You might as well start by looking in the data of your machine. Did you fill in your real name and address anywhere? Remove it. And don’t keep any of your passwords on your machine. A piece of paper will do.

KeePassX is very useful if you make more identities, keeping the database on a USB stick that you take out of your machine when you walk away from it, and keep that stick in a location only known to you.
 

Anonymous – the uber-secret handbook

The greatest threats to your safety are A) social engineering and your behaviour and B) revealing your IP address.

http://pastebin.com/a8sCYHep

Anonymous – An Introductory Guide to Safety during Social Instability

Political activists, dissidents, and even nonpartisan bystanders caught in social instability are often fearful for their protection and protection of their families. Citizens may face harsh and even violent opposition by authorities and security forces in such situations. This guide is designed to introduce the reader to the mentality needed to stay safe during unrest and protests – both online and offline. It furthermore aims to assist in continued communications during periods of internet and phone line restrictions.

http://pastebin.com/LVrXDNCm

OrangeMesh

OrangeMesh is a simple, open source network management dashboard for ROBIN based networks. It helps communities, individuals, and business create and manage wireless mesh networks without any reliance on third parties.

http://orangemesh.sourceforge.net/

Freenet

Freenet is free software which lets you anonymously share files, browse and publish “freesites” (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in “darknet” mode, where users only connect to their friends, is very difficult to detect. For Linux and Unix.

http://freenetproject.org/

Osiris – serverless portal system

Osiris portals are serverless, so they spread through the P2P network members. This allows the portals to be independent of central servers, free and indestructibles since they are supported by every portal member.
Moreover, all the sent contents are anonymous, enabling a strong privacy protection and ensuring that no one can overwhelm this experiment of free thought and knowledge distribution.
Osiris can also build monarchic portals for a traditional moderation.

http://osiris.kodeware.net

The Social VPN Project

This is a free and open-source P2P Social Virtual Private Network (VPN) that seamlessly networks your computer with the computers of your friends so that:

  • Your computer can communicate directly to computers of your friends, and all communication is encrypted and authenticated. In other words, you are in full control of who you connect to and all your communications are private.
  • This private network is configured with no hassle. The social VPN does all the configuration automatically for you. All you and your friends need to do is run this software and log in to your XMPP backend (such as Google chat, or Jabber.org).
  • You and your friends can communicate, share and collaborate in countless ways, with existing applications, like iTunes, Windows shared folders, and remote desktop. You can share files and folders, stream music and video, play multi-user games, access remote desktops, and run a Web server private to your friends.
  • If you own multiple computers at different places, you can also use the Social VPN to seamlessly access your files, desktop, etc remotely – creating your own personal VPN.

http://socialvpn.wordpress.com

 

How-To's will follow. Want me to investigate a specific tool (first), or have FOSS suggestions for more tools, please let me know.

Views: 1941

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Anonymiss Express on June 27, 2011 at 9:45am
Thank. Let me know if you get into trouble. I have been overloaded since I wrote this and have not hunted or (when not found or not up to par) created How-To's yet.
Comment by Anonymiss Express on April 8, 2011 at 4:56am
Zwadderneel says will write about experiences with Metasploit and THCHydra, so people can see how it works in more understandable ways. And then there is the ongoing battle in keyloggers to write about.
Comment by Anonymiss Express on April 8, 2011 at 3:01am
I am working on an article explaining the details of proxy chaining and including Tor in the chain. But, busy, busy, busy IRL too ... may take a few days.
Comment by Anonymiss Express on April 8, 2011 at 3:00am

This is just a first article. Help if you will to spread the notion of securit.

My "colleague" Zwadderneel wrote articles about Tor and I2P:

http://zwadderneel.wordpress.com/2011/02/25/a-clever-request-can-cl... (Tor)

http://zwadderneel.wordpress.com/2011/03/15/i2p-does-not-trust-part... (I2P)

http://zwadderneel.wordpress.com/2011/03/24/anonymous-irc-suits/ (IRC)

Comment by TheLasersShadow on April 7, 2011 at 3:22pm

Hey Anonymiss, thanks for that article i was aware hacks like that existed but had never read a professional writeup on them. I'm still confident in truecrypt as i don't leave my machine running and as that article says the ram image only last at room temp for seconds to minutes, lets say 5min and be generous. Thats not an issue to me and all os encryption programs use ram to store a key so there is no immune program. The only way someone can use this technique is to ether catch my machine running or seconds after I shut it off. Thats not likely and I don't have anything that would make a team with this tech come after me or anything that would make a physical attack worth it. All you need is AES 256 and SHA 512 hash combo that TC has if the attacker can break that theres no defense thats going to stop them. TC is as good if not better due to being much more popular than those on your list for the reason that its been tested extensively by experts world wide.

