Measures to counteract. The scale of global surveillance.

Hacker

Professional
Messages
1,044
Reaction score
803
Points
113
The system of recommendations for ensuring security will be built on the basis of 4 levels of protection:
  • Level 1 - free security.
  • Level 2 - paid software with low costs.
  • Level 3 - paid software with high costs.
  • Level 4 - security for organizations or online communities.
Before giving recommendations on how to configure programs for your security, you need to explain some of the parameters and concepts used in this area.

67be0c8ce227226cfa855.jpg


Proxy service

What is a proxy server?
Proxy server (from the English proxy - the right to use on someone else's behalf) - a remote computer that, when you connect your machine to it, becomes an intermediary for the subscriber to access the Internet. The proxy transmits all requests of the subscriber's programs to the network and, having received a response, sends it back to the subscriber. The proxy server also has its own IP address. As we have already mentioned, by connecting to a proxy, you transmit all requests to the Internet through it, while checking shows the ip of the proxy server, and you remain anonymous.

A proxy server is a service on a server that allows you to make indirect requests to services on other servers. Or in human language, this is a server that is located in another country or place and redirects your traffic, so that all sites that you visit through a proxy record the ip address of this proxy server in the logs, and not your ip.

What functions does a proxy perform?
  • Data caching;
  • Data compression;
  • Access anonymization;
  • Providing, restricting, and protecting Internet access for local network computers.

What types of proxies exist?

NAT is the simplest type of proxy. NAT = network address translation. It has been included in Windows since version 2000. It is called "Internet connection sharing" and is enabled by checking the connection properties. This proxy works transparently for the user, and no special settings are required in the programs.

HTTP is the most common proxy type. As the name suggests, it works over the HTTP protocol. If the program does not explicitly specify the type of proxy used during operation, then this is an HTTP proxy.

HTTPS (SSL) is the same as HTTP proxy + supports SSL encryption.

IRC (bouncer, bnc) - used to hide the real IP in IRC networks. A useful feature of bouncers is that they allow you to stay on the channel even when the IRC client is turned off.

SOCKS - can work with any protocol (SOCKS4 version - TCP/IP only, SOCKS5-TCP / IP + UDP + authorization + remote DNS query). The disadvantages of SOCKS proxy include the complexity of their use. Using special programs, you can socks almost any application. Such proxies are anonymous by definition, because they are not tied to high-level protocols and do not update request headers.

CGI (anonymizers) - you can only work with this type of proxy through the browser, because the proxy server in this case is not a service that is banned on any port, but a script on the web server. They are very easy to use, but they have significantly less features than all other types of proxies. They don't always display pages correctly. However, it is possible to prohibit cookies and / or advertising directly in the proxy server itself, without changing the browser settings.

FTP is a highly specialized type of proxy server, and they can only work with FTP servers. They are mainly used in corporate networks. As a rule, the function of working with FTP servers is also inserted into an HTTP proxy, so this type of proxy is becoming less common.

Gopher is an extremely common proxy type that uses the Gopher protocol , a network protocol for distributed search and transfer of documents (it was widely used before the invention of WWW and was later replaced by it).

MySQL is a new developing type of proxy, its specialization is clear from the name-it is focused on interaction with the MySQL server.

533b1d9f3451a7d4ce207.jpg


Are all proxies equally anonymous?
No, proxies are divided by levels of anonymity:
  • transparent-transparent proxies, they do not hide either the client's IP or their own (HTTP(S), FTP, Gopher proxy).
  • anonymous-anonymous proxies that hide the client's IP address, but do not hide their presence (HTTP(S), CGI proxy).
  • distorting - they replace the client's IP address and do not hide their presence (HTTP(S), CGI proxy).
  • high anonymous / elite-hide the client's IP address, as well as the fact of using a proxy (HTTP(S), CGI, SOCKS proxy) + the admin configures automatic deletion of logs after a certain time.

What is a proxy chain?
A chain of proxy servers allows using special programs (SocksChain and similar) to use several different proxies in the same way as if it were one proxy server. It is mainly used to increase anonymity, but it can significantly slow down your work on the network.

By what parameters do proxies differ?
  • IP - no comments.
  • Hostname - symbolic name of the server (if any).
  • Port - the port that the proxy is hanging on. Please note that the same server may have several proxies on different ports.
  • Anon - level, or presence/absence of anonymity.
  • Ping - the time taken to transmit a packet of information from the client to the proxy and back, measured in milliseconds.
  • Gateway - whether this proxy overloads the request to another proxy (gateway).

To make it clearer, you can describe it like this:
12.34.56.43:80
12.34.56.76:80 > 12.34.56.55:80
12.34.56.91:80 /

  • Connect - whether the proxy supports the CONNECT method.
  • Socks - whether the proxy is an SOSKS proxy.
  • Country - physical location of the proxy.
  • Date - the date of the last proxy check (in principle, it has nothing to do with the proxy itself).

Why are proxies slow/not working?
Because they are free. You can get access to a private proxy by paying for this very access. There are plenty of such services.

How do I check the proxy for performance?
When checking the proxy for operability, the corresponding port on the server is scanned. There are many programs for analyzing and verifying proxies. The Charon program deserves attention.

How do I check the proxy for anonymity?
There are so-called proxy judges, which are a perl / php or other cgi script that returns a set of environment variables of its web server, based on which you can draw a conclusion about the level of anonymity of a particular proxy server.

How do I scan a proxy correctly?
It depends on what they will be used for. In any case , the lower the ping, the better. The number of threads to scan is selected experimentally for a specific connection.

Where can I get anonymous proxies?
  1. Buy from reliable people, price from $30
  2. Create a Trojan and create your own botnet
  3. Make a proxy yourself (this is the most reliable way)
The technology is simple - you buy VDS hosting in the Netherlands, for example, and install your proxy server there. And you can also raise your VPN.

So what are anonymizers?
Anonymizers are the simplest way to hide your ip address
In terms of reliability, the anonymizer is no more reliable than simple non-elite proxies, which means that they will not be able to fully resist IPS - 2, but they can be used as a certain element of protection.

91e8b9135f14783f3281f.jpg


VPN​

VPN (Virtual Private Network). Externally, a VPN connection is not much different from connecting to a regular local network: applications will not feel the difference at all, and therefore, without any configuration, they will use it to access the Internet. When one of them wants to access a remote resource, a special GRE packet (Generic Routing Encapsulation) will be created on the computer, which will be sent in encrypted form to the VPN server.

Continuous encryption of transmitted data is a key point in ensuring security. PPTP traffic can be encrypted using MPPE (Microsoft Point-to-Point Encryption, supports 40 -, 56 -, and 128-bit keys). This is the Microsoft protocol. Early versions were monstrously full of holes and elementary hacking, in the new ones, gross errors have been fixed, but Microsoft's attempts to do something in the field of cryptography do not cause anything but laughter. New versions of their protocols simply don't do much analysis for holes.

OpenVPN is a free implementation of VPN technology, organized on the basis of the generally accepted TCP/IP protocol stack on the Internet. This ensures that the connection works even with providers that do not support PPTP (most often these are mobile operators that cut all GRE packets passing through GPRS and EDGE). Also, OpenVPN works even when you don't have a real IP address, unlike PPTP, which requires two network sessions to be established simultaneously.

OpenVPN has a number of advantages over VPN technology:
  1. Adaptive compression of data in a connection using the LZO compression algorithm. The data transfer rate over OpenVPN is faster than that of PPTP;
  2. Supports flexible certificate-based client authentication methods;
  3. Using a single TCP / UDP port without binding to a specific port ( in our case, UDP);
  4. Encryption of 2048 bits, provides unprecedented security, implemented through a permanent key.
Servers for anonymous VPNs are usually installed in countries that are most loyal to hacking, spam, and so on (China, