Tagged: hacking Toggle Comment Threads | Keyboard Shortcuts

  • Earthling 2:55 am on 16th November 2018 Permalink | Reply
    Tags: abuse of environment, cyberbullying, digital justice, digital justice and ecocide, , environmental hacktivism, FOSS and ecocide, Free and Open-Source Software and Ecocide, hacking, internet freedom and ecocide, , privacy and ecocide, web freedom and ecocide   

    Digital Justice and Ecocide 


    Internet Freedom and Ecocide
    The free exchange of information is essential for the propagation of scientific information about the environment, journalism about ecocidal behavior and policies, and also to organize activities and protests in support of Mother Earth.
    Privacy and Ecocide
    Privacy is essential for freedom of speech. The absence of privacy makes it easy for authorities to punish journalism, activism and the propagation of scientific information about the environment (as can be seen in China).
    Free and Open-Source Software and Ecocide
    Commercial software is more susceptible to being manipulated and abused by ecocidal governments and corporations. Closed-source software cannot be freely evaluated by users for security and privacy, so consumers can’t know for sure what the software is actually doing. Free and open source software is also more efficient in terms of human and hardware resources. Open source projects can borrow from each other easily, whereas Apple, Google and Microsoft cannot.
    Cyberbullying/Hacking and Ecocide
    Cyberbullying and hacking are illegal in many places. Such behaviors can be harmful to environmental causes when the victims are environmental activists or journalists, or they could hypothetically be productive if used against ecocidal forces like illegally polluting companies. Here is a book covering the subject of environmentalist hacktivism.
     
    By Henry L. MacGregor

     
  • Earthling 7:37 am on 11th November 2018 Permalink | Reply
    Tags: abuse, corrupt governments, cybersecurity, firewall, founding fathers, , gafam, hacking, healthy living, , , linux, malware, , private life, qubes, , spyware, , tor, trojan, tyranny, US constitution, virus, vpn, windows 10   

    How to use the internet securely and privately 


    On the internet, security is a prerequisite for privacy.
    A life with privacy is the normal, natural, healthy way of living. Perhaps this is why the Founding Fathers of America put protection of privacy in the constitution. With the advent of the internet and the large-scale usage of electronics that can spy on us, forces of evil such as governments and corporations want to deprive people of this natural human right in order to more effectively control and exploit us.
    There is a trade-off between security and convenience: the more secure and private your life is, the less convenient it will be and the more time it will take to do things. Nevertheless, those who love Liberty should take the trouble to implement at least some of the following measures:
    • Use a secure operating system if possible (Qubes, Linux, etc.). Especially avoid Windows 10, which is designed to spy on you and send your data to Microsoft even if you tell it not to. In case you can’t avoid using Windows 10, harden it for maximum security, and do what you can to circumvent the telemetry.
    • Encrypt your hard drives.
    • Go through all your phone’s settings and make sure nothing is accessing or transferring data you don’t want it to.
    • For maximum mobile security, do not root your phone; for maximum privacy, do root your phone and install a custom ROM with microG instead of Google apps and services. Google does not respect your privacy.
    • On Android, use Privacy Guard and an isolating app such as Shelter to minimize the amount of data apps can access.
    • Use encrypted communication when possible.
    • Use privacy-respecting services to communicate (Messengers: Telegram, Signal; Email: Protonmail, Tutanota)
    • Use a secure browser with plugins such as NoScript, Scriptsafe, uBlock Origin, AdBlock Plus, etc. that block ads, trackers, and unnecessary scripts. Chrome is secure but does not respect your privacy; use Firefox.
    • Use a VPN for secure browsing (ProtonVPN is free), or Tor for anonymity. Tor is anonymous but not secure, so don’t enter any personal information when using it.
    • Don’t use public wifi connections. If you do, use a VPN.
    • Browse securely, being vigilant. Browse in private mode. Have your browser delete your history when closing. Use secure connections (https). If you get a warning that a site has a bad or out of date certificate, close your browser and don’t visit the site. Javascript can do all kinds of things on your computer, so when you open a webpage with Javascript you should think of it as running a program on your computer: do you trust this program, do you trust its source, do you know what it does?
    • Use a firewall on your computer and phone to control which applications use the internet.
    • Use a firewall on your router to filter out bad content as it’s coming in.
    • Use a family internet filter on your computer to block malicious sites (porn, gambling).
    • Keep everything updated regularly.
    • Don’t click on links in emails. If you must open any, copy and paste the link into the browser and verify that it is a safe site.
    • Don’t download email or messenger attachments unless necessary. Open documents in Google Drive, Yandex Drive or a similar service in your browser.
    • Use virtual machines to browse the internet and open attachments, so when you get a virus it won’t infect your whole system.
    • Use Whonix or Tails OS to browse the internet anonymously. These operating systems use Tor, so don’t enter any personal information.
    • Don’t illegally download things. If you do, find things from reliable sources that have been downloaded many times and have positive feedback.
    • Use an antivirus on Windows or OS X, but don’t rely on it.
    • Beware of any links or documents coming from anyone, because even if you trust someone 100%, their device could be hacked, virus-ridden, or someone could be impersonating them.
    • Don’t let anyone use your devices, because they might be less security-aware than you. Lock the screen when you leave the computer. Use a good password. Set a BIOS password for your computer. Factory reset your devices before traveling or visiting police, if you don’t want them to look at or copy all your data.
    • For true online anonymity, use Tails OS on a disposable device at a cafe somewhere far from where you usually go, then break and throw out the device afterwards.
    • Avoid doing terrorism or other illegal activities, or associating with people doing them, because this may give governments a legitimate reason to invade your privacy, and they have extensive resources at their disposal.
    Be diligent about what you share online, and know that whatever you share with one person might be seen by many if they disclose your content or their privacy is invaded. Don’t share personal information with random people or websites. Use a separate email account for signing up for random websites.
    • Don’t use the same password everywhere. Use strong passwords.
    • Check if your personal information has been compromised in any data breaches using Have I Been Pwned.
    • There is deanonymization technology that can identify you solely based on your online behavior and browsing patterns. To avoid this, don’t use consistent patterns: develop several styles of typing and moving your cursor, don’t visit the same sites all the time (and especially not in the same order or from the same IP or VPN), don’t use the same software and hardware all the time to do the same things.
    SERVICES TO AVOID IF YOU WANT PRIVACY
    Google, Facebook, Microsoft, Apple, Amazon, and other big names are notorious for spying on people and sending their information to the US government. Avoid services of these companies if you want privacy. Since many can’t avoid using these services, make sure to go to the settings and configure them to minimize the spying.
    Assume that a company may not value your privacy at all, unless you personally know its CEO and can vouch for their decency. Also assume that your data is not safe with any company, since there are data breaches even in big companies with the financial resources to implement extensive security.
    HOW TO TELL IF YOUR DEVICE HAS BEEN COMPROMISED
    There are obvious signs of malware infection, such as your device being slow, behaving erratically, showing ads, installing things you never told it to, using lots of bandwidth, and so on. Your antivirus may indicate if you have malware. On the other hand, a well-done hack or subtle kind of malware will not be easy to detect. Many forms of malware require expertise to detect, so in order to be sure your device is clean you need to have an expert examine it, or study cybersecurity yourself. The terms to search are “deep packet inspection” and “intrusion detection”.
    WHAT TO DO WHEN YOUR PRIVACY IS INVADED
    If someone has invaded your privacy, often it will be impossible to identify them, or they will be “legally untouchable” corporations or government agencies. In case there is the possibility of justice, you should sue them and could receive a good compensation.
    If your device has been infected or hacked, disconnect it from the internet. Reinstall the operating system. Don’t download the installation media from a compromised machine. Be aware that any files copied, backed up or uploaded from the compromised device may contain hidden malware. Other devices of yours may also be infected, such as computers, phones, printers or routers (with the IoT the list is growing), as well as other people’s devices that came into contact with yours physically or online.
    RELIABLE PRIVACY
    Most devices do not have hardware switches to turn the camera and microphone off, so you can’t be sure they aren’t spying on you. When purchasing devices keep things like this in mind. For certain privacy, stay away from all electronics with the capacity to record and transfer data.
    Further information on surveillance: https://ssd.eff.org/en#index
    Article by Anonymous Man

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel