[ / / / / / / / / / / / / / ] [ dir / 8teen / abdl / animu / asmr / leftpol / mde / sw / zoo ][Options][ watchlist ]

/qresearch/ - Q Research Board

Research and discussion about Q's crumbs
You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Name
Email
Subject
Comment *
File
Select/drop/paste files here
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

Pro Aris et Focis

File (hide): be55fb3d9ee2e1c⋯.gif (606.57 KB, 800x792, 100:99, giphy.gif) (h) (u)

[–]

f9676a (1) No.426873>>426955 [Watch Thread][Show All Posts]

Anons, in light of recent events it might be wise to educate yourselves in the fundamentals of cybersecurity (if you haven't done so already). Below are some tools and techniques you should consider using depending on your individual circumstances. Other CSEC anons will likely have more to add in the replies.

NOTE: These measures will help protect against surveilance and direct attacks. The clowns will likely be using DDOS attacks and CPU-destroying malware in order to shut down anons. Backup your research on multiple flashdrives; use physical pads to write down notes. Furthermore, these measures are only worthwhile if you practice good OPSEC. Be sure to read up on the topic if you're unfamiliar.

1. Stop Using Windows/macOS

While Linux might not be as invulnerable as a lot of tech-evangelists claim it is, Windows and macOS are packed to the brim with backdoors. Ultimately it's better to stick to what you know, but if you use a proprietary OS, you have been warned.

2. Tor

The bread and butter of anonymous browsing. Easy to use and allows you to select the level of security you desire. Be aware of its limitations though: Tor is safest when you completely disable scripts, which will break quite a few sites. It also doesn't encypt any of the data you upload or send, so you will have to use a seperate program. Lastly, be aware that the clowns have been know to set up malicious exit nodes in order to spy on users. Stay aware of where you're connecting to.

3. Brave

Doesn't anonymize your IP address like Tor, but is built around blocking trackers. This will at least help you stay out of the Google-sphere if you have to use their services during the course of your research.

4. VPNs

Law enforcement and the IC have "unmasked" Tor users by simply checking to see who was using Tor at the time of an incident. One way to thwart this is to add an extra layer of protection by hiding your Tor usage with a VPN. The quality and security of the VPN will depend on which one you choose. Vet accordingly.

5. MAT

Pictures and other files contain metadata, which can be used to find their originator. This is particularly important for photos, since the metadata can not only include the camera used to take the picture, but the location of where it was taken. Any original images posted here should first be cleaned up with the Metadata Anonymisation Toolkit.

6. Tails

WARNING: SNOWDEN HAS PERSONALLY RECOMMENDED THIS. POSSIBLE CLOWN OS.

A portable Linux distro that's booted up from a thumbdrive. It's designed to pipe everything through Tor and forget all data upon shutdown. More suited for quick browsing and communication. Each version is dependant on the then-current version of Tor, so be aware of any vulnerabilities that might come out of the box.

7. Whonix

A two-piece virtual machine that--like Tails–connects to the internet via Tor. However it is not anmesiac and will retain your data. The virtual aspect provides a good deal of protection from attacks on the host machine. There are currently efforts to expand this protection by having a multi-host setup, though this is only for power users.

8. Stegnography

The concealment of files in other files. This can range from glaringly obvious, to almost impossible to detect. There are many different programs, but steghide is one of the most commonly used. Be sure to keep track of which file you use, where that file is, and what you're hiding inside it. For example, it wouldn't be wise to try hiding a 10 GB archive in a 250x250 jpeg that is the only file in your Pictures folder. Make sure the file size makes sense and that it blends in with its surroundings.

9. VeraCrypt

Very handy tool for encrypting files and hard drives. Be sure to verify your download using the PGP Key listed on the Downloads page.

10. Air gaps

This is overkill, but worth thinking about. An air gap is a configuration of two computers where one is used to download and scan files for malware before they're transfered over to an offline computer. This can help protect your achives (and memes) from damaging online attacks.

11. MELTDOWN/Spectre Precautions

MELTDOWN is a vulnerability affecting Intel x86 CPUs, which basically puts any computer using post-1995 Intel hardware at risk. AMD CPUs are not affected by MELTDOWN, but are susceptable to another, somewhat harder to execute vulnerability known as Spectre. Study these vulnerabilities closely and find your own way to try mitigating them. Patches are being released, but at the cost of performance. There reason I mention this is because these will likely be MAJOR weapons used by the clowns in their attempts to erase as many of our findings as possible.

There are many more tools and techniques out there to help keep you safe online, but this is a good starting point.

7997e5 (1) No.426955

>>426873 (OP)

Now THIS is a good thread already.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
1 replies | 0 images | 2 UIDs | Page ???
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / 8teen / abdl / animu / asmr / leftpol / mde / sw / zoo ][ watchlist ]