CHATPRIVACYDONATELOGINREGISTER
DMT-Nexus
FAQWIKIHEALTH & SAFETYARTATTITUDEACTIVE TOPICS
PREV123NEXT
How to secure your entire computer and surf completely anonymous Options
 
MelCat
#21 Posted : 1/21/2012 10:59:36 AM

DMT-Nexus member


Posts: 1925
Joined: 28-Apr-2010
Last visit: 27-Apr-2024
RebornInSmoke wrote:
i totally read all of that.

Cool



Awesome. I'm finishing up the process of getting my quasi sensitive files together for the first true crypt steps. Once I finish those I'm going to wipe this system completely and start fresh using this guide.

Instead of using Ubuntu I'm going to use Linux Mint 12 (Lisa) for the main OS.

I'm pretty stoked about this project.
Convert a melodic element into a rhythmic element...
 

Good quality Syrian rue (Peganum harmala) for an incredible price!
 
RebornInSmoke
#22 Posted : 1/21/2012 11:31:39 AM

Lysergic Feline


Posts: 303
Joined: 04-Dec-2011
Last visit: 10-Apr-2014
Location: deep within a black hole
it would seem somebody is a little unfamiliar with sarcasm.

this is a HUGE post and a lot of stuff to read.
thanks for contributing this, it IS very useful information to have in these uncertain times, and for some people here on the nexus.

i however just run chrome and have adblock. i have ccleaner and i dont support - i repeat I DO NOT SUPPORT - international terrorist organisations.
i think im good.
i dont really fancy having to go through all of that hassle just to watch videos on youtube, shop online,etc. its a bit excessive for some.
i installed tor last year. used it once. cbf with it.

however, as an internet user, and as a geek, thanks for sharing this Smile
its appreciated. but yeah i so totally saw all that and was waiting for the tl;dr Smile
Gun it to 88...
..::those who speak do not know, those who know do not speak::..
<3
 
MelCat
#23 Posted : 1/21/2012 11:59:52 AM

DMT-Nexus member


Posts: 1925
Joined: 28-Apr-2010
Last visit: 27-Apr-2024
RebornInSmoke wrote:
it would seem somebody is a little unfamiliar with sarcasm.

this is a HUGE post and a lot of stuff to read.
thanks for contributing this, it IS very useful information to have in these uncertain times, and for some people here on the nexus.

i however just run chrome and have adblock. i have ccleaner and i dont support - i repeat I DO NOT SUPPORT - international terrorist organisations.
i think im good.
i dont really fancy having to go through all of that hassle just to watch videos on youtube, shop online,etc. its a bit excessive for some.
i installed tor last year. used it once. cbf with it.

however, as an internet user, and as a geek, thanks for sharing this Smile
its appreciated. but yeah i so totally saw all that and was waiting for the tl;dr Smile


Yeah, I suck at sarcasm and tend to take most things too literally.

This is absolutely overkill for the average user but could quite literally save someone's life in an extreme scenario. I just hope it helps someone gain a little piece of mind.

I was gonna edit out the tl;dr but now that you say that, I'll leave it in there. Thanks for comments. Smile
Convert a melodic element into a rhythmic element...
 
a1pha
#24 Posted : 1/21/2012 12:51:43 PM


Moderator | Skills: Master hacker!

Posts: 3830
Joined: 12-Feb-2009
Last visit: 08-Feb-2024
I haven't read all the posts here but a couple tools I find invaluable:

Privoxy
Quote:
Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks.


I2P
Quote:
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.


JAP/JonDo
Quote:
JonDo, formerly JAP, is the ip changer proxy tool you have to install on your computer. It acts as a proxy and will forward the traffic of your internet applications multible encrypted to the mix cascades and so it will hide your ip address. It is a Java application, open source and you can download it for free. You may use JonDonym for free, but free mix cascades are restricted in some cases. Full speed and anonymisation features you will get only with a premium account.
"Facts do not cease to exist because they are ignored." -A.Huxley
 
tony
#25 Posted : 1/21/2012 12:53:36 PM

DMT-Nexus member


Posts: 486
Joined: 01-Nov-2011
Last visit: 07-Aug-2012
Location: 127.0.0.1
Very few people need to go to these lengths. For most people (who need it at all) it is enough just to have a dual boot system with one system being linux (assuming they still want to use windows for most things), use windows for the vast majority of things and use linux and tor for sensitive things (certain hidden market places spring to mind). Have an encrypted pen drive and save anything sensitive (bitcoin wallet etc) onto that using truecrypt.

