K
Kelakarekrew
Guest
One thing that is missing from this forum is a thread about basic operational security for using crypto, ordering, or even just communication. I am open for any tips, corrections, or additions: I am not an expert so there may be holes or better ways. There are no referral codes in the links, I get nada from this. Nonetheless you can google the software names to make sure I'm not scamming you. It doesn't hurt to be cautious and doubt is the main path to security. If in doubt, verify. Nothing here is unusual, just basic steps to help avoid the eyes of big bro.
Basically without some form of security we are all a single subpoena away from exposure. It might even happen in the vendor's country and we'd never know.
So what can you do? You can dramatically minimize risk with a few steps. This is NOT a guide to absolute safety. This just adds layers that make digitally tracking you down difficult. The main lesson is: Encrypt, encrypt, encrypt!!
1) The big one. If you are using a gmail, yahoo, hotmail, outlook, comcast, etc.... email address- stop now. I've been guilty of this, I started 15 years ago with a big email provider and just kept doing it. Get a free protonmail, tutanova or countermail address. There's debate over which is better but at least all 3 should provide encryption of your data on their servers. Do not mention anything sensitive in subject line, it may or may not be encrypted. If you can, only use a single email address for any single vendor. Make another email for other vendors. Combined with step 2 you are way safer.
2) Use Tor browser only to access the encrypted email accounts, Tor is the standard and does a good job to hide your location and make IDing you difficult. Not impossible but highly unlikely. Chrome, Firefox, Safari... they are not secure out of the box. Tor is the entrypoint to the darknet, so it is obviously well regarded by those with privacy needs. I use it often even when serious security isn't needed. https://www.torproject.org/. It is slower than other browsers due to the many steps the data moves through. I don't stream or download torrents using Tor for this reason.
----------------------------------------------------------------------------------------
Really curious about this? Read on. Step 3 is overkill for most of us but may be handy for other purposes, particularly in crypto if you are US based. Steps 4-5 are for the truly paranoid, privacy, conscious, or risk-averse.
3) Use a vpn, it can add some privacy depending on the provider. Skip the free ones, they make money somehow. I use protonmail's paid basic VPN service. You can use the VPN for anything also. Like bypassing a netflix country block, or such actions. You can use with Tor; VPN + Tor isn't necessarily safer but it doesn't hurt as far as I know. You can run mobile and home PC data through most VPNs
4) Learn and use PGP encryption for any of the vendors willing to use it. Almost no one does though they should. It only adds 30 sec to sending/receiving a message but it's a bit of a pain in the ass to learn. PGP means you and the vendor both independently create a public key and private key for yourselves. The cryptography is way over my head but essentially each user provides their public key to each other and the message is encrypted using the receiver's public key. Only the receiver's private key can then decrypt that message. At the moment it is nearly impossible to break this encryption.
For doing this I use https://www.gpg4win.org/index.html.
The weak spot here is exchanging public keys. temp.pm is a nice service for transmitting sensitive data, the service encrypts your message and then it self deletes at your specified time. You send a link, when it expires it's gone. For many of us, this service might be good enough to avoid using PGP locally on your PC. Depends on the vendor.
5) My goto for really, really, sensitive actions is using "Tails". This will take a little bit of time and effort to set up, but there are good guides. Tails is a Linux OS that usually runs off a USB stick (known as a live USB). It is designed to leave no trace on the host PC and have no memory of its own. So the next time you boot into it, it is the first time as far as the OS knows. https://tails.boum.org/. Like PGP you'll need to find a guide for the OS you use.
--------------------------------------------------------------------------------------------------------------------
That's it from me for now. I hope others know more. All this info is culled from various friends, websites, and guides. I make no pretense to being an expert.
Thanks to vendor pink for introducing me to temp.pm, it is an awesome resource.
Basically without some form of security we are all a single subpoena away from exposure. It might even happen in the vendor's country and we'd never know.
So what can you do? You can dramatically minimize risk with a few steps. This is NOT a guide to absolute safety. This just adds layers that make digitally tracking you down difficult. The main lesson is: Encrypt, encrypt, encrypt!!
1) The big one. If you are using a gmail, yahoo, hotmail, outlook, comcast, etc.... email address- stop now. I've been guilty of this, I started 15 years ago with a big email provider and just kept doing it. Get a free protonmail, tutanova or countermail address. There's debate over which is better but at least all 3 should provide encryption of your data on their servers. Do not mention anything sensitive in subject line, it may or may not be encrypted. If you can, only use a single email address for any single vendor. Make another email for other vendors. Combined with step 2 you are way safer.
2) Use Tor browser only to access the encrypted email accounts, Tor is the standard and does a good job to hide your location and make IDing you difficult. Not impossible but highly unlikely. Chrome, Firefox, Safari... they are not secure out of the box. Tor is the entrypoint to the darknet, so it is obviously well regarded by those with privacy needs. I use it often even when serious security isn't needed. https://www.torproject.org/. It is slower than other browsers due to the many steps the data moves through. I don't stream or download torrents using Tor for this reason.
----------------------------------------------------------------------------------------
Really curious about this? Read on. Step 3 is overkill for most of us but may be handy for other purposes, particularly in crypto if you are US based. Steps 4-5 are for the truly paranoid, privacy, conscious, or risk-averse.
3) Use a vpn, it can add some privacy depending on the provider. Skip the free ones, they make money somehow. I use protonmail's paid basic VPN service. You can use the VPN for anything also. Like bypassing a netflix country block, or such actions. You can use with Tor; VPN + Tor isn't necessarily safer but it doesn't hurt as far as I know. You can run mobile and home PC data through most VPNs
4) Learn and use PGP encryption for any of the vendors willing to use it. Almost no one does though they should. It only adds 30 sec to sending/receiving a message but it's a bit of a pain in the ass to learn. PGP means you and the vendor both independently create a public key and private key for yourselves. The cryptography is way over my head but essentially each user provides their public key to each other and the message is encrypted using the receiver's public key. Only the receiver's private key can then decrypt that message. At the moment it is nearly impossible to break this encryption.
For doing this I use https://www.gpg4win.org/index.html.
The weak spot here is exchanging public keys. temp.pm is a nice service for transmitting sensitive data, the service encrypts your message and then it self deletes at your specified time. You send a link, when it expires it's gone. For many of us, this service might be good enough to avoid using PGP locally on your PC. Depends on the vendor.
5) My goto for really, really, sensitive actions is using "Tails". This will take a little bit of time and effort to set up, but there are good guides. Tails is a Linux OS that usually runs off a USB stick (known as a live USB). It is designed to leave no trace on the host PC and have no memory of its own. So the next time you boot into it, it is the first time as far as the OS knows. https://tails.boum.org/. Like PGP you'll need to find a guide for the OS you use.
--------------------------------------------------------------------------------------------------------------------
That's it from me for now. I hope others know more. All this info is culled from various friends, websites, and guides. I make no pretense to being an expert.
Thanks to vendor pink for introducing me to temp.pm, it is an awesome resource.