A Tech Bleg For The Digerati


How to Hide Your Digital Communications from Big Brother

Comment below, please.

12 responses to “A Tech Bleg For The Digerati

  1. Anonymous

    Tails. Bootable thumbdrive. No footprints, in theory.


  2. Hugh Davis

    Overly complicated and not much better than VPN tech. I’ll stake my PhD and 25 years of doing computer security and networking on it.

  3. I’m certainly no computer security expert, but it looks interesting.

    Bitcoin is a joke, but if the encryption technology has spawned something useful, then it was worth their efforts.

  4. Make sure you read the warning faq’s at tails, though. It leaves no footprint on the local machine, but it’s still subject to man-in-the-middle and watching the Tors exit node.

    Re: bitmessage, I’d think it would have the same problems. The big advantage is end-to-end encryption. So the content should be safe, though I’m not sure that using it doesn’t raise red flags. I didn’t see how it hides your IP address, but I didn’t read too deeply.

    Definitely interesting, and another tool to add to the toolbox.

  5. snowmizuh

    I still think it’s safer to roll-your-own:
    [Option 1 – somewhat secure] Host your own email system and disable STMP transport. This means it doesn’t send email over the ‘net and only send to internal recipients. Think 1988 BBS. Only allow connections to your home network on which this system lives via VPN. See Denninger article “Tired of Snoopfest” for how to set up VPN host on FreeBSD (warning: advanced!) http://www.market-ticker.org/akcs-www?post=220395 . Bonus, use gpg/pgp to encrypt messages sent on this internal-only email server.

    [Optioon 2 – more secure] Pass messages on MicroSD, thumbdrives, etc. person-to-person, aka ‘PeopleIP’. This is how they roll in Cuba. Encrypt the entire drive using truecrypt and/or encrypt specific files for recipients using PGP/GPG.

  6. Why bother hiding ? They already know who we are and where we live. If you doubt that or think you can effectively hide from them on the internet you’re a fool. Our timewould be better spent if we found out who they are rather than hiding from them.
    Yank lll

  7. Mt Top Patriot

    Pardon me ya’ll,
    Why hide what is yours to begin with?
    Why hide as if you need permission, when you don’t?
    Why hide from people and their diktats that carry no legitimacy?
    Why hide from the dregs of the human race?
    Why hide the dignity of your Liberty?
    Why hide from tyranny, it only legitimizes the tyrants?
    Why ain’t you showing these rat bastards you ain’t afraid?
    Why do you not understand it is you they are afraid of?
    Why not show them they are outnumbered…
    when it is you they want to believe you are outnumbered?
    Why not show them the might of our right!

  8. Denninger’s homebrew VPN is a nightmarish farce and is beyond unduly complicated. One could use a commercial VPN and run Tor through that (i.e., connect to your VPN service, then start Tor). This allows you to establish a secure connection to a proxy, and then obscures the final destination from the VPN provider (and the fact that you are using Tor). It also obscures the true origin of the Tor transmission from the exit node. Select a VPN service that offers node connect points outside your country of origin – preferably in a country with better privacy protections than your home nation. Not full proof, but nothing is, and it would make them work to find out who you are. Just take care not to include identifying information within whatever communications or downloads you perform, and do not login somewhere with authentication credentials that can easily be traced back to you.

    Also, you’d want to turn off any location identification services on your workstation, or other “background” services that might use authentication to an account that traces back to you.

  9. Bill Harzia

    Dead drops and post office letters. Make these bastards get off their fat asses and do some work. They probably can’t even remember how to do that kind of thing anymore.

    Can you see them sifting through 100,000 letters to find the one with the info they want?

  10. cyberghost uses openvpn and has an easy to use front end. many servers around the world. not free, but cheap. https://cyberghostvpn.com/
    tor is a darpa product so they can communicate when all hell breaks loose and normal channels don’t work. they know how it works. all attempts at secure comms has to be seen as only something to buy you time. the narus st-6400 found in that at&t service closet is almost ten years old now. the 1200+ new ones sitting around the country and reporting back to utah are amazing works of art. verisign was the first company to actually use them wholesale. been anywhere that says “verified by verisign”? yep, that’s them.

  11. snowmizuh

    Regarding Denninger’s approach being so complicated, I agree completely. It all depends on how much you trust you want to put into compiled or proprietary solutions. His approach stays very close to the open source side.

    I provided that as a reference, but I haven’t personally eaten my own dogfood in this case. I have used Windows Server 2012 to set up my home VPN as well as Himachi LogMeIn. I especially recommend the latter for ease of use.