Ive not really heard of a legitimate, non sinister reason for people to go to those lengths unless they are involved in leaking government info or something, or live in china.

Tor is horribly slow just now but I think that as internet freedom erodes, things like tor and VPN's will become much faster and more reliable. It will probably end up with full system encryption being the norm for anyone who wants to download movies or visit sites without pesky government firewalls stopping them, especially if SOPA and PIPA go through in the states.
-Я Ξ √ Ω L U T ↑ Ø N-
 
John Smith
#26 Posted : 8/29/2012 6:03:04 AM

DMT-Nexus member


Posts: 225
Joined: 08-Apr-2011
Last visit: 20-Jul-2021
Very useful thread, thanks for compiling. I've been running ubuntu from a virtual machine environment for virus-free browsing for a while. Planning a full reformat soon, might as well go all way on a clean install.
INFORMATION
No input signal

 
Infinite I
#27 Posted : 8/29/2012 9:34:27 AM

JC


Posts: 1183
Joined: 18-Jan-2008
Last visit: 12-May-2024
Location: Scotland
Sure you need to get something called meta data remover, google it, which gets rid of information on a photo. If you use an iphone or any smartphone then yes there will be data that will tie the photo to you.
 
universecannon
#28 Posted : 8/29/2012 2:15:42 PM



Moderator | Skills: harmalas, melatonin, trip advice, lucid dreaming

Posts: 5257
Joined: 29-Jul-2009
Last visit: 13-May-2024
Location: 🌊
Infinite I wrote:
Sure you need to get something called meta data remover, google it, which gets rid of information on a photo. If you use an iphone or any smartphone then yes there will be data that will tie the photo to you.


AFAIK trav has it set up so the nexus does this automatically Smile



<Ringworm>hehehe, it's all fun and games till someone loses an "I"
 
SnozzleBerry
#29 Posted : 8/29/2012 2:40:25 PM

omnia sunt communia!

Moderator | Skills: Growing (plants/mushrooms), Research, Extraction troubleshooting, Harmalas, Revolution (theory/practice)

Posts: 6024
Joined: 29-Jul-2009
Last visit: 29-Oct-2021
universecannon wrote:
Infinite I wrote:
Sure you need to get something called meta data remover, google it, which gets rid of information on a photo. If you use an iphone or any smartphone then yes there will be data that will tie the photo to you.


AFAIK trav has it set up so the nexus does this automatically Smile

Yup...any attached pictures or images uploaded to the Nexus are scrubbed of their meta data.
WikiAttitudeFAQ
The NexianNexus ResearchThe OHT
In New York, we wrote the legal number on our arms in marker...To call a lawyer if we were arrested.
In Istanbul, People wrote their blood types on their arms. I hear in Egypt, They just write Their names.
גם זה יעבור
 
1tokeovertheline
#30 Posted : 8/29/2012 10:27:48 PM
DMT-Nexus member


Posts: 14
Joined: 10-Aug-2012
Last visit: 09-Nov-2012
Location: Somewhere over the rainbow
Excellent freakin post MelCat!! Thumbs up Thumbs up Thumbs up

I know how much time that took to go through, documenting and then writing it up. You've crossed all your T's and dotted your i's for certain. I know what I'll be doing for the next month, Lol! No sarcasm whatsoever intendedBig grin I'm impressed.
 
oden
#31 Posted : 11/2/2012 12:33:13 PM

odin the one


Posts: 360
Joined: 23-Oct-2011
Last visit: 12-Nov-2012
Location: In The Clouds
Melcat<3
What an amazing effort and share,
Way to watch out for the nexen's got alot of info from it that i did not know..Surprised
Big hug to ya!Thumbs up
 
MelCat
#32 Posted : 11/2/2012 3:51:10 PM

DMT-Nexus member


Posts: 1925
Joined: 28-Apr-2010
Last visit: 27-Apr-2024
My pleasure guys and gals, glad you are finding it useful. Smile

Just to reiterate, I didn't write this post, I'm just passing it along because I think it's important information for people to have in this turbulent political climate we're finding ourselves in these days.
Convert a melodic element into a rhythmic element...
 
Ancotar
#33 Posted : 11/2/2012 3:54:29 PM

DMT-Nexus member


Posts: 156
Joined: 25-Jul-2012
Last visit: 10-Oct-2023
This sharing of knowledge is exactly what I have come here for.

Thank you, MelCat.

While this may be "overkill" as some users state for the average internet surfer, this is still invaluable info to have regardless!

Well done! Smile
"We speak of Time and Mind, which do not easily yield to catagories. We separate past and future and find that Time is an amalgam of both. We separate good and evil and find that Mind is an amalgam of both. To understand, we must grasp the whole." -Isaac Asimov

"You will not be punished for your anger, you will be punished by your anger." -Buddha

"I must not fear. Fear is the mind killer. Fear is the little death that brings total obliteration. I will face my fear. I will permit it to pass over me and through me. And when my fear is gone I will turn and face fear's path, and only I will remain." -Paul Atreides, while being tested with the Gom Jabbar by the Reverend Mother Gaius Helen Mohiam
 
The Day Tripper
#34 Posted : 11/3/2012 12:34:18 AM

Rennasauce Man


Posts: 853
Joined: 27-May-2011
Last visit: 25-Feb-2019
Location: A Pale Blue Dot orbiting a GV2 Yellow Dwarf fusion powered Luminous Ball of Plasma at 30km/s
Great contribution melcat!

Personally, i think its alot easier to get a decently fast flash drive, or build a compact flash/sd card usb ssd if you want speed, and install a live ubuntu disto on it. Make a persistent partition, truecrypt it just for good measure, and do any kind of sensitive browsing/computer use with this. Possibly even truecrypt the whole drive and use the truecrypt bootloader before grub loads ubuntu, that would be the most secure option, i haven't tried it yet. Use public wifi AP's, spoof your mac address, use tor, and remember anything transmitted over the net is never fully secure.

I want to to try and do it with a 16GB flash drive i'm setting up for anonymous browsing though. Ideally, if you can TC the whole drive, use the TC bootloader pre grub, then boot to a persistent ubuntu(or other linux distro), thats pretty much foolproof. Easy to destroy quickly if need be, or store in a secret location not on your property/in your posession.

Having encrypted partitions, or encrypted data seized, arouses suspicion as to whats on that device. You can even get charged with contemt of court, tampering with evidence, or some other BS iirc for not turning over passwords for those encrypted partitions if subpeonead/a warrant is obtained. Might be wrong there as you could argue thats self incrimination

Making it easy to destroy quickly using a flash drive, or just storing the drive not on your property in a waterproof storage box solves that issue. Its not about encrypting your sensitive data, its about making it impossible to determine you even have encrypted data to hide at all.

Its like that don't get busted dvd, where the ex-narcotics officer tells you to consent to a search if you have hidden your stuff properly. Refusing, or having partitions/files/drives that aren't just random 0's, they can tell something is hidden there. Forensic data analysis is no joke, and theres always a bootloader, or something to give it away that its not just a unformatted drive with no data on it.

Having stuff life that seized puts up a big red flag, this guy/gal has something to hide. Play dumb, and they will afford you the same level of skill when looking into someone who doesn't stand out as trying to hide something. If you bend over and take the abuse, chances are you will end up on top. They look for signs that people are hiding something above all else. Because very few people use these tactics to protect their sensitive non-incriminating data.

Thats why i won't try and hide/encrypt data on internal hard drives, or any OS i use on a daily basis. Keep it sterile by keeping what you need to keep private, seperate from what would not incriminate you if seized, and theres no appearance that your trying to hide something.

Its just a pita to boot up that flash drive every time you need to use it, but worth it for stuff thats especially incriminating.

And above all else, don't EVER cross borders with encrypted sensitive/incriminating data. You will get harassed, you will get profiled, they will consider that you may be affiliated with terrorist/criminal organizations, and strip you of your constitutinal PRIVLIDGES, as shown time and time again.