 

Also you don't have TOR or I2P on that list above, If you know their short comings they are very effective. All one has to remember is that unencrypted data can be seen by the exit node.

 

 

Comment by Anonymiss Express on April 7, 2011 at 1:19pm
Dear TheLasersShadow, I have added an article on Encryption tools here: http://wp.me/P1pwng-fK.
Comment by Anonymiss Express on April 1, 2011 at 9:10am
Doesn't mean it isn't useful. Just means it is not enough.
Comment by Anonymiss Express on April 1, 2011 at 7:55am
Er ... disk encryption, the for many still standard approach to protecting sensitive data on laptops, can be defeated by relatively simple methods. See http://citp.princeton.edu/memory/
Comment by TheLasersShadow on March 31, 2011 at 10:37pm
TrueCrypt Its free, encrypt your entire PC with it. Can't be hacked if a solid password is used.

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

cheeki kea commented on cheeki kea's photo
Thumbnail

Waste runs deep

"Make USAID - go away."
8 minutes ago
cheeki kea posted a photo
2 hours ago
cheeki kea commented on cheeki kea's photo
Thumbnail

$ Paid Annual Leave $

"Now is the Time for American Workers to Unite! Take back the squandered taxes and demand time off…"
yesterday
cheeki kea posted a photo
yesterday
Burbia commented on Burbia's blog post Mystery illness strikes Russia with fever, blood symptoms, and no cure in sight.
Monday
Burbia posted a blog post

Mystery illness strikes Russia with fever, blood symptoms, and no cure in sight.

I guess releasing this bio-weapon upon Israeli neighbors would be hitting too close to home. I…See More
Monday
tjdavis posted videos
Monday
tjdavis posted a video

The Electric State | Final Trailer | Netflix

Together, robots & humans can take the whole system down. THE ELECTRIC STATE starring Millie Bobby Brown, Chris Pratt and directed by the Russo Brothers, onl...
Sunday
Less Prone favorited Sandy's video
Saturday
Doc Vega's 7 blog posts were featured
Saturday
tjdavis's blog post was featured
Saturday
Sandy posted a video

"Mommy Tells Me I'm a Girl"-Jeff Younger

Soft White Underbelly interview and portrait of Jeff Younger, a father who is fighting to protect his son from transitioning into a girl. Get 40% off access ...
Saturday
tjdavis posted a video

MindWar: Full Spectrum Cognitive Dominance [Michael Aquino Analysis]

This is my analysis and my thoughts on Michael Aquino's "MindWar". This document is a must-read if you are looking to understand the psyop tactics and cognit...
Saturday
Doc Vega posted a blog post

A Horrid Murder at Land Between the Lakes (Sasquatch?)

 Most of us hear that Sasquatch-Bigfoot are intelligent yet reclusive creatures that are closely…See More
Friday
Doc Vega posted blog posts
Thursday
cheeki kea commented on cheeki kea's video
Thumbnail

Metropolis (1927) Full Movie | 4K Color Remastered: 2023 Colorized with Gottfried Huppertz Score

"Hey thanks for the thumbs up guys. I was blown away (like a leaf in a tornado) when I watched this…"
Mar 27
tjdavis favorited cheeki kea's video
Mar 27
tjdavis posted a video

Did you know this? I was SHOCKED!

Wounder how many people know what they do to baby chicks? Wounder if they know what the are doing to Salmon? What about the lettuce and tomatoes? This will n...
Mar 27
cheeki kea posted a photo
Mar 27
Less Prone posted a video

Pine Tree Riots - We'll Have Our Home Again

NOW ON SPOTIFY (and everywhere else)!https://open.spotify.com/album/1gWcRqHD7TSbAA2UzYOLWlEvery people deserves a Homeland.Sung by no one in particular.Origi...
Mar 25

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted