Hard Drive

WHY YOU SHOULD ALWAYS BACK UP YOUR DRIVES, ESPECIALLY ENCRYPTED DRIVES

This is an embarrassing story of something that happened to me in the past few days, and it was a lesson well learned, for...
National Security Agency NSA

CAPABILITIES OF THE NSA

I wanted to share a 1 hour video by one of the tor developers Jacob Applebaum.He talks about legitmate, confirmed capabilities of the NSA...
TOR

HIDING TOR FROM YOUR ISP – PART 1 – BRIDGES AND PLUGGABLE TRANSPORTS

This post is going to talk about something that has been commonly discussed on the forums recently. How can I hide my tor usage...
Bitcoin

LOCALBITCOINS PART 4 – SELLERS BUSTED FOR MONEY LAUNDERING

Here is a simple copy and paste story you should be aware of:Quote State authorities in Florida on Thursday announced criminal charges targeting three men...
Bitcoin

LOCALBITCOINS PART 3 – MORE SCAM STORIES

This post is more stories about people being scammed or robbed on LocalBitcoins.Quote AmbysWorld:just got robbed in Oklahoma City – Edmond, a kid about 20...
Bitcoin

LOCALBITCOINS PART 2 – THIEVES, SCAMMERS AND COUNTERFEIT BILLS!

This post is a continuation from the last one.The threat of being ripped off or scammed on LocalBitcoin is a very real threat.One that...
Bitcoin

LOCALBITCOINS PART 1 – POLICE ARE WATCHING IT!

I have a few stories to share from people who used LocalBitCoins to sell their Bitcoins.Quote In September and October, I sold 213 BTC (gradually)...
Cryptography

YET ANOTHER EXAMPLE OF HOW STRONG CRYPTOPGRAPHY AND PROPER OPSEC CAN PROTECT EVEN PEDOPHILES

Yes, you read the title correctly.Using the same types of techniques taught in this thread, you can and should remain anonymous no matter what...
SAFE MAIL

ARE YOU USING SAFE-MAIL.NET ?

A recent article on Forbes.com talks about a false sense of security users may have when using Safe-Mail.nethttps://www.forbes.com/sites/runasandvik/2014/01/31/the-email-service-the-dark-web-is-actually-using/If you are a user of Silk...
TOR

IT IS OBVIOUS WHEN YOU ARE USING TOR

This is going to be a short post about a mistake we can all learn from when a Harvard student emailed a bomb threat...
md5

AN INTRODUCTION TO AN EXPERT ON OPSEC, PLUS MD5 & SHA-1 CHECKSUMS

This post, I would like to focus on introducing you to an expert in the field of OpSec.*Note this message contains a download, therefore...

ANOTHER SCAM EMAIL – BEWARE

If you have been following my thread for a while now, you will remember the previous email scam going around trying to get people...
PGP

PGP/GPG Email Addresses

This post was created by HonoluluExpress and posted at the following page and I have decided to add it to my security thread with his permission....

THE STRENGH OF CRYPTOGRAPHY AND ANONYMITY WHEN USED PROPERLY

This post is meant to serve as an example of how, when cryptography and anonymity is used properly, you can evade just about anybody...

COLD BOOT ATTACKS, UNENCRYPTED RAM EXTRACTION

Did you know that even if your system is whole disk encrypted, your data can still be extracted using something called a cold boot...
recommended

A FEW RECOMMENDATIONS

Here are a few recommendations that may slip by the average user on these forums.1. Never leave your computer that you use for your freedom...
tracking

COOKIES & JAVASCRIPT REVISITED, PLUS FLASH COOKIES AND OTHER BROWSER TRACKING

Your browser can reveal an alarming amount of information about you.Surprisingly enough, or not too surprising, when you visit a website there is a...
antenna-

MONITORING YOU WITH AN ANTENNA

First thing I want you to do is find a secure way of watching this video.Remember they log everyone who watches these videos and...

THEY ARE WATCHING YOU – VIRUSES, MALWARE, VULNERABILITIES

Your computer will always be vulnerable to some sort of attack from those who want to harm you in some way. Whether it is...
hidden

CLEARNET VS HIDDEN SERVICES – WHY YOU SHOULD BE CAREFUL

Some of you may have seen links to different websites on these forums.In fact my thread is full of them.As you probably know by...
Bitcoin

OBTAINING, SENDING AND RECEIVING BITCOINS ANONYMOUSLY

This post was inspired by a user who posted the following on the Silk Road forums.Quote from: dusttodust on January 12, 2014, 07:39:43 pm BEST...

TOR CHAT

By now if you have been following this thread, you should know that any type of messaging system is likely compromised or storing your...

AN EXAMPLE OF REALLY BAD OPSEC – SMARTEN UP!

Guys, I am not going to post exactly who started this thread quoted below, but it belongs to somebody who is a senior member...

VERIFYING SIGNED MESSAGES WITH SIGNATURES AND SIGNING YOUR OWN MESSAGES

Since we just finished a section on verifying downloads with signatures and public keys, I figured we should do a quick post on verifying...
authentic

HOW TO VERIFY YOUR DOWNLOADED FILES ARE AUTHENTIC

I just had a realization about something that is pretty important and I wanted to share it with you, regarding security. Verifying your downloadsAs a...
TOR

HOW TO CONNECT TO TOR OVER TOP OF TOR

Here is another fun tip that may or may not interest you, but I figured I would throw it in for you anyways.I figured...

INVINCIBILITY MINDSET, FEDERAL GOVERNMENT BULLYING TACTICS

Some people have an invincibility mind set that nothing will ever be able to be tied to them or derived from their online communications.Well...
fbi watching

SECURING YOUR ACCOUNT FROM FBI MONITORING

I just had another realization that you may want to consider.I noticed that certain some people on the forum were never shown as Online, even...

WHERE YOU MIGHT CONSIDER RUNNING TO, IF YOU HAD NO OTHER CHOICE

In the case that you may have to run, here are some things to consider.I am not an expert on evading extradition, or how...
betray

LEARNING FROM OTHERS’ MISTAKES. SABU BECAME FBI INFORMANT AND BETRAYED JEREMY HAMMOND

We are continuing the subject of how others were taken down after Sabu was compromised and started cooperating with the FBI. According to this...
arrested

LEARNING FROM OTHERS’ MISTAKES. HOW THEY BUSTED SABU

This next post I want to focus on more mistakes that other hacktivists and freedom fighters have made which ultimately led to their arrests.This...

FRAUDULENT PRIVATE MESSAGES

Be careful with private messages (PM) online, because one thing that comes with anonymity, is plenty of scammers.Silk Road users have been reporting supsicious...
police oppression

HOW FAR WILL LAW ENFORCEMENT GO?

Today we are going to talk about the lengths that law enforcement (LE) will go to try and catch you slipping.The first question is,...
learnfrommistake

LEARNING FROM OTHERS’ MISTAKES. LIBERTAS, DPR, SABU, LULZSEC

A little change of pace for this next post. I want to talk about one of our fallen moderators Libertas.It has finally been confirmed,...
cookies

TRACKING COOKIES

A recent article explains how the NSA uses things like Google Ads and other tracking cookies to identify users over TOR when doing so...

CONNECTING TOR -> VPN FOR WINDOWS USERS

After a long search, I have found a way you can connect TOR -> VPN. It is not perfect, and some might not agree...
TOR

COMBINING TOR WITH A VPN CONTINUED

Ok, now let us talk about why you may want to connect to a VPN over TOR.The data flow would look like this. You...
TOR

COMBINING TOR WITH A VPN

Today I want to talk about a greatly debated topic.Should I use a VPN with TOR? Should I use TOR to connect to a VPN,...

RETAINING A LAWYER, HOW TO HANDLE GETTING CAUGHT OR INTERROGATED

ext entry into the series on security is how to handle getting caught.Let us face it. We are all human and we make mistakes.Unfortunately,...

EXIF DATA

I forgot to mention above when talking about metadata, that when it comes to photos, there is another risk involved called EXIF data, this...

GENERAL SECURITY PRECAUTIONS WHEN POSTING ONLINE, LEARN FROM OTHERS’ MISTAKES

Next I want to talk about good practices when using TOR, Tails and other hidden services.First of all, it is highly recommended that you...
meta-data

JAVASCRIPT VULNERABILITIES AND REMOVING PERSONAL METADATA FROM FILES

Before I get into removing harmful meta data from your files, I want to talk about another vulnerability to our browsing capabilities called Javascript.In...
hard disk

WHOLE DISK ENCRYPTION AND FILE SHREDDING

Now that we have PGP figured out, hopefully, I want to remind you that using PGP whenever possible, is very very very important.One of...
pgp

PGP CONTINUED

Ok, so by now I am assuming you have Tails running.Let’s learn how to use PGP within Tails.First thing you are going to want...

PGP, TAILS, VIRTUAL BOX

So keep in mind that if you are a user of Silk Road, or any other form of activism, you never want to enter...

INTRODUCTiON TO SECURE COMMUNICATION – TOR, HTTPS, SSL

Greetings comrades.Through my research I have put together some security measures that should be considered by everyone.The reason I put this together is mainly...

Send this to a friend