Rebirth of Reason

Post to this threadMark all messages in this thread as readMark all messages in this thread as unread

Post 0

Friday, November 8, 2013 - 9:06amSanction this postReply
And my first ideas on how to communicate more securely:

1. Buy a laptop computer.
2. Install an OS, doesn't matter which one, preferably something where the source is open to security reviews (such as linux).
3. Install True Crypt.
4. Install linux on a hidden partition with Tor for some security when you are at home.
5. Use a live CD OS like Liberte which uses Tor at a wifi hotspot at a restaurant for extra secure communication. With Mac address randomization and not saving any persistence info like cookies etc on the computer's hard drive/ssd.

#5 should work well for just looking around the internet. More work needs to be done when you want to do things like use email etc.

Post 1

Friday, November 8, 2013 - 9:30amSanction this postReply
Hmmm. Here are a list of cloud vendors that accept Bitcoin:

Cloud Providers and Services
RemoteFS Geo-distributed highly redundant online storage for backups and archival
TrilightZone Providing Privacy Services Since 2005 - Including Offshore Cloud Services - Choose from Multiple Offshore Jurisdictions !
wiki-site.com Wiki hosting
s3rsync.com On line rsync backup to Amazon S3 storage
Yoku Cloud Hosting Private Cloud Servers running Windows or Linux with full remote desktop or ssh access.
Bit-Host exchange bitcoins for your favorite File-Hosting services premium like Rapidshare, Uploaded.net/ul.to or Netload Premium subscription and SAVE!
BitcoinCloud.eu Cloud servers in Amsterdam starting from about 0.04 BTC per month.
GbVault, Online Data Backup: Fast - Safe - Secure
Sublight, Sublight is application for searching and downloading movie subtitles.
Away RJN Cryptography, Before you "cloud" your files, securely encrypt them.
EVALinx Free and Open Source Software consulting. We speak Spanish/English. We specialize in: Virtualization (private and public), LAMP, Networking, Security, Backup and Encryption. We offer personalized hosting solutions as well.
EZComet Realtime web message pushing solution
Rocket Tech Storage Online storage for $0.02/GB/month, SSH/SFTP access, Bitcoin always accepted.

Spin up virtual machine on cloud for as long as you want, pay via Bitcoin, delete it when done.

Post 2

Friday, November 8, 2013 - 10:26amSanction this postReply
Here's an article on internet communication security: Tails/Warning

Summary: Tor doesn't help that much vs various power grabbing government agencies who have lots of control over the internet, and using it may even make your activity more likely to be monitored and known to them. More people would have to use Tor in order to be a needle in a haystack, Tor users are probably more needles in needle stacks.

But... using Tor does help vs less powerful entities in the world.
(Edited by Dean Michael Gores on 11/08, 10:30am)

Post 3

Friday, November 8, 2013 - 10:55amSanction this postReply

One thing about bitcoins is they don't really offer anonymity, the only offer defense from theft. So a person with lots of surveillance info could figure out who you received and sent bitcoins with, but they wouldn't be able steal any bitcoins you securely encrypted.

Potentially there are bitcoin laundry methods, but then you need to trust the people you are exchanging with that they aren't malicious.


Post 4

Saturday, November 16, 2013 - 6:03pmSanction this postReply
Access here on RoR defaults to Internet Explorer, which is hopelessly outdated.  Those who run Safari or Firefox on a Macintosh are more secure.  Google Chrome for the Windows environment is not supported here, except as an allegedly "Gimpy" program along with Netscape.

I mentioned in the Technology Forum that using Wireshark I was able to read my own username and password in plaintext on this site from outside this site.

Computer viruses are the least common form of security breach. All Anti-Virus program makers share their data: to have one is to have another. AV software catches about 4% of viruses.  Other attacks include keystroke loggers and screen scrapers. 

Roughly, perhaps 150 million different malware programs are known to exist because they mutate on their own and because hackers re-engineer them.

See Austin ISSA November 15 program announcement here.  (ISSA: Information Systems Security Association.)

 The most secure program you can use for communication is a one-time pad.  Short of that, I look to PGP, originally called "Pretty Good Privacy" an independent instantiation of the RSA Algorithm.  It is now available free from the owners Symantec here.  This what the lawyers at the Electronic Frontier Foundation use.

(Long out of print.)

Post to this thread

User ID Password or create a free account.