"let those who have talked to the elves, find each other and band together" -TMK

In a society in which nearly everybody is dominated by somebody else's mind or by a disembodied mind, it becomes increasingly difficult to learn the truth about the activities of governments and corporations, about the quality or value of products, or about the health of one's own place and economy.
In such a society, also, our private economies will depend less upon the private ownership of real, usable property, and more upon property that is institutional and abstract, beyond individual control, such as money, insurance policies, certificates of deposit, stocks, etc. And as our private economies become more abstract, the mutual, free helps and pleasures of family and community life will be supplanted by a kind of displaced citizenship and by commerce with impersonal and self-interested suppliers...
The great enemy of freedom is the alignment of political power with wealth. This alignment destroys the commonwealth - that is, the natural wealth of localities and the local economies of household, neighborhood, and community - and so destroys democracy, of which the commonwealth is the foundation and practical means.” - Wendell Berry
 
MelCat
#35 Posted : 11/3/2012 4:45:32 PM

DMT-Nexus member


Posts: 1925
Joined: 28-Apr-2010
Last visit: 27-Apr-2024
Ash - The site I got the guide from has been taken down but all the directions are in the first 20 posts of this thread...
Convert a melodic element into a rhythmic element...
 
some one
#36 Posted : 12/10/2012 12:47:14 PM

DMT-Nexus member


Posts: 524
Joined: 02-Dec-2012
Last visit: 22-Feb-2023
The fastest, easiest and simplest way to surf anonymous is the following:

(1) Download the Tails Linux distro from https://tails.boum.org

(2) Download and run Unetbootin from: http://unetbootin.sourceforge.net/

(3) use Unetbootin to create a bootable Tails USB stick from the Tails ISO

(4) Boot from the USB stick and choose "Live" from the Tails menu

(5) Leave the password blanc

(6) Enjoy

- All internet is channeled through a torr network
- There is no access to your HDD



The Amnesic Incognito Live System (Tails) is a Debian-based live CD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with all traffic anonymised. To achieve this, Incognito uses the Tor network to make Internet traffic very hard to trace.

- use the Internet anonymously almost anywhere you go and on any computer:
- all connections to the Internet are forced to go through the Tor network;
- leave no trace on the computer you're using unless you ask it explicitly;
- use state-of-the-art cryptographic tools to encrypt your files, email and instant messaging.


Note:

It is possible to burn the ISO to a CDROM. When you boot into Tails from the CDROM you can create a bootable persistent USB from there. However this method does not work with all motherboards it seems. It didn't with mine. You could also use "Universal USB Installer" instead of Unetbootin. However it doesn't contain the latest Tails version yet (0.15). You will have to wait for it. Unetbootin works fine, but you won't have a persistant system.

What you can do is create 2 partitions on the USB. One FAT partition big enough for the ISO. Install the ISO here using the bootable USB software. Boot Tails from the USB, insert an admin password, and create an additional password protected encrypted ext3 partition on your USB device. Here you can store all your files. Again, the operating system itself will not be persistant. Personally I prefer it not to be. Safety comes at the cost of comfortability.

When you boot Tails it asks you to insert an admin password. If you don't, a limited user account will be created without access to the internal HDD and other resources. This is safer than inserting a password, so don't. Unless you need access to your HDD or format your USB etc. When doing so, don't connect to the internet and reboot before you do.

As an additional safety precausion, password protect you HDD in BIOS. When you boot, boot straight from the USB without inserting the HDD password. This creates a physical barier to your HDD. If your computer doesn't have the option to password protect you HDD, you can encrypt it for the same effect. Truecrypt offers the option to encrypt and password protect the entire HDD. Truecrypt might be NSA, but on the level of this forum (discussing banned plants) I wouldn't worry.

Even if someone somehow hacks your Tails OS and is able to gain sudo power, which is probably not possible if you leave the password blanc, he will not be able to access the HDD to identify you. In theory, this should be just as safe as a virtual machine. In my opion, even safer as running a virtual machine your main OS. If your main OS gets hacked, keylogs can show your virtual machine login and encryption passwords and eveything you do in you vitual machine might be exposed. Governments are known to infiltrate citizens computers (Google: R2D2 Trojan).

