VPN, privacy & Firefox (+ other Gecko browsers)* rev. 0.3.13

[chan] Crypto-Anarchist Federation
Nov 13 10:51 [raw]

+----------------------------------------------------------------------------------+ | VPN, privacy & Firefox (+ other Gecko browsers)* rev. 0.3.13 | +----------------------------------------------------------------------------------+ ========== VPN section ========== + You can try free OpenVPN configs or Softether: + OpenVPN: - OpenVPN - you can edit configs (.ovpn) with notepad to change encryption (line 88 - standard is not so good: AES-128-CBC - try AES-256-CBC instead) - OpenVPN - you can edit configs (.ovpn) with notepad to add option "block-outside-dns" (for example in line 104) to avoid DNS leaks - OpenVPN - if you add option "block-outside-dns" you can avoid "DNS leaks" & you don't need (Simple) DNSCrypt (my testing suggest that when you using OpenVPN without "block-outside-dns" option together with Simple DNSCrypt you are affected by DNS leaks) (Simple DNSCrypt not working for me, anyway this needs further testing...) - OpenVPN - you can edit configs (.ovpn) with notepad to add option "--remote-cert-tls server" (for example in line 21) to avoid "Man-in-the-Middle" attack https://openvpn.net/index.php/open-source/documentation/howto.html#secnotes [OpenVPN 2.1 and above] - https://www.vpnbook.com/ (few free OpenVPN configs) - http://www.vpngate.net/en/ (a lot of free OpenVPN configs) + OpenVPN manuals: - https://community.openvpn.net/openvpn/wiki/Openvpn24ManPage - https://community.openvpn.net/openvpn/wiki/Openvpn23ManPage - https://openvpn.net/index.php/open-source/documentation/howto.html - https://openvpn.net/index.php/open-source/documentation/security-overview.html + Softether: - http://www.vpngate.net/en/ - I recommend to try DNSCrypt to avoid DNS leaks (check your DNS leaks - links are below) - Changed the default algorithm for SSL from RC4-MD5 to AES128-SHA - http://www.softether.org/5-download/history - http://www.softether.org/1-features/3._Security_and_Reliability + Softether disadvantages: - logging policy: 2 weeks [default] - when you will be disconnected then your IP will be exposed (there is no 'kill switch' feature) - DNS leaks... + Security of popular algorithms: - https://en.wikipedia.org/wiki/RC4#Security - https://en.wikipedia.org/wiki/MD5#Security ========== Browser section ========== + Secure your privacy in Firefox: - by using addons like in IceCat [https://directory.fsf.org/wiki/IceCat] I mean: Adblock Plus (ABP), Disable WebRTC, Fat-Free Fox, No Resource URI Leak, NoScript, Privacy Badger, uBlock Origin (uBO), uMatrix etc. Additionally you can add: CanvasBlocker, Disconnect, FoxyProxy, Https Everywhere, Privacy Settings, Random Agent Spoofer. Take a look @ these sites: - https://web.archive.org/web/20170404173124/http://b.agilob.net/better-security-privacy-and-anonymity-in-firefox - http://configfox.sourceforge.net/ - https://www.bestvpn.com/make-firefox-secure-using-aboutconfig/ - https://www.bestvpn.com/privacy-news/control-firefox-privacy-settings-with-an-add-on/ - https://vikingvpn.com/cybersecurity-wiki/browser-security/guide-hardening-mozilla-firefox-for-privacy-and-security - https://www.howtogeek.com/102032/how-to-optimize-mozilla-firefox-for-maximum-privacy/ - http://www.ghacks.net/2015/07/01/control-privacy-settings-in-firefox-easily/ + If you would like to use Google Chrome anyway you can replace it with Chromium or Iron: - https://en.wikipedia.org/wiki/Chromium_(web_browser) - https://en.wikipedia.org/wiki/SRWare_Iron + Use Tor or Tor Browser (based on Firefox): - "We will