Tools which protect our privacy. Post your tools / ways you are using and opinions.

Discussion in 'Serious Discussion' started by Yen, Jul 23, 2013.

  1. timesurfer

    timesurfer MDL Developer

    Nov 22, 2009
    8,527
    4,112
    270
    #41 timesurfer, Sep 17, 2013
    Last edited: Sep 17, 2013
    Great response to the STASI mind ;)...lol

    However the STASI mind will never hear you with it's heart closed!

    And indeed you are correct! To some being free or being in the present is control to them

    They want the future (An idea) and to control it and from a STASI controlled "past" they will create an STASI controlled future and true freedom from oppression and tyranny will be hidden behind justification that bypassing human rights including rights to privacy is necessary to preserve there privileged based partial freedom they sell the masses

    Freedom is never something that another can give another. It's self-existing, autonomous and sovereign unto itself

    It cannot be sold or traded for anything or given away

    It's innate

    And ultimately freedom is a spiritual thing not an physical thing

    I know very well that the govt and world powers in general is not any one's friend but rather just people in power doing whatever they please being slave masters in all walks of life including the internet

    Tor is working great for me, thanks Yen :D

    I was just nervous about it's being funded by the Fed's

    But still not sure why my streaming link I posted in earlier posts won't work :(

    :shisha:
     
  2. R29k

    R29k MDL GLaDOS

    Feb 13, 2011
    5,171
    4,811
    180
    Err been gone a bit, anyway just wanted to say that to me Tor and some of these vpns are all honeypots in a sense. They are a damn good way of harvesting ips without much effort.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  3. tinux

    tinux MDL Junior Member

    Feb 26, 2012
    84
    14
    0
    #43 tinux, Sep 18, 2013
    Last edited: Sep 18, 2013
    Just came accross this thread by accident
    Good one indeed.
    I have a question which everyone should answer

    Would you leave your front door open?
    if yes good luck
    if no then close it and how????? use any lock and improve it bit by bit

    I do not use Google or yahoo or bing .. i use Xstart or duckNduck search engine
    why? because they spy on us and sell our info.
    I do not enter free surveys..... and when using social media i use fake info.
    I use Tor when i need extra privacy
    and i always use VPN for all traffic except what is not important
    i use true crypt to hid my private info in a drive with all files encrypted for max security
    i use cloud storage but all files are encrypted
    and by the way i do not have porn or pics or anything illegal of anyone on my PC but occasionally do a whole erase on a weekly basis why?
    Because i suffered from ID thief and it messed up my life for more than 18 months.
    I could not prove who I was on the phone and even when using my passport as Id there was doubt about me because of what happen so play safe and don't let idiots rule your life. take control.
     
  4. Yen

    Yen Admin
    Staff Member

    May 6, 2007
    13,081
    13,980
    340
    Ermm. I have allowed myself to clean my thread from OT posts. Hope it is OK and not STASI-like lol.
    I'd appreciate to keep personal things outa here. Hmmm a study is primarily good for an ego. Have experienced that by myself, got over it and became a 'human' guy. :D
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  5. sid_16

    sid_16 MDL Giveaway Organiser

    Oct 15, 2011
    2,494
    5,363
    90
    Did you? :DWhen?:p
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  6. Yen

    Yen Admin
    Staff Member

    May 6, 2007
    13,081
    13,980
    340
    Can't remember exactly... :D:p



    It is a question of trust. Better them and spread over the world as one huge company like google, M$... IMHO. I am using a private VPN tunnel to home @my router / intranet.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  7. gorski

    gorski MDL Guru

    Oct 21, 2009
    5,518
    1,453
    180
    It wouldn't be STASI-like had you removed the STASI-s**te, too...

    But you haven't sooooo....:rolleyes::bye1:
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  8. Yen

    Yen Admin
    Staff Member

    May 6, 2007
    13,081
    13,980
    340
    I cannot delete a direct reply to my post, that would be impolite regardless of its contents. :rolleyes:
    Also TS said that Tor is working good which isn't OT. The deleted posts were OT and not addressed to me.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  9. MysTikAL3

    MysTikAL3 MDL Senior Member

    Jul 15, 2013
    387
    8,461
    10
    #49 MysTikAL3, Sep 23, 2013
    Last edited: Sep 25, 2013
    To truly have or experience 'Freedom', one must put some amount of trust in others.
    Sure, a couple of 'privacy tools' out there could be compromised, but they all have a track record and reputation of which one can decide to trust in or not.
    IMO the vast majority of privacy tools out there are not 'honeypots'. Most are made by developers and companies with your security and privacy being paramount. Check out their standards of services to be expected and the results that are achieved. That said, some providers services and products achieve their claims of privacy and security much better than others. The better their security and 'track record' are translates directly into profits and their business success, as it well should. With just a single plausible scandal, breach of user(s) privacy-security, most likely that site/product/service/company would cease to exist.....virtually overnight. The 'news' would go viral and result in numerous user lawsuits, their 'business' would most certainly go down in flames .

