opsec
Captain
★★★★★
- Joined
- Nov 8, 2017
- Posts
- 1,879
This guide is much more in depth and explanetory than my first one, but fails to mention secure OSs to use. This guide is probably where you want to start. It was written up by hackforums user "Previously Known As..."
I hope we can use this in our never ending ideology war against the bluepill.
- Edward Snowden
I got asked about privacy online for the average user, and I ended up compiling some info regarding such. This is a broad topic and most of this information isn't coming directly from me, rather it is being compiled from multiple sources. I won't take credit for anything, and I'll attempt to link to sources where I can.
Encryption of data
I use VeraCrypt full disk encryption for all of my drives and partitions, not just my OS. VeraCrypt adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in attacks.
VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt, the old industry standard for full disk encryption.
Key disclosure law - Who is required to hand over the encryption keys to authorities?
Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
Virtual Private Networks
I always recommend using a good VPN, even for normal every day browsing. View more information on how VPNs work and why using one is important here.
View my other thread for my personal VPN suggestions. Or view this large spreadsheet that I put up on Google Docs (note that I did not compile this data, source is at the bottom of the spreadsheet).
And here is a good guide on making VPNs more secure.
Random Note: I strongly recommend using wired connections for your internet connection at home as opposed to wireless. There have been many cases of government snooping by them breaking into networks and collecting wireless data. A classic example is the arrest of Iserdo, the creator of the Butterfly Botnet (Mariposa). Ultimately his arrest and conviction was solidified when Law Enforcement broke into his Wireless Network and monitored him, gathering all the evidence necessary.
Browser Choice and Security
First things first, I will never recommend using Google Chrome and nothing any of you can say will change my mind on this.
Firefox is fast, reliable, open source and respects your privacy.
Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, it comes with pre-installed privacy add-ons, encryption and an advanced proxy.
Browser Fingerprint - Is your browser configuration unique?
When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlickto test your browser to see how unique it is.
WebRTC IP Leak Test - Is your IP address leaking?
WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN. While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.
For Google Chrome users: There is no known working solution, only a plugin that is easily circumvented. Please use Firefox instead.
For Firefox users: (Click to View)
Test for WebRTC leaks here.
Improve your security with these Firefox add ons
Stop tracking with "Disconnect"
Founded in 2011 by former Google engineers and a consumer-and privacy-rights attorney. The addon is open source and loads the pages you go to 27% faster and stops tracking by 2,000+ third-party sites. It also keeps your searches private.
Block Ads with "uBlock Origin"
An efficient wide-spectrum-blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source. We recommend FireFox but uBlock Origin also works in other browsers such as Safari, Opera, and Chromium. Unlike AdBlock Plus, uBlock does not allow so-called "acceptable ads".
Hinder Browser Fingerprinting with "Random Agent Spoofer"
A privacy enhancing firefox addon which aims to hinder browser fingerprinting. It does this by changing the browser/device profile on a timer.
Automatically Delete Cookies with "Self-Destructing Cookies"
Automatically removes cookies when they are no longer used by open browser tabs. With the cookies, lingering sessions, as well as information used to spy on you, will be expunged.
Encryption with "HTTPS Everywhere"
A Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure. A collaboration between The Tor Project and the Electronic Frontier Foundation.
Block Content Delivery Networks with "Decentraleyes"
Emulates Content Delivery Networks locally by intercepting requests, finding the required resource and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required. Source code: GitHub.
Stop cross-site requests with uMatrix
Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix gives you control over the requests that websites make to other websites. This gives you greater and more fine grained control over the information that you leak online.
Be in total control with "NoScript Security Suite"
Highly customizable plugin to selectively allow Javascript, Java, and Flash to run only on websites you trust. Not for casual users, it requires technical knowledge to configure.
Content control with "Policeman"
This addon has purpose similar to RequestPolicy and NoScript. It's different from the former in that it supports rules based on content type. For example, you can allow images and styles, but not scripts and frames for some sites. It can also be set up to act as a blacklist.
