OVERVIEW
Despite the intrusion of massive surveillance programs like
PRISM and
DCSNet, the
mass-use of
Stingray devices, as well as the potential threat of weak to mid-tier
encryption equating to no encryption because of programs like
Bullrun, it's still the
case that you may find personal privacy on the internet a priority, or further that
since the state is allowed to see everyone's personal information, that everyone else
should be allowed to see the same information, meaning offensive measures as well as
defensive measures are necessary. This is a good starting point for your future of
being put on government watch lists.
I have not kept on top of link maintenance for this page, so lots of links are broken.
I will try to fix this soon, sorry.
Privacy was recognized as a fundamental human right by the
Universal Declaration of
Human Rights in 1948. For information on digital rights, visit the
EFF or
FSF.
The
defense for anonymity on Shiichan offers good support for the
notion of privacy.
Be wary of
dark patterns,
cyber phrenology, and
AI &
DNA surveillance methods.
Demystify
hacking, show how it is
easy and banal; same with
cryptography.
Other sites I recommend for researching info security -
OSCP &
DD.
HARDWARE INSECURITY
Most of this page is about software exploitation and its mitigation, but it should be
noted that compared to software, computing hardware is disproportionately
proprietary
and insecure. There are plenty of security issues you can look up for both
Intel and
AMD architecture and even if they didn't backdoor their own hardware there are still
serious deep-system vulnerabilities that have no robust solutions no matter what
architecture your hardware uses. In particular, the
Rowhammer,
RAMBleed, and
ZombieLoad attacks are pretty devastating and do not have any effective patches as of the time writing this. The
first two allow for arbitrary privilege escalation and key theft, and ZombieLoad
allows for full-blown remote access and total capture even of virtual machines running
privacy software as the site shows. These exploits do not care what operating system
you run or security software you use. This should be considered a massive issue with
secure computing and hopefully curbs any enthusiasm you have in thinking you can stop
an intelligence agency from getting what they want out of your computer.
The above applies to mobile phones as well and if that wasn't bad enough,
Simjacker
exploits an old flaw with SIM cards that has allowed, and still allows, anyone to
remotely access and control the majority of cellphones.
MISCELLANEOUS
Terms of Service; Didn't Read is a great resource for summarizing site policies.
Basic home network security -
router,
ports, and
Windows security.
I used to recommend
PGP and related
downloads (
+,
+), but it's ran into some
problems.
What
OTR fingerprinting is in general
plus downloads.
Schuyler Towne's and
Deviant Ollam's sites are giant resources for physical sec.
Black Hills and
Grimm are both pen testing firms with lots of resources.
Learn
programming,
shell scripting, or the basics of hacking with
wargames.
Cloudflare may be
compromised.
It's good to know about
DNSSEC root key split and about
secret sharing in general.
LOCKSS, lots of copies keep stuff safe.
You can use
Shamir's Secret Sharing Scheme to ensure group efforts on key sharing.
I think the debate around
systemd is funny and worth exploring.
Be faceless, share website logins with
BugMeNot /
Login2.
Work on your reverse-engineering skills with
Crackmes.
You should consider what to do if
hardware becomes scarce.
If you read this far, here's a
little something
special for you.
SECURE SYSTEMS & NETWORKS
Due to the nature of centralized or federated systems, it does not matter what kind of
encryption or log policy a service has, they are trust-based systems with central points
of failure. The belief that protocols like XMPP don't leak any valuable metadata (or are
not easily broken by seizing the host server) is a harmful ideation that gets people
regularly killed. The only truly secure systems are decentralized, distributed,
trustless, permissionless, encrypted, free and open systems. I am in the process of
finding robust
decen+dist services for everything in this list and personally no longer
trust systems that are not
decen+dist.
• The mailchuck gateway through
Bitmessage (
+,
+,
+,
+,
+) is the only truly
secure
email service (
+) for the clearnet that I know of.
•
Jami,
Status,
Tox, and
Keybase are some
secure communication platforms.
•
Syncthing,
IPFS, and
OnionShare are secure ways to store and share files.
•
KeePassXC and
diceware for
secure password generation and management.
•
Monero and
Zcash are privacy-ensuring dark currencies.
•
Etherpad,
Privatebin (
+), and
ProtectedText are secure paste services.
•
Tails and
Qubes (with
AEM) are operating systems that can be placed on and
booted from removable media that also create a secure and trusted end node.
•
GrapheneOS,
Replicant, and
Librem are security-focused cellphone systems (
+).
•
ZeroNet,
GNUnet,
Beaker, and
I2P are clients for private networks.
•
Tor is
highly questionable (
+,
+,
+), and does not stop a global passive adversary.
•
Don't use a VPN unless it's
Mysterium, or just
cycle IPs.
•
ORWL is a
self-destructing desktop (expensive but works for paranoid people).
•
VeraCrypt and
dm-crypt are robust drive encryption tools.
•
HDShredder is a robust drive and file nuking tool.
IMMUNIZATION
•
How to Opt-Out of data brokers and
remove yourself from Google's search.
•
Privacy and
Akimbo both let you set up virtual credit cards so your finances can't be tracked as easily.
•
Debloat Firefox (
+,
+,
+,
+), use
secure addons (
+,
+), and check your
fingerprint(
s).
•
Okey provides protection against simjacking and out-of-band communications.
•
Njalla buys and holds domains for you like a WhoIs gaurd.
•
HIBP? lets you check if your email accounts or
passwords have been compromised.
•
DNSCrypt is a tool for preventing DNS spoofing.
•
Snort and
Samhain are robust IDS's.
•
usbkill /
silk-guardian are anti-forensic device whitelisters.
•
Chkrootkit is a tool for determining if system files have been tampered with.
•
GNU MAC Changer /
Technitium are good MAC address spoofers.
•
OpenPuff and
f5stego are good
steganography tools.
• Generate
new identitie(
s),
face(
s),
credit cards, and
phone services.
PHYSICAL DEFENSE
•
YubiKey and
Nitrokey are hardware authentication devices, start using them.
•
Spyfinder Pro is a device for finding hidden cameras.
•
Mic-Lock is a microphone suppressor that blocks sounds from being monitored.
•
ADL-1 is a physical OTP printer; this has myriad uses.
• Learn how
physical pen actually happens (
playlist) and how to defend against it.
•
Security Snobs is a direct source for
Abloy locks and
others.
•
MOSequipment and
Silent Pocket are faraday product manufacturers.
•
Radar detectors are useful for avoiding cops.
•
Firearms; you should strongly consider getting a
concealed carry license.
THREATENING CLASSICAL ENCRYPTION
D-wave, the world's only commercial manufacturer of quantum computers, has recently
announced production of a
5,000+ qubit computer purchasable for about 2 million
United States Dollars. This means a good chunk of classical encryption up to 4,096
bits is theoretically arbitrary to break now. Since most commercial encryption is only
256 bits, most military encryption is only 1,024 bits, and most intelligence agency
encryption is only 2,048 bits, it appears that trillions of dollars and all kinds of
government, corporate, and academic secrets may be at threat, depending on the crypto
scheme they used to secure their data and trasmissions.
DOCUMENTATION
•
IntelligenceX is a search engine for emails, IPs, CIDRs, BTC adds, IPFS hashes, etc.
•
Datasploit is an OSINT assistant with similar possible uses as
Maltego.
• Skiptrace services like
BellesLink provide powerful tracking services.
•
Infosniper is an IP address geographical locator.
•
GeoHack is the most robust geotag and location tool amalgamator.
•
FastPeopleSearch /
TruePeopleSearch /
InstantCheckmate whitepage-esk tools.
•
Metadata scrapper for images.
•
Whois lookup for domains.
INTERDICTION & ATTRITION
•
Sakari lets you capture all of someone's texts
for just $16.
•
Wireshark and
Nmap are powerful network analyzers.
•
P4wnP1 A.L.O.A. is software for a mobile network analyzer/pen tool.
•
Nikto2 and
Metasploit are robust penetration testing tools.
•
Hydra and
Medusa are login brute-forcers for remote authentication.
•
Online Hash Crack is a cloud-based cracking service.
•
GUID Generator gen's serial numbers for some software.
•
DarkComet is a common remote access tool (plus the
removal tool).
•
Dangerous Kitten's skiddie hackpack is surprisingly comprehensive.
•
DCE lets you scrape Discord servers.
DATABASES & DUMPS
•
0DAY.today is a large zero-day exploit database.
•
CVE /
ExploitDB are the de facto exploit databases.
•
Hashes.org and
CMD5 are large hash databases.
•
Shodan is an IoT exploit search engine / database.
• Device default
password database(
s).
•
Serials.ws database for software serial keys.
• The
NVD is a useful tool for investigating known exploits.
•
Equation group exploit dump.
•
Shadow Brokers exploit dump.
•
CIA Vault 7 hacking tools leak.
•
theZoo is a live malware repository, for 'testing' stuff.
•
Ghidra is the NSA's very own decompiler; myriad uses.
PHYSICAL OFFENSE
•
DSTIKE has many WiFi deauthorizer devices that are easily concealed.
•
Pwnagotchi is a deauthorizer that also captures handshakes for WiFi.
•
Signal jammers are super useful but also super illegal.
• Learn to
War Drive (or just use
aircrack-ng),
SkyJack, and
drop.
•
Pick all kinds of
lock(
s) just like
Bosnian Bill (
+).
•
Key decoding tools and 3D-printable
TSA master keys.
•
USB Killer kills laptops at will by simply pluging it in.
• Get a millitary-grade
briefcase EMP bomb for fun.