    You previously stated; "A) Understand that nothing can be trusted;"
    So the alternative would be...?... don't use any privacy/security tools???
    IMO that would be irrational. You would serve up everything to 'them' on a silver platter?
    With no effort at all every piece of data and communication you handle is theirs....to forever use any way they want!:eek:

    "Tools which protect our privacy. Post your tools / ways you are using and opinions."
    So I'm just wondering, would you use or endorse any of the tools or services available out there?
    o_O
     
  10. Yen

    Yen Admin
    Staff Member

    May 6, 2007
    13,081
    13,980
    340
    Another point comes into my mind.
    We have IP addresses which are assigned to our place of residence. Even though they could be dynamic the assignment is reproducible at the ISP logs.
    To servers and services even secret services the reference to one's own home address is not made when tapping wires, except:

    1. The user sends his home address through the web (which always happens together with current IP address.) or logs into an account which identifies himself.
    2. The data of the ISPs can be recorded. Those data actually never should go online, must be stored on an offline PC.

    So one also can have more privacy when changing the browsing behaviour.

    I suspect the ISP have to reveal ones home address when NSA asks for it. And that is IMHO not right.
    It should be only possible with an judicial decision.

    The ISPs play a key role since there the IP address (number) becomes a face (person).

    What do you think? What are your local laws saying about this? :)
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  11. nodnar

    nodnar MDL Expert

    Oct 15, 2011
    1,315
    1,040
    60
    interesting question, yen..
    so what do i think?
    well, what you say is quite true..
    but isps are tied hand and foot to rules
    and regulations, and not just in the us
    either..
    what troubles me far more, is that our
    trusty old firm of google is engaged in
    wardriving all over europe, registering
    wifi points, comparing them to isp adresses,
    known searches, and failing `by mistake` to
    delete the data thus obtained when my local
    eu legislators objected. that was years ago..
    m$ has such data too.. from somewhere..
    so i think isp adresses may get a face
    even without isps or nsa bothering.
    it seems to be inherent to using the www..
    now..
    it did not look like that in the days of w95a,
    but it seems to have happened..
    of course, there are the social media traps to
    be avoided, etc..
    most of us here are at least aware of that.
    well, for a long time i was with the okay, i
    have got nothing to hide, so why should i care
    brigade. which is naive. because my business is
    none of their business.
    imo it is not limited to decent behaviour
    of isps anymore. we are all using flawed
    technology, the www.. that is what i think,
    excuse the rant.. :D
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  12. Yen

    Yen Admin
    Staff Member

    May 6, 2007
    13,081
    13,980
    340
    Well the dynamic allocation of IP addresses has no foreseeable algorithm (has a defined range, though). And most have two different ISPs. A mobile and one @home.
    So the address is only assigned as long as it changes.
    Even if they might assign a face to one IP address at a special time, as soon as it changes the IP gets another face.
    To create a profile with a face one has to know which IP address one has had and when. And that belongs to the ISP.

    If I get this right without the 'help' of the ISP a personal profile cannot be made by tapping wires.
    A profile can be made when the customer visits a special service / seller such as Facebook, Google, Amazon. But only from the data the customer leaves there.


    Who has actually access to the ISP's data? Since the government allows that secret services can have access to these data they are not really interested in our privacy.

    The customer should have the right to have IP allocation deleted if wished. But instead of they want to have it stored at least 6 months.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  13. sofatiger51

    sofatiger51 MDL Senior Member

    Mar 3, 2010
    380
    56
    10
    Since the NSA revelation, I started looking at encryption end-to end for privacy. It's a matter of right and principle as I have nothing to hide in any of my correspondences.
    I have explore TOR browser and am using it currently. The trade-off for that is I need to verify when logging into some of my regular websites. Tor is still subject to smtp-smtp trapping during transit.
    TOR.org recommended Tails as better overall system especially if one includes Mozilla Thunderbird email system with Enigma. I am also exploring gpg4win and gpg. The drawback with gpg4win is that only Outlook 2003 and 2007 are supported.
    Outlook 2010 & 2013 encryption is built-in. The question is can one trust M$?
    I read that Ubuntu has phone system and they are talking with all the major phone companies worldwide and Ubuntu will probably break through the Android monopoly. After all, Android is basically Linux program.
    Another better way is set up your own VPN using Linux server program like Yen did. Unfortunately, my technical level is not there yet. That is my ultimate route if I can set it up myself. Another problem that prevents me to pursue home-VPN is the Internet connection that our ISP provides sucks. I will probably adapt Ubuntu Thunderbird-Enigma system or Tails for end-to-end encryption.
     
  14. Yen

    Yen Admin
    Staff Member

    May 6, 2007
    13,081
    13,980
    340
    It depends on the VPN server which is running on the router. AVM makes good and reliable routers called fritz boxes. They're running a Linux distro which supports Ciscos's IPSec xauth with pre-shared key (PSK) authentication.
    I never got it running using Android's own VPN client though. The tunnel is there but no data running through it.
    I am using an paid app. VPNCilla as client. The setup is nicely described on their (AVM) site. Not sure if they are selling them worldwide, though. It comes with a tool to create a config file which is uploaded to the box later to configure the vpn server.

