Quantcast

Archive: Feb 2015

Don’t Fuck It Up 6: OPSEC with Phones

Zoz underscores the immense amount of personally identifiable data that cell phones can leak and provides recommendations on using burner phones securely. Let’s move to phones. What does that little Benedict Arnold in your pocket do to give you away? So much frickin’ stuff (see right-hand image). The...

Don’t Fuck It Up 5: The Silk Road and Dread Pirate Roberts Story

Zoz contemplates on the potential weak links of using Tor hidden services, making some assumptions about OPSEC fails by the infamous Dread Pirate Roberts. Here’s some more good news: the big list and the small list. These are the recently leaked XKeyscore filter rules (see left-hand image). Basically,...

Don’t Fuck It Up 4: Use Tor the Right Way

Zoz has got some great points on the ways of using Tor securely, providing real-world fail examples and underscoring that Tor is not really for encryption. Let’s go multi-hop. Don’t fuck it up when you use Tor. Hopefully everyone here knows what Tor is and the main way you fuck it up when you use Tor,...

Don’t Fuck It Up 3: The Ins and Outs of VPNs

This part provides the analysis of whether using VPN services prevents traffic interception and gets a user on some kind of a potential suspects list. So, here’s the first tool, VPNs (see left-hand image). You are going to use an insecure network – are you safe? Two questions when it comes to tools:...