https://www.boywiki.org/en/api.php?action=feedcontributions&user=Eskimo&feedformat=atomBoyWiki - User contributions [en]2024-03-29T09:08:09ZUser contributionsMediaWiki 1.41.0https://www.boywiki.org/en/index.php?title=YayNay&diff=55622YayNay2023-02-25T08:36:26Z<p>Eskimo: Added cleanup tag</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''YayNay''' was an app that was allegedly ruined by [[child pornography]]. The author writes:<ref>https://medium.com/@hemeon/how-child-porn-killed-my-app-called-yaynay-c0ccea6d8b2c</ref><br />
{{cquote|I came up with the idea of YayNay in the summer of 2013 while clothes shopping with my 12 year old daughter, Maren. Maren would take a picture of each outfit she tried on and text the picture to her friends and ask them simply “Yay or Nay”. I was intrigued, so when I got home that night I did some armchair market research on Twitter and Instagram and found this Yay or Nay behavior to be fairly common.<br />
<br />
Observing my daughter and the twitter and instagram behavior had me convinced building a “Yay or Nay” app would be a success because the app would align with existing human behavior.}}<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Child pornography]]<br />
<br />
[[Category:Technology]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=SAFE_Network&diff=55621SAFE Network2023-02-25T08:35:54Z<p>Eskimo: Added clean up tag</p>
<hr />
<div>{{cleanup}}<br />
<br />
'''Warning! This project has not been updated for years it should be considered abandoned ware, I am going to propose the deletion of this page. 01st February 2023'''<br />
<br />
<br />
'''SAFE Network''' is an open-source project under active development. It is years from implementation. It would provide a level of security which existing resources, such as [[Tor]], cannot. It has been referred to as Web 3.0: a redefinition and reengineering of what the Internet is. No one server would host any Web site, and data storage will be decentralized. At present (2016), however, there is nothing an individual boylover can make use of.<br />
<br />
SAFE claims it will provide:<br />
* Private and secure communications<br />
* Secure storage of all data<br />
* Being control of your own data and personal information<br />
* Websites that go faster the more popular they get<br />
<br />
== See also ==<br />
* [[Computer security]]<br />
<br />
== External links ==<br />
<br />
* [https://safenetwork.org/ SAFE Network Homepage]<br />
* [https://safenetwork.org/community/ Community]<br />
<br />
[[Category:Technology]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55620Internet security tutorial2023-02-25T08:35:04Z<p>Eskimo: Removed the cleanup tag, article is now all updated</p>
<hr />
<div>This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Windows, Mac, Android and iOS, all try to get users to use their embedded cloud service to back up and store personal data, many users are uploading their personal data to the cloud, which is monitored by those companies, without even knowing about it, if you don´t configure your settings right, specially in smartphones, it is possible that the pictures you take or download from the Internet get automatically uploaded to the cloud, this is extremely dangerous because on top of Microsoft and Google (Google drive) staff being able to access your files, the account could also be hacked and your data stolen like one incident where dozens of celebrities had their naked selfies leaked onto the Internet <ref> https://thehackernews.com/2014/09/reported-apple-icloud-hack-leaked_1.html </ref> after their iCloud was hacked. <br />
<br />
A cloud computer is another´s person or company computer, if you care about privacy you should avoid at all costs uploading your personal files to the cloud but if for whatever reason this is not possible you can pick a zero-knowledge encryption cloud provider, which are rarely free and you can´t know for sure how real their claims but one good bet would be Proton Drive because they have been around for many years and so far they haven´t had any significant data leaks, or ideally you should encrypt the data yourself before encrypting it to the cloud service of your choice. Cryptomator is one of the best tools to encrypt data destined for the cloud because it can sync it and doesn´t need you to open and close the container continuously as you update your files.<br />
<br />
== Virtual Private Network ==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can bypass that censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, because of the layered approach Tor has, even if one administrator turns to be rogue, it will not be enough to deanonimize you.<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card, wired and wireless, has a MAC address. This address is unique and it is used to communicate with other computers or routers on the same network, the websites you visit will not have access to your MAC address but software you have installed could leak it, there are many ways to sneakily get hold of a MAC address, diagnostic software often record the MAC address because it is a way to uniquely identify that machine, you can use software to change your MAC address but this can lead to incompatibilities when your computer tries to communicate in the internal network. The main danger of your MAC address being leaked is that it identifies your computer specially by public wifi access points that do not require login, they might use this piece of information to limit how long for you can connect to the network and multiple of other restrictions or monitoring. When you connect to your library´s Wifi your smartphone MAC address will be logged and it could be used to identify you. Apple randomizes the MAC address when it scans for open access points to avoid user profiling.<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
== External links ==<br />
<br />
* [https://www.brave.com Brave browser]<br />
* [https://avast.com/free-antivirus-download Avast free antivirus]<br />
* [https://ssd.eff.org Surveillance Self-Defense]<br />
* [https://sourceforge.net/projects/eraser/ Eraser]<br />
* [https://cryptomator.org Cryptomator]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Talk:Internet_security_tutorial&diff=55619Talk:Internet security tutorial2023-02-25T08:33:55Z<p>Eskimo: </p>
<hr />
<div>This article has some serious problems (which, unfortunately, I don't have time to fix, so I am simply flagging it).<br />
<br />
[[User:User4|User4]] ([[User talk:User4|talk]]) 21:52, 19 March 2016 (UTC)<br />
<br />
I have cleaned up the article but like all technology, this needs constant updating, remember this always before adding anything to the Wiki, if it is going to need updating it is not going to last for too long, we don´t have full time staff that can keep updating tech articles every year, let´s keep things ambiguous and not too specific or this is going to be outdated in no time.<br />
<br />
--[[User:Eskimo|Eskimo]] ([[User talk:Eskimo|talk]]) 08:33, 25 February 2023 (UTC)</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55618Internet security tutorial2023-02-25T08:31:39Z<p>Eskimo: /* Virtual Private Network */</p>
<hr />
<div>{{cleanup}}<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Windows, Mac, Android and iOS, all try to get users to use their embedded cloud service to back up and store personal data, many users are uploading their personal data to the cloud, which is monitored by those companies, without even knowing about it, if you don´t configure your settings right, specially in smartphones, it is possible that the pictures you take or download from the Internet get automatically uploaded to the cloud, this is extremely dangerous because on top of Microsoft and Google (Google drive) staff being able to access your files, the account could also be hacked and your data stolen like one incident where dozens of celebrities had their naked selfies leaked onto the Internet <ref> https://thehackernews.com/2014/09/reported-apple-icloud-hack-leaked_1.html </ref> after their iCloud was hacked. <br />
<br />
A cloud computer is another´s person or company computer, if you care about privacy you should avoid at all costs uploading your personal files to the cloud but if for whatever reason this is not possible you can pick a zero-knowledge encryption cloud provider, which are rarely free and you can´t know for sure how real their claims but one good bet would be Proton Drive because they have been around for many years and so far they haven´t had any significant data leaks, or ideally you should encrypt the data yourself before encrypting it to the cloud service of your choice. Cryptomator is one of the best tools to encrypt data destined for the cloud because it can sync it and doesn´t need you to open and close the container continuously as you update your files.<br />
<br />
== Virtual Private Network ==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can bypass that censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, because of the layered approach Tor has, even if one administrator turns to be rogue, it will not be enough to deanonimize you.<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card, wired and wireless, has a MAC address. This address is unique and it is used to communicate with other computers or routers on the same network, the websites you visit will not have access to your MAC address but software you have installed could leak it, there are many ways to sneakily get hold of a MAC address, diagnostic software often record the MAC address because it is a way to uniquely identify that machine, you can use software to change your MAC address but this can lead to incompatibilities when your computer tries to communicate in the internal network. The main danger of your MAC address being leaked is that it identifies your computer specially by public wifi access points that do not require login, they might use this piece of information to limit how long for you can connect to the network and multiple of other restrictions or monitoring. When you connect to your library´s Wifi your smartphone MAC address will be logged and it could be used to identify you. Apple randomizes the MAC address when it scans for open access points to avoid user profiling.<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
== External links ==<br />
<br />
* [https://www.brave.com Brave browser]<br />
* [https://avast.com/free-antivirus-download Avast free antivirus]<br />
* [https://ssd.eff.org Surveillance Self-Defense]<br />
* [https://sourceforge.net/projects/eraser/ Eraser]<br />
* [https://cryptomator.org Cryptomator]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55617Internet security tutorial2023-02-25T08:27:27Z<p>Eskimo: /* MAC addresses */</p>
<hr />
<div>{{cleanup}}<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Windows, Mac, Android and iOS, all try to get users to use their embedded cloud service to back up and store personal data, many users are uploading their personal data to the cloud, which is monitored by those companies, without even knowing about it, if you don´t configure your settings right, specially in smartphones, it is possible that the pictures you take or download from the Internet get automatically uploaded to the cloud, this is extremely dangerous because on top of Microsoft and Google (Google drive) staff being able to access your files, the account could also be hacked and your data stolen like one incident where dozens of celebrities had their naked selfies leaked onto the Internet <ref> https://thehackernews.com/2014/09/reported-apple-icloud-hack-leaked_1.html </ref> after their iCloud was hacked. <br />
<br />
A cloud computer is another´s person or company computer, if you care about privacy you should avoid at all costs uploading your personal files to the cloud but if for whatever reason this is not possible you can pick a zero-knowledge encryption cloud provider, which are rarely free and you can´t know for sure how real their claims but one good bet would be Proton Drive because they have been around for many years and so far they haven´t had any significant data leaks, or ideally you should encrypt the data yourself before encrypting it to the cloud service of your choice. Cryptomator is one of the best tools to encrypt data destined for the cloud because it can sync it and doesn´t need you to open and close the container continuously as you update your files.<br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card, wired and wireless, has a MAC address. This address is unique and it is used to communicate with other computers or routers on the same network, the websites you visit will not have access to your MAC address but software you have installed could leak it, there are many ways to sneakily get hold of a MAC address, diagnostic software often record the MAC address because it is a way to uniquely identify that machine, you can use software to change your MAC address but this can lead to incompatibilities when your computer tries to communicate in the internal network. The main danger of your MAC address being leaked is that it identifies your computer specially by public wifi access points that do not require login, they might use this piece of information to limit how long for you can connect to the network and multiple of other restrictions or monitoring. When you connect to your library´s Wifi your smartphone MAC address will be logged and it could be used to identify you. Apple randomizes the MAC address when it scans for open access points to avoid user profiling.<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
== External links ==<br />
<br />
* [https://www.brave.com Brave browser]<br />
* [https://avast.com/free-antivirus-download Avast free antivirus]<br />
* [https://ssd.eff.org Surveillance Self-Defense]<br />
* [https://sourceforge.net/projects/eraser/ Eraser]<br />
* [https://cryptomator.org Cryptomator]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55616Internet security tutorial2023-02-25T08:25:26Z<p>Eskimo: Improving MAC addresses section</p>
<hr />
<div>{{cleanup}}<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Windows, Mac, Android and iOS, all try to get users to use their embedded cloud service to back up and store personal data, many users are uploading their personal data to the cloud, which is monitored by those companies, without even knowing about it, if you don´t configure your settings right, specially in smartphones, it is possible that the pictures you take or download from the Internet get automatically uploaded to the cloud, this is extremely dangerous because on top of Microsoft and Google (Google drive) staff being able to access your files, the account could also be hacked and your data stolen like one incident where dozens of celebrities had their naked selfies leaked onto the Internet <ref> https://thehackernews.com/2014/09/reported-apple-icloud-hack-leaked_1.html </ref> after their iCloud was hacked. <br />
<br />
A cloud computer is another´s person or company computer, if you care about privacy you should avoid at all costs uploading your personal files to the cloud but if for whatever reason this is not possible you can pick a zero-knowledge encryption cloud provider, which are rarely free and you can´t know for sure how real their claims but one good bet would be Proton Drive because they have been around for many years and so far they haven´t had any significant data leaks, or ideally you should encrypt the data yourself before encrypting it to the cloud service of your choice. Cryptomator is one of the best tools to encrypt data destined for the cloud because it can sync it and doesn´t need you to open and close the container continuously as you update your files.<br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card, wired and wireless, has a MAC address. This address is unique and it is used to communicate with other computers or routers on the same network, the websites you visit will not have access to your MAC address but software you have installed could leak it, there are many ways to sneakily get hold of a MAC address, diagnostic software often record the MAC address because it is a way to uniquely identify that machine, you can use software to change your MAC address but this can lead to incompatibilities when your computer tries to communicate in the internal network. The main danger of your MAC address being leaked is that it identifies your computer specially by public wifi access points that do not require login, they might use this piece of information to limit how long for you can connect to the network and multiple of other restrictions or monitoring. When you connect to your library´s Wifi your smartphone MAC address will be logged, you won´t be able to deny that it was your phone making the connection because the MAC address can proof that it was yours. Apple randomizes the MAC address when it scans for open access points to avoid other profiling your.<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
== External links ==<br />
<br />
* [https://www.brave.com Brave browser]<br />
* [https://avast.com/free-antivirus-download Avast free antivirus]<br />
* [https://ssd.eff.org Surveillance Self-Defense]<br />
* [https://sourceforge.net/projects/eraser/ Eraser]<br />
* [https://cryptomator.org Cryptomator]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55522Internet security tutorial2023-02-10T02:45:20Z<p>Eskimo: added link to Cryptomator</p>
<hr />
<div>{{cleanup}}<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Windows, Mac, Android and iOS, all try to get users to use their embedded cloud service to back up and store personal data, many users are uploading their personal data to the cloud, which is monitored by those companies, without even knowing about it, if you don´t configure your settings right, specially in smartphones, it is possible that the pictures you take or download from the Internet get automatically uploaded to the cloud, this is extremely dangerous because on top of Microsoft and Google (Google drive) staff being able to access your files, the account could also be hacked and your data stolen like one incident where dozens of celebrities had their naked selfies leaked onto the Internet <ref> https://thehackernews.com/2014/09/reported-apple-icloud-hack-leaked_1.html </ref> after their iCloud was hacked. <br />
<br />
A cloud computer is another´s person or company computer, if you care about privacy you should avoid at all costs uploading your personal files to the cloud but if for whatever reason this is not possible you can pick a zero-knowledge encryption cloud provider, which are rarely free and you can´t know for sure how real their claims but one good bet would be Proton Drive because they have been around for many years and so far they haven´t had any significant data leaks, or ideally you should encrypt the data yourself before encrypting it to the cloud service of your choice. Cryptomator is one of the best tools to encrypt data destined for the cloud because it can sync it and doesn´t need you to open and close the container continuously as you update your files.<br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network. section about MAC To be finished soon, signed (1st February 2023)<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
== External links ==<br />
<br />
* [https://www.brave.com Brave browser]<br />
* [https://avast.com/free-antivirus-download Avast free antivirus]<br />
* [https://ssd.eff.org Surveillance Self-Defense]<br />
* [https://sourceforge.net/projects/eraser/ Eraser]<br />
* [https://cryptomator.org Cryptomator]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55521Internet security tutorial2023-02-10T02:43:44Z<p>Eskimo: Added cloud services security information</p>
<hr />
<div>{{cleanup}}<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Windows, Mac, Android and iOS, all try to get users to use their embedded cloud service to back up and store personal data, many users are uploading their personal data to the cloud, which is monitored by those companies, without even knowing about it, if you don´t configure your settings right, specially in smartphones, it is possible that the pictures you take or download from the Internet get automatically uploaded to the cloud, this is extremely dangerous because on top of Microsoft and Google (Google drive) staff being able to access your files, the account could also be hacked and your data stolen like one incident where dozens of celebrities had their naked selfies leaked onto the Internet <ref> https://thehackernews.com/2014/09/reported-apple-icloud-hack-leaked_1.html </ref> after their iCloud was hacked. <br />
<br />
A cloud computer is another´s person or company computer, if you care about privacy you should avoid at all costs uploading your personal files to the cloud but if for whatever reason this is not possible you can pick a zero-knowledge encryption cloud provider, which are rarely free and you can´t know for sure how real their claims but one good bet would be Proton Drive because they have been around for many years and so far they haven´t had any significant data leaks, or ideally you should encrypt the data yourself before encrypting it to the cloud service of your choice. Cryptomator is one of the best tools to encrypt data destined for the cloud because it can sync it and doesn´t need you to open and close the container continuously as you update your files.<br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network. section about MAC To be finished soon, signed (1st February 2023)<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
== External links ==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[https://avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55520Computer security2023-02-10T02:34:34Z<p>Eskimo: /* External links */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can and should lock them with a passphrase, but in some countries like the United Kingdom the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your phone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, but this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
Consider using a VPN to protect your Internet connection from illegal spying by hackers and government agencies, nearly all of the big VPN companies smartphone apps have a setting to block advertising and tracking cookies, that will save you from downloading an app to block adverts. If you are in a high security environment you might want to download an antivirus for your smartphone but this will quickly drain your battery. You should only download apps from the official store as otherwise you risk downloading a trojan into your phone. A good open source alternative to Android and Apple Marketplace is F-Droid.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud, in 2023 Apple announced that they would be encrypting iCloud with a system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in the settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
The security and privacy of an Android phone is not much more different from an iPhone, the main difference is that while Apple makes the software and the hardware of an iPhone, in Android, Google only develops the software and licenses it to multiple hardware vendors that build the phone, now you have two companies that could violate your privacy, Google and your smartphone vendor, try to stay away from cheap little known Chinese smartphone brands as some of them ship with spyware. Regarding the Android OS, you should not trust Google Drive, Gmail or any other Google product that comes embedded with the operating system, while Apple makes money selling hardware, Google does not, their main reason to give away Android for free is that they will push you to use their products, mine your data and make money with it.<br />
<br />
The main way to secure an Android phone, always bearing in mind that it might not be possible 100%, familiarise yourself with the privacy and security settings of Android and turn off all the data sharing which is on by default, protect access to your phone with a passphrase, and don´t use any Google product that comes with the phone.<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://whatismybrowser.com/ WhatIsMyBrowser.com] See your Internet browser headers<br />
* [https://bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://f-droid.org/ F-Droid open source app store for Android]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55519Computer security2023-02-10T02:31:53Z<p>Eskimo: removed Windows 10 outdated link, added F-droid link instead</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can and should lock them with a passphrase, but in some countries like the United Kingdom the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your phone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, but this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
Consider using a VPN to protect your Internet connection from illegal spying by hackers and government agencies, nearly all of the big VPN companies smartphone apps have a setting to block advertising and tracking cookies, that will save you from downloading an app to block adverts. If you are in a high security environment you might want to download an antivirus for your smartphone but this will quickly drain your battery. You should only download apps from the official store as otherwise you risk downloading a trojan into your phone. A good open source alternative to Android and Apple Marketplace is F-Droid.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud, in 2023 Apple announced that they would be encrypting iCloud with a system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in the settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
The security and privacy of an Android phone is not much more different from an iPhone, the main difference is that while Apple makes the software and the hardware of an iPhone, in Android, Google only develops the software and licenses it to multiple hardware vendors that build the phone, now you have two companies that could violate your privacy, Google and your smartphone vendor, try to stay away from cheap little known Chinese smartphone brands as some of them ship with spyware. Regarding the Android OS, you should not trust Google Drive, Gmail or any other Google product that comes embedded with the operating system, while Apple makes money selling hardware, Google does not, their main reason to give away Android for free is that they will push you to use their products, mine your data and make money with it.<br />
<br />
The main way to secure an Android phone, always bearing in mind that it might not be possible 100%, familiarise yourself with the privacy and security settings of Android and turn off all the data sharing which is on by default, protect access to your phone with a passphrase, and don´t use any Google product that comes with the phone.<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Internet browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://f-droid.org/ F-Droid open source app store for Android]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55518Internet security tutorial2023-02-10T02:28:31Z<p>Eskimo: removed internal link to the SAFE Network (outdated)</p>
<hr />
<div>{{cleanup}}<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Windows, Mac, Android and iOS, all try to get users to use their embedded cloud service to back up and store personal data, many users are uploading their personal data to the cloud, which is monitored by those companies, without even knowing about it, if you don´t configure your settings right, specially in smartphones, it is possible that the pictures you take or download from the Internet get automatically uploaded to the cloud, this is extremely dangerous because on top of Microsoft and Google (Google drive) staff being able to access your files, the account could also be hacked and your data stolen like one incident where dozens of celebrities had their naked selfies leaked onto the Internet <ref> https://thehackernews.com/2014/09/reported-apple-icloud-hack-leaked_1.html </ref> after their iCloud was hacked. <br />
<br />
Section not completed, will update soon (todays date 01st February 2023)<br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network. section about MAC To be finished soon, signed (1st February 2023)<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
== External links ==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[https://avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55517Computer security2023-02-10T02:26:27Z<p>Eskimo: /* Smartphones and tablets */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can and should lock them with a passphrase, but in some countries like the United Kingdom the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your phone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, but this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
Consider using a VPN to protect your Internet connection from illegal spying by hackers and government agencies, nearly all of the big VPN companies smartphone apps have a setting to block advertising and tracking cookies, that will save you from downloading an app to block adverts. If you are in a high security environment you might want to download an antivirus for your smartphone but this will quickly drain your battery. You should only download apps from the official store as otherwise you risk downloading a trojan into your phone. A good open source alternative to Android and Apple Marketplace is F-Droid.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud, in 2023 Apple announced that they would be encrypting iCloud with a system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in the settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
The security and privacy of an Android phone is not much more different from an iPhone, the main difference is that while Apple makes the software and the hardware of an iPhone, in Android, Google only develops the software and licenses it to multiple hardware vendors that build the phone, now you have two companies that could violate your privacy, Google and your smartphone vendor, try to stay away from cheap little known Chinese smartphone brands as some of them ship with spyware. Regarding the Android OS, you should not trust Google Drive, Gmail or any other Google product that comes embedded with the operating system, while Apple makes money selling hardware, Google does not, their main reason to give away Android for free is that they will push you to use their products, mine your data and make money with it.<br />
<br />
The main way to secure an Android phone, always bearing in mind that it might not be possible 100%, familiarise yourself with the privacy and security settings of Android and turn off all the data sharing which is on by default, protect access to your phone with a passphrase, and don´t use any Google product that comes with the phone.<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55516Computer security2023-02-10T02:21:01Z<p>Eskimo: /* Android */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can and should lock them with a passphrase, but in some countries like the United Kingdom the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your phone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, but this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud, in 2023 Apple announced that they would be encrypting iCloud with a system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in the settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
The security and privacy of an Android phone is not much more different from an iPhone, the main difference is that while Apple makes the software and the hardware of an iPhone, in Android, Google only develops the software and licenses it to multiple hardware vendors that build the phone, now you have two companies that could violate your privacy, Google and your smartphone vendor, try to stay away from cheap little known Chinese smartphone brands as some of them ship with spyware. Regarding the Android OS, you should not trust Google Drive, Gmail or any other Google product that comes embedded with the operating system, while Apple makes money selling hardware, Google does not, their main reason to give away Android for free is that they will push you to use their products, mine your data and make money with it.<br />
<br />
The main way to secure an Android phone, always bearing in mind that it might not be possible 100%, familiarise yourself with the privacy and security settings of Android and turn off all the data sharing which is on by default, protect access to your phone with a passphrase, and don´t use any Google product that comes with the phone.<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55515Computer security2023-02-10T02:19:44Z<p>Eskimo: /* Android */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can and should lock them with a passphrase, but in some countries like the United Kingdom the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your phone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, but this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud, in 2023 Apple announced that they would be encrypting iCloud with a system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in the settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
The security and privacy of an Android phone is not much more different from an iPhone, the main difference is that while Apple makes the software and the hardware of an iPhone, in Android, Google only develops the software and licenses it to multiple hardware vendors that build the phone, now you have two companies that could violate your privacy, Google and your smartphone vendor, try to stay away from cheap little known Chinese smartphone brands as some of them ship with spyware. Regarding the Android OS, you should not trust Google Drive, Gmail or any other Google product that comes embedded with the operating system, while Apple makes money selling hardware, Google does not, their main reason to give away Android for free is that they will mine your data and make money with your data.<br />
<br />
The main way to secure an Android phone, always bearing in mind that it might not be possible 100%, familiarise yourself with the privacy and security settings of Android and turn off all the data sharing which is on by default, protect access to your phone with a passphrase, and don´t use any Google product that comes with the phone.<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55514Computer security2023-02-10T02:19:00Z<p>Eskimo: Added the Android section</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can and should lock them with a passphrase, but in some countries like the United Kingdom the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your phone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, but this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud, in 2023 Apple announced that they would be encrypting iCloud with a system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in the settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
The security and privacy of an Android phone is not much more different from an iPhone, the main difference is that while Apple makes both, the software and the hardware of an iPhone, in Android, Google makes the software and licenses it to multiple hardware vendors that build the phone, now you have two companies that could violate your privacy, Google and your smartphone vendor, try to stay away from cheap little known Chinese smartphone brands as some of them ship with spyware. Regarding the Android OS, you should not trust Google Drive, Gmail or any other Google product that comes embedded with the operating system, while Apple makes money selling hardware, Google does not, their main reason to give away Android for free is that they will mine your data and make money with your data.<br />
<br />
The main way to secure an Android phone, always bearing in mind that it might not be possible 100%, familiarise yourself with the privacy and security settings of Android and turn off all the data sharing which is on by default, protect access to your phone with a passphrase, and don´t use any Google product that comes with the phone.<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55513Computer security2023-02-10T02:11:41Z<p>Eskimo: /* iPhone/iPad */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can and should lock them with a passphrase, but in some countries like the United Kingdom the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your phone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, but this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud, in 2023 Apple announced that they would be encrypting iCloud with a system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in the settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55512Computer security2023-02-10T02:10:17Z<p>Eskimo: /* Smartphones and tablets */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can and should lock them with a passphrase, but in some countries like the United Kingdom the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your phone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, but this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55511Computer security2023-02-10T02:09:44Z<p>Eskimo: /* Smartphones and tablets */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can and should lock them with a passphrase, the most secure way, but in some countries like the United Kingdom, the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your phone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, but this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55510Computer security2023-02-10T02:08:29Z<p>Eskimo: /* Smartphones and tablets */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can and should lock them with a passphrase, the most secure way, but in some countries like the United Kingdom, the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your iPhone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55509Computer security2023-02-10T02:08:03Z<p>Eskimo: /* Windows 10 & Windows 11 */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can lock them with a passphrase, the most secure way, but in some countries like the United Kingdom, the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your iPhone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55508Computer security2023-02-10T02:07:31Z<p>Eskimo: /* Windows 10 & Windows 11 */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows 10 but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can lock them with a passphrase, the most secure way, but in some countries like the United Kingdom, the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your iPhone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55507Computer security2023-02-10T02:05:30Z<p>Eskimo: improving section</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows 10.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows 10 but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
Android and iPhones have encryption turned on by default and you can lock them with a passphrase, the most secure way, but in some countries like the United Kingdom, the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your iPhone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55506Computer security2023-02-10T02:04:14Z<p>Eskimo: /* Smartphones and tablets */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows 10.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows 10 but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
You can lock your smartphone but in some countries like the United Kingdom, the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your iPhone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55505Computer security2023-02-10T02:03:43Z<p>Eskimo: cutting and moving text to the same page in a different section</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows 10.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows 10 but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
=== iPhone/iPad ===<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55504Computer security2023-02-10T02:02:29Z<p>Eskimo: improving iPhone section</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows 10.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows 10 but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
=== iPhone/iPad ===<br />
<br />
You can lock your iPhone but in some countries like the United Kingdom, the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, in other countries like the United States you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your iPhone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55503Computer security2023-02-10T02:01:46Z<p>Eskimo: /* Smartphones and tablets */</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows 10.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows 10 but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
=== iPhone/iPad ===<br />
<br />
You can lock your iPhone but in some countries like the United Kingdom, the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, but in other countries like the United States, you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your iPhone, however if the smartphone is switched on when seized it is trivial to access the content without your consent and if it is switched off they could try a brute force attack, this is very time consuming and expensive depending on password difficulty and might not work in the end. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55502Computer security2023-02-10T00:37:38Z<p>Eskimo: fixing formatting issue</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows 10.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows 10 but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
=== iPhone/iPad ===<br />
<br />
You can lock your iPhone but in some countries like the United Kingdom, the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, but in other countries like the United States, you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your iPhone, however if the smartphone is switched on when seized, it is trivial to access the content without your consent and if it is switched off there are other ways to access it, like a brute force attack, which is time consuming and expensive but it could be feasible depending on password difficulty. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Computer_security&diff=55501Computer security2023-02-10T00:36:12Z<p>Eskimo: Added information on Apple iOS</p>
<hr />
<div>The term '''computer security''' for boylovers normally refers to preventing hostile operatives from tracing your Internet activities back to you. You need to make sure that your computer, if stolen or lost, does not reveal anything linking you to any boylove activities, even if activism is legal. That still means the risk of losing your job, friends, and family, and being physically attacked.<br />
<br />
Although one hundred per cent security is impossible, you can make it more difficult for hackers and authorities to trace you, so they'll go bother somebody else. It is like installing an alarm system in your house - it guarantees nothing, but it makes breaking in burdensome, so the would-be burglar goes to a house with no alarm. ''Security is a function of the resources your adversary is willing to commit'', said Julian Sanchez, a policy expert with the Cato Institute in Washington, D.C.<ref>"Beat the FBI: How to Send Anonymous Email Without Getting Caught", by Ben Weitzenkorn,http://www.tomsguide.com/us/-anonymous-email-how-to,news-17511.html</ref> <br />
<br />
Because terrorists are perceived as a bigger danger than boylovers, the bulk of the computing power available in the world (always finite) is focused on them.<br />
<br />
== Internet security==<br />
<br />
The Internet was originally built with no security, as it came out of a military environment in which all participants were known and trusted <ref>Wikipedia: History of the Internet https://en.wikipedia.org/wiki/History_of_the_Internet</ref>. Privacy and security is continuously grafted onto the platform as it grows and expands into new fields that their creators never designed it for. With complexity it increases the chances of a vulnerability being exploited for nefarious purposes, Internet Security is a game of a whack a mole, you should never lower your guard.<br />
<br />
There are technological advances every single day, if you care about computer security, you must read about technology and security news as often as you can to update your knowledge, what is safe today might change tomorrow, by being up to date on technological advances you can plan for the future, for example, by picking a strong encryption algorithm that will be safe for the next twenty years.<br />
<br />
===Web browsers===<br />
<br />
A Web browser is a program that runs on your computer/smartphone/tablet and is used to access the Internet. It has the function, among others, of decoding the data received — most of it strings of characters are meaningless if not processed — and transforming them into a meaningful form to a human while displaying it optimally on your computer/smartphone/tablet. Chrome, Firefox, Microsoft Edge and Apple's Safari are some example of Internet browsers.<br />
<br />
When your browser sends a request for a page to a web server, it goes first to your Internet Service Provider (in some countries a government agency), which records it and sends it on its way on the Internet. Together with the name/address of the page desired, the request includes information about you. Most important is your IP (Internet protocol) address, a string of numbers that identifies the requesting computer, so that the desired data can be sent to it. It also includes the browser and operating system used, and sometimes the hardware used.<br />
<br />
===IP Address===<br />
<br />
Every device connected to the Internet is identified by a unique number known as an IP address, IP stands for ''Internet Protocol'', an IPv4 address number is made up of 32 bits and takes the form '''n.n.n.n''', IPv4 address example: 127.1.67.235. To cope with Internet growth, due to IPv4 addresses running out, a new Internet Protocol Version called IPv6 was developed, they are made up of 128 bits and represented as eight groups of four hexadecimal digits with the groups being separated by colons, IPv6 address example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf <br />
<br />
Both protocols IPv4 and IPv6 are interoperable, the numbers may be different each time you connect but your Internet Service Provider assigns these numbers, they know the history of each IP address, they can provide law enforcement with the name and address of the subscriber that has been assigned a particular IP address. <br />
<br />
Internet Service Providers have the capacity of logging each page a user visits and blocking access to them, in some countries this is a reality. In the United Kingdom the Investigatory Powers Bill forces Internet Service Providers to keep web records of users for 12 months. <ref>Investigatory Powers Bill UK https://www.wired.co.uk/article/ip-bill-law-details-passed</ref><br />
<br />
In the United States, if national security is at stake, National Security Letters, authorised by Congress can be used by federal agencies. They require Internet Service Providers to release to all data they have about any user, furthermore, the Internet Service Provider is prohibited from informing you that a request for information about you has been received. Given the recent history of misconduct by the FBI and similar agencies, it would be naive to assume that all of these warrantless, secret searches are for legitimate national security purposes. It is well documented that if evidence of any illegal activity is found in the data gathered using a National Security Letter, even if it has no relevance to national security, that data can be and is legally used to bring criminal charges.<br />
<br />
In addition to your ISP, Web sites routinely log the IP address of every visitor, together with the browser they are using and operating system. This information may also be retained indefinitely. While a subpoena is usually necessary for law enforcement to obtain access in the United States, a subpoena may entail little more for the requesting agency than filling out an online form. In many countries law enforcement has total access to servers within its borders. <ref>Russia demands access to VPN providers’ servers https://www.networkworld.com/article/3385050/russia-demands-access-to-vpn-providers-servers.html</ref><br />
<br />
To secure your web browsing and stop Internet Service Providers from logging, spying and censoring your Internet activities, you can use a [[Proxy and VPN|VPN or Tor]].<br />
<br />
=== Virtual Private Networks (VPNs) ===<br />
<br />
A [[Proxy_and_VPN|Virtual Private Network]] creates an encrypted tunnel and connects you to a proxy server that will receive your data request for an Internet page or download and forward it using the VPN server IP address instead of yours, because of the encryption, your Internet Service Provider will not be able to see what you are doing on the Internet or intercept your communications, only the VPN provider will be able to do that, many claim they keep no logs, or keep them very briefly but such claims must be treated with caution as you have no way to verify it. <br />
<br />
A VPN provider located in a foreign country, simply because of the hassle of dealing with an agency of another country, can provide more protection than a domestic one. The client software running on your computer/smartphone or tablet will [[encryption|encrypt]] your request for a Web page, so even if your data is being monitored, all the monitor can tell is that a certain IP address (you) sent a request to a VPN, but the URL of the page that you requested is not visible. Another use of a VPN is being able to access websites that are georestricted, for example watching CBS online outside the USA.<br />
<br />
In most Western countries using a VPN is completely legal and there are many legitimate purposes to use one, like wanting to secure your Internet activities on a Wifi access point or a business looking for secure access to a stock market account.<br />
<br />
The Onion Router [[Tor]] is a chain of proxy servers located in multiple countries and it is far more secure than a VPN, however speed is slower.<br />
<br />
==What information does your browser store?==<br />
<br />
Most web browsers store a great deal of information every time you visit a web page; law enforcement accesses it by running the program Browser Postmortem. This storage is intended to make it easier for you to later find and reload already visited Web pages. What information is stored, how and where, depends on which browser you use, which version you have, on what platform or operating system you are running it, and your personal security settings. Some of the items a browser may record are:<br />
<br />
# All web page addresses (URLs) you entered into your browser's address bar. This is found in your browser's History.<br />
# The page itself in your cache.<br />
# Any embedded elements, such as graphics or scripts, saved separately in your cache.<br />
# Cookies.<br />
# Search history (terms searched for by [[search engines]]).<br />
<br />
===Address Bar and History===<br />
<br />
Both the browser history and address-bar list make it easier to access recently-visited sites by storing the addresses of any site you visit. These effectively leaves a trail for others with access to your computer to find and follow your activity on the Internet. Anyone else who uses or has access to your browser can easily look at your recent internet activity.<br />
<br />
All major browsers have a menu command to delete the history; but this is no protection and can be easily recovered with specialist software by law enforcement or computer technicians. There are programs like Bleachbit that will securely overwrite temporary files so that recovery it is not possible but wiping software is not 100% perfect, the only way to be sure that no data will ever be recovered from your computer is to encrypt the whole hard drive or use a live DVD to browse the Internet, for example Tails.<br />
<br />
===The Browser Cache===<br />
<br />
The browser cache is designed to make loading frequently-accessed pages quicker. Downloading a page from the internet takes time, so the cache is designed to store entire pages from sites which you visit. Some browsers create a single cache file, while others may store embedded elements such as images, style-sheets or scripts separately. When you type an address into your browser it will check with the server to see if the page has been modified since last accessed and if there are no changes it will draw the page from the cache rather than from the server.<br />
<br />
The browser cache is a record of the sites you have visited and can easily be accessed by others. Major browsers have a menu selection to erase the cache. However it does not securely erase the data is still recoverable with specialist undelete software. A medium security solution is to deploy secure erasing software like CCleaner, or browse the Internet in incognito mode, it considerably reduces the information available in your hard drive but not all of it if your opponent has high IT skills he might still be able to recover small bits of information.<br />
<br />
===Cookies===<br />
<br />
Cookies are small files used to by web sites to either store settings or track what you do online. They are sent to your computer and stored by your browser when you visit a site. Cookies are necessary for innocent purposes such as automating log-in and storing preferences, and providing targeted advertising, but they too leave their footprints for others to follow. If someone can look at what cookies you have stored in your Internet browser they can find out what websites you visited and the associated usernames. <br />
<br />
Inside your Internet browser settings you can manually erase cookies but this will not be done safely unless they are overwritten with specialist Internet privacy software that stops computer forensic tools from unerasing them.<br />
<br />
==="Private" or "Incognito" mode===<br />
<br />
Modern browsers often have what is called ''Private Browsing'' (Firefox) or ''Incognito Mode'' (Chrome), when activated, no browsing history, cookies or cache are kept. Once all tabs are closed, all session information is discarded. However, it does not conceal from your Internet Service Provider, workplace, library or Internet cafe which pages you visited and it will not stop other applications in your computer. like a keylogger, from monitoring what you are browsing, if you have downloaded a file in Incognito mode, this file will remain in your hard drive. <ref> Myths about private browsing: https://support.mozilla.org/en-US/kb/common-myths-about-private-browsing</ref><br />
<br />
== Windows 10 & Windows 11 ==<br />
<br />
* Microsoft account: The Microsoft Windows 10/11 operating system attempt to convince users to sign up for a Microsoft account, signing into Windows 10/11 with your Microsoft account will immediately sync (upload) settings and data to the company’s servers, the data contains your Internet browsing history, passwords and settings saved. <ref> 5 privacy settings you should change in Windows 10 https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10/</ref> to avoid this use a local Windows 10 account instead of a Microsoft cloud account. At the moment of writing, Windows 11 is making it impossible for users to operate without creating a Microsoft cloud account, there are ways around this but as the situation keeps changing, instead of a providing a solution that will quickly be out of date, you are advised to use a search engine to search for a work around.<br />
<br />
* OneDrive: When you upload files to OneDrive they are automatically scanned to detect child pornography, <ref>Microsoft tip leads to child porn arrest in Pennsylvania https://www.bbc.com/news/technology-28682686</ref> the main problem with this is approach is that Microsoft treats everybody like a suspected criminal and child pornographer without being one, it is like having to submit yourself to a search without any evidence of any wrongdoing and without any warrant, by agreeing to using OneDrive, you are waving your privacy rights, the same for Dropbox and other cloud services. If you care about not being treated like a suspected criminal, uninstall OneDrive from Windows 10.<br />
<br />
* Cortana: Microsoft speech assistant is turned on by default, it collects and analyses speech data like your name, contacts and calendar events, they are all saved on Microsoft servers. You can not uninstall Cortana from Windows 10 but you can turn it off in settings and you should do that if you are privacy conscious.<br />
<br />
== Smartphones and tablets ==<br />
<br />
=== iPhone/iPad ===<br />
<br />
You can lock your iPhone but in some countries like the United Kingdom, the law forces you to hand over your decryption keys when law enforcement requests it. <ref> UK police can now force you to reveal decryption keys: https://www.theregister.co.uk/2007/10/03/ripa-decryption_keys_power/ </ref>, but in other countries like the United States, you can plead the Constitution Fifth Amendment right not to self-incriminate and refuse handing over the password to your iPhone, however if the smartphone is switched on when seized, it is trivial to access the content without your consent and if it is switched off there are other ways to access it, like a brute force attack, which is time consuming and expensive but it could be feasible depending on password difficulty. <ref>Forcing Someone to Unlock and Decrypt Their Phone Violates the Constitution https://www.eff.org/deeplinks/2017/03/eff-court-forcing-someone-unlock-and-decrypt-their-phone-violates-constitution </ref>.<br />
<br />
All of the data on the iPhone is backed up onto servers operated by Apple, a default behaviour that can be turned off in settings. The iCloud used to be easily accessible by law enforcement because Apple holds the decryption key for iCloud but in 2023 Apple announced that they would be encrypting iCloud with system called Advanced Data Protection that makes it impossible for their own staff to access your data <ref>How to lock down your iCloud with Apple's Advanced Data Protection https://www.inverse.com/gear/how-to-lock-down-icloud-ios-16-apple-advanced-data-protection</ref>, however it is the user who must turn this on in settings and you should keep your eyes open in the tech news because Apple appears to often change their stance on data privacy depending on the political climate.<br />
<br />
In 2021 Apple announced that they would scan all iPhones to detect child porn and report it to law enforcement, unlike iCloud, where Apple only scans the files you upload to detect child porn, Apple intention was to scan anything stored in the phone regardless of whether it is being uploaded to their cloud servers or not. <ref>Apple to start scanning US iPhones for images of child sexual abuse https://www.france24.com/en/americas/20210806-apple-to-start-scanning-us-iphones-for-images-of-child-sexual-abuse</ref>. After outrage from privacy activists and users, in fear that a system like that could be used by dictatorships like China to require Apple to scan iPhones for anything they see fit, not only child porn, Apple decided to quietly shelve the plan.<br />
<br />
=== Android ===<br />
<br />
== See also ==<br />
<br />
* [[Privacy Freeware]]<br />
* [[Tor|The Onion Router Tor]]<br />
* [[The Dangers of using VPN]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Essential reading for BoyLovers]]<br />
[[Category:Technology]]<br />
<br />
== External links ==<br />
<br />
* [https://ssd.eff.org/ Surveillance Self-defence Guide] Electronics Frontiers Foundation guide<br />
* [https://www.whatismybrowser.com/ WhatIsMyBrowser.com] See your Interner browser headers<br />
* [https://www.bleachbit.org/ BleachBit Privacy Cleaner]<br />
* [https://www.oo-software.com/en/shutup10 ShutUp10++:Free antispy tool for Windows 10 and 11]<br />
* [https://www.makeuseof.com/windows-11-disable-remove-onedrive/ How to Disable or Remove OneDrive on Windows 11]<br />
* [https://www.howtogeek.com/230543/how-to-revert-your-windows-10-account-to-a-local-one-after-the-windows-store-hijacks-it/ How to Revert Your Windows 10 Account to a Local One]</div>Eskimohttps://www.boywiki.org/en/index.php?title=SAFE_Network&diff=55389SAFE Network2023-02-01T14:58:11Z<p>Eskimo: Attn Ettene! would it be possible to delete this page? This project "SAFE Network" no longer exists, it was never completed and it is unsafe to use, I don´t see the point of having this page.</p>
<hr />
<div><br />
'''Warning! This project has not been updated for years it should be considered abandoned ware, I am going to propose the deletion of this page. 01st February 2023'''<br />
<br />
<br />
'''SAFE Network''' is an open-source project under active development. It is years from implementation. It would provide a level of security which existing resources, such as [[Tor]], cannot. It has been referred to as Web 3.0: a redefinition and reengineering of what the Internet is. No one server would host any Web site, and data storage will be decentralized. At present (2016), however, there is nothing an individual boylover can make use of.<br />
<br />
SAFE claims it will provide:<br />
* Private and secure communications<br />
* Secure storage of all data<br />
* Being control of your own data and personal information<br />
* Websites that go faster the more popular they get<br />
<br />
== See also ==<br />
* [[Computer security]]<br />
<br />
== External links ==<br />
<br />
* [https://safenetwork.org/ SAFE Network Homepage]<br />
* [https://safenetwork.org/community/ Community]<br />
<br />
[[Category:Technology]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55388Internet security tutorial2023-02-01T14:43:57Z<p>Eskimo: /* External links */</p>
<hr />
<div>{{cleanup}}<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Windows, Mac, Android and iOS, all try to get users to use their embedded cloud service to back up and store personal data, many users are uploading their personal data to the cloud, which is monitored by those companies, without even knowing about it, if you don´t configure your settings right, specially in smartphones, it is possible that the pictures you take or download from the Internet get automatically uploaded to the cloud, this is extremely dangerous because on top of Microsoft and Google (Google drive) staff being able to access your files, the account could also be hacked and your data stolen like one incident where dozens of celebrities had their naked selfies leaked onto the Internet <ref> https://thehackernews.com/2014/09/reported-apple-icloud-hack-leaked_1.html </ref> after their iCloud was hacked. <br />
<br />
Section not completed, will update soon (todays date 01st February 2023)<br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network. section about MAC To be finished soon, signed (1st February 2023)<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
== External links ==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[https://avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55387Internet security tutorial2023-02-01T14:43:18Z<p>Eskimo: added HTTPS instead of http</p>
<hr />
<div>{{cleanup}}<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Windows, Mac, Android and iOS, all try to get users to use their embedded cloud service to back up and store personal data, many users are uploading their personal data to the cloud, which is monitored by those companies, without even knowing about it, if you don´t configure your settings right, specially in smartphones, it is possible that the pictures you take or download from the Internet get automatically uploaded to the cloud, this is extremely dangerous because on top of Microsoft and Google (Google drive) staff being able to access your files, the account could also be hacked and your data stolen like one incident where dozens of celebrities had their naked selfies leaked onto the Internet <ref> https://thehackernews.com/2014/09/reported-apple-icloud-hack-leaked_1.html </ref> after their iCloud was hacked. <br />
<br />
Section not completed, will update soon (todays date 01st February 2023)<br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network. section about MAC To be finished soon, signed (1st February 2023)<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[https://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55386Internet security tutorial2023-02-01T14:41:11Z<p>Eskimo: Erased the 2009 warning about being out of date because page is now 80% updated, I believe I will manage to finish the other 20% this week</p>
<hr />
<div>{{cleanup}}<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Windows, Mac, Android and iOS, all try to get users to use their embedded cloud service to back up and store personal data, many users are uploading their personal data to the cloud, which is monitored by those companies, without even knowing about it, if you don´t configure your settings right, specially in smartphones, it is possible that the pictures you take or download from the Internet get automatically uploaded to the cloud, this is extremely dangerous because on top of Microsoft and Google (Google drive) staff being able to access your files, the account could also be hacked and your data stolen like one incident where dozens of celebrities had their naked selfies leaked onto the Internet <ref> https://thehackernews.com/2014/09/reported-apple-icloud-hack-leaked_1.html </ref> after their iCloud was hacked. <br />
<br />
Section not completed, will update soon (todays date 01st February 2023)<br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network. section about MAC To be finished soon, signed (1st February 2023)<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55385Internet security tutorial2023-02-01T14:36:41Z<p>Eskimo: added info to cloud services section</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Windows, Mac, Android and iOS, all try to get users to use their embedded cloud service to back up and store personal data, many users are uploading their personal data to the cloud, which is monitored by those companies, without even knowing about it, if you don´t configure your settings right, specially in smartphones, it is possible that the pictures you take or download from the Internet get automatically uploaded to the cloud, this is extremely dangerous because on top of Microsoft and Google (Google drive) staff being able to access your files, the account could also be hacked and your data stolen like one incident where dozens of celebrities had their naked selfies leaked onto the Internet <ref> https://thehackernews.com/2014/09/reported-apple-icloud-hack-leaked_1.html </ref> after their iCloud was hacked. <br />
<br />
Section not completed, will update soon (todays date 01st February 2023)<br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network. section about MAC To be finished soon, signed (1st February 2023)<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55384Internet security tutorial2023-02-01T14:27:19Z<p>Eskimo: added section about MAC addresses</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==== MAC addresses ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network. section about MAC To be finished soon, signed (1st February 2023)<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55383Internet security tutorial2023-02-01T14:26:16Z<p>Eskimo: copied and erased info about MAC addresses because I am going to be creating this section below VPN (same page)</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55382Internet security tutorial2023-02-01T14:24:30Z<p>Eskimo: erased information about child porn links FBI because news source no longer exists and it did not feel this information belongs here</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
==== Faking the MAC address ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55381Internet security tutorial2023-02-01T14:21:01Z<p>Eskimo: updated encryption and passwords section</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
==== Faking the MAC address ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.<br />
<br />
== Encryption ==<br />
<br />
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==Internet Security and Child Pornography==<br />
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55380Internet security tutorial2023-02-01T14:05:09Z<p>Eskimo: updated and organised paragraph</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
==== Faking the MAC address ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.<br />
<br />
== Encryption & live DVD/USB ==<br />
<br />
Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref> If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like [https://tails.boum.org/ Tails], live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==Internet Security and Child Pornography==<br />
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''<br />
<br />
== Securely deleting files ==<br />
<br />
When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55379Internet security tutorial2023-02-01T13:58:52Z<p>Eskimo: erased information about anonymity via open wireless networks as this is not feasible in 2023 perhaps it was in the 90s</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
==== Faking the MAC address ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.<br />
<br />
== Encryption & live DVD/USB ==<br />
<br />
Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref> If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like [https://tails.boum.org/ Tails], live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==Internet Security and Child Pornography==<br />
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''<br />
<br />
==Securely deleting files==<br />
<br />
Many times when using GNU/Linux or Windows, when you try to delete some file. It isn't really deleted. Instead the information about its existence is deleted. Then an attacker can retrieve the file from disk. When using GNU/Linux you should open a terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>. If you use Windows, you can install specialist wiping software like Eraser.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55378Internet security tutorial2023-02-01T13:51:44Z<p>Eskimo: /* Migrating to GNU/Linux */</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
=== Anonymity via wireless ===<br />
If you known some wireless network that allows you to get connected to. Using only information that is used by other people too(eg. the network name and the password). Then you can use it to have some anonymity. But it may only work if other people is using ''exactly the same network at exactly the same time''. Then the attacker will not know for sure, who exactly made such access.<br />
<br />
These networks can be:<br />
* The Internet connection offered by your job that other employees are using too.<br />
* Open Wireless: The Internet connection offered by public places. These places can be shops, restaurants, parks and so on.<br />
* The Internet connection offered by your university to students and teachers.<br />
<br />
Even if the attacker never find you. It can get fairly close, then it is highly recommended that you use the methods described here with [[encryption]] or a liveCD ([http://en.boywiki.org/wiki/Internet_security_tutorial#Encryption_.26_live_CD see below]).<br />
It is recommended that you use a anonymizer(like Tor) too.<br />
<br />
==== Faking the MAC address ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.<br />
<br />
So if you want anonymity through a public network (eg. Open Wireless). You should fake that address. To fake it simply change it by something else. For example: 00:D0:A3:4B:C3:F5<br />
<br />
Open a terminal and type the following lines:<br><br />
<code><br />
sudo ifconfig wlan0 down<br><br />
sudo ifconfig wlan0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig wlan0 up<br />
</code><br />
<br />
In this example I use the wlan0 device, but you may use some other to connect to the Internet, then pay attention to error messages like: wlan0: unknown interface: No such device. This means that an error occurred and the address has not changed.<br />
<br />
You can do that for all interfaces the command <code>ifconfig</code> will show the interface name for all interfaces. Simply replace wlan0, by the name of the interface. For example: <br><br />
<code><br />
sudo ifconfig eth0 down<br><br />
sudo ifconfig eth0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig eth0 up<br />
</code><br />
<br />
Then run <code>ifconfig</code> to make sure they succeed. This command will show the interface name followed by several information. If all went well the MAC that you typed should appear as the HWaddr of the interface that you use to access the Internet.<br />
<br />
You may want to change the MAC for all interfaces. After it re-run <code>ifconfig</code> to make sure that everything went well.<br />
<br />
== Encryption & live DVD/USB ==<br />
<br />
Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref> If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like [https://tails.boum.org/ Tails], live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==Internet Security and Child Pornography==<br />
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''<br />
<br />
==Securely deleting files==<br />
<br />
Many times when using GNU/Linux or Windows, when you try to delete some file. It isn't really deleted. Instead the information about its existence is deleted. Then an attacker can retrieve the file from disk. When using GNU/Linux you should open a terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>. If you use Windows, you can install specialist wiping software like Eraser.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55377Internet security tutorial2023-02-01T13:49:23Z<p>Eskimo: updating with new information and erasing old info</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux system the easiest way to do this is with a tool such as [https://unetbootin.github.io/ UNetbootin] that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.<br />
<br />
Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy that comes comes with Tor already configured.<br />
<br />
=== Anonymity via wireless ===<br />
If you known some wireless network that allows you to get connected to. Using only information that is used by other people too(eg. the network name and the password). Then you can use it to have some anonymity. But it may only work if other people is using ''exactly the same network at exactly the same time''. Then the attacker will not know for sure, who exactly made such access.<br />
<br />
These networks can be:<br />
* The Internet connection offered by your job that other employees are using too.<br />
* Open Wireless: The Internet connection offered by public places. These places can be shops, restaurants, parks and so on.<br />
* The Internet connection offered by your university to students and teachers.<br />
<br />
Even if the attacker never find you. It can get fairly close, then it is highly recommended that you use the methods described here with [[encryption]] or a liveCD ([http://en.boywiki.org/wiki/Internet_security_tutorial#Encryption_.26_live_CD see below]).<br />
It is recommended that you use a anonymizer(like Tor) too.<br />
<br />
==== Faking the MAC address ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.<br />
<br />
So if you want anonymity through a public network (eg. Open Wireless). You should fake that address. To fake it simply change it by something else. For example: 00:D0:A3:4B:C3:F5<br />
<br />
Open a terminal and type the following lines:<br><br />
<code><br />
sudo ifconfig wlan0 down<br><br />
sudo ifconfig wlan0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig wlan0 up<br />
</code><br />
<br />
In this example I use the wlan0 device, but you may use some other to connect to the Internet, then pay attention to error messages like: wlan0: unknown interface: No such device. This means that an error occurred and the address has not changed.<br />
<br />
You can do that for all interfaces the command <code>ifconfig</code> will show the interface name for all interfaces. Simply replace wlan0, by the name of the interface. For example: <br><br />
<code><br />
sudo ifconfig eth0 down<br><br />
sudo ifconfig eth0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig eth0 up<br />
</code><br />
<br />
Then run <code>ifconfig</code> to make sure they succeed. This command will show the interface name followed by several information. If all went well the MAC that you typed should appear as the HWaddr of the interface that you use to access the Internet.<br />
<br />
You may want to change the MAC for all interfaces. After it re-run <code>ifconfig</code> to make sure that everything went well.<br />
<br />
== Encryption & live DVD/USB ==<br />
<br />
Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref> If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like [https://tails.boum.org/ Tails], live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==Internet Security and Child Pornography==<br />
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''<br />
<br />
==Securely deleting files==<br />
<br />
Many times when using GNU/Linux or Windows, when you try to delete some file. It isn't really deleted. Instead the information about its existence is deleted. Then an attacker can retrieve the file from disk. When using GNU/Linux you should open a terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>. If you use Windows, you can install specialist wiping software like Eraser.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55376Internet security tutorial2023-02-01T13:15:21Z<p>Eskimo: /* Why you should not use Windows? */</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns <ref>https://www.cyberghostvpn.com/en_US/privacyhub/what-are-dark-patterns/</ref> to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA <ref>https://www.makeuseof.com/what-is-photodna-how-does-it-work/</ref> a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.<br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux system download a beginner friendly distribution like [http://www.linuxmint.com/ Linux Mint], burn the ''.iso'' to a CD/DVD using the free CDXPBurner [https://cdburnerxp.se/en/home CDBurnerXP] making sure that you select "''Burn ISO Image''". You can use Linux Mint as a live CD to make sure that everything works before installing it. More sophisticated users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy, it comes with Tor already configured. <br />
<br />
Be aware that you will have to modify your computer BIOS to boot a live CD and Windows 8 secure boot is known to cause problems doing this, search the internet or ask in a computer forum to troubleshoot.<br />
<br />
=== Anonymity via wireless ===<br />
If you known some wireless network that allows you to get connected to. Using only information that is used by other people too(eg. the network name and the password). Then you can use it to have some anonymity. But it may only work if other people is using ''exactly the same network at exactly the same time''. Then the attacker will not know for sure, who exactly made such access.<br />
<br />
These networks can be:<br />
* The Internet connection offered by your job that other employees are using too.<br />
* Open Wireless: The Internet connection offered by public places. These places can be shops, restaurants, parks and so on.<br />
* The Internet connection offered by your university to students and teachers.<br />
<br />
Even if the attacker never find you. It can get fairly close, then it is highly recommended that you use the methods described here with [[encryption]] or a liveCD ([http://en.boywiki.org/wiki/Internet_security_tutorial#Encryption_.26_live_CD see below]).<br />
It is recommended that you use a anonymizer(like Tor) too.<br />
<br />
==== Faking the MAC address ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.<br />
<br />
So if you want anonymity through a public network (eg. Open Wireless). You should fake that address. To fake it simply change it by something else. For example: 00:D0:A3:4B:C3:F5<br />
<br />
Open a terminal and type the following lines:<br><br />
<code><br />
sudo ifconfig wlan0 down<br><br />
sudo ifconfig wlan0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig wlan0 up<br />
</code><br />
<br />
In this example I use the wlan0 device, but you may use some other to connect to the Internet, then pay attention to error messages like: wlan0: unknown interface: No such device. This means that an error occurred and the address has not changed.<br />
<br />
You can do that for all interfaces the command <code>ifconfig</code> will show the interface name for all interfaces. Simply replace wlan0, by the name of the interface. For example: <br><br />
<code><br />
sudo ifconfig eth0 down<br><br />
sudo ifconfig eth0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig eth0 up<br />
</code><br />
<br />
Then run <code>ifconfig</code> to make sure they succeed. This command will show the interface name followed by several information. If all went well the MAC that you typed should appear as the HWaddr of the interface that you use to access the Internet.<br />
<br />
You may want to change the MAC for all interfaces. After it re-run <code>ifconfig</code> to make sure that everything went well.<br />
<br />
== Encryption & live DVD/USB ==<br />
<br />
Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref> If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like [https://tails.boum.org/ Tails], live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==Internet Security and Child Pornography==<br />
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''<br />
<br />
==Securely deleting files==<br />
<br />
Many times when using GNU/Linux or Windows, when you try to delete some file. It isn't really deleted. Instead the information about its existence is deleted. Then an attacker can retrieve the file from disk. When using GNU/Linux you should open a terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>. If you use Windows, you can install specialist wiping software like Eraser.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55375Internet security tutorial2023-02-01T12:13:08Z<p>Eskimo: /* On GNU/Linux */</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software does not mean zero cost software although most Linux distributions are free of charge.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows have a long history of security holes.<ref>http://en.windows7sins.org/security/</ref> Windows is proprietary software and Windows restricts your freedom, invades your privacy and expose your personal data. <ref>http://fsf.org/windows8</ref><br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux system download a beginner friendly distribution like [http://www.linuxmint.com/ Linux Mint], burn the ''.iso'' to a CD/DVD using the free CDXPBurner [https://cdburnerxp.se/en/home CDBurnerXP] making sure that you select "''Burn ISO Image''". You can use Linux Mint as a live CD to make sure that everything works before installing it. More sophisticated users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy, it comes with Tor already configured. <br />
<br />
Be aware that you will have to modify your computer BIOS to boot a live CD and Windows 8 secure boot is known to cause problems doing this, search the internet or ask in a computer forum to troubleshoot.<br />
<br />
=== Anonymity via wireless ===<br />
If you known some wireless network that allows you to get connected to. Using only information that is used by other people too(eg. the network name and the password). Then you can use it to have some anonymity. But it may only work if other people is using ''exactly the same network at exactly the same time''. Then the attacker will not know for sure, who exactly made such access.<br />
<br />
These networks can be:<br />
* The Internet connection offered by your job that other employees are using too.<br />
* Open Wireless: The Internet connection offered by public places. These places can be shops, restaurants, parks and so on.<br />
* The Internet connection offered by your university to students and teachers.<br />
<br />
Even if the attacker never find you. It can get fairly close, then it is highly recommended that you use the methods described here with [[encryption]] or a liveCD ([http://en.boywiki.org/wiki/Internet_security_tutorial#Encryption_.26_live_CD see below]).<br />
It is recommended that you use a anonymizer(like Tor) too.<br />
<br />
==== Faking the MAC address ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.<br />
<br />
So if you want anonymity through a public network (eg. Open Wireless). You should fake that address. To fake it simply change it by something else. For example: 00:D0:A3:4B:C3:F5<br />
<br />
Open a terminal and type the following lines:<br><br />
<code><br />
sudo ifconfig wlan0 down<br><br />
sudo ifconfig wlan0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig wlan0 up<br />
</code><br />
<br />
In this example I use the wlan0 device, but you may use some other to connect to the Internet, then pay attention to error messages like: wlan0: unknown interface: No such device. This means that an error occurred and the address has not changed.<br />
<br />
You can do that for all interfaces the command <code>ifconfig</code> will show the interface name for all interfaces. Simply replace wlan0, by the name of the interface. For example: <br><br />
<code><br />
sudo ifconfig eth0 down<br><br />
sudo ifconfig eth0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig eth0 up<br />
</code><br />
<br />
Then run <code>ifconfig</code> to make sure they succeed. This command will show the interface name followed by several information. If all went well the MAC that you typed should appear as the HWaddr of the interface that you use to access the Internet.<br />
<br />
You may want to change the MAC for all interfaces. After it re-run <code>ifconfig</code> to make sure that everything went well.<br />
<br />
== Encryption & live DVD/USB ==<br />
<br />
Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref> If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like [https://tails.boum.org/ Tails], live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==Internet Security and Child Pornography==<br />
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''<br />
<br />
==Securely deleting files==<br />
<br />
Many times when using GNU/Linux or Windows, when you try to delete some file. It isn't really deleted. Instead the information about its existence is deleted. Then an attacker can retrieve the file from disk. When using GNU/Linux you should open a terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>. If you use Windows, you can install specialist wiping software like Eraser.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55374Internet security tutorial2023-02-01T12:10:44Z<p>Eskimo: /* Firewall/Anti-virus */</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software not means zero cost software.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows have a long history of security holes.<ref>http://en.windows7sins.org/security/</ref> Windows is proprietary software and Windows restricts your freedom, invades your privacy and expose your personal data. <ref>http://fsf.org/windows8</ref><br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux system download a beginner friendly distribution like [http://www.linuxmint.com/ Linux Mint], burn the ''.iso'' to a CD/DVD using the free CDXPBurner [https://cdburnerxp.se/en/home CDBurnerXP] making sure that you select "''Burn ISO Image''". You can use Linux Mint as a live CD to make sure that everything works before installing it. More sophisticated users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy, it comes with Tor already configured. <br />
<br />
Be aware that you will have to modify your computer BIOS to boot a live CD and Windows 8 secure boot is known to cause problems doing this, search the internet or ask in a computer forum to troubleshoot.<br />
<br />
=== Anonymity via wireless ===<br />
If you known some wireless network that allows you to get connected to. Using only information that is used by other people too(eg. the network name and the password). Then you can use it to have some anonymity. But it may only work if other people is using ''exactly the same network at exactly the same time''. Then the attacker will not know for sure, who exactly made such access.<br />
<br />
These networks can be:<br />
* The Internet connection offered by your job that other employees are using too.<br />
* Open Wireless: The Internet connection offered by public places. These places can be shops, restaurants, parks and so on.<br />
* The Internet connection offered by your university to students and teachers.<br />
<br />
Even if the attacker never find you. It can get fairly close, then it is highly recommended that you use the methods described here with [[encryption]] or a liveCD ([http://en.boywiki.org/wiki/Internet_security_tutorial#Encryption_.26_live_CD see below]).<br />
It is recommended that you use a anonymizer(like Tor) too.<br />
<br />
==== Faking the MAC address ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.<br />
<br />
So if you want anonymity through a public network (eg. Open Wireless). You should fake that address. To fake it simply change it by something else. For example: 00:D0:A3:4B:C3:F5<br />
<br />
Open a terminal and type the following lines:<br><br />
<code><br />
sudo ifconfig wlan0 down<br><br />
sudo ifconfig wlan0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig wlan0 up<br />
</code><br />
<br />
In this example I use the wlan0 device, but you may use some other to connect to the Internet, then pay attention to error messages like: wlan0: unknown interface: No such device. This means that an error occurred and the address has not changed.<br />
<br />
You can do that for all interfaces the command <code>ifconfig</code> will show the interface name for all interfaces. Simply replace wlan0, by the name of the interface. For example: <br><br />
<code><br />
sudo ifconfig eth0 down<br><br />
sudo ifconfig eth0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig eth0 up<br />
</code><br />
<br />
Then run <code>ifconfig</code> to make sure they succeed. This command will show the interface name followed by several information. If all went well the MAC that you typed should appear as the HWaddr of the interface that you use to access the Internet.<br />
<br />
You may want to change the MAC for all interfaces. After it re-run <code>ifconfig</code> to make sure that everything went well.<br />
<br />
== Encryption & live DVD/USB ==<br />
<br />
Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref> If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like [https://tails.boum.org/ Tails], live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==Internet Security and Child Pornography==<br />
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''<br />
<br />
==Securely deleting files==<br />
<br />
Many times when using GNU/Linux or Windows, when you try to delete some file. It isn't really deleted. Instead the information about its existence is deleted. Then an attacker can retrieve the file from disk. When using GNU/Linux you should open a terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>. If you use Windows, you can install specialist wiping software like Eraser.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55373Internet security tutorial2023-02-01T12:09:52Z<p>Eskimo: /* Firewall/Anti-virus */</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software not means zero cost software.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows have a long history of security holes.<ref>http://en.windows7sins.org/security/</ref> Windows is proprietary software and Windows restricts your freedom, invades your privacy and expose your personal data. <ref>http://fsf.org/windows8</ref><br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux system download a beginner friendly distribution like [http://www.linuxmint.com/ Linux Mint], burn the ''.iso'' to a CD/DVD using the free CDXPBurner [https://cdburnerxp.se/en/home CDBurnerXP] making sure that you select "''Burn ISO Image''". You can use Linux Mint as a live CD to make sure that everything works before installing it. More sophisticated users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy, it comes with Tor already configured. <br />
<br />
Be aware that you will have to modify your computer BIOS to boot a live CD and Windows 8 secure boot is known to cause problems doing this, search the internet or ask in a computer forum to troubleshoot.<br />
<br />
=== Anonymity via wireless ===<br />
If you known some wireless network that allows you to get connected to. Using only information that is used by other people too(eg. the network name and the password). Then you can use it to have some anonymity. But it may only work if other people is using ''exactly the same network at exactly the same time''. Then the attacker will not know for sure, who exactly made such access.<br />
<br />
These networks can be:<br />
* The Internet connection offered by your job that other employees are using too.<br />
* Open Wireless: The Internet connection offered by public places. These places can be shops, restaurants, parks and so on.<br />
* The Internet connection offered by your university to students and teachers.<br />
<br />
Even if the attacker never find you. It can get fairly close, then it is highly recommended that you use the methods described here with [[encryption]] or a liveCD ([http://en.boywiki.org/wiki/Internet_security_tutorial#Encryption_.26_live_CD see below]).<br />
It is recommended that you use a anonymizer(like Tor) too.<br />
<br />
==== Faking the MAC address ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.<br />
<br />
So if you want anonymity through a public network (eg. Open Wireless). You should fake that address. To fake it simply change it by something else. For example: 00:D0:A3:4B:C3:F5<br />
<br />
Open a terminal and type the following lines:<br><br />
<code><br />
sudo ifconfig wlan0 down<br><br />
sudo ifconfig wlan0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig wlan0 up<br />
</code><br />
<br />
In this example I use the wlan0 device, but you may use some other to connect to the Internet, then pay attention to error messages like: wlan0: unknown interface: No such device. This means that an error occurred and the address has not changed.<br />
<br />
You can do that for all interfaces the command <code>ifconfig</code> will show the interface name for all interfaces. Simply replace wlan0, by the name of the interface. For example: <br><br />
<code><br />
sudo ifconfig eth0 down<br><br />
sudo ifconfig eth0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig eth0 up<br />
</code><br />
<br />
Then run <code>ifconfig</code> to make sure they succeed. This command will show the interface name followed by several information. If all went well the MAC that you typed should appear as the HWaddr of the interface that you use to access the Internet.<br />
<br />
You may want to change the MAC for all interfaces. After it re-run <code>ifconfig</code> to make sure that everything went well.<br />
<br />
== Encryption & live DVD/USB ==<br />
<br />
Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref> If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like [https://tails.boum.org/ Tails], live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==Internet Security and Child Pornography==<br />
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''<br />
<br />
==Securely deleting files==<br />
<br />
Many times when using GNU/Linux or Windows, when you try to delete some file. It isn't really deleted. Instead the information about its existence is deleted. Then an attacker can retrieve the file from disk. When using GNU/Linux you should open a terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>. If you use Windows, you can install specialist wiping software like Eraser.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=Internet_security_tutorial&diff=55372Internet security tutorial2023-02-01T12:05:07Z<p>Eskimo: updating really old information, lots of work to be done here...</p>
<hr />
<div>{{cleanup}}<br />
<br />
<br />
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''<br />
<br />
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, [https://linuxmint.com/ LinuxMint] is suitable for beginners, advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref><br />
<br />
==On Windows==<br />
<br />
=== Browser security ===<br />
<br />
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.<br />
<br />
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:<br />
<br />
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.<br />
<br />
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service. <br />
<br />
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.<br />
<br />
===Firewall/Anti-virus===<br />
<br />
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall can do that for them and also log all attempts, device connected and usernames activities, they can also log the websites you visit, each business decides its own IT policy for users. They can do pretty much what they want since it is their machine and not yours.<br />
<br />
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, some antivirus include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.<br />
<br />
== On GNU/Linux ==<br />
<br />
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software not means zero cost software.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref><br />
<br />
=== Why you should not use Windows? ===<br />
<br />
Windows have a long history of security holes.<ref>http://en.windows7sins.org/security/</ref> Windows is proprietary software and Windows restricts your freedom, invades your privacy and expose your personal data. <ref>http://fsf.org/windows8</ref><br />
<br />
=== Migrating to GNU/Linux ===<br />
<br />
If you use Windows and want to try the GNU/Linux system download a beginner friendly distribution like [http://www.linuxmint.com/ Linux Mint], burn the ''.iso'' to a CD/DVD using the free CDXPBurner [https://cdburnerxp.se/en/home CDBurnerXP] making sure that you select "''Burn ISO Image''". You can use Linux Mint as a live CD to make sure that everything works before installing it. More sophisticated users will want to download [https://tails.boum.org/ Tails] a Linux distribution focused on user privacy, it comes with Tor already configured. <br />
<br />
Be aware that you will have to modify your computer BIOS to boot a live CD and Windows 8 secure boot is known to cause problems doing this, search the internet or ask in a computer forum to troubleshoot.<br />
<br />
=== Anonymity via wireless ===<br />
If you known some wireless network that allows you to get connected to. Using only information that is used by other people too(eg. the network name and the password). Then you can use it to have some anonymity. But it may only work if other people is using ''exactly the same network at exactly the same time''. Then the attacker will not know for sure, who exactly made such access.<br />
<br />
These networks can be:<br />
* The Internet connection offered by your job that other employees are using too.<br />
* Open Wireless: The Internet connection offered by public places. These places can be shops, restaurants, parks and so on.<br />
* The Internet connection offered by your university to students and teachers.<br />
<br />
Even if the attacker never find you. It can get fairly close, then it is highly recommended that you use the methods described here with [[encryption]] or a liveCD ([http://en.boywiki.org/wiki/Internet_security_tutorial#Encryption_.26_live_CD see below]).<br />
It is recommended that you use a anonymizer(like Tor) too.<br />
<br />
==== Faking the MAC address ====<br />
<br />
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.<br />
<br />
So if you want anonymity through a public network (eg. Open Wireless). You should fake that address. To fake it simply change it by something else. For example: 00:D0:A3:4B:C3:F5<br />
<br />
Open a terminal and type the following lines:<br><br />
<code><br />
sudo ifconfig wlan0 down<br><br />
sudo ifconfig wlan0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig wlan0 up<br />
</code><br />
<br />
In this example I use the wlan0 device, but you may use some other to connect to the Internet, then pay attention to error messages like: wlan0: unknown interface: No such device. This means that an error occurred and the address has not changed.<br />
<br />
You can do that for all interfaces the command <code>ifconfig</code> will show the interface name for all interfaces. Simply replace wlan0, by the name of the interface. For example: <br><br />
<code><br />
sudo ifconfig eth0 down<br><br />
sudo ifconfig eth0 hw ether 00:D0:A3:4B:C3:F5<br><br />
sudo ifconfig eth0 up<br />
</code><br />
<br />
Then run <code>ifconfig</code> to make sure they succeed. This command will show the interface name followed by several information. If all went well the MAC that you typed should appear as the HWaddr of the interface that you use to access the Internet.<br />
<br />
You may want to change the MAC for all interfaces. After it re-run <code>ifconfig</code> to make sure that everything went well.<br />
<br />
== Encryption & live DVD/USB ==<br />
<br />
Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. [[Encryption]] software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.<br />
<br />
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref> If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like [https://tails.boum.org/ Tails], live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.<br />
<br />
==== Using secure passwords ====<br />
<br />
The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.<br />
<br />
== Cloud Services ==<br />
<br />
Section to be completed soon (today´s date 12th August 2022) <br />
<br />
==Virtual Private Network==<br />
<br />
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.<br />
<br />
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).<br />
<br />
==Internet Security and Child Pornography==<br />
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''<br />
<br />
==Securely deleting files==<br />
<br />
Many times when using GNU/Linux or Windows, when you try to delete some file. It isn't really deleted. Instead the information about its existence is deleted. Then an attacker can retrieve the file from disk. When using GNU/Linux you should open a terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>. If you use Windows, you can install specialist wiping software like Eraser.<br />
<br />
==See also==<br />
<br />
* [[SAFE Network]]<br />
* [[How not to accidentally out yourself]]<br />
* [[Email security]]<br />
* [[Police]]<br />
<br />
==References==<br />
<br />
<References /><br />
<br />
==External links==<br />
<br />
*[https://www.brave.com Brave browser]<br />
*[http://www.avast.com/free-antivirus-download Avast free antivirus]<br />
*[https://ssd.eff.org Surveillance Self-Defense]<br />
*[https://sourceforge.net/projects/eraser/ Eraser]<br />
<br />
[[Category:Technology]]<br />
[[Category:Security for boylovers]]<br />
[[Category:Essential reading for BoyLovers]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=To_Catch_a_Predator&diff=55366To Catch a Predator2023-01-31T16:30:53Z<p>Eskimo: typo fixed</p>
<hr />
<div>'''To Catch a Predator''' is a recurring segment on NBC's Dateline news show whose mission is to lure adult men into sexual chats with people posing as children, invite them to a house to meet the imaginary children, and then expose them on national television. The segment, presented by [[Chris Hansen]] is wildly popular; episodes featuring "Predator" segments are ranked 16 among NBC's 41 regularly broadcast shows in the 2005-2006 season.<br />
<br />
[[Perverted Justice]] and its leader [[Xavier Von Erck]] provide the vigilante operations and the actual luring of the show's sting victims. Perverted Justice is paid at least USD 100,000 per episode, as well as being promised a cut from future DVD releases.<br />
<br />
On June 1st, 2007, all twenty-four cases brought up during an episode set in Murphy, Texas were declined to be prosecuted by the Collin County prosecutor's office due to insufficient evidence (Dallas Morning News, 1 June 2007), but only after one suspect (a former assistant district attorney) had committed suicide (Associated Press, 6 November 2006).<br />
<br />
== Death of Louis Conradt ==<br />
<br />
[https://www.newgon.net/wiki/Louis%20Conradt Louis Conradt], a Democratic district attorney from Texas fell victim to Dateline NBC's To Catch a Predator, a TV series documenting "sexual predator stings", after he committed suicide when a SWAT team entered his house, with Dateline cameras recording the action.<br />
<br />
== Ethics lawsuit ==<br />
<br />
On 24 May 2007, former Dateline producer Marsha Bartel sued NBC for breach of her employment contract. NBC claimed they fired her on 17 November 2006 as part of NBC's "TV 2.0" reorganization, but Bartel contends that the dismissal was due to her reaction to the extensive breaches of NBC's ethics code and journalistic ethical standards during Dateline production. The specific breaches mentioned by Bartel were:<br />
<br />
* Perverted Justice was deputized as part of the sting, despite being "a shadowy organization with ill-defined purposes".<br />
* Bartel as a producer was denied access to Perverted Justice volunteers, even though they were pivotal to the show's production.<br />
* NBC's view of Perverted Justice changed after they began paying the organization. At first, they were viewed as "vigilante[s]"; later, they were viewed as "watchdog[s]". Bartel quotes Dateline Executive Producer David Corvo as saying, "We all know they're nuts."<br />
* As paid contributors, Perverted Justice demonstrate a conflict of interest in their personal and professional lives. (This may refer to an intricate plan of revenge by Xavier Von Erck on one of his former covolunteers; see the Radar Online reference for more.)<br />
* By paying Perverted Justice to troll and lure sting targets, NBC gives the organization incentive to lie to and trick their victims.<br />
* Dateline host Chris Hansen lied to the public about NBC's "parallel investigation" with law enforcement in order to appear ethical. (In reality, NBC and law enforcement agencies were working closely together, as the next items suggest.)<br />
* NBC traded video equipment and tapes with law enforcement for "dramatically staged arrest scenarios" and police interrogations to "increase ratings and ultimately revenues for NBC".<br />
* Also to increase dramatic effect, NBC paid or reimbursed law enforcement officials to participate in the sting.<br />
* NBC provided live data feeds to law enforcement during the sting operations, and later to prosecutors.<br />
* In an unwritten agreement with law enforcement, officials provided confidential information they otherwise would not.<br />
* The show covered up unethical and humiliating behavior by law enforcement officials.<br />
* Perverted Justice did not provide complete transcripts of their trolling operations, making it impossible for Dateline producers to check them. Independent verification was also impossible.<br />
* Although sting victims initially decide not to come, Perverted Justice vigilantes (posing as children) would beg the victims to come anyway. Dateline and Perverted justice would cover up these facts.<br />
* Sting victims were led into additional acts of humiliation, such as undressing on national television.<br />
* Chris Hansen over reported child abuse, saying that "at any given time, 50,000 predators were on the internet prowling children", even FBI sources show that this is false.<br />
* NBC News and anyone acting on its behalf must obey United States and local laws, yet "Perverted Justice has been accused of committing the exact crime it claims it wishes to prevent, i.e. minors being exposed to pornography." NBC was told of this, yet took no action. <br />
<br />
== References ==<br />
<br />
* Marsha Bartel v. NBC Universal, Inc., 07-CV-2925 (N. Dist. Ill. 2007)<br />
* [http://www.radaronline.com/features/2006/09/strange_bedfellows.php Strange Bedfellows], Radar Online, 7 September 2006 (on the relationship between Xavier Von Erck and NBC)<br />
* [http://www.radaronline.com/exclusives/2007/05/to-sue-a-predator-catcher.php To Sue a Predator Catcher], Radar Online, 29 May 2007 (on the lawsuit)<br />
* [http://www.msnbc.msn.com/id/15592444/ "Texas prosecutor kills himself after sex sting"], Associated Press, 6 November 2006. Retrieved on 7 November 2006.<br />
* [http://www.dallasnews.com/sharedcontent/dws/news/localnews/crime/stories/DN-sexsting_02cco.ART.North.Edition1.43ea895.html "Sex-predator arrests in Murphy rejected"], Dallas Morning News, 1 June 2007. Retrieved on 1 June 2007. <br />
<br />
== External links ==<br />
<br />
* [https://www.boychat.org/messages/1078168.htm BC:1078168]<br />
* [https://www.newgon.net/wiki/To_Catch_a_Predator "To Catch a Predator] (Original Newgon Wiki Article)<br />
<br />
[[Category:Vigilante]]<br />
[[Category:Television]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=To_Catch_a_Predator&diff=55365To Catch a Predator2023-01-31T16:29:51Z<p>Eskimo: Added external link to Newgon.net Louis Conradt page</p>
<hr />
<div>'''To Catch a Predator''' is a recurring segment on NBC's Dateline news show whose mission is to lure adult men into sexual chats with people posing as children, invite them to a house to meet the imaginary children, and then expose them on national television. The segment, presented by [[Chris Hansen]] is wildly popular; episodes featuring "Predator" segments are ranked 16 among NBC's 41 regularly broadcast shows in the 2005-2006 season.<br />
<br />
[[Perverted Justice]] and its leader [[Xavier Von Erck]] provide the vigilante operations and the actual luring of the show's sting victims. Perverted Justice is paid at least USD 100,000 per episode, as well as being promised a cut from future DVD releases.<br />
<br />
On June 1st, 2007, all twenty-four cases brought up during an episode set in Murphy, Texas were declined to be prosecuted by the Collin County prosecutor's office due to insufficient evidence (Dallas Morning News, 1 June 2007), but only after one suspect (a former assistant district attorney) had committed suicide (Associated Press, 6 November 2006).<br />
<br />
== Death of [[Louis Conradt]] ==<br />
<br />
[[https://www.newgon.net/wiki/Louis%20Conradt Louis Conradt]]], a Democratic district attorney from Texas fell victim to Dateline NBC's To Catch a Predator, a TV series documenting "sexual predator stings", after he committed suicide when a SWAT team entered his house, with Dateline cameras recording the action.<br />
<br />
== Ethics lawsuit ==<br />
<br />
On 24 May 2007, former Dateline producer Marsha Bartel sued NBC for breach of her employment contract. NBC claimed they fired her on 17 November 2006 as part of NBC's "TV 2.0" reorganization, but Bartel contends that the dismissal was due to her reaction to the extensive breaches of NBC's ethics code and journalistic ethical standards during Dateline production. The specific breaches mentioned by Bartel were:<br />
<br />
* Perverted Justice was deputized as part of the sting, despite being "a shadowy organization with ill-defined purposes".<br />
* Bartel as a producer was denied access to Perverted Justice volunteers, even though they were pivotal to the show's production.<br />
* NBC's view of Perverted Justice changed after they began paying the organization. At first, they were viewed as "vigilante[s]"; later, they were viewed as "watchdog[s]". Bartel quotes Dateline Executive Producer David Corvo as saying, "We all know they're nuts."<br />
* As paid contributors, Perverted Justice demonstrate a conflict of interest in their personal and professional lives. (This may refer to an intricate plan of revenge by Xavier Von Erck on one of his former covolunteers; see the Radar Online reference for more.)<br />
* By paying Perverted Justice to troll and lure sting targets, NBC gives the organization incentive to lie to and trick their victims.<br />
* Dateline host Chris Hansen lied to the public about NBC's "parallel investigation" with law enforcement in order to appear ethical. (In reality, NBC and law enforcement agencies were working closely together, as the next items suggest.)<br />
* NBC traded video equipment and tapes with law enforcement for "dramatically staged arrest scenarios" and police interrogations to "increase ratings and ultimately revenues for NBC".<br />
* Also to increase dramatic effect, NBC paid or reimbursed law enforcement officials to participate in the sting.<br />
* NBC provided live data feeds to law enforcement during the sting operations, and later to prosecutors.<br />
* In an unwritten agreement with law enforcement, officials provided confidential information they otherwise would not.<br />
* The show covered up unethical and humiliating behavior by law enforcement officials.<br />
* Perverted Justice did not provide complete transcripts of their trolling operations, making it impossible for Dateline producers to check them. Independent verification was also impossible.<br />
* Although sting victims initially decide not to come, Perverted Justice vigilantes (posing as children) would beg the victims to come anyway. Dateline and Perverted justice would cover up these facts.<br />
* Sting victims were led into additional acts of humiliation, such as undressing on national television.<br />
* Chris Hansen over reported child abuse, saying that "at any given time, 50,000 predators were on the internet prowling children", even FBI sources show that this is false.<br />
* NBC News and anyone acting on its behalf must obey United States and local laws, yet "Perverted Justice has been accused of committing the exact crime it claims it wishes to prevent, i.e. minors being exposed to pornography." NBC was told of this, yet took no action. <br />
<br />
== References ==<br />
<br />
* Marsha Bartel v. NBC Universal, Inc., 07-CV-2925 (N. Dist. Ill. 2007)<br />
* [http://www.radaronline.com/features/2006/09/strange_bedfellows.php Strange Bedfellows], Radar Online, 7 September 2006 (on the relationship between Xavier Von Erck and NBC)<br />
* [http://www.radaronline.com/exclusives/2007/05/to-sue-a-predator-catcher.php To Sue a Predator Catcher], Radar Online, 29 May 2007 (on the lawsuit)<br />
* [http://www.msnbc.msn.com/id/15592444/ "Texas prosecutor kills himself after sex sting"], Associated Press, 6 November 2006. Retrieved on 7 November 2006.<br />
* [http://www.dallasnews.com/sharedcontent/dws/news/localnews/crime/stories/DN-sexsting_02cco.ART.North.Edition1.43ea895.html "Sex-predator arrests in Murphy rejected"], Dallas Morning News, 1 June 2007. Retrieved on 1 June 2007. <br />
<br />
== External links ==<br />
<br />
* [https://www.boychat.org/messages/1078168.htm BC:1078168]<br />
* [https://www.newgon.net/wiki/To_Catch_a_Predator "To Catch a Predator] (Original Newgon Wiki Article)<br />
<br />
[[Category:Vigilante]]<br />
[[Category:Television]]</div>Eskimohttps://www.boywiki.org/en/index.php?title=To_Catch_a_Predator&diff=55364To Catch a Predator2023-01-31T16:27:12Z<p>Eskimo: I changed the old non working Newgon.com link to the new Newgon.net link</p>
<hr />
<div>'''To Catch a Predator''' is a recurring segment on NBC's Dateline news show whose mission is to lure adult men into sexual chats with people posing as children, invite them to a house to meet the imaginary children, and then expose them on national television. The segment, presented by [[Chris Hansen]] is wildly popular; episodes featuring "Predator" segments are ranked 16 among NBC's 41 regularly broadcast shows in the 2005-2006 season.<br />
<br />
[[Perverted Justice]] and its leader [[Xavier Von Erck]] provide the vigilante operations and the actual luring of the show's sting victims. Perverted Justice is paid at least USD 100,000 per episode, as well as being promised a cut from future DVD releases.<br />
<br />
On June 1st, 2007, all twenty-four cases brought up during an episode set in Murphy, Texas were declined to be prosecuted by the Collin County prosecutor's office due to insufficient evidence (Dallas Morning News, 1 June 2007), but only after one suspect (a former assistant district attorney) had committed suicide (Associated Press, 6 November 2006).<br />
<br />
== Death of [[Louis Conradt]] ==<br />
<br />
[[Louis Conradt]], a Democratic district attorney from Texas fell victim to Dateline NBC's To Catch a Predator, a TV series documenting "sexual predator stings", after he committed suicide when a SWAT team entered his house, with Dateline cameras recording the action.<br />
<br />
== Ethics lawsuit ==<br />
<br />
On 24 May 2007, former Dateline producer Marsha Bartel sued NBC for breach of her employment contract. NBC claimed they fired her on 17 November 2006 as part of NBC's "TV 2.0" reorganization, but Bartel contends that the dismissal was due to her reaction to the extensive breaches of NBC's ethics code and journalistic ethical standards during Dateline production. The specific breaches mentioned by Bartel were:<br />
<br />
* Perverted Justice was deputized as part of the sting, despite being "a shadowy organization with ill-defined purposes".<br />
* Bartel as a producer was denied access to Perverted Justice volunteers, even though they were pivotal to the show's production.<br />
* NBC's view of Perverted Justice changed after they began paying the organization. At first, they were viewed as "vigilante[s]"; later, they were viewed as "watchdog[s]". Bartel quotes Dateline Executive Producer David Corvo as saying, "We all know they're nuts."<br />
* As paid contributors, Perverted Justice demonstrate a conflict of interest in their personal and professional lives. (This may refer to an intricate plan of revenge by Xavier Von Erck on one of his former covolunteers; see the Radar Online reference for more.)<br />
* By paying Perverted Justice to troll and lure sting targets, NBC gives the organization incentive to lie to and trick their victims.<br />
* Dateline host Chris Hansen lied to the public about NBC's "parallel investigation" with law enforcement in order to appear ethical. (In reality, NBC and law enforcement agencies were working closely together, as the next items suggest.)<br />
* NBC traded video equipment and tapes with law enforcement for "dramatically staged arrest scenarios" and police interrogations to "increase ratings and ultimately revenues for NBC".<br />
* Also to increase dramatic effect, NBC paid or reimbursed law enforcement officials to participate in the sting.<br />
* NBC provided live data feeds to law enforcement during the sting operations, and later to prosecutors.<br />
* In an unwritten agreement with law enforcement, officials provided confidential information they otherwise would not.<br />
* The show covered up unethical and humiliating behavior by law enforcement officials.<br />
* Perverted Justice did not provide complete transcripts of their trolling operations, making it impossible for Dateline producers to check them. Independent verification was also impossible.<br />
* Although sting victims initially decide not to come, Perverted Justice vigilantes (posing as children) would beg the victims to come anyway. Dateline and Perverted justice would cover up these facts.<br />
* Sting victims were led into additional acts of humiliation, such as undressing on national television.<br />
* Chris Hansen over reported child abuse, saying that "at any given time, 50,000 predators were on the internet prowling children", even FBI sources show that this is false.<br />
* NBC News and anyone acting on its behalf must obey United States and local laws, yet "Perverted Justice has been accused of committing the exact crime it claims it wishes to prevent, i.e. minors being exposed to pornography." NBC was told of this, yet took no action. <br />
<br />
== References ==<br />
<br />
* Marsha Bartel v. NBC Universal, Inc., 07-CV-2925 (N. Dist. Ill. 2007)<br />
* [http://www.radaronline.com/features/2006/09/strange_bedfellows.php Strange Bedfellows], Radar Online, 7 September 2006 (on the relationship between Xavier Von Erck and NBC)<br />
* [http://www.radaronline.com/exclusives/2007/05/to-sue-a-predator-catcher.php To Sue a Predator Catcher], Radar Online, 29 May 2007 (on the lawsuit)<br />
* [http://www.msnbc.msn.com/id/15592444/ "Texas prosecutor kills himself after sex sting"], Associated Press, 6 November 2006. Retrieved on 7 November 2006.<br />
* [http://www.dallasnews.com/sharedcontent/dws/news/localnews/crime/stories/DN-sexsting_02cco.ART.North.Edition1.43ea895.html "Sex-predator arrests in Murphy rejected"], Dallas Morning News, 1 June 2007. Retrieved on 1 June 2007. <br />
<br />
== External links ==<br />
<br />
* [https://www.boychat.org/messages/1078168.htm BC:1078168]<br />
* [https://www.newgon.net/wiki/To_Catch_a_Predator "To Catch a Predator] (Original Newgon Wiki Article)<br />
<br />
[[Category:Vigilante]]<br />
[[Category:Television]]</div>Eskimo