never be able to de-anonymize all Tor users all the time. • With manual analysis we can de-anonymize a very small fraction of Tor users" - https://edwardsnowden.com/docs/doc/tor-stinks-presentation.pdf‎ - https://commons.wikimedia.org/wiki/File:Tor_Stinks.pdf - https://en.wikipedia.org/wiki/Tor_(anonymity_network)#Tor_Browser - https://www.torproject.org/docs/tor-manual.html.en - https://www.torproject.org/docs/faq.html.en - https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters + SSH/SOCKS/proxy: - Privoxy - https://en.wikipedia.org/wiki/Privoxy - https://lifehacker.com/5763170/how-to-secure-and-encrypt-your-web-browsing-on-public-networks-with-hamachi-and-privoxy - https://lifehacker.com/237227/geek-to-live--encrypt-your-web-browsing-session-with-an-ssh-socks-proxy - https://outflux.net/blog/archives/2006/12/07/paranoid-browsing-with-squid/ - https://embraceubuntu.com/2006/12/08/ssh-tunnel-socks-proxy-forwarding-secure-browsing/ - https://pl.terminal28.com/instalacja-i-konfiguracja-squid3-tor-privoxy-anonimowosc-w-sieci [translate with your favourite translator] - https://www.reaper-x.com/2011/10/17/how-to-install-squid-proxy-on-windows/ - https://www.unixmen.com/install-configure-squid-proxy-ubuntu-debian/ - https://www.cyberciti.biz/faq/debian-ubuntu-linux-install-onionrouter-software/ - Pirate Tor Browser - http://www.softpedia.com/get/Internet/Browsers/PirateBrowser.shtml or http://www.majorgeeks.com/files/details/piratebrowser.html + Change your UserAgent frequently (get UA addon for your browser). Example of UA sites: - Random Agent Spoofer addon for firefox: https://addons.mozilla.org/en-US/firefox/addon/random-agent-spoofer/ List of UA sites: - http://www.browser-info.net/useragents - http://mybrowseraddon.com/custom-useragent-string.html - https://developers.whatismybrowser.com/useragents/explore/ - https://udger.com/resources/ua-list - https://techblog.willshouse.com/2012/01/03/most-common-user-agents/ - http://www.useragentstring.com/pages/useragentstring.php + Fingerprint (fingerprinting algorithms): - https://en.wikipedia.org/wiki/Fingerprint_(computing) - https://en.wikipedia.org/wiki/Canvas_fingerprinting - https://en.wikipedia.org/wiki/Device_fingerprint - https://browserleaks.com/canvas + Check your browser privacy/security: - https://browserleaks.com/ - http://browserspy.dk/ - https://panopticlick.eff.org/ - https://www.howsmyssl.com/ + Other sites worth mentioning: - riseup.net/en/better-web-browsing - privacytools.io - https://en.wikipedia.org/wiki/Category:Internet_privacy - https://en.wikipedia.org/wiki/Category:Crypto-anarchism ========== OS section ========== + Check Tails Linux: - https://en.wikipedia.org/wiki/Tails_(operating_system) - https://www.wired.com/2014/04/tails/ + Check Whonix Linux: - https://en.wikipedia.org/wiki/Whonix - https://www.whonix.org/ + Secure you DNS with DNSCrypt: - For Linux follow this: http://www.webupd8.org/2014/08/encrypt-dns-traffic-in-ubuntu-with.html - For Windows - you need: "dnscrypt-winclient" or "Simple DNSCrypt". URLs: - https://simplednscrypt.org/ - https://github.com/jedisct1/dnscrypt-proxy/wiki - https://github.com/Noxwizard/dnscrypt-winclient (Simple DNSCrypt not working for me (I'm still using "block-outside-dns" option in OpenVPN config file). (Anyway this needs further testing...) + Check your DNS leaks: - https://ipleak.net/ - https://www.dnsleaktest.com/ - https://whoer.net/ ========== P2P section ========== + Use peerblock - https://en.wikipedia.org/wiki/PeerBlock + Use ipfilter.dat - for example: ed2k://|file|ipfilter_v0153.dat|19871409|93474AE3F1D3A0A7C4EEC7E52A146721|/ __________________________________________________________ * Other Gecko browsers - this means it may also work with: Airfox, Beonex Communicator, Camino, Comodo IceDragon, Conkeror, Classilla, Firefox for Android, Flock, Galeon, Ghostzilla, HP Secure Web Browser, IceCat (GNU IceWeasel), K-Meleon, Kazehakase, Kirix Strata, Lotus Symphony, Lunascape, MicroB, Minimo, Netscape 6, Nightingale, Oxygen, Pale Moon, Portable FireFox, SeaMonkey, Swiftfox, Swiftweasel, Sylera (for mobile), TenFourFox, Timberwolf (AmigaOS 4), Tor Browser, Waterfox, xB Browser https://en.wikipedia.org/wiki/Gecko_(software) Any suggestions are welcomed. Source: https://beamstat.com/chan/privacy https://beamstat.com/chan/Crypto-Anarchist%20Federation (Bitmessage channel)

[chan] Crypto-Anarchist Federation
BM-2cWdaAUTrGZ21RzCpsReCk8n86ghu2oY3v

Subject Last Count
[chan] 411: DARKNET DIRECTORY ASSISTANCE Apr 19 06:52 2
Tonight, in Paris, you are all welcome to the second edition of the "Paris Crypto-Anarchist Meetup". Apr 18 08:43 1
Collaborative blog Apr 18 08:39 2
In Memoriam of Gary Yarbrough: Radio Wehrwolf: Susan Yarbrough Apr 15 19:12 1
STEPHEN HAWKING'S BRAIN PRESERVED BY SCIENCE Apr 13 17:21 5
[chan] TOR <BM-2cUsLJoVvnYr5YpRuAiXWRBnuqrZkCK2M8> Apr 6 14:53 1
The NSA worked to “track down” bitcoin users, Snowden documents reveal Apr 5 19:22 1
Letter for the NSA Apr 5 11:52 1
The Swiss origin of the Pedo Bear Apr 3 19:04 1
The Swiss Khazars rule the world. The Swiss Guard controls the Pope. Apr 3 17:07 1
#DeleteFacebook Apr 3 14:52 2
leadership Apr 3 13:44 1
PRIVACY QUESTION: BEST ANDROID p2p MOBILE MESSAGING APP Apr 3 00:20 1
ANDROID SECURITY Apr 3 00:20 1
How to turn Mersenne Twister into secure stream cipher? Mar 31 13:39 4
Paris Crypto-Anarchist Meetup N°2 Mar 31 12:28 1
Violence and the culture of Crypto-Anarchy Mar 31 12:14 3
thank you all Mar 31 11:41 1
Encryption is not journalism Mar 31 09:43 6
Credit Bureaus Mar 30 23:55 1
We are from the Internet Mar 30 17:50 1
How do you crypto anarchists protect from theft? Mar 30 17:49 5
Cryptech on going discussions so far about some modifications to their 100% Free & FPGA based RNG ! Enjoy ! Mar 28 15:10 1
#LeaveTheChurch Mar 28 14:58 1
News from Cryptech PRNG & an interesting article aboput PRNG backdoors. Mar 28 10:23 1
The Stephen Hawking Fraud Mar 28 04:22 2
CRYPTO ANARCHIST MEETING PARIS Mar 28 02:50 2
RIP Stephen Hawking - I'll miss your brillance, honnesty, clarity, truths & heart. Mar 28 01:42 5
Crypto-Anarchist tip to escape state sandboxing of your internet access when installing new software or doing fresh installs of OS's from ISO disk images downloaded from the internet Mar 27 22:09 1
Next Crypto-Anarchist meeting in Paris. Mar 27 18:03 6
Reminder : Crypto-Anarchist Federation News braodcast address on BitMessage Mar 27 14:31 1
A very good book about P2P networks I really recommand all Crypto-Anarchists to have. Mar 27 12:47 3
Microprocessors hardware architectural backdoors news : As predicted, more branch prediction processor attacks are discovered Mar 27 12:42 1
Racially Motivated, South African Farm Attacks Mar 27 09:14 1
Message in a bottle to LAURI LOVE Mar 26 19:14 1
BEWARE OF SCAMMERS, THIEVES POSING AS HACKERS! Mar 26 15:08 1
The Cambridge Analytica Files : Mar 26 12:21 1
CRYPTOLD (Ancient Crypto) Mar 25 01:26 1
Mark Zuckerberg Hunting : Deploying "Secret Police" To Catch Leakers Mar 24 12:21 1
CRYPTO NOOB QUESTIONS DUPLICATE Mar 24 02:28 1
OMEGA release 42 is available for download Mar 23 20:55 1
The Transgender Assualt on the Creator of JavaScript Mar 23 08:32 1