Tag: Security

  • An observation – How Society reflects the Internet drama over 3 years.

    Over the three years at my University, I have seen a shift in attitudes that can be attributed to the downfall of the Internet with this new SOPA/PIPA/ACTA laws. it’s odd but Society reflects it well, so here goes.

    My first year saw very Politically active groups. Protests were frequent and they had a purpose. Some more blurred than others, but there was at least a force to be reckoned with. I was involved but soon withdrew as splits emerged in how we would go around achieving our objectives. Both in real life and online. I kept ToTSE secret for the most part as it was my little “Fight Club” where I’d go to vent. With the General Elections and the voting in of David Cameron and Nick Clegg as a Coalition, there was Political furor everywhere and people were pleading with me to vote Liberal Democrats.
    However, if a candidate does not suit me, then I won’t vote. Instead drawing a penis on the ballot paper. At this point I was aware of individuals like Ron Paul and my Libertarian upbringing was beginning to emerge. Students soon became complacent and things lost momentum. Facebook was popular, and as a Student, you tended to get your updates of events via these Social Networking sites. People were careful about what they shared and it seemed rather comfortable. Like an awkward family member than you can just about stomach.

    Second year passed almost the same. Much more blurred as the drugs were more frequent and I was in a relationship as well as working for the University. However people were less concerned or active in fighting for what they believed in. Hedonism was the “in” thing and I looked around to see people rightly so enjoying themselves, but if an issue arose, nobody would take any action. They tended to roll over and either accept it or ask somebody else to help them out.
    Needless to say, it was a busy year.

    Now I am almost at the end of my Third and final year. Self-affirmation and belief in Liberty have gone out the window. Technology has become totally integrated into peoples lives – Tweets, Facebook and other Social Networks where you can share all and everything are just another part of the Human body. Privacy means nothing and so when I met my TUtor last week who uses the TOR network I was relieved. It was like an island of sanity in an ocean of carelessness. The first person I met who knew about it in real life, and from an Academic standpoint, almost a saviour.
    As the days go by, not only for myself but for the SOPA/PIPA/ACTA legislation, I look around and see nobody taking any notice. Once again, they roll over and accept it as the inevitable future of the one last beacon of hope – the Internet.
    Although the Internet was built primarily (in my eyes) to share information, it now seems to be for sharing information and entrapment. The amount of personal details people are willing to put into the public domain genuinely puts chills down my spine. A few good examples are the phone number or Blackberry Messenger groups on Facebook which, if you like, can easily be searched via Google and shared within slightly more black to grey-hat circles.

    In a way I find it comforting that, although I’m not amazingly computer literate, but at least security-conscious, that I won’t accept this. The acts may, and probably will be passed, but I know I can rely on my knowledge to help cover my arse when most others will fall foul of them. Even for the most simple of violations.
    Looking forward to a world of work, as we are now going through what the University has termed “Employability Week” things look grim as most Graduates expect to get a high-flying job after 3 years of being fed bullshit about how they will be the next future CEO or whatnot.
    You can’t get there without understanding the world, and although my upbringing was varied in the safety net sense of the word, my exposure to sites like ToTSE, and that includes all of the original .com domain users, has placed me in better stead. I can only hope we grow bigger and can spread the word of safety online, allowing people to preserve their liberty, because from my island, it seems the waters are rising.

    Of course, it’s not all doom and gloom. There is and always will be a way round the laws. Not every Nation will abide and so those who choose not to will profit hugely from Server rentals and traffic of what will soon be deemed “illegal” by the Acts being discussed, revised and passed by the powers that be.
    In the words of Macka B – who are the Terrorists, who are the Heroes? The Soviet Union was once depicted on a propaganda poster as being an octopus with tentacles in its Satellite States, which now seems to be the way the European Union and USA are going – but of course, it’s all under the guise of “freedom” and “Democracy”.
    You can polish a turd, but it’s still a turd.

    If you are reading this and got this far, I cannot urge you enough to join our Community and get learning. Failing to prepare is preparing to fail.

    Stay safe, Brothers.

  • How to Catch Anonymous Users and Take Down Anonymous Networks

    Work in progress guide, I was talking a shit and then it hit me.

    I was always curious how Anonymous gets attacked by Feds. So, after taking my time on the poop seat and I finally got an idea. This How-To basically helps Feds and other agencies to track down anonymous users and kill them.

    I am not a computer wizard but I do make porn videos and I guess that’s wizardry enough when it comes to Anonymous. To catch a prey like anonymous you must become one with nature and CP/JB. You should daily get up and watch girls with small tits jumping up and down. You must visit different websites like stickam. In reality, to catch anonymous with their pants down and dicks up their loose buttholes you need to become an Internet faggot with basically no life.

    You need to register tons of accounts. I mean from Facebook to twitter. You need to suck their cocks and most of all you need to be active. The best way to get in their groups is to lead a campaign or help them in some project. For example, they want to raid a blog etc. You just join with them and notify the blog owner about it and then ask him to cooperate and let you take things down. Sure you will need to convince him but if works you will see your tag on that etc page and all the kidiots would be like OMG l33t.

    The other method is to become a worker. You do some raids and then you can easily track users based on the pattern. Anonymous have ring of selected members leading the raids. You just need to filter out the noise. Text patterns and small tags should be your aim.

    I mean if they do a lulz raid the chances are most of them will slip up.

    Another method you can try is to incite butthurtness. Anonymous is group with random people and people hate each other. You just troll them by pointing fingers and soon enough people will join in. This will then result in a massive butthurt competition.

    Using this chance you check all the IRC channels. You log everything. You don’t idle in them otherwise you will get kicked. Instead just join channels and make new friends.

    The next obvious step is tracing them. this is easy, wait for someone to D0X them and then check their profiles, use Google Cache or Internet Time Machine. Your best bet would be to track their accounts on various forums. Like you found a comment somewhere that some dude is building a water cannon. You then do a Google for blogs. And I am sure you will get some hits or you will find out more posts about that guy. The people who’re talking about him are in fact Anonymous members.

    Find the most active users, become their friends, find out more about them. It helps if you have a stash of JB or CP or if you have fake videos of your sister doing naughty stuff to you. Trust me with that bait they will come to you and become your best friends.

    This is just a start, I call this my brain fart. All these methods listed are valid and hell are unique in their own way. I am not sure if the feds can try them but hey at least you guys know how badly I can fuck things up .

    Discuss

  • Privacy 101 – How to Use Truecrypt

    Privacy 101 – How to Use Truecrypt

    By trx100

     

    What is Truecrypt?

    As written on the Truecrypt website, Truecrypt is – Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux.

    Where should I download it from?

    http://www.truecrypt.org/downloads

    So, how do I create an encrypted file container?

    Once you have downloaded and installed the Truecrypt software, you should go ahead and open it up. You should be presented with a window which looks something like this…
     

    Ubuntu Truecrypt

    • Click on the “Create Volume” button. From here, you can either create an encrypted file container on your HDD, or format an external drive or non-system partition which will then be encrypted. For the purpose of this tutorial, we’ll be creating an encrypted file container. If you wish to play around with the other option, it’s easy enough to follow and get working correctly.
    • Next, the program asks you if you wish to create a “Standard Truecrypt Volume”, or a “Hidden Truecrypt Volume”. The hidden option is fantastic, as it creates a container within a container, each with different passwords. This offers deniability in case you have to reveal your password – in which case you would reveal the password to your unimportant encrypted volume. For the sake of the guide though, we’re going to select Standard TrueCrypt Volume.
    • Choose your file location. Simple enough.
    • Choose your encryption strength and hash algorithm. I’d leave it all default (AES, RIPEMD-160).
    • Specify how much space you want to dedicate to your encrypted file container. Make it as big or as small as you need it to be.
    • Choose a password. Make it s STRONG password. Read the guidelines on creating a password, as using a dictionary word isn’t good at all. Make it significantly long, and jumbled.
    • Once you’ve done that, you need to decide on the type of filesystem you’re going to use. If you don’t, your filesystem won’t be able to be mounted by TrueCrypt and you wont be able to access your files. Just leave it on FAT.
    • Next up is the part where you need to move your mouse around the screen in a completely random manner. Do this for as long as you want, but remember that the longer you do it, the more random and strong the encryption keys will be.
    • Finally, hit the “Format” button. Your encrypted container has been created!

    How do I access the container?

    • Simple. When you’re on the main TrueCrypt screen, select a slot (anyone, it doesn’t matter). Then, hit the “Select File” button, browse to your encrypted container, and double click it. Once you’re brought back to the main screen, hit the “Mount” button, and put in your password.
    • Double click on the newly mounted drive, and use the encrypted file to your hearts content!

    Some words of wisdom by Negrophobe…

    From my basic knowledge and from confirmation from others who are better in the know with programming, there is no tampering or backdoors in thre.

    SERPENT 256 and TWOFISH 256 trump AES in algorithms; and truecrypt allows you to use all of them ontop of each other.

    Free encryption software is the best bet for you. You’re less likely to have some programmers who are doing this for free tricking you for the government. Obviously still check the source code (if it’s closed source it’s a good bet that it’s backdoored e.g. JAP) to make sure.

    With a laptop taken off the back of a van or where ever, with full encyption and random passwords on someone elses unsecure wifi; along with all flash drives encrypted and material saved onto; whilst using a VPN set up by you, or even tor; you should be relatively safe.

    Keep this hidden as well and have a decoy comp and PC which you use too.

    In the UK if they demand the password you can just give them the password to your work safe area whilst they can’t see any of the incriminating material, unless you give them the passphrase for that. Personally I would just stick with the 5 words instead of making their job easy.

    I’d recommend reading the dr who manual (I’ll upload it when I find which flash drive it’s on)

    Here’s some good links for you:

    You have nothing to lose and everything to gain, if you keep your mouth shut.

     

    Discuss

    http://www.totse.info/bbs/showthread.php?t=8082