My two cents.
some = one | here = some | there = one
 
MelCat
#37 Posted : 12/10/2012 1:20:38 PM

DMT-Nexus member


Posts: 1925
Joined: 28-Apr-2010
Last visit: 27-Apr-2024
Thank you for the contribution some one, lots of valuable information that ties right in with what The Day Tripper was saying. I'll give it a shot here soon and report back.
Convert a melodic element into a rhythmic element...
 
cyb
#38 Posted : 12/10/2012 1:26:32 PM

DMT-Nexus member

Moderator | Skills: Digi-Art, DTP, Optical tester, Mechanic, CarpenterSenior Member | Skills: Digi-Art, DTP, Optical tester, Mechanic, Carpenter

Posts: 3574
Joined: 18-Apr-2012
Last visit: 05-Feb-2024
Nice, some one...dloading now for a trial...
Can you say whether this method is as sloooow as Tor seems to be?
Please do not PM tek related questions
Reserve the right to change your mind at any given moment.
 
some one
#39 Posted : 12/10/2012 2:17:14 PM

DMT-Nexus member


Posts: 524
Joined: 02-Dec-2012
Last visit: 22-Feb-2023
Yes Tails linux always uses the tor network so internet is slow.. I only use it for very specific purposes. Like posting on forums without needing to use the SWIM word and such Pleased When I'm done I return to my daily OS. I recommend it to be used as such.

For more comfort and the ability to switch tor internet on/off, i would install an encrypted linux distro next to an encrypted OS for daily use like others have mentioned. The encyrption will act as a barrier between both operating systems. Keep your identity out of the linux OS (don't use google or social media services with your real name, etc) and password protect the partition. That should be sufficient protection.

I doubt they'd go this deep for users posting on forums, so i'm not worrying. But who knows maybe it might be possible to ID a computer user by hacking his system and checking its hardware (service tag, etc). Or by obtaining the IP after taking over the system. If you are worried, you could setup a linux virtual machine in your linux encrypted OS like the topic starter explains. You could even setup Tails as the virtual OS.

Remember to take care of your identity. If you use google while logged in, google stores all you data. Same for yahoo etc. Even if you're not logged in, your data is connected to your IP. Two things can happen. One is that the government demands that the internet company gives your personal data (search history etc). Second is that the internet company gets hacked and all your search data is out in the open. Eg. "How to administer DMT anally" next to you name, etc. How will that look to your next employer googling your name? So, try to keep your identity safe. Example by using alternative search engines:

https://www.duckduckgo.com
https://startpage.com
some = one | here = some | there = one
 
gammagore
#40 Posted : 3/27/2013 1:58:03 PM

DMT-Nexus member

Moderator

Posts: 2807
Joined: 19-May-2009
Last visit: 16-Mar-2024
Anyone familiar with this guide/process please help out this member, his thread is here https://www.dmt-nexus.me...aspx?g=posts&t=42178


blessedsensi wrote:
Hello everyone! this is my first post but i have been lurking around nexus for some time, i have read this guide(https://www.dmt-nexus.me/forum/default.aspx?g=posts&m=313264#post313264) a long time ago and now that i am on vacation i have decided to give a shot!
I am now on the section 16. of that tutorial and i have encountered an error regarding the connectivity to the internet.
So at step 30. when i need to go to ( http://check.torproject.org ) it gives an error saying " The proxy server is refusing connections ".... i don't know what i did wrong it might be the firewall machine miss configured or the fact that when in Primary machine i wrote the code " ssh -N -L 9050:10.0.2.2:9050 root@10.0.3.1 " it said "ssh: connect to host 10.0.3.1 port 22:No route to host", but i don't seem to know what that is telling me or if it is normal...

I am posting in here because I'm still a new member and i don't have permissions to post on the threat of the guide neither send a pm to MelCat, so if anyone is familiar with the guide or with this type of problem it would be awesome!
 
PREV123NEXT
 
Users browsing this forum
Guest

DMT-Nexus theme created by The Traveler
This page was generated in 0.083 seconds.