilation of resources is below. If you are paranoid, scan for exploits and strip the data provided per your needs.
  583.  
  584. A brief guide for computers has been zipped, uploaded, and the link for it included, make sure to open these files in TOR browser by dragging them in individually or disconnect from the internet to prevent site scripts from leaking your ip and browser activity and PDFs from loading components that may de-anonymize you online. alternatively you can use them as a list of topics to research:
  585.  
  586. https://1fichier.com/?mxljxg5mv9
  587. https://mega.nz/#!Y092BbgY
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement