• Amused
  • Angry
  • Annoyed
  • ArrgPirate
  • atwork
  • Awesome
  • Bemused
  • Cocky
  • Cool
  • Crazy
  • Crying
  • deejayn
  • Depressed
  • Down
  • drinking
  • Drunk
  • eating
  • editing
  • Embarrased
  • Enraged
  • Friendly
  • gamingpc
  • gamingps
  • gamingsteam
  • gamingxbox
  • Geeky
  • Godly
  • Happy
  • hatemailing
  • Hungry
  • Innocent
  • lagging
  • livestreaming
  • loving
  • lurking
  • Meh
  • netflix
  • nostatus
  • Poorly
  • raging
  • Sad
  • Secret
  • Shy
  • Sneaky
  • Tired
  • trolling
  • Wtf
  • youtuber
  • zombies
  • Results 1 to 5 of 5

    Thread: Survival Guide for Protecting Your Identity & Data Online

    1. #1
      Banned
      This user has no status.
       
      I am:
      ----
       

      Join Date
      Mar 2018
      Posts
      100
      Post Thanks / Like
      Rep Power
      122

      Survival Guide for Protecting Your Identity & Data Online


      Browser:
      At the current moment in time I only recommend using the TOR browser for online activities that you which to remain anonymous. The mapping algorithm that TOR uses makes it extremely difficult to trace the true identity of the end user.


      Online Chat:


      For discussing anything sensitive in nature – DO NOT USE any live chat such as Skype or WhatsApp. They can be tapped just like any phone line. The big-name chat apps boast a big game with their encryption; but it doesn’t really matter since the data centers are hosted within the United States. Big brother can seize and tap with nothing more than probable cause.


      Email and Electronic Drop boxes:


      There is no nice way to put this….if you are conducting sensitive business via yahoo mail or Gmail, you are an idiot. Big brother is pretty much in bed with those email platforms and the social media giants. All sensitive communications should ONLY be done via an offshore/encrypted platform outside of U.S. and European jurisdiction. Me personally, prefer offshore encrypted drop box type platforms. The advantages to these are there are no actual transmissions of a message, so nothing can be intercepted. The sensitive note is created, and the other party is given a code created by you that will decrypt the note. The note should be destroyed after it is read. I have created such an offshore communication system, but I am not going to mention it yet, since I am still waiting for PAIN to approve me to advertise it.

      Posting Pictures:
      Post away, but keep in mind a lot of meta data can be gleaned by a photo that someone posts online. I never understood why folks here posts the famous TOUCH DOWN pictures. Just because you are not in the picture, heaps of source data and geographical origin data can be found by a halfway descent analyst.



      Sanitize Your PC:
      Use a secure deletion technology to wipe your computer after each sensitive communication session. Each time you use your computer you leave digital footprints and finger prints. Programs such as Cyberscrub do a descent job of erasing your tracks.

      Keep a Hammer Handy:
      Hey, if Hillary Clinton can destroy evidence without consequences so should all of us. If you think your electronic devices are at risk for being seized, destroy them until they look like saw dust. That is the only way there is no chance for data recovery, even with the most sophisticated government technology.

      Anyways, that’s my 2 cents for what it is worth.
      MarineX

    2. Thanks Hayabusa_muscle thanked for this post
      Likes Hayabusa_muscle liked this post
    3.    Sponsored Links

      ----
    4. #2
      Member
      This user has no status.
       
      I am:
      ----
       
      Gainzbruh's Avatar
      Join Date
      Oct 2018
      Posts
      262
      Post Thanks / Like
      Rep Power
      590
      A hammer? No, use an encrypted hardrive.

    5. ----
    6. #3
      Banned
      This user has no status.
       
      I am:
      ----
       

      Join Date
      Mar 2018
      Posts
      100
      Post Thanks / Like
      Rep Power
      122
      If data recovery experts get a hold of your hard drive your encryption isn't going to save you. I'll take my chances with destroying my hard drive. but hey to each their own.

    7. ----
    8. #4
      Member
      This user has no status.
       
      I am:
      ----
       
      Gainzbruh's Avatar
      Join Date
      Oct 2018
      Posts
      262
      Post Thanks / Like
      Rep Power
      590
      Quote Originally Posted by MarineX View Post
      If data recovery experts get a hold of your hard drive your encryption isn't going to save you. I'll take my chances with destroying my hard drive. but hey to each their own.
      You might not have the time or be near your computer if bad shit happens. If encryption is so weak, why do we still hear of court cases of people being asked to unlock a phone?
      Last edited by Gainzbruh; 06-15-2019 at 02:54 AM.

    9. ----
    10. #5
      Junior Member
      This user has no status.
       
      I am:
      ----
       

      Join Date
      Jul 2019
      Posts
      4
      Post Thanks / Like
      Rep Power
      16
      Nice tip. Thanks

      Sent from my SM-G973U using Tapatalk

    11. ----

    Similar Threads

    1. Beginner's Guide to Online Security.
      By pupu in forum Computer Tech Support, Safety/Security, & Downloads
      Replies: 1
      Last Post: 08-24-2016, 10:12 PM

    Tags for this Thread

    Bookmarks

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts
    •