[ / / / / / / / / / / / / / ] [ dir / random / abdl / feet / fringe / hydrus / lewd / s / tech / tingles ]

/cyber/ - Cyberpunk & Science Fiction

A board dedicated to all things cyberpunk (and all other futuristic science fiction)
Name
Email
Subject
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
Archive
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Flag
Embed
(replaces files and can be used instead)
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Voice recorder Show voice recorder

(the Stop button will be clickable 5 seconds after you press Record)
Options

Allowed file types:jpg, jpeg, gif, png, webm, mp4, swf, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.


“Your existence is a momentary lapse of reason.”

File: b49b144fa754682⋯.png (172.33 KB, 578x365, 578:365, big_spoook.PNG)

 No.57698

##cross posting with as many /fucko/ friendly boards I know ##

Was wondering if anyone here knew anything about proper data sanitation when it came to an OS's digital fingerprint.

Say for example hypothetically that one wanted to connect to a proxy server though a neighbors hacked WPA2 Network. What could the neighbors or more likely the feds tell from the logs. The MAC address of my Wi-Fi card, the hardware address of my OS?

Are there any good resources/Blackhat forum discussions about this issue and how to protect ones self from it. I read in Edward Snowdens autobiography that when he was trying to contact journalists to divulge his whistleblower data he used public wifi and Tails as it is a Amnesic-Live OS meaning it generates a new mac address on every restart. Is this enough to protect me from the feds tracing the actively on the hacked network back to my computer or are there other things I should be concerned about?

All suggestions are welcome, I have tired searching or answers be have found no good discussions on the topics.

____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.57704

>>57698

>The MAC address of my Wi-Fi card

Logs would likely have the MAC address you were using.

>the hardware address of my OS

What would this even be supposed to mean?

>Is this enough

If you are certain that no one will actually look into the logs and all, you might be safe enough.

If someone were going to look into your connection, though,

it would probably be easy to choose you out of a small number of neighbors, no matter how you connect.

Also, if someone knows that you're currently connecting to the network and has access to a couple machines in the area, they can triangulate your position.

>I have tried searching For answers bUT have found no good discussions on the topics.

FYI, if you know the basics about wifi networks, what i have said is obvious.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.57731

>>57698

Currently using neighbors wifi too.

If you are worried about the 'internet police' coming knocking on your door for purchasing bad stuff or just by searching for frazzledrip, you probably wouldn't have to worry,

as it is virtually impossible for anyone to pinpoint you, have the means to do so, or simply giving a fuck about you.

Almost all 'illegal activity' is been traced back by simply been an idiot. For example, posting it on you social page, not using a tor when you have to, buying illegal stuff through the web with no protection, fishing, obvious scams and data collection scripts or browsing like an idiot and forgetting to clear your cookies and history if police coming at your door. You really must be an idiot to get 'caught' like that and almost all of the impending 'danger' comes from downloading malware. So if thats the case, you don';t have to worry

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.57747

>>57731

You got a point, but there's no such thing as too paranoid. If OP is going to use someone else's WiFi as an added security measure, he should make sure to cycle his MAC and consider connecting other people in his area to it. (pwn the neighbors neighbor and try connecting one of his devices to it, or if neighbor is properly secured, connect a small wifi enabled board and hide it at a nearby power source)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.57874

>>57698

LMAO JUST CHANGE YOUR MAC ADDRESS WITH MAC CHANGER ON KALI!!

Use Trail on USB live boot if you want to max it

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.57875

>>57698

Why are you doing this over your neighbors wifi? Don't you think that's a bit too close to where you live?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.57897

EYYYY SINCE WIFI IS LOCKED BY WPA2 SECURITY YOU ACTUALLY HAVE TO HAVE ACCESS TO THE USERS MODEM IN ORDER TO GET THE KEY PASSCODE. DON'T PULL A B&E BUT USUALY ITS WRITTEN ON THE MODEM ITSELF. AND IF YOU HAVE HAD ACCESS TO THE MODEM BEFORE THE PASS WORD SHOULD BE SAVED AUTOMACILY IN YOU PC. JUST GOOGLE HOW TO GET YOUR STORED KEY PASSWORDS. THERES A MYTH THAT IF YOU GET SOMEONE TO RESET THE MODEM YOU CAN STEAL THE KEY IF THEY CHANGE IT. BUT I DOUBT IT YOU WOULD LITTERALY HAVE TO KNOW THEIR ISP LOGIN TO THAT IF POSSIBLE YOU COULD CHANGE THE PASSWORD YOURSELF… TELL EM BOBO SENT YA LOL

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.58060

>>57698

The number one identifying characteristics you have to worry about are mac address and hostname. I actually wrote systemd units to randomize these on my website coarse_enigma

http://cgjzkysxa4ru5rhrtr6rafckhexbisbtxwg2fg743cjumioysmirhdad.onion/code/

But there are more concerns than this depending on how paranoid you are. The first is actually Pattern of Life . If you are connected to the network ALL DAY LONG, then you have been next door, ALL DAY long. As you can imagine, this is kindof obvious.

Further, if random macs/hostnames connect everyday at the same time, someone might suspect that's the same person.

Finally, when your nic associates with the router, it actually provides are hardware specific set of capabilities. Someone who is active observing you connect will observe this set of capabilities never changes, and is the same model wifi-card each time.

Such a person could also potentially triangulate you but, if your connected all day, they know your a neighbor anyway.

Also, be-careful about cleartext traffic and domain names. God help you if you viist your personal website at a revealing domainname. Or facebook sends certain requests clear text.

What you migth consider doing is:

0.) Randomizing Mac/Hostname

1.) Getting a directional antenna and cracking wifi further away from your house.

2.) altnerating between multiple networks randomly

3.) Encrypting ALL traffic via VPN/Tor

4.) Posting Wifi crenditals on one of those sites where you share credentials for plausible denability

Also, What are the actual odds you have a targeted investigation? Unless you download some real drek, or post a manifesto ( http://cgjzkysxa4ru5rhrtr6rafckhexbisbtxwg2fg743cjumioysmirhdad.onion/blog/guerilla-privacy.html ) , why would anyone with Supona Power come looking through logs for Hostnames, MACs, vistied URLs, and/ or Triangulate you? Its a lot of effort for not much.

You could also just pay for internet access. ATT will let you pay in BTC.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.



[Return][Go to top][Catalog][Nerve Center][Random][Post a Reply]
Delete Post [ ]
[]
[ / / / / / / / / / / / / / ] [ dir / random / abdl / feet / fringe / hydrus / lewd / s / tech / tingles ]