Overclock.net › Forums › Software, Programming and Coding › Networking & Security › You're in China/Saudi Arabia and....
New Posts  All Forums:Forum Nav:

You're in China/Saudi Arabia and....

post #1 of 38
Thread Starter 
And you're reporting on human rights violations secretly to the rest of the world, in addition to having a secret stash of pornography or possibly offensive/vulgar obscene blasphemous, in certain States/Countries. (i.e. Comics of Muhammad or Girls Gone Wild).

How would you protect your data, protect your system, and still remain anonymous?

Just thought this would be an interesting thought-experiment. I already know ALOT of ways to anonymize your data, protect your system, and encrypt your files, but I'm interested in creating a guide/tutorial (if there isn't one on OCN already. If there is, I appologize)


tl;dr
How do you secure your computer/data from others and remain anonymous/secure while on the internet.

CHECK SECOND POST FOR A QUICK GUIDE.
This is a rough-draft, I will refine it, make it more read-able, and user friendly.
I will also add more to it and refine it.
Feel free to make suggestions/recommendations on what to add/change.

Edited by FriedSushi87 - 1/21/11 at 10:18pm
Sweaty Fat Man
(13 items)
 
  
CPUMotherboardGraphicsRAM
x4 Phenom 965 3.8 GHz Asus M4A79XTD EVO X2 GeForce 9800 GT 512 MB OC 8GB (4 x 2GB) G.Skill 1600 DDR3 
Hard DriveOptical DriveOSMonitor
Samsung F3 1TB + 1TB F1 backup. DVD-RW Windows 7 Pro. 64-Bit Signature Edition 23" Samsung + x2 19" DELL Widescreen LCD 
KeyboardPowerCaseMouse
Logitech G110 Corsair CMPSU-650TX 650W LIAN LI Lancool PC-K62 Razer Copperhead 
Mouse Pad
Razer Goliathus Medium 
  hide details  
Reply
Sweaty Fat Man
(13 items)
 
  
CPUMotherboardGraphicsRAM
x4 Phenom 965 3.8 GHz Asus M4A79XTD EVO X2 GeForce 9800 GT 512 MB OC 8GB (4 x 2GB) G.Skill 1600 DDR3 
Hard DriveOptical DriveOSMonitor
Samsung F3 1TB + 1TB F1 backup. DVD-RW Windows 7 Pro. 64-Bit Signature Edition 23" Samsung + x2 19" DELL Widescreen LCD 
KeyboardPowerCaseMouse
Logitech G110 Corsair CMPSU-650TX 650W LIAN LI Lancool PC-K62 Razer Copperhead 
Mouse Pad
Razer Goliathus Medium 
  hide details  
Reply
post #2 of 38
Thread Starter 
1) Updating everything. An exploit in Flash or PDF or even an instant messenger application can be bad. For Windows Users, I recommend:
http://secunia.com/vulnerability_scanning/personal
2) Keep an external thumb drive for all sensitive material. Never keep this thumb drive with the PC unless you're currently using it. This will make things appear less suspicious on your main PC. If your laptop/PC ever gets inspected, it will appear to be innocent. I recommend:
https://store.ironkey.com/personal
3)Encrypt your thumb drive! I recommend external encryption on a thumb disc rather than a partition/whole drive encryption for a few reasons. First, it's easier for you to take, hide, destroy, swallow, ect... a thumb drive. Plus, handing a thumb drive from one person to another is the most secure way, especially when one's communications may be monitored. Secondly, even the best encryption algorithms today might be cracked in a year or two. When you encrypt, lets say, an archive and leave it in a folder on your desktop on your main hard drive, every time you write to it, data goes all over your drive. How computers work is that data written is not always sequential, and sometimes one file can have bits and pieces (CLUSTERS) spread out all around your PC. These clusters are, of course, encrypted, but who's to say that a few years from now the encryption is broken, or a critical breakthrough happens in CPU computing power and allows a Chinese Super Computer to search your hard drive for encrypted data/bits and brute force their way through. You'd have no way for removing these pieces of information, unless of course you physically destroyed your disk or attempted to use an ERASER program.
I recommend TrueCrypt:
http://www.truecrypt.org/
I WILL MAKE A MORE DETAILED GUIDE ON TRUECRYPT LATER ON.
Encrypt an entire USB Thumb drive. You can even make hidden volumes within the thumb drive, and create a "fake" key.
Let's say, you're James Bond, and someone catches you, and tortures you for the password. You give them the Password "SWORDFISH" which unlocks the THUMB drive and shows whatever files you put on it. Though, these aren't your hidden files. This is whatever you want your abductors to see, it can be false information, if you'd like.

Now instead, if you didn't type "SWORDFISH" as the password, and typed, lets say "CHINASUCKS", then the true contents of the thumb drive would be revealed.

You can even tie the THUMB DRIVE to a certain file. ANY FILE. It can be an exe, a jpeg of you and your gf, a thumbs file in some windows folder. When you pop in the thumb drive you must select that file and then type in the PW and then it'll un-encrypt. Without the file, you cannot see the contents of the archive.

If an average joe were to get hold of the thumb drive and put it into someone's computer and try to open it, you'd get a windows message saying that it's not partitioned, and ask if you'd like to format it. NO DATA will show up! No one would even know that there's anything on it (you can modify it so that certain files do show up when you put it inside).

4) Internet. Anything you say or do on the internet can be traced back to your computer. IP's man, they're traceable! I'd recommend TOR. TOR is an open source free proxy program. Your computer sends requests to view a web page or download a file to an entry-node, which then sends your request, daisy-chain through 6 other computers until it reaches a TOR exit node, where the exit node sends/receives data on your behalf like it were your own computer. You post/upload a picture of President Obama picking his nose? CIA tracks your IP to the EXIT node instead of your computer. YOU ARE SAFE!

This also helps you get around various blocks on certain sites, especially in China and other countries that censor the internet.

http://www.torproject.org/

5) Browser. Honestly, steps 4/5 can be combined, and I don't recommend downloading the full/fledged TOR client. Installed onto your main PC, if it ever gets inspected, it could be suspicious. (not really bad, but normal Chinese citizens don't use TOR. At least in the eyes of the government.) I suppose you could install it onto your little thumb drive.

I recommend:
http://www.torproject.org/projects/torbrowser.html.en

This is basically FireFox portable, with a built in TOR client, easily launched from a USB. It comes pre-installed with the hefty little add-on TOR BUTTON:

https://addons.mozilla.org/en-US/fir...don/torbutton/

Also, even though you're through 7 proxies, I recommend caution when browsing the internet. Not only is TOR really slow because of limited bandwith, but you don't want any unnecessary attention pointed towards you or any of TOR's exit nodes. Turn off Java-Script, (or get NoScript). Turn off images, and manually load all images you want. (remember, an image loaded, even if it's 1px by 1px of clear space, is an IP being logged).

XXXXXXXXXXXXXXXXXXX - Other steps here required to tweak Firefox to work well with TOR and to maximize anonymousness...
6) ERASER. When you delete a file, it's not actually deleted. It's sent to the Recycle bin. When you empty the Recycle Bin, it's not actually deleted either. It's just removed from the folder, and "marked" that it's a deleted file and it's okay to be written over by other files if need be. The actual file is still there. This is true for copy/paste and dragging/dropping files too. You have the launch codes to USA's nuclear arsenal and you drag/drop them from your hard drive to a thumb drive? Guess what! It's still there.

ERASER and other programs like it actually re-write the entire file. ERASER can be configured to write over the file with random 1's and 0's for up to 32 times in a row, making it incredibly difficult, if not impossible to recover data stored on the medium.
http://eraser.heidi.ie/

7) Browsing history! Well, if you followed my lead and put firefox mobile with TOR on your thumb drive, you shouldn't have much of a browsing history at all. But still, in case you use your main PC's browser to surf the net and may have stumbled onto something...
I use CCLEANER. It does a bunch of things. Browsing history, temporary internet files, cookies, autocomplete, passwords, windows recently viewed documents list, and MUCH MUCH more. It can also be configured to securely delete in a fashion similar to ERASER.
http://www.piriform.com/ccleaner/download
Edited by FriedSushi87 - 1/21/11 at 10:16pm
Sweaty Fat Man
(13 items)
 
  
CPUMotherboardGraphicsRAM
x4 Phenom 965 3.8 GHz Asus M4A79XTD EVO X2 GeForce 9800 GT 512 MB OC 8GB (4 x 2GB) G.Skill 1600 DDR3 
Hard DriveOptical DriveOSMonitor
Samsung F3 1TB + 1TB F1 backup. DVD-RW Windows 7 Pro. 64-Bit Signature Edition 23" Samsung + x2 19" DELL Widescreen LCD 
KeyboardPowerCaseMouse
Logitech G110 Corsair CMPSU-650TX 650W LIAN LI Lancool PC-K62 Razer Copperhead 
Mouse Pad
Razer Goliathus Medium 
  hide details  
Reply
Sweaty Fat Man
(13 items)
 
  
CPUMotherboardGraphicsRAM
x4 Phenom 965 3.8 GHz Asus M4A79XTD EVO X2 GeForce 9800 GT 512 MB OC 8GB (4 x 2GB) G.Skill 1600 DDR3 
Hard DriveOptical DriveOSMonitor
Samsung F3 1TB + 1TB F1 backup. DVD-RW Windows 7 Pro. 64-Bit Signature Edition 23" Samsung + x2 19" DELL Widescreen LCD 
KeyboardPowerCaseMouse
Logitech G110 Corsair CMPSU-650TX 650W LIAN LI Lancool PC-K62 Razer Copperhead 
Mouse Pad
Razer Goliathus Medium 
  hide details  
Reply
post #3 of 38
VyprVPN, FindNot, Secure Tunnel etc. If you sign up to someone like GigaNews, go SSL.
Ryzen
(12 items)
 
  
CPUMotherboardGraphicsRAM
Ryzen 7 1700 Gigabyte GA-AB350M Gaming 3 Palit GT-430 Corsair Vengeance LPX CMK16GX4M2B3000C15 
Hard DriveCoolingOSMonitor
Samsung 850 EVO AMD Wraith Spire Linux Mint 18.x Dell UltraSharp U2414H 
KeyboardPowerCaseMouse
Apple Basic Keyboard Thermaltake ToughPower 850W Lian-Li PC-A04B Logitech Trackman Wheel 
  hide details  
Reply
Ryzen
(12 items)
 
  
CPUMotherboardGraphicsRAM
Ryzen 7 1700 Gigabyte GA-AB350M Gaming 3 Palit GT-430 Corsair Vengeance LPX CMK16GX4M2B3000C15 
Hard DriveCoolingOSMonitor
Samsung 850 EVO AMD Wraith Spire Linux Mint 18.x Dell UltraSharp U2414H 
KeyboardPowerCaseMouse
Apple Basic Keyboard Thermaltake ToughPower 850W Lian-Li PC-A04B Logitech Trackman Wheel 
  hide details  
Reply
post #4 of 38
put it on a flash drive and swallow it.

Whenever you want to use it, just crap it out, and when your done, swallow it again!


I see no flaw in this plan.
Alienware M9700
(14 items)
 
Wackbook pro
(12 items)
 
Mpowerlicous
(12 items)
 
CPUCPUMotherboardGraphics
AMD Turion ML-42 2.4GHz AMD Turion ML-40 Alienware nForce3 2X nVidia GeForce Go 7900GS SLI 
RAMHard DriveOSMonitor
1GB DDR 333MHz Samsung Spinpoint 250GB Windows XP Professional 1920X1200 Integrated LCD 
Case
Alienware M9700 chassis 
CPUMotherboardGraphicsGraphics
Core i7 3615QM @2.3GHz Apple Logic Board Intel HD 4000 Nvidia GT 650M 512MB 
RAMHard DriveOSMonitor
16GB 1600MHz DDR3 500GB Samsung 840  OSX 10.10 1440x900  
PowerAudioAudioAudio
85W PSU Schiit Modi Schiit Magni 2 Über DT770 Pro 
CPUMotherboardGraphicsRAM
Intel i7 3770K MSI Z77 Big Bang MPower Radeon R9 270X 4X4GB G.Skill  
Hard DriveCoolingOSMonitor
Intel X25-V Cooler Master Hyper 212+ Life without walls? Who needs windows? Acer 
KeyboardPowerCaseMouse
G15 Raidmax RX-1000AE Brooks shoebox  Acer G500 
  hide details  
Reply
Alienware M9700
(14 items)
 
