Skip to main content

Posts

What are the Web related leakage | What is Web related leakage

Web related leakage Your web browser leaks a frighteningly large amount of information about you. For example, even after you protect yourself by concealing your IP address through Tor, it is still possible for someone to use a Java program to obtain your actual source IP and hostname. And this is only the beginning. An excellent test utility to test all the different types of information that can be obtained from your browser is available at BrowserSpy. Most of these can be handled by the excellent Firefox extension NoScript. You are encouraged to test out your browser there in addition to looking over the following material. Contents     1 Cookies     2 Browser User Agent And Capability Info     3 Referrer Url     4 Browser History     5 Web bugs     6 Desktop and Web Browser Extensions Cookies Cookies can be used to track your web usage across even a Tor session, where each connection originates from a different IP. This can be both a blessing and a curse. A blessing bec

Network Attributes of your computer

Contents 1 MAC Address 1.1 Linux 1.2 Windows 1.3 Mac OS 2 802.11 "nickname" 2.1 Linux 2.2 Mac OS 2.3 Windows 3 DHCP Properties 3.1 Linux 3.2 Windows 3.3 Mac OS 4 IP Address 4.1 Proxy Hopping 4.2 SSH Hopping 4.3 OpenVPN 4.3.1 Windows 4.3.2 Mac OS 4.3.3 Linux 4.4 Tor 4.5 I2P 4.6 SLIRP 5 Double Black Magic IP Wizardry 5.1 Tor followed by HTTP Proxy 5.2 Tor followed by SSH-tunneled SOCKS4 Proxy 5.3 OpenVPN over Tor or HTTP Proxy 5.4 SLiRP over Tor or HTTP Proxy 5.5 SLiRP over SSH hopping (and Tor) MAC Address Every 802.x network card (wireless, ethernet, token ring) has a unique 48 bit identifier known as a MAC address. This address is burned into the EEPROM on the card, and oftentimes is used by networking equipment to track users as they come and go, frequently associating MAC address to hotel or dorm room #, credit card number, login info, etc. This means hopping on a network that

Anonymous Communications | Methods of Anonymous Communications Detailed

Anonymity is hard. One f**k up and the game is up. The art of remaining anonymous is constantly evolving and what works one day may not work the next. There are very few people that know *all* of the ways communications are monitored and how to protect your privacy. There are however some best practices that you must use in order to give yourself the best chance. Contents     1 Anonymous Email     2 Posting to Usenet     3 IRC/Instant Messaging         3.1 Choosing an IRC Client         3.2 Choosing an IRC Network     4 Creating Web Content         4.1 On the Public Web         4.2 Over Tor         4.3 Over I2P         4.4 Apache Tidbits         4.5 Anonymous Blogging     5 Document Metadata         5.1 Microsoft Office         5.2 LibreOffice/OpenOffice         5.3 Document DRM         5.4 Image Metadata     6 Bit Torrents/P2P apps         6.1 Over Tor         6.2 Over I2P     7 Guerrilla Data Exchange     8 The Vector of Information     9 The Social Network Anonymous Emai