Home | Community | Message Board

World Seed Supply
This site includes paid links. Please support our sponsors.


Welcome to the Shroomery Message Board! You are experiencing a small sample of what the site has to offer. Please login or register to post messages and view our exclusive members-only content. You'll gain access to additional forums, file attachments, board customizations, encrypted private messages, and much more!

Jump to first unread post Pages: < Back | 1 | 2  [ show all ]
Anonymous #1

Re: Nerotik's Network Security and Anonymity Guide. [Re: decaf]
    #26173895 - 09/07/19 09:03 AM (4 years, 8 months ago)

Please don't distribute this as a PDF. The format is horribly insecure for everyone.

From the reader's perspective, PDFs can run scripts and connect to the internet. What's the point of publishing a PDF about Tor when the document itself can connect to a server and bypass Tor's IP address obfuscation? Besides the inherent risk of the document being able to run arbitrary programs. The Tor Browser is dead simple to use, being a hardened Firefox fork that automagically establishes a secure network connection.

From the writer's perspective, there's too much damn metadata. It sounds like your guide has embedded screenshots. Did you strip the metadata from these images before adding them to the PDF? What about the metadata of the PDF itself? The only way to make a clean PDF is to copy its contents into a fresh document without metadata.

On Tor itself, please know your use case! It's not an invisibility cloak for the internet, rather a highly visible anomaly on the network. Tor traffic glows on the wire, but all Tor traffic looks the same. You should use Tor at a public access point with a spoofed MAC address. Otherwise you're pointing a neon arrow at your workstation that says, "I have something to hide."

That's actually how they caught the Harvard bomb threat guy: check the logs to see who on campus used Tor when the bomb threat was sent. All he had to do was walk across the street to a cafe and spoof his MAC address before connecting.

Edit: Sorry, I didn't realize this thread is 10+ years old. Oh well, it's already bumped.

Edited by Anonymous (09/07/19 09:06 AM)

Extras: Filter Print Post Top
InvisibleLateForTheFuture
Old Hand
I'm a teapot User Gallery


Registered: 02/24/03
Posts: 845
Re: Nerotik's Network Security and Anonymity Guide. [Re: YuriKalevra17]
    #26181634 - 09/11/19 11:02 AM (4 years, 8 months ago)

Quote:

YuriKalevra17 said:
From what I understand, it takes a lot of resources, like federal-level resources, to identify tor users. I read a book about how they tracked and caught Silk Road creator Ross Ulbricht (spell check?) by identifying a unique tor traffic pattern that could be matched to his network use. This was a multi-agency federal task force though that involved the FBI, IRS, and several other big-budget federal agencies, so I don't think it's within the means of local or regional PD.

I think tor is relatively safe but, for maximum operational security, using Tails OS (which includes Tor Browser) on public WiFi is one of the most secure, in my opinion.




They caught him from a simple google search that lead to his account here on the shroomery.

Extras: Filter Print Post Top
OfflineFungiMaster
Entrepreneur
Male User Gallery


Registered: 10/31/19
Posts: 998
Loc: Bay Area, CA, USA Flag
Last seen: 4 years, 5 months
Re: Nerotik's Network Security and Anonymity Guide. [Re: LateForTheFuture]
    #26294153 - 11/02/19 12:55 PM (4 years, 6 months ago)

just read a ceh book for network security.


--------------------


https://tinyurl.com/wjuxagb

Extras: Filter Print Post Top
OfflineFungiMaster
Entrepreneur
Male User Gallery

Registered: 10/31/19
Posts: 998
Loc: Bay Area, CA, USA Flag
Last seen: 4 years, 5 months
Re: Nerotik's Network Security and Anonymity Guide. [Re: FungiMaster]
    #26352815 - 11/29/19 08:46 PM (4 years, 5 months ago)

Dude, that's a pretty geeky self help guide.


--------------------


https://tinyurl.com/wjuxagb

Extras: Filter Print Post Top
Offlinecatalog99
Stranger
 User Gallery
Registered: 06/12/23
Posts: 18
Last seen: 1 month, 18 days
Re: Nerotik's Network Security and Anonymity Guide. [Re: Nerotik]
    #28476223 - 09/20/23 10:46 AM (7 months, 24 days ago)

The instructions in this tutorial are outdated.  Is there an updated tutorial?

Extras: Filter Print Post Top
Offlinecidero
Stranger

Registered: 10/15/22
Posts: 50
Last seen: 27 days, 9 hours
Re: Nerotik's Network Security and Anonymity Guide. [Re: catalog99]
    #28523411 - 10/30/23 01:14 PM (6 months, 15 days ago)

Yes, this is really outdated and nowadays plain wrong information, please do no rely on any of this! Vidalia was discontinued almost 10 years ago. Use Tails.

Extras: Filter Print Post Top
Jump to top Pages: < Back | 1 | 2  [ show all ]


Similar ThreadsPosterViewsRepliesLast post
* Internet Security abhi 973 2 06/27/04 10:45 PM
by Vvellum
* Remote Desktop Management for Novell Networks HidingInPlainSight 1,126 6 01/20/04 09:56 PM
by nife
* The BASICS of Securing your computer and E-mail. Cyber 2,691 12 06/09/09 03:34 PM
by Alan Rockefeller
* Tor: An anonymous Internet communication system garbage 933 1 04/10/05 08:59 AM
by newuser1492
* Secure Email theocean06 1,425 12 01/24/05 08:58 AM
by nife
* Metadata jonsnow 379 4 08/18/13 10:32 PM
by Bacchus
* securing my Linux box monoamine 505 1 07/05/04 08:05 PM
by Cyber
* security test Xochitl 1,201 5 11/02/03 03:03 PM
by Kid_Orgo

Extra information
You cannot start new topics / You cannot reply to topics
HTML is disabled / BBCode is enabled
Moderator: Enlil, Alan Rockefeller
8,612 topic views. 0 members, 0 guests and 3 web crawlers are browsing this forum.
[ Show Images Only | Sort by Score | Print Topic ]
Search this thread:

Copyright 1997-2024 Mind Media. Some rights reserved.

Generated in 0.021 seconds spending 0.003 seconds on 13 queries.