Wackbook pro
(12 items)
 
Mpowerlicous
(12 items)
 
CPUCPUMotherboardGraphics
AMD Turion ML-42 2.4GHz AMD Turion ML-40 Alienware nForce3 2X nVidia GeForce Go 7900GS SLI 
RAMHard DriveOSMonitor
1GB DDR 333MHz Samsung Spinpoint 250GB Windows XP Professional 1920X1200 Integrated LCD 
Case
Alienware M9700 chassis 
CPUMotherboardGraphicsGraphics
Core i7 3615QM @2.3GHz Apple Logic Board Intel HD 4000 Nvidia GT 650M 512MB 
RAMHard DriveOSMonitor
16GB 1600MHz DDR3 500GB Samsung 840  OSX 10.10 1440x900  
PowerAudioAudioAudio
85W PSU Schiit Modi Schiit Magni 2 Über DT770 Pro 
CPUMotherboardGraphicsRAM
Intel i7 3770K MSI Z77 Big Bang MPower Radeon R9 270X 4X4GB G.Skill  
Hard DriveCoolingOSMonitor
Intel X25-V Cooler Master Hyper 212+ Life without walls? Who needs windows? Acer 
KeyboardPowerCaseMouse
G15 Raidmax RX-1000AE Brooks shoebox  Acer G500 
  hide details  
Reply
post #5 of 38
Quote:
Originally Posted by reflex99 View Post
put it on a flash drive and swallow it.

Whenever you want to use it, just crap it out, and when your done, swallow it again!


I see no flaw in this plan.
Unless they capture you and cut you open
I know China have some very sophisticated ways of finding suspicious information(terrorist, anti-gov, and other sensitive infos) on the internet, so your best bet really is VPN. If they find out which IP address submitted these kind of info they will locate you and get you within a few hours if not minutes. (only if you are within Chinese territory of course)
Edited by nardox - 1/21/11 at 5:00pm
SK-004
(14 items)
 
  
CPUMotherboardGraphicsRAM
Intel Xeon E3-1235 Asus P8P67 WS Revolution Gigabyte 7950 Windforce Samsung Low Profile 4x4GB, 1600Mhz 
Hard DriveOptical DriveCoolingOS
Plextor M3 256GB, WD 1.5TB Black, 2x Hitachi 2T... Lite-On 20X DVD burner Thermalright HR-02 Windows 7 Ultimate 64bit 
MonitorKeyboardPowerCase
HP ZR30w Razer BlackWidow Ultimate Seasonic X750 Lian Li V1020R 
MouseMouse Pad
Logitech G500 Ikea desk 
  hide details  
Reply
SK-004
(14 items)
 
  
CPUMotherboardGraphicsRAM
Intel Xeon E3-1235 Asus P8P67 WS Revolution Gigabyte 7950 Windforce Samsung Low Profile 4x4GB, 1600Mhz 
Hard DriveOptical DriveCoolingOS
Plextor M3 256GB, WD 1.5TB Black, 2x Hitachi 2T... Lite-On 20X DVD burner Thermalright HR-02 Windows 7 Ultimate 64bit 
MonitorKeyboardPowerCase
HP ZR30w Razer BlackWidow Ultimate Seasonic X750 Lian Li V1020R 
MouseMouse Pad
Logitech G500 Ikea desk 
  hide details  
Reply
post #6 of 38
Quote:
Originally Posted by reflex99 View Post
put it on a flash drive and swallow it.

Whenever you want to use it, just crap it out, and when your done, swallow it again!


I see no flaw in this plan.
post #7 of 38
Quote:
Originally Posted by reflex99 View Post
put it on a flash drive and swallow it.

Whenever you want to use it, just crap it out, and when your done, swallow it again!


I see no flaw in this plan.
What if your constipated?
4-year build.
(13 items)
 
  
CPUMotherboardGraphicsRAM
E8500 @ 4GHz 1.27v (LOAD) EVGA 750i SLI EVGA GTX 460 768MB SC @ 870/1075 G.SKILL PI Black 4GB 4-4-4-12 850MHz 
Hard DriveOSMonitorPower
WD Blue Caviar 320GB Windows 7 x64 DELL SE198WFP ThermalTake TR2 430w 
Case
It's a table!! 
  hide details  
Reply
4-year build.
(13 items)
 
  
CPUMotherboardGraphicsRAM
E8500 @ 4GHz 1.27v (LOAD) EVGA 750i SLI EVGA GTX 460 768MB SC @ 870/1075 G.SKILL PI Black 4GB 4-4-4-12 850MHz 
Hard DriveOSMonitorPower
WD Blue Caviar 320GB Windows 7 x64 DELL SE198WFP ThermalTake TR2 430w 
Case
It's a table!! 
  hide details  
Reply
post #8 of 38
this is brilliant already

Quote:
Originally Posted by kora04 View Post
What if your constipated?
they have came a long way in stool softners.
Edited by pcnoob1 - 1/21/11 at 5:02pm
The Kool Aid
(14 items)
 
  
CPUMotherboardGraphicsRAM
i-7 5820k Msi x99m g1 matx Asus 6950 crossfire 8g's of Muskin DDR3 1866 
Hard DriveCoolingOSPower
2 x 1tb WD Blacks.One for backup 2 xspc 360 rads Windows 7 Corsair 1200w 
Case
Lian li 
  hide details  
Reply
The Kool Aid
(14 items)
 
  
CPUMotherboardGraphicsRAM
i-7 5820k Msi x99m g1 matx Asus 6950 crossfire 8g's of Muskin DDR3 1866 
Hard DriveCoolingOSPower
2 x 1tb WD Blacks.One for backup 2 xspc 360 rads Windows 7 Corsair 1200w 
Case
Lian li 
  hide details  
Reply
post #9 of 38
Quote:
Originally Posted by reflex99 View Post
put it on a flash drive and swallow it.

Whenever you want to use it, just crap it out, and when your done, swallow it again!


I see no flaw in this plan.
You know these kinda responses piss me off. There is a real question here and your rediculous answer is annoying.

You left out the most important part to your plan, First put the flash drive in a condom.
My First Build
(15 items)
 
  
CPUMotherboardGraphicsRAM
I7-860 2.8/OC'ed 3.60 FPO/batch # L935B730 Asus P7P55d Evo MSI 580 TF II OC 8 Gig Corsiar DDR3 1600 XMP 
Hard DriveOptical DriveCoolingOS
WD Black 750 Samsung H50, pull/push Win7 Pro 64 
MonitorKeyboardPowerCase
HP 2509B 25" 1920x1080 Steelseries backlit Merc Corsiar TX650 Thermatake V9 Black 
MouseAudio
Rat 7 Asus Xonar DG 
  hide details  
Reply
My First Build
(15 items)
 
  
CPUMotherboardGraphicsRAM
I7-860 2.8/OC'ed 3.60 FPO/batch # L935B730 Asus P7P55d Evo MSI 580 TF II OC 8 Gig Corsiar DDR3 1600 XMP 
Hard DriveOptical DriveCoolingOS
WD Black 750 Samsung H50, pull/push Win7 Pro 64 
MonitorKeyboardPowerCase
HP 2509B 25" 1920x1080 Steelseries backlit Merc Corsiar TX650 Thermatake V9 Black 
MouseAudio
Rat 7 Asus Xonar DG 
  hide details  
Reply
post #10 of 38
TOR, read something in rolling stones about it. Its scrambles your ip by sending it to other people using tor and bounces it around so nobody can find your ip adress.
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Networking & Security
Overclock.net › Forums › Software, Programming and Coding › Networking & Security › You're in China/Saudi Arabia and....