Read these sources for more information on hardening FireFox:
https://github.com/pyllyukko/user.js
http://kb.mozillazine.org/Category:Security_and_privacy-related_preferences
I hope we can use this in our never ending ideology war against the bluepill.
If you think privacy is unimportant for you because you have nothing to hide, you might as well say free speech is unimportant for you because you have nothing useful to say.
- Edward Snowden
I got asked about privacy online for the average user, and I ended up compiling some info regarding such. This is a broad topic and most of this information isn't coming directly from me, rather it is being compiled from multiple sources. I won't take credit for anything, and I'll attempt to link to sources where I can.
Encryption of data
I use VeraCrypt full disk encryption for all of my drives and partitions, not just my OS. VeraCrypt adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in attacks.
VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt, the old industry standard for full disk encryption.
Key disclosure law - Who is required to hand over the encryption keys to authorities?
Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
Virtual Private Networks
I always recommend using a good VPN, even for normal every day browsing. View more information on how VPNs work and why using one is important here.
View my other thread for my personal VPN suggestions. Or view this large spreadsheet that I put up on Google Docs (note that I did not compile this data, source is at the bottom of the spreadsheet).
And here is a good guide on making VPNs more secure.
Random Note: I strongly recommend using wired connections for your internet connection at home as opposed to wireless. There have been many cases of government snooping by them breaking into networks and collecting wireless data. A classic example is the arrest of Iserdo, the creator of the Butterfly Botnet (Mariposa). Ultimately his arrest and conviction was solidified when Law Enforcement broke into his Wireless Network and monitored him, gathering all the evidence necessary.
Browser Choice and Security
First things first, I will never recommend using Google Chrome and nothing any of you can say will change my mind on this.
Firefox is fast, reliable, open source and respects your privacy.
Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, it comes with pre-installed privacy add-ons, encryption and an advanced proxy.
Browser Fingerprint - Is your browser configuration unique?
When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlickto test your browser to see how unique it is.
WebRTC IP Leak Test - Is your IP address leaking?
WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN. While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.
For Google Chrome users: There is no known working solution, only a plugin that is easily circumvented. Please use Firefox instead.
For Firefox users: (Click to View)
Test for WebRTC leaks here.
Improve your security with these Firefox add ons
Stop tracking with "Disconnect"
Founded in 2011 by former Google engineers and a consumer-and privacy-rights attorney. The addon is open source and loads the pages you go to 27% faster and stops tracking by 2,000+ third-party sites. It also keeps your searches private.
Block Ads with "uBlock Origin"
An efficient wide-spectrum-blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source. We recommend FireFox but uBlock Origin also works in other browsers such as Safari, Opera, and Chromium. Unlike AdBlock Plus, uBlock does not allow so-called "acceptable ads".
Hinder Browser Fingerprinting with "Random Agent Spoofer"
A privacy enhancing firefox addon which aims to hinder browser fingerprinting. It does this by changing the browser/device profile on a timer.
Automatically Delete Cookies with "Self-Destructing Cookies"
Automatically removes cookies when they are no longer used by open browser tabs. With the cookies, lingering sessions, as well as information used to spy on you, will be expunged.
Encryption with "HTTPS Everywhere"
A Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure. A collaboration between The Tor Project and the Electronic Frontier Foundation.
Block Content Delivery Networks with "Decentraleyes"
Emulates Content Delivery Networks locally by intercepting requests, finding the required resource and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required. Source code: GitHub.
Stop cross-site requests with uMatrix
Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix gives you control over the requests that websites make to other websites. This gives you greater and more fine grained control over the information that you leak online.
Be in total control with "NoScript Security Suite"
Highly customizable plugin to selectively allow Javascript, Java, and Flash to run only on websites you trust. Not for casual users, it requires technical knowledge to configure.
Content control with "Policeman"
This addon has purpose similar to RequestPolicy and NoScript. It's different from the former in that it supports rules based on content type. For example, you can allow images and styles, but not scripts and frames for some sites. It can also be set up to act as a blacklist.
Read these sources for more information on hardening FireFox:
https://github.com/pyllyukko/user.js
http://kb.mozillazine.org/Category:Security_and_privacy-related_preferences