Internet security tutorial: Difference between revisions

From BoyWiki
(updated and organised paragraph)
(updated encryption and passwords section)
Line 44: Line 44:
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.
Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.


== Encryption & live DVD/USB ==
== Encryption ==


Numerous boylovers have had their lives destroyed after their computers have been unexpectedly lost or stolen, privacy breaches can be easily stopped using full disk encryption. Full disk encryption will encrypt every single byte in your hard drive and will only make it accessible after you enter the correct password. [[Encryption]] software  has been known to be unbreakable by even law enforcement. There are many encryption programs out there, you should focus on those that can fully encrypt the drive, if you encrypt single files there is the risk that temporary files will still exist in your drive.
It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. [[Encryption]] software  has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.


Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, a recent case is testing whether boylovers can really count on this. In the USA, a person may now be indefinitely detained for refusing to unencrypt their drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref> If you were to live in a repressive country like China, and do no want to be found using encryption, then use a live DVD or USB like [https://tails.boum.org/ Tails], live DVDs/USB run in volatile RAM memory, when you switch off the computer after running a live DVD, there will be nothing left to recover, not even tracks that you have used it.
Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your [[encryption]] password when required by law enforcement, in the [[United States]] there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.<ref>http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/</ref>. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like [https://tails.boum.org/ Tails] where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.


==== Using secure passwords ====
==== Using secure passwords ====


The weakness of most encryption systems is the password. You must remember that computers can test password much more faster than a human. Then if your password is a dictionary word, sooner or later it will be found. Some brute force programs used by government agencies, try to combine dictionary words with numbers and do some other common changes too: like changing 'o' by '0', etc. Some weak password like john34, car23 or john34car23 may be easily found by government agencies trying to look at your files.
The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.


== Cloud Services ==
== Cloud Services ==

Revision as of 14:21, 1 February 2023


Caution: this article was written in 2009 and, except for points here and there, has not been updated, and should not be taken as a reliable guide to Internet security. See Computer security.

This tutorial will help you stay safe when using the Internet, and avoid hackers, viruses, and accidentally giving out your private information to strangers. The first section assume that you're using Microsoft Windows (the most popular operating system for PCs). But even if Windows is the most popular operating system for PCs, does not mean that it is the most reliable. It is better to install an open source system like GNU/Linux, LinuxMint is suitable for beginners, advanced users paranoid about security can use Qubes OS. Because Microsoft is intercepting your data and sending it to the NSA (and the CIA and the FBI). [1]

On Windows

Browser security

Windows ships with a web browser called Microsoft Edge, this is the program you use to 'surf the web' and view web pages. As Windows is a popular operating system, a large percentage of web surfers and companies use it but it doesn't mean that it is the only Internet browser out there, you can download a different one and install it.

In fact, it is strongly advisable to use another web browser instead of Microsoft Edge. Here's why:

  • Windows makes money with your data, and the same company owns an advertisement business and a search engine called Bing, the default in Microsoft Edge, it is not in their interest to look after your privacy.
  • Microsoft Edge will try to push you towards other products Windows owns, like their non private search engine or their cloud service.

Chrome is the most popular browser but it has the same downfalls of Windows, it is owned by Google, another company that owns an advertisement business and they have no interest whatsoever in your privacy, they make money by mining your data and selling it, you will be better off with a privacy focused browser such as Brave or Firefox, you can get them at zero cost, both are simple to download and install and they are available for mobile phones as well as desktop computers.

Firewall/Anti-virus

A firewall monitors your internet connection and allows you to only let through the programs you want and block out potential hackers. Windows comes with a built-in firewall turned on by default and invisible to the user unless you dig into settings. Businesses deploy hardware firewalls that are far more complex, like a library that wants to stop users from accessing gambling and pornography websites, a hardware firewall will do that for them and log all policy violations and which user did what, including the visited websites, each business decides its own IT policy and what the firewall does. They can do whatever they want since it is their network and not yours.

Anti-virus software will prevent computer viruses from spreading to your computer monitoring the behaviour of downloaded files, sometimes they include a webshield and when visiting a page that is known to distribute malware it will block access and warn you. Windows comes with a free tool called Microsoft Defender that analyses malware, the tool has good ratings at detecting malware but Microsoft is not known respect user privacy, if you decide you don´t wish to trust Microsoft Defender you can install a free antivirus like Avira or Avast, installing an antivirus in Windows will automatically disable Microsoft Defender, an operating system can not run two antivirus at the same time because it would cause incompatibilities.

On GNU/Linux

GNU/Linux is the combination of the Linux kernel, with the GNU operating system created by Richard Stallman.[2] The GNU/Linux operating system is often called, simply Linux.[2] This operating system is free software.[3] Free software does not mean zero cost software although most Linux distributions are free of charge.[4] It means that respect your freedom to study, share, modify, etc the software. [4] It is generally safer to use free software instead of proprietary software. Because you have the right to study it and find out what it is really doing. Becoming less vulnerable to malicious code and spyware. Some examples of spyware in proprietary software are Windows Media Player and RealPlayer that reports what each user watches or listens. [5]

Why you should not use Windows?

Windows is proprietary software, the operating system's source code is not available for review and Microsoft makes money with your data, they use dark patterns [6] to force you to give up your privacy or get you to use unwanted services like OneDrive, Microsoft own cloud service that scans all of the files you upload with PhotoDNA [7] a technology to detect child porn that could lead to false positives as well as illegal spying from three letter agencies, CIA, NSA, etc.

Migrating to GNU/Linux

If you use Windows and want to try the GNU/Linux operating system the easiest way to do this is with a tool such as UNetbootin that will automatically download the Linux distribution of your choice into a USB thumbdrive and make it bootable, you will only have to make sure that your computer UEFI will start booting from the USB thumbdrive when you start the computer.

Beginners should start by trying LinuxMint or similar beginner friendly distributions, advanced users will want to download Tails a Linux distribution focused on user privacy that comes comes with Tor already configured.

Faking the MAC address

Each network card has a MAC address. This address is unique, so if the attacker gets it, will probably reach your computer and you. This address can not be obtained through the Internet. But it can be used to communicate with other computers or routers on the same network.

Encryption

It doesn´t matter that you are a law abiding citizen are, due to prejudices in society being a boylover makes you a target, if anybody finds out you will be treated like an outcast, marginalised, fired from your job and perhaps even physically attacked, boylovers should take privacy seriously. The best way to stop having your personal computer files and Internet browsing history exposed if your laptop gets lost or stolen or accessed without authorization by somebody at your home, you should use full disk encryption, this will render every single byte in your hard drive unreadable without the correct password. Encryption software has been known to be unbreakable by even law enforcement. There are many encryption programs out there, focus on those that can fully encrypt the whole operating system because if you encrypt individual files there is the risk that temporary unencrypted copies could still be recovered from other parts of the operating system.

Some countries like the United Kingdom and Australia make it a criminal offense not to reveal your encryption password when required by law enforcement, in the United States there is no such law and you have no legal obligation to reveal your passwords to the authorities. However, there was a case where a person in the USA was jailed for refusing to unencrypt his drives.[8]. If you live in a repressive country like China, and do no want to be found out using encryption, then use a live USB like Tails where creating an encrypted partition for your files are settings is optional, a live USB like Tails runs in volatile RAM memory, when you switch off the computer, there will be nothing left to recover, but not all live USBs work the same way, Tails does because it has been designed for privacy.

Using secure passwords

The weakness of most encryption systems is the password, the most common way to guess somebody´s password is by having a computer to try common dictionary words and passwords that the user is known to have used somewhere else, you should not be using the same password everywhere and remember that if your password is a dictionary word, sooner or later it will be found. The best way to protect you form password guessing is by using a password manager like KeePassXC where you can store different passwords and only remember the main one for the password manager, which should be a long passphrase with numbers and special signs.

Cloud Services

Section to be completed soon (today´s date 12th August 2022)

Virtual Private Network

All computers that are connected to the Internet have their own identifiable IP address, your Internet Service Provider will keep a record of the person who is using that Internet connection and it can be used to identify you as an individual, many countries also censor the websites you can visit and VPN can get bypass censorship as well as encrypting your connection and thwart your ISP spying on your activities. A VPN can help you stay anonymous on the Internet by masking your IP address, because of the hatred against boylovers using a VPN is recommended when visiting boylover sites.

If you're serious about Internet security, you should consider using Tor. It is an advanced proxy, and is better at protecting your privacy than web-based proxies. Tor is also considered more secure, as it is based on open source code and dynamic traffic routing, and doesn't have the possibilities for logging that a fixed web site has. It should be noted that Tor is still experimental software. Tor is a program that is installed on your computer. There are downloads and complete installation instructions available at Tor's home site (linked below).

Internet Security and Child Pornography

Remember that no matter how secure you can make your computer, it will never be 100 percent secure. There will always be ways law enforcement can use to bust you if you attempt downloading illegal materials on your computer. For example, the FBI put links to fake child porn sites, and then raids the homes of anyone willing to click on them. [9] This tutorial should only be used to help you visit legal web sites safely without having to fear revealing your personal information or getting your computer hacked or infected by nasty code, not to help visiting illegal sites. There is only one waterproof advice to avoid being caught with child pornography: stay away from it!

Securely deleting files

When you delete a file from your operating system it isn´t really gone for ever, only marked as invisible by your operating system so that it is not visible to you but the file can be recovered easily with specialist software, to make sure that you permanently delete a file beyond recovery, in Windows you must install specialist wiping software like Eraser, the program will overwrite the indicated document, image, etc to make sure that it not be unmarked as undeleted, and in Linux you can use the terminal and use shred -u <file_name> or shred <file_name> instead of rm.

See also

References

External links