Ad Code

Responsive Advertisement

Ticker

6/recent/ticker-posts

How to protect your privacy online



The following guide will be related to keeping your anonymity and private data about your real life out of your identity online, some stuff will be very "invasive" to your comfort-zone about browsing the web, but if you really care about your privacy these tools will help you a lot, and also no, this won't probably talk a lot how to be "undoxable" or how to clear your traces, we're talking about preventing, not being sorry as "better safe than sorry" says.


1. Encrypting your data 

VeraCrypt adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks.
VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. The following post describes some of the enhancements and corrections done.
As an example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations whereas in VeraCrypt we use 327661. And for standard containers and other partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses 655331 for RIPEMD160 and 500000 iterations for SHA-2 and Whirlpool.
This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data.

Key disclosure laws also known as mandatory key disclosure, is legislation that requires individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and use it either as evidence in a court of law or to enforce national security interests. Similarly, mandatory decryption laws force owners of encrypted data to supply decrypted data to law enforcement.
Nations vary widely in the specifics of how they implement key disclosure laws. Some, such as Australia, give law enforcement wide-ranging power to compel assistance in decrypting data from any party. Some, such as Belgium, concerned with self-incrimination, only allow law enforcement to compel assistance from non-suspects. Some require only specific third parties such as telecommunications carriers, certification providers, or maintainers of encryption services to provide assistance with decryption. In all cases, a warrant is generally required.
Basically if you're getting hunted by the authorities VeraCrypt won't totally save you.


2. Virtual Private Networks or VPN

Using a VPN for normal things such as browsing is good for your privacy, please don't use free VPNs like CyberGhost since they 99% keep logs, that defeates the concept of using a VPN for anonymity, so yeah i'd say to spend these 9 bucks that you can make lawning your neighbor's grass in a decent VPN with a no-logs policy.
I'd recommend you to use RAW4VPN as they look the most legit no-logs VPN and it's very cheap, it uses OpenVPN and has mobile app in active developement, either way you can host your own VPN on a bulletproof / offshore server.


3. Browsers and Security 

Firefox, unlike other browsers, is fast and respects your privacy and it's even supported by Tor Browser.
Tor Browser Is your to-go choice if you demand extreme layers of privacy and anonymity, It's a modified version of Firefox, it comes with privacy add-ons, encryption and advanced proxy settings.

Browser Fingerprint - Is your browser configuration unique?

When you visit a website, your browser sends information about it's configuration such as font library, browser type and extensions, if these informations are unique from the other users' configurations, it can be possible that you can get tracked thanks to a browser without using things like cookies.


4. WebRTC IP Leak Test

Is your IP address leaking?

WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN. While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.
For Google Chrome users: There is no known working solution, only a plugin that is easily circumvented. Please use Firefox instead.

How to disable these naughty IP leaks in Firefox :
Code:
In short: Set "media.peerconnection.enabled" to "false" in "about:config".

Explained:

    Enter "about:config" in the firefox address bar and press enter.
    Press the button "I'll be careful, I promise!"
    Search for "media.peerconnection.enabled"
    Double click the entry, the column "Value" should now be "false"
    Done. Do the WebRTC leak test again.

If you want to make sure every single WebRTC related setting is really disabled change these settings:

    media.peerconnection.turn.disable = true
    media.peerconnection.use_document_iceservers = false
    media.peerconnection.video.enabled = false
    media.peerconnection.identity.timeout = 1

Now you can be 100% sure WebRTC is disabled.

Post a Comment

0 Comments

Ad Code

Responsive Advertisement