Anonymity/Security Breached

Prince

[ Verified Seller ]
Staff member
Trusted Seller
Joined
11 yrs. 6 mth. 26 days
Messages
5,381
Reaction score
18,380
Age
45
Wallet
11,590$
92sok.png



This paper not speak of anonymity or security techniques... But his illusion !

I create this paper only for expose important points for you descend your feet down to earth... And create a sense of fear in you

I will not talk about theories but to facts !

Hm, since many years in the network (www), i can see many wrong tutorials, papers or documents about Anonymity or Security on blog/forum (dev, data processing, security, white-hat, hacking... and others stuff) and with my
Please, Log in or Register to view URLs content!
and many research & tests... I can tell with you.

I will not speak a Windows (which the worst of all ...)

0x00 - Introduction about Anonymity/Security

Quote
Please, Log in or Register to view quote content!

0x01 - Myths and Truths

Myth: Linux hasn't malware, spyware.

Reality: 90% of Linux distro's are backdoored. (Back|Track for example
tongue.png
I already see your thoughts....


Quote
Please, Log in or Register to view quote content!
Just for information: VPN protocol is vulnerable and VPN company selling informations (don't trust no-log), Sock protocol vulnerable (DNS :/), JAVA running on your local machine, so bypass proxies.

And most softwares are backdoored, social networks spying, games (can be backdoor), videos (use JAVA)... and social engineering, all can compromise your security and anonymity.

Some will say that we must follow the way of free software/open-source... True ! As Skype for example :'D for those who would not like this example, know that Skype is backdoored by the NSA since 2009. But Skype was open source at this time !

Yes, you can secure a system. Yes, you can have some anonymity ... The game of cat and mouse or that's smarter than the other !

0x03 - Breached by Hardware

Open-Source is really good way but... isn't compatible with this system based on money, if everyone put on Open Source, which companies will want to invest ? If everything is open, the economic slowdown, of competition and technological progress !

Other problem, Open-Source to Software that best way (all know that) but for Open-Source Hardware ? It is how ?

Has anyone ever seen a processor, motherboard, under a free license/open-source ?

Who verified that the implementation of the network layer by a particular manufacturer (American ?) Is faithful and not provided with a backdoor directly in hardware ?

It's fine to peel the source code to be safe, but if the material on which this little world is already sits at the source, backdoored, so what solutions we are have ?

0x04 - A Little Story

For those who do not know, I'm sl1nk (delighted). I am now searching for several years for computer crimes.

I study, I do researching and testing, about security/anonymity.

I've found interesting technics and dev stuff for be near of perfectly anonymity and security ! But this morning, spilling my bowl of milk on my computer, which burn my leg, so I jumped and my laptop made ​​a horrible BOOOOM ! I changed quickly my pants and look from the horror of the kitchen while making another bowl of milk.

Now that my laptop is in open source (ha ha ha), I look at what I can make it
smile.png
After repairing, I felt compelled to write a paper on Z + xD And look for electronic books in the room and my soldering iron !
 
Paid adv. expire in 2 months
CLICK to buy Advertisement !
westernunion carding Verified & Trusted WesternUnion | MoneyGram | Bank - Transferring [299$ BTC for 2000$ WU]
electronics carding Verified & Trusted Electronics Carding, Carding iPhone, Samsung Carding, MacBook Carding, Laptops Carding

ClarenceCTZ

Active member
Member
Joined
1 yrs. 9 mth. 30 days
Messages
29
Reaction score
1
Wallet
0$
You are absolutely right, nothing is "totally anonymous and safe" there is always something visible if you investigate well, the information is there. Thank you very much for sharing your knowledge, I really enjoyed your post.
Based on your experience, as you mention above, what interesting techniques and development material have you managed to find to approach the perfect anonymity and security?
 
Top Bottom