Internet security tutorial: Difference between revisions

From BoyWiki
(references to Truecrypt removed)
m (removed Zorin OS from Linux distros because it asks for payment)
(46 intermediate revisions by 6 users not shown)
Line 1: Line 1:
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs,does not mean that it is the most reliable. It is better to install an open source system. Like GNU/Linux: [http://opensuse.org OpenSUSE], [http://www.debian.org/ Debian], [http://trisquel.info Trisquel], etc. Because Microsoft is intercepting your stuff and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref>
{{cleanup}}
 
 
'''Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See [[Computer security]].'''
 
This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, for beginners [https://linuxmint.com/ LinuxMint], advanced users paranoid about security can use [https://www.qubes-os.org/ Qubes OS]. Because Microsoft is intercepting your stuff and sending it to the NSA (and the CIA and the FBI). <ref>http://www.fsf.org/blogs/community/windows-8-prism-edition</ref>


==On Windows==
==On Windows==


===Browser security===
=== Browser security ===
''Main article: [[Browser security]]''


All Windows versions newer than Windows 95 (including Windows NT 4.0 and Windows XP) ship with a web browser called [[Internet Explorer|Microsoft Internet Explorer]] (often called "IE"). This is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers (often estimated to around 90 %) use IE. But it doesn't mean that IE is the only Internet browser out there.
Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.


In fact, it is strongly advisable to use another web browser instead of IE. Here's why:
In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:
*IE is known for having many security holes that can be used by hackers and malicious code to gain entry to your computer. IE is also closely integrated with Windows, which means that security exploits in IE can easily be used to infect the entire operating system.
*IE is the most popular Internet browser on the web, which means that it is a big target for hackers and viruses out there.


Instead, it is recommended to use either [[Mozilla Firefox]] or [[Opera]] as the standard Internet browser. Firefox is open source software, while Opera is proprietary software but you can get it at zero cost. Both are simple to download and install (visit the websites linked below). Firefox seems to be preferred by many.
* Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.


===Firewall/Anti-virus===
* Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service.  
A firewall is software that monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default, unfortunately this will not warn you against insider threats, like a trojan already installed in your computer attempting to connect to an external server, Windows firewall only blocks incoming hacking attempts, to improve your security it would be best to install one of the many free firewalls, e.g. Comodo, ZoneAlarm.


Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, your antivirus will only come into action when you execute or unrar a file, if the virus is just sitting down on the drive the antivirus will not detect it unless you select it and run a manual scan. Windows does not come with antivirus, there are various free ones that do a good job. e.g. Avast, AVG
Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.


To be secure you should be running both, an antivirus and a firewall, both programs are complementary and do different jobs, a firewall will not analyse files, it only looks into your Internet connection and blocks unauthorised requests to access the Internet.
===Firewall/Anti-virus===


=== Windows Update ===
A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall can do that for them and also log all attempts, device connected and usernames activities, they can also log the websites you visit, each business decides its own IT policy for users. They can do pretty much what they want since it is their machine and not yours.
Windows has a feature called Windows Update, which lets you easily update Windows with new security fixes, you should visit Windows Update regularly (there should be a shortcut in the Start Menu) or considering turning on automatic updates. Not all software will be updated by Windows, operating system addons, like Flash, Shockwave and Java, are updated by their respective developers, you will be better off using the software settings to automatically update and you will not have to keep checking for security patches.


People working in very high security environments and fearing privacy breaches from corrupt security agencies should extreme caution when updating software, read everything before clicking on "Next" and make sure that the update is valid. It is known that top law enforcement departments have access to tools that camouflage trojans as fake Windows and Flash player updates and they are not detected by any antivirus. According to "''Wikileaks SpyFiles''", The Gamma group offers to law enforcement personnel a trojan called Finfly to remotely install monitoring software on a target computer, they also have tools to monitor huge volumes of traffic going through an ISP and lock into certain keywords, using a VPN or encrypted connection will get around ISP filters and monitoring.
Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, some antivirus include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.


== On GNU/Linux ==
== On GNU/Linux ==
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software not means zero cost software.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref>
GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by [[Richard Stallman]].<ref name=linuxandgnu>http://www.gnu.org/gnu/linux-and-gnu.html</ref> The GNU/Linux operating system is often called, simply '''Linux'''.<ref name=linuxandgnu /> This operating system is free software.<ref>http://gnu.org</ref> Free software not means zero cost software.<ref name=freesw>http://www.gnu.org/philosophy/free-sw.html</ref> It means that respect your freedom to study, share, modify, etc the software. <ref name=freesw /> It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. <ref>http://gnu.org/philosophy/who-does-that-server-really-serve.html</ref>


=== Why you should not use Windows? ===
=== Why you should not use Windows? ===
Windows have a long history of security holes.<ref>http://en.windows7sins.org/security/</ref> Windows is proprietary software and Windows 8 restricts your freedom, invades your privacy and expose your personal data. <ref>http://fsf.org/windows8</ref>
 
Windows have a long history of security holes.<ref>http://en.windows7sins.org/security/</ref> Windows is proprietary software and Windows restricts your freedom, invades your privacy and expose your personal data. <ref>http://fsf.org/windows8</ref>


=== Migrating to GNU/Linux ===
=== Migrating to GNU/Linux ===
Line 46: Line 48:
* The Internet connection offered by your university to students and teachers.
* The Internet connection offered by your university to students and teachers.


Even if the attacker never find you. It can get fairly close, then it is highly recommended that you use the methods described here with encryption or a liveCD ([http://en.boywiki.org/wiki/Internet_security_tutorial#Encryption_.26_live_CD see below]).
Even if the attacker never find you. It can get fairly close, then it is highly recommended that you use the methods described here with [[encryption]] or a liveCD ([http://en.boywiki.org/wiki/Internet_security_tutorial#Encryption_.26_live_CD see below]).
It is recommended that you use a anonymizer(like Tor) too.
It is recommended that you use a anonymizer(like Tor) too.


==== Faking the MAC address ====
==== Faking the MAC address ====
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.


Line 74: Line 77:
You may want to change the MAC for all interfaces. After it re-run <code>ifconfig</code> to make sure that everything went well.
You may want to change the MAC for all interfaces. After it re-run <code>ifconfig</code> to make sure that everything went well.


== Encryption & live CD ==
== Encryption & live DVD/USB ==
Strong password to log on accounts on your computer is a good step. But it isn't enough to protect your computer against seizure. Encryption allow your data to be unreadable for the attacker.


The last and more important line of defense is encryption, numerous BLs have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. Encryption software  has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.
Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. [[Encryption]] software  has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.


Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your encryption password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live CD like [https://tails.boum.org/ Tails], live CDs run in volatile RAM memory, when you switch off the computer after running a live CD, there will be nothing left to recover, not even tracks that you have used it.
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref> If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like [https://tails.boum.org/ Tails], live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.


For Linux, [http://gnu.org/s/fcrypt GNU fcrypt] is a disk encryption software. It allows you to use random passwords. The randomly generated password is in memory and is never disclosed to the User. Then you not need hide anything.  But this program is in development, not have released versions and may have security holes. Then if you isn't a computer hacker, it is bad idea to use this program. It only works on GNU/Linux and GNU/Hurd operating systems.
==== Using secure passwords ====


==== Using secure passwords ====
The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.
The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.


==Proxy==
== Cloud Services ==
All computers that are connected to the Internet have their own identifiable [[IP address]]. It is visible to external web sites you connect to, and in the worst case can be used to identify you as an individual. A proxy can help you stay anonymous on the Internet by masking your IP address. The easiest proxies operate via a website, like Anonymouse (link below). Using a proxy is recommended when visiting boylover sites that use external hosting of images, like [[boylover.net]].
 
Section to be completed soon (today´s date 12th August 2022)
 
==Virtual Private Network==
 
All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.


If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilites for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).
If you're serious about Internet security, you should consider using [[Tor]]. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).


==Internet Security and Child Pornography==
==Internet Security and Child Pornography==
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''
Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. <ref>http://news.cnet.com/8301-13578_3-9899151-38.html</ref> This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: '''stay away from it!'''


==securely deleting files==
==Securely deleting files==
Many times when using GNU/Linux or Windows, when you try to delete some file. It isn't really deleted. Instead the information about it's existence is deleted. Then an attacker can retrieve the file from disk. When using GNU/Linux you should open a terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>. If you use Windows, you can use the Eraser.
 
Many times when using GNU/Linux or Windows, when you try to delete some file. It isn't really deleted. Instead the information about its existence is deleted. Then an attacker can retrieve the file from disk. When using GNU/Linux you should open a terminal and use <code>shred -u <file_name></code> or <code>shred <file_name></code> instead of <code>rm</code>. If you use Windows, you can install specialist wiping software like Eraser.
 
==See also==
 
* [[SAFE Network]]
* [[How not to accidentally out yourself]]
* [[Email security]]
* [[Police]]
 
==References==
 
<References />


==External links==
==External links==
*[https://www.mozilla.org/products/firefox/ Firefox browser]
 
*[http://personalfirewall.comodo.com/ Comodo free firewall]
*[https://www.brave.com Brave browser]
*[http://www.avast.com/free-antivirus-download Avast free antivirus]
*[http://www.avast.com/free-antivirus-download Avast free antivirus]
*[http://www.truecrypt.org Truecrypt encryption]
*[https://ssd.eff.org Surveillance Self-Defense]
*[https://ssd.eff.org Surveillance Self-Defense]
*[http://eraser.heidi.ie/ Eraser]
*[https://sourceforge.net/projects/eraser/ Eraser]
 
==References==
<References />


[[Category:Technology]]
[[Category:Technology]]
[[Category:Computer security]]
[[Category:Security for boylovers]]
[[Category:Essential reading for BoyLovers]]

Revision as of 07:28, 19 August 2022


Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See Computer security.

This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, for beginners LinuxMint, advanced users paranoid about security can use Qubes OS. Because Microsoft is intercepting your stuff and sending it to the NSA (and the CIA and the FBI). [1]

On Windows

Browser security

Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.

In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:

  • Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.
  • Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service.

Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.

Firewall/Anti-virus

A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall can do that for them and also log all attempts, device connected and usernames activities, they can also log the websites you visit, each business decides its own IT policy for users. They can do pretty much what they want since it is their machine and not yours.

Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, some antivirus include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.

On GNU/Linux

GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by Richard Stallman.[2] The GNU/Linux operating system is often called, simply Linux.[2] This operating system is free software.[3] Free software not means zero cost software.[4] It means that respect your freedom to study, share, modify, etc the software. [4] It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. [5]

Why you should not use Windows?

Windows have a long history of security holes.[6] Windows is proprietary software and Windows restricts your freedom, invades your privacy and expose your personal data. [7]

Migrating to GNU/Linux

If you use Windows and want to try the GNU/Linux system download a beginner friendly distribution like Linux Mint, burn the .iso to a CD/DVD using the free CDXPBurner CDBurnerXP making sure that you select "Burn ISO Image". You can use Linux Mint as a live CD to make sure that everything works before installing it. More sophisticated users will want to download Tails a Linux distribution focused on user privacy, it comes with Tor already configured.

Be aware that you will have to modify your computer BIOS to boot a live CD and Windows 8 secure boot is known to cause problems doing this, search the internet or ask in a computer forum to troubleshoot.

Anonymity via wireless

If you known some wireless network that allows you to get connected to. Using only information that is used by other people too(eg. the network name and the password). Then you can use it to have some anonymity. But it may only work if other people is using exactly the same network at exactly the same time. Then the attacker will not know for sure, who exactly made such access.

These networks can be:

  • The Internet connection offered by your job that other employees are using too.
  • Open Wireless: The Internet connection offered by public places. These places can be shops, restaurants, parks and so on.
  • The Internet connection offered by your university to students and teachers.

Even if the attacker never find you. It can get fairly close, then it is highly recommended that you use the methods described here with encryption or a liveCD (see below). It is recommended that you use a anonymizer(like Tor) too.

Faking the MAC address

Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.

So if you want anonymity through a public network (eg. Open Wireless). You should fake that address. To fake it simply change it by something else. For example: 00:D0:A3:4B:C3:F5

Open a terminal and type the following lines:
sudo ifconfig wlan0 down
sudo ifconfig wlan0 hw ether 00:D0:A3:4B:C3:F5
sudo ifconfig wlan0 up

In this example I use the wlan0 device, but you may use some other to connect to the Internet, then pay attention to error messages like: wlan0: unknown interface: No such device. This means that an error occurred and the address has not changed.

You can do that for all interfaces the command ifconfig will show the interface name for all interfaces. Simply replace wlan0, by the name of the interface. For example:
sudo ifconfig eth0 down
sudo ifconfig eth0 hw ether 00:D0:A3:4B:C3:F5
sudo ifconfig eth0 up

Then run ifconfig to make sure they succeed. This command will show the interface name followed by several information. If all went well the MAC that you typed should appear as the HWaddr of the interface that you use to access the Internet.

You may want to change the MAC for all interfaces. After it re-run ifconfig to make sure that everything went well.

Encryption & live DVD/USB

Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. Encryption software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.

Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your encryption password when required by law enforcement, in the United States there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.[8] If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like Tails, live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.

Using secure passwords

The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.

Cloud Services

Section to be completed soon (today´s date 12th August 2022)

Virtual Private Network

All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.

If you're serious about Internet security, you should consider using Tor. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).

Internet Security and Child Pornography

Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. [9] This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: stay away from it!

Securely deleting files

Many times when using GNU/Linux or Windows, when you try to delete some file. It isn't really deleted. Instead the information about its existence is deleted. Then an attacker can retrieve the file from disk. When using GNU/Linux you should open a terminal and use shred -u <file_name> or shred <file_name> instead of rm. If you use Windows, you can install specialist wiping software like Eraser.

See also

References

External links