    Those boxes come with either a ADSL or cable modem (EuroDOCSIS 3.0), a phone land line interface and wlan included. So all you need is to connect the box with either cable or phone (ADSL) wire and your intra net. I am using power line-LAN to connect my intra net devices such as Enigma server, PC and Samsung TV. The latter I am using also as wireless access point to provide an SSID for my living room.:)
    AVM also provides an Android app. which makes it possible to reach the land line phone @home via wlan from an abroad wlan hotspot via the vpn tunnel.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  15. R29k

    R29k MDL GLaDOS

    Feb 13, 2011
    5,171
    4,811
    180
    NSA repeatedly tries to unpeel Tor anonymity and spy on users, memos show

    The National Security Agency and its UK counterpart have made repeated and determined attempts to identify people using the Tor anonymity service, but the fundamental security remains intact, as top-secret documents published on Friday revealed.
    The classified memos and training manuals—which were leaked by former NSA contractor Edward Snowden and reported by The Guardian, show that the NSA and the UK-based Government Communications Headquarters (GCHQ) are able to bypass Tor protections, but only against select targets and often with considerable effort. Indeed, one presentation slide grudgingly hailed Tor as "the king of high-secure, low-latency Internet anonymity." Another, titled "Tor Stinks," lamented: "We will never be able to de-anonymize all Tor users all the time."
    An article published separately by The Washington Post also based on documents provided by Snowden concurred.
    "There is no evidence that the NSA is capable of unmasking Tor traffic routinely on a global scale," the report said. "But for almost seven years, it has been trying."
    .... more
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  16. gorski

    gorski MDL Guru

    Oct 21, 2009
    5,518
    1,453
    180
    Yes, you can if you want to. But you do not want to, as we can all see... You are protecting her way above the really necessary man-woman gentleman thing... Because she is not a gentlewoman... I commend you in some ways but she does not deserve it!

    It is utterly "impolite" (read UNFAIR and unnatural!!!) to remove my post in which I defend myself from BS accusation by a nasty, wicked person. You can quote me on that! One must have the RIGHT to defend oneself. It is the only universal law in the Universe! But it seems you have a better understanding of it all...:rolleyes:

    You also had another possibility - to edit the post, to leave the Tor part and remove the BS part, but you only removed my post in which I defend myself. You didn't do it and that speaks volumes...
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  17. Mikorist

    Mikorist MDL Member

    Dec 26, 2012
    205
    145
    10
    #57 Mikorist, Oct 6, 2013
    Last edited: Oct 6, 2013
    They do not have to access anything.

    Because everything is reversed in the other way around as it really is.

    They do not need any special software (or a team of specially trained monkeys :laie:) to track and monitor
    the entire Internet as their own constituent.

    NSA = Internet - fully and in its all segments (from the Beginning in timeline of the 20th century)

    But literally. The problem is that most people do not know ( and many do not care to know) how it
    works (such as infrastructure) . Prejudice, stupidity, lack of education , and somewhat true, but rarely .

    The whole infrastructure ( physical) , the entire lens, ( all ) equipment , Multi-Gigabit Ethernet to USA and EU (All World)

    it works ( mostly) over one and the same corporation .

    Internet is not only "made in by USA" ---> But the USA is " provider of providers" for all us too.


    From the heart of the United States , Level 3:

    http://www.level3.com/en/global-reach/


    This is not a conspiracy - it's factual situation "beyond bandwidth" :

    http://maps.level3.com/default/


    We follow "them" and we move together in the work , leaving

    (personal) data, sharing, connect to and browse through "them", as an integral part of "them" ,

    and (we are ) its " matrix " .

    And we are all most from "their" dependents (their internet addicts ) and we
    all pay "them" {subconsciously} . ( voluntarily participate into) .

    [​IMG]:D
     

    Attached Files:

    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  18. gorski

    gorski MDL Guru

    Oct 21, 2009
    5,518
    1,453
    180
    Well, apparently, as you may have seen, Snowden docs revealed that they are struggling to get into DarkNet properly...

    But maybe you know something none of us knows, Snowden included...
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  19. Yen

    Yen Admin
    Staff Member

    May 6, 2007
    13,081
    13,980
    340
    I am sorry, you are distorting the things a bit, IMHO. I have removed all posts, not only yours! Post #43 is a direct reply with quote to my post and a personal meaning of TS about the STASI. This reply is addressed to the general public, no word about you, whereas your direct reply had been personally at the first few words already. "Says the worst STASI mind..."

    I have deleted the posts because they were off topic. I accept that you have another opinion about moderation here, but when you argue you should include the entire deleted posts and not blame me out of context for seemingly denying 'universal' laws.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  20. gorski

    gorski MDL Guru

    Oct 21, 2009
    5,518
    1,453
    180
    She did it before, and she didn't mince her words, so there was no chance of it being "general", as you well know it. It was obvious who this was addressed to.

    But you chose to ignore that. It isn't the first time, I might add...

    Never mind, including the fact that some mods here...

    Ach, forget it and forget her...

    Not worth it!

    But principles... Ahem...
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...