Lurker emerges from the shadows

choomer

Well-Known Member
I live in a place where this hobby is not looked upon favorably so posting to a site dedicated to this hobby without significant obfuscation measures (that have recently been implemented) isn't either.

Presently running NFT rails of personal design based off of the SB system.

Have 1 mag ballast Hydrofarm 400W MH w/ 360W HPS conversion bulb but seriously looking into building 2'x4' stalls (1 per flowering system) w/ COB lighting to maximize light output while minimizing watt input and heat production.

Learned a lot. Look forward to learning more.

Salut!
 

Skeet Kuhn Dough

Well-Known Member
I live in a place where this hobby is not looked upon favorably so posting to a site dedicated to this hobby without significant obfuscation measures (that have recently been implemented) isn't either.

Presently running NFT rails of personal design based off of the SB system.

Have 1 mag ballast Hydrofarm 400W MH w/ 360W HPS conversion bulb but seriously looking into building 2'x4' stalls (1 per flowering system) w/ COB lighting to maximize light output while minimizing watt input and heat production.

Learned a lot. Look forward to learning more.

Salut!
significant obfuscation measures? You mean like a VPN? I use nothing like that... should I be worried?... cos I don't live in a green state? :shock:
 

choomer

Well-Known Member
Yup yup.

Like VPN, tor browser, http proxy, ssh tunnel, etc. and combining methods is not that bad an idea either.

I work in IT and the revelations of Snowden were old news to me because I used packet capture and analysis at work and I knew that if it could be done, it is being done at any network nexus and most likely all of them.
For instance, look up CALEA (but I'd use something other than Google to do so and also use the methods above.) as every ISP is required to have such a routing device (meaning all the ISP's traffic goes through it).

Also, there's this huge data center your tax dollars built in Utah that holds so much information that the new measurement term "yotta" (1 trillion terabytes) had to be coined to describe that amount . Why do you think they need that? Ter-ror-ists?
That's an awfully big amount of data for such a small segment of human society.

Gov't is an unwilling servant and an overbearing task master.
Which do you think its actions today best describe?

Editted for grammer.
 
Last edited:

Skeet Kuhn Dough

Well-Known Member
Yup yup.

Like VPN, tor browser, http proxy, ssh tunnel, etc. and combining methods is not that bad an idea either.

I work in IT and the revelations of Snowden were old news to me because I used packet capture and analysis at work and I knew that if it could be done, it is being done at any network nexus and most likely all of them.
For instance, look up CALEA (but I'd use something other than Google to do so and also use the methods above.) as every ISP is required to have such a routing device (meaning all the ISP's traffic goes through it).

Also, there's this huge data center your tax dollars built in Utah that holds so much information that the new measurement term "yotta" (1 trillion terabytes) had to be coined to describe that amount . Why do you think they need that? Ter-ror-ists?
That's an awfully big amount of data for such a small segment of human society.

Gov't is an unwilling servant and an overbearing task master.
Which do you think its actions today best describe?

Editted for grammer.
Thanks, choomer. While I can't afford a VPN right now I am very interested in tor browser. I'm actually checking it out right now. +respect. Love that an IT is here. Green grass and high tides, my friend. :bigjoint:
 

Skeet Kuhn Dough

Well-Known Member
Yup yup.

Like VPN, tor browser, http proxy, ssh tunnel, etc. and combining methods is not that bad an idea either.

I work in IT and the revelations of Snowden were old news to me because I used packet capture and analysis at work and I knew that if it could be done, it is being done at any network nexus and most likely all of them.
For instance, look up CALEA (but I'd use something other than Google to do so and also use the methods above.) as every ISP is required to have such a routing device (meaning all the ISP's traffic goes through it).

Also, there's this huge data center your tax dollars built in Utah that holds so much information that the new measurement term "yotta" (1 trillion terabytes) had to be coined to describe that amount . Why do you think they need that? Ter-ror-ists?
That's an awfully big amount of data for such a small segment of human society.

Gov't is an unwilling servant and an overbearing task master.
Which do you think its actions today best describe?

Editted for grammer.
^^^Maybe you could create a thread on this...Im not uber tech savvy and Im sure others would like to learn too! Tag me @ForRealz if you do... Peace!
Choomer, you should absolutely make a thread. It will be very helpful to others and you will probably also get lots of likes which will up your status (I assume you're indifferent towards status anyway). Start a thread under technology/science :arrow: https://www.rollitup.org/f/technology-science.129/
 

choomer

Well-Known Member
Dudes and/or Dudettes,

Thank you for the warm welcome!

Choomer, you should absolutely make a thread. It will be very helpful to others and you will probably also get lots of likes which will up your status (I assume you're indifferent towards status anyway). Start a thread under technology/science :arrow: https://www.rollitup.org/f/technology-science.129/
While I appreciate your exuberance and thank you for the well wishes, the suggestion to write a cyber-security how-to guide is kind of like asking someone to write your term paper for free or to grow you some medijuana and give it to you all nicely manicured and cured without you having an ailment that would be worthy of such fine charity.
Such a guide, to be truly comprehensive, would need to be about the length of a masters thesis and that takes some serious time to accomplish. That said, our era of "economic recovery" doesn't allow me a lot of free time, so finding enough to afford a charitable gift like that is a bit difficult.

