Jump to content
The Corroboree

at0m

Members2
  • Content count

    903
  • Joined

  • Last visited

  • Days Won

    10

Everything posted by at0m

  1. at0m

    computer question

    What doublebenno said. Motherboard is the "mother" that connects all the "children" components together. Those hard drives can be plugged-in (internally or through an external enclosure) to any computer and the data will be readable.
  2. You're going to be hard pressed to get an ageing demographic to accept legal weed. Fucking stoners, right? It's a positive step in the right direction and nobody's going to /really/ say no sick kids. The rest will come. Eventually.
  3. at0m

    at0m's digital OPSec guidelines

    I could get us another IRC room going or we could all start using jabber/xmpp. I'm personally leaning toward jabber/xmpp as we can them all use our own servers/server we trust (but I'll be setting my own up in the next week, In the mean time I'm [email protected])
  4. I will provide information to the best of my knowledge however it is provided as is without any guarantees or assurances. Do your own research as well. The best way to use this is to understand it and build on it. I've been meaning to do something like this for quite a while but never really got around to it. With the metadata stuff coming into effect soon, I figured now is as good a time as any to start writing some things on the topics. I'll try cover as much as I can, as best I can, but let me know if you have any questions, suggestions, ideas, whatever. Some topics I'd like to cover include VPNs, Tor, Bitcoin, PGP/GPG encryption and general internet privacy. If you've got others you want me to cover, let me know. VPNs What is a VPN? VPN stands for Virtual Private Network. It's main use was to allow people/computers to securely remotely connect into a personal or private network (usually an office) from wherever they may be. This would allow them to safely access the internal services like printers, shared drives/folders, and most importantly and relevant to this post - the internet connection. Despite Bob being at home, their IP would still be the same as if they were in the office for all traffic routed through the VPN. People then started using VPNs solely for the previously mentioned purpose of routing traffic through remote locations. How do they stop my metadata being collected/how do they work? Well... they don't. But they stop the important stuff being collected. The only metadata that can be collected by Australian ISPs about your internet usage when you're using a VPN is, well, that you're using a VPN. The traffic is fairly easily identified but it's all end-to-end encrypted meaning that at no point along it's journey does your traffic become readable to any party.' Are there any drawbacks? Yup! The biggest one you will notice, especially living in Australia, is speed. Expect to lose atleast a 3rd of your internet speed. The second biggest thing you'll notice is the hassle if you're going all out. It's very easy to put it in the too hard basket because you've got to install it on all of your devices, make sure they're always connected to the VPN, keep your bills paid, get annoyed at how slow it gets sometimes, etc... Unfortunately privacy comes at a cost now days. Alright, I'm with ya, how do I get one of these VPNs? Short answer: Buy service from a reputable provider like IPVanish, PIA, IVPN or similar. Using a credit card or Paypal is fine. You're looking at about $10/month but (much) less if you buy in larger blocks (3 months, 6 months, 1 year). Long answer: Do a bit of research about the providers out there. Some questions to ask: Do they log? (Logging for VPNs is usually, amusingly, metadata which is often identifiable if given to certain parties) Do they use OpenVPN? (If they don't, don't use them) What are people saying about them? Where are their servers located? Where do the companies operate from? How much do they cost? Do they support multiple devices/connections? Do they look legit? How much info are they asking for? Once you've found one that ticks your boxes, sign up and pay for your plan. Use bitcoins if you want but realistically Paypal or credit card is likely going to be alright unless you're doing really nefarious things and want some anonymity with your privacy (they are not the same thing). Start with a single month and see how it goes for you. If all is well, consider longer billing periods. They usually have pretty extensive guides on how to connect from your difference devices so I won't cover that here. Once connected, run a few checks like see what DuckduckGo thinks your IP is, what DNSLeakTest says and maybe some speed tests if you're interested. Finally, go about your normal browsing. Some interesting links World War II information security: Navajo VPN - Kaspersky Blog I Am Anonymous When I Use a VPN - VPN Myths (I wouldn't go with them as a provider but the info is interesting) VPN - Wikipedia Tor - Wikipedia List of privacy conscious VPN providers by a torrenting/piracy blog (trustworthy) - TorrentFreak
  5. at0m

    at0m's digital OPSec guidelines

    XMPP/jabber client + OTR + well run server. Pidgin + OTR + Dukgo server (From the great guys at Duckduckgo) Setup guide: https://securityinabox.org/en/guide/pidgin/windows Dukgo guide: https://duck.co/blog/post/2/using-pidgin-with-xmpp-jabber Alternatively, something a little more experimental: ricochet.im. It uses the tor network quite cleverly. Alternatively-er: Go back to the good old IRC servers All the usual warnings here about being careful about what you say either way, nothing is 100%, etc. We should do key signing parties at meetups. Edit: I also feel like the title of this thread should really be read more as "Digital Privacy Guide". Opsec implies you've got something to hide and if they're perusing you, these won't help all that much. They're more to stop passive surveillance.
  6. at0m

    at0m's digital OPSec guidelines

    Minor bump for this image. I'm a big believer in Signal. Solid encryption and team behind it. Encrypted messages and phone calls. There is a desktop messenger client coming soon too. https://whispersystems.org/
  7. at0m

    GardInspiration

    Bump because I did a pallet thing! Do look forward to it being a bit more filled out but not bad for my first ever project. Had to replace quite a few planks on it with some from other pallets but totally worth it. Found a good source for pallets too so when my thicknesser arrives, I should have some more pallet stuff to show off! (PS: I'm (probably) back! Out in the country now on a couple acres, got lots to talk about)
  8. http://www.premier.vic.gov.au/medicinal-cannabis-to-be-legalised-in-victoria * But: From 2017 For 'exceptional cases' Cultivated within Victoria Likely other stuff Step in the right direction, for sure, but I'm sure we're all on the same page about it not being enough in the long run. Side note: Source: https://www.facebook.com/DanielAndrewsMP/photos/a.149185875145957.31693.134712696593275/957125697685300/?type=3 That's pretty rad too!
  9. at0m

    TBM long form Euro clone

    It /does/ show up for the correct spelling but it's waaaaaay down the bottom in "More items related to trichocereus" along with this bargain and this p. viridis. That's a mighty big gash on the side tipz
  10. at0m

    TBM long form Euro clone

    http://pages.ebay.co.uk/help/sell/editing-store-inventory.html Not sure if that helps. Really sucks about the splitting though PS: This is why you always setup alerts for misspellings ;) Typo bargains.
  11. at0m

    2n a half k post care pack

    The video is prize enough for all. Congrats
  12. at0m

    2n a half k post care pack

    I guess that makes me #10? <3 ethy
  13. at0m

    at0m's digital OPSec guidelines

    Realistically, against the NSA, you're kind of fucked. I did note in the post is that the only VPN protocol any trust should be put in is OpenVPN but I'll give you that against the NSA and similar, you're probably fucked anyway. Best you can hope for is to not be a big enough target for them. I'd be highly doubtful that AU has access to those tools for non-international cases tbh.
  14. This is only slightly related because it's not very basic but I thought some of you guys may get a kick out of it anyway. https://www.youtube.com/watch?v=ynA8hPDIxZM
  15. at0m

    Rehab is making me crazy (crazier....)

    Small hairy child?
  16. at0m

    Rehab is making me crazy (crazier....)

    What's in the cage?
  17. at0m

    GardInspiration

    Pallets! And as a bonus: Light up your garden edging with some LED strips!
  18. No worries! Please feel free to ask any questions or give ideas/feedback. It was written a bit late at night so I'm worried it may be a bit scattered or missing things. Might add some diagrams too for the visual people (like myself).
  19. at0m

    GardInspiration

    I dig it, Brooa! Simple, a nice "rustic" look to it and recycling! Some of my favourite things. I'm going to go searching around for some more pallet ideas. I don't know if they're as commonly used/found here in AU as they are in the states where it seems to be a big thing but I'll be damned if I don't love the idea!
  20. First and foremost: DO NOT use Tor for anything you log into on the "clearnet" (SAB, Facebook, twitter, Gmail, etc). Tor exit nodes, who you are routing your traffic through, should not be trusted. Tor to Tor (anything ending in .onion) is 100% encrypted until the destination though. To answer your question: Unless there's vulnerabilities in Tor (which I'm still not convinced there are however I am starting to get a bit more sus. about it as the weird happenings continue), the answer is no. They cannot see your traffic as anything other than "That person is using Tor (probably) and they're using X amount of data".
  21. Ex-NSA Chief: 'We Kill People Based on Metadata' Meta data is the envelope, not the letter inside it. Which is to say everything about the communication/transaction except the part that gives it context. Don't misread that as me wanting them to store that too... I want no data retention. (Probable retained metadata in orange): (Date: 17:00 21/09/2015) Bob (From: [email protected]) sends Jane (To: [email protected]) an email with the subject "Quote for 1500 units of teddy bears" and body telling her about the bears and asking for more info. He attaches a photo of an idea he had for the teddy bear. (Size: 1.5MB, Filetype: JPG) When Bob gets arrested for "dissenting against the system" and his metadata is pulled, they can now build a web of connections around Bob and prove that he had been in contact with Jane. Without context, Jane is now pulled into the fold. You can bet they will be storing the destination of web connections too. Your last line is spot on though. I feel like I should write a quick guide on this... not that it's hard.
  22. at0m

    Rehab is making me crazy (crazier....)

    I remember those fuckers from when I was down there... They were my first real experience with Australia's dangerous flora and fauna. Bastards. Amazing photos and info as usual, wb.
×