Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 530 Vote(s) - 3.62 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Australia's New MASS Surveillance Mandate

#11
Quote:(09-21-2021, 03:52 AM)mothered Wrote:

[To see links please register here]

Quote: (09-20-2021, 09:20 PM)Chai Wrote:

[To see links please register here]

I believe there is good and bad that will come of this
In my view, predominantly bad.

As It stands, I cannot see an upside.

You don't see the potential for an increased sense of urgency for developing more things such as Tor and privacy focused lifestyle changes etc?

Maybe not for the general public, but for the ones who care.
Reply

#12
Quote:(09-21-2021, 04:25 AM)Chai Wrote:

[To see links please register here]

You don't see the potential for an increased sense of urgency for developing more things such as Tor and privacy focused lifestyle changes etc?
Evidently I do. My post Is referring to the Australian government.

My entire privacy and anonymity Is well configured, with a few Implementations as per below. There's more, but I do not wish to disclose any details.
Quote:* DNS servers encrypted.
* Running both Tor over VPN (triple-layer encryption) & VPN over Tor.
* 14 eyes countries restricted from the exit node.
* WebGL, WebRTC, Canvas and Font fingerprinting disabled.
* Tor Itself running In a controlled/sandbox environment.
* Bridges applied to the entry/guard node (changing every day or so).
* Tor entry and exit nodes heavily configured.
* Overall uniqueness operating on a 1:20 ratio.
* AES-Twofish-Serpent encryption on all drives.
* Full disc encryption x 2, encrypted volumes x2, stored data x1 layer.
* Anti-keylogging software.
* Internal wireless network monitoring- auto scan at 2 minute Intervals.
* Local/Internal/non-routable IP address & device MAC address scanning.
* IDS/IPS active monitoring.
* Executing only performed via VMs (NAT connection to Host) Live CD.
* ISP Transparent DNS Proxy Interception bypassed.
Reply

#13
Quote:(09-21-2021, 05:31 AM)mothered Wrote:

[To see links please register here]

Quote: (09-21-2021, 04:25 AM)Chai Wrote:

[To see links please register here]

You don't see the potential for an increased sense of urgency for developing more things such as Tor and privacy focused lifestyle changes etc?
Evidently I do. My post Is referring to the Australian government.

My entire privacy and anonymity Is well configured, with a few Implementations as per below. There's more, but I do not wish to disclose any details.
Quote:* DNS servers encrypted.
* Running both Tor over VPN (triple-layer encryption) & VPN over Tor.
* 14 eyes countries restricted from the exit node.
* WebGL, WebRTC, Canvas and Font fingerprinting disabled.
* Tor Itself running In a controlled/sandbox environment.
* Bridges applied to the entry/guard node (changing every day or so).
* Tor entry and exit nodes heavily configured.
* Overall uniqueness operating on a 1:20 ratio.
* AES-Twofish-Serpent encryption on all drives.
* Full disc encryption x 2, encrypted volumes x2, stored data x1 layer.
* Anti-keylogging software.
* Internal wireless network monitoring- auto scan at 2 minute Intervals.
* Local/Internal/non-routable IP address & device MAC address scanning.
* IDS/IPS active monitoring.
* Executing only performed via VMs (NAT connection to Host) Live CD.
* ISP Transparent DNS Proxy Interception bypassed.

Please advise, I need to start learning more about privacy, I honestly have no idea where to start.
I would assume an understanding of Networking, however at the moment I dedicate my time entirely to C programming, I am a beginner in the language.

Basically I need to learn:

1. C programming
2. Fluency with Linux
3. Networking

I just need to get over the learning curve, until my skill is at a level where I can develop and experiment which then repeats itself, speeding up the process.

Any recommendations on what I should do regarding protecting myself, I currently have a few addons on my browser.
That is literally as far as I go, but I have a deep interest in becoming 'invisible' or as they say, "a ghost in the wires".
Reply

#14
Quote:(09-21-2021, 11:36 AM)Chai Wrote:

[To see links please register here]

Please advise, I need to start learning more about privacy, I honestly have no idea where to start.
Do note that privacy and anonymity are both different.

* Anonymity - Not being able to Identify you.
* Privacy - Not being able to see what you're doing.

Quote:(09-21-2021, 11:36 AM)Chai Wrote:

[To see links please register here]

I currently have a few addons on my browser.
That barely scratches the surface.

At the absolute minimum, you should have a VPN and Tor Installed, use a private search engine as well as a private browser, and also protect your data with encryption. Although your MAC address doesn't leave your local/Internal network, It's still good practice to spoof It.

Operating In a controlled environment, especially with applications downloaded and executed, Is also a must - a VM or Sandboxie will suffice. For added protection, you can run Sandboxie Inside the VM and launch everything within Sandboxie Itself. Making yourself less unique through browser fingerprinting Is paramount, but It's way beyond the scope of this post to cater for every detail Involved.
Reply

#15
Quote:(09-21-2021, 12:09 PM)mothered Wrote:

[To see links please register here]

Quote: (09-21-2021, 11:36 AM)Chai Wrote:

[To see links please register here]

Please advise, I need to start learning more about privacy, I honestly have no idea where to start.
Do note that privacy and anonymity are both different.

* Anonymity - Not being able to Identify you.
* Privacy - Not being able to see what you're doing.

Quote:(09-21-2021, 11:36 AM)Chai Wrote:

[To see links please register here]

I currently have a few addons on my browser.
That barely scratches the surface.

At the absolute minimum, you should have a VPN and Tor Installed, use a private search engine as well as a private browser, and also protect your data with encryption. Although your MAC address doesn't leave your local/Internal network, It's still good practice to spoof It.

Operating In a controlled environment, especially with applications downloaded and executed, Is also a must - a VM or Sandboxie will suffice. For added protection, you can run Sandboxie Inside the VM and launch everything within Sandboxie Itself. Making yourself less unique through browser fingerprinting Is paramount, but It's way beyond the scope of this post to cater for every detail Involved.

I understand that the best time to start is always 'now'. However in terms of OPSEC, I feel like I have totally compromised myself, I feel like I would need to do the following:

1. Format my drive
2. Run OS such as Qubes
3. Change location and networks
4. Everything you listed plus more


What would be your first steps if you were to start from scratch?
Reply

#16
Quote:(09-21-2021, 12:15 PM)Chai Wrote:

[To see links please register here]

What would be your first steps if you were to start from scratch?
Precisely what I've mentioned above.
Reply

#17
Australian police use facial recognition to make sure you're home during COVID quarantine

Quote:

[To see links please register here]

Reply

#18
Quote:(09-21-2021, 01:01 PM)mothered Wrote:

[To see links please register here]

Precisely what I've mentioned above.

Okay I will have to learn how to do it, seems extremely involved.
What do you do if you visit someone and they have WiFi

Quote:(09-21-2021, 05:26 PM)ghostboy Wrote:

[To see links please register here]

Australian police use facial recognition to make sure you're home during COVID quarantine
How can anybody in Australia say they have rights anymore...
Reply

#19
Quote:(09-21-2021, 08:58 PM)mothered Wrote:

[To see links please register here]

Quote: (09-21-2021, 08:54 PM)Chai Wrote:

[To see links please register here]

What do you do if you visit someone and they have WiFi
How do you mean?

Say for example you visit my house and yet there is no mobile reception but I have WiFi.
Do you connect to it and use Tor etc? If so, what do you use in order to stay anonymous and have privacy when the network is not configured to your liking?

Also do you know of any resources where I can get started with OPSEC? My scope of what I would like OPSEC to help with is to be as close to complete anonymity as possible.
Also would you say I have already compromised myself by using this forum without proper steps taken from the beginning?
Reply

#20
Quote:(09-21-2021, 08:54 PM)Chai Wrote:

[To see links please register here]

What do you do if you visit someone and they have WiFi
How do you mean?
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through