Also, posting a guide about cyber-security on a site whose subject matter might be one of the reasons you would want such a guide is a bit oxymoronic, meaning that it's a subject that should already be under your belt (something you understand) before you visit such a site.
It's also a reinvention of the wheel as there are a plethora of sites out there that already address the subject matter much better than I.

I might still do it, just because the thought appealed to me when I first read it, but upon investing an hour into such a post I realized just how much time it would take me and so don't expect it soon.

Here are some cliff notes though, hard and fast and loose.

Run a flavor of Linux.
Get a DD-WRT/OpenWRT/Tomato router for your home/business and configure it to use a subscription based VPN service for all traffic it routes and also add a script to change the VPN endpoint (preferably a service with multiple international endpoints) at least once a day.
Use the torbrowser.
Always try replacing "http" with "https" in a URL string to negotiate a secure connection to a website IF they offer that.
(RUI does have https but the torbrowser complains it is not a secure connection for some elements on the page and has no SSL validation for its certificate. The first issue might be due to THIS. The fastest cure for the 2nd issue is money since you usually have to pay a certificate authority for high level validation).
In fact, ALWAYS pay attention to the URL because that's who you're connected to. Just because it looks like the site you want to go to doesn't mean that it actually IS that site and not an elaborate copy to steal your information (web/mail/bank account....it does happen, especially with email links).
Use PGP for encryption.
Consider encrypting your entire hard drive since, though computers are "dumb", they remember EVERYTHING unless told specifically not to do so and so make the states best witness. Truecrypt was my favorite when it was a going project, but alas, is no more.
Learn what a http proxy is and how to use it.
Learn about ssh tunnels and how to use them.

Advanced security services are available to any w. coast based green concern (OR or WA) that would be looking for a partner to enhance their cyber security. ;)
 

choomer

Well-Known Member
Almost forgot.......

The P2P torrent crowd are some great resources for privacy concerns. Torrentfreak has some really good comparisons and ratings of VPN providers.
When possible go for any free trial offer, or if necessary, the shortest subscription to test things like total throughput, connection drop, OpenVPN compatibility, the amount of devices you can connect to the service at once (a router only counts as 1 device so you can also use the service on your smartphone, netbook, tablet...any device you use away from home), etc.

NEVER DO ANYTHING THAT CONCERNS YOUR PRIVATE DATA WHILE USING A PUBLIC HOTSPOT WITHOUT VPN!!!!!

Be wary of providers that offer services using their "special" software only unless it's open source, but some of those offerings do have a "kill switch" that stops all network activity if the VPN connection would drop, otherwise if it drops you're browsing bareback (unprotected) so a feature that's worth considering.

When descriptions of service start meandering into encryption details with a lot of weird acronyms just remember the bigger the number before "bit" the better the encryption.

Remember when paying for the VPN service to use VISA gift card (harder for them to process for payment though and some providers won't allow it's use) or bitcoin as it's as much for your safety and anonymity as the VPN itself.

I tried multiple providers and found one that had a great price ($35/yr.), decent throughput (about 1/2-3/5 of my regular connection speed limit), is a rock solid connection (I haven't seen drop in 1.5 mo.), allows me to connect up to 5 devices at once, and was able to process my pre-paid VISA.
Took about 2 wks. from start of research to finished installation.
 

choomer

Well-Known Member
This article from arstechnica.com highlights how the goalposts are constantly shifting in the quest for privacy and anonymity and no guide is a replacement for doing your own due diligence.

Let this be an example of how ALL tech can be broken or compromised and there is no one source of absolutely trustworthy security. What works today may not work tomorrow and this is why you have to keep a finger on the pulse of security news.

This is also why a combination of the methods I mention above is the best way to have decent comfort in your anonymity method.

Edited: bast = best
 
Last edited:

choomer

Well-Known Member
Yo @choomer , you got an ovchartka?! Thank you for your cyber security tips! Im an eternal student, always learning...
IM-PRESS-IVE!! Not many know what a caucasian ovcharka <for those that don't know, it's geographical not skin color> looks like!

But no, I WANT one but with prices easily scaling up to $3K for an unaltered M/F w/ papers I decided instead to browse local no-kill shelters and found a pair of 1.5 yo Rott mixes for $250 to help bolster home security.
Nothing like a pair of 80+ lbs. dogs with teeth flashing and hackles raised to make people think about calling before they come over. I like company, just not the unannounced variety.

You're quite welcome for the tips and please don't take my rant about the full guide as a dig against you or @Skeet Kuhn Dough for asking. It's just a lot of work and as my father said, "You don't buy the cow if you get the milk for free."
 

choomer

Well-Known Member
Is there a cyber security program for Windows phone?
Cyber security covers a BROAD spectrum of IT. I think you should search for "windows anonymous web browsing" to get a more detailed answer.

That said, PPTP and IPSEC are windows oriented encryption protocols, but the article I last link to above highlights how those protocols are not as secure as they once were.

Focus on open source offerings like OpenVPN as they have much better peer review and contribution from developers. The chances that if you focus on open source offerings you can usually find a client program that runs on Windows, Mac, or Linux are MUCH better than commercial software.

You're starting off a bit handicapped w/ Windows (and Mac is not immune to this either) though because as "conspiracy theory" as it sounds, I believe gov't entities have a built in backdoor to use with either of those operating systems and the only way to prove they don't is for them (M$/crApple) to publish their code uncompiled and that ain't never gonna happen.

The whole reason this discussion has come up is a "conspiracy theory" that Snowden proved to be true far beyond our wildest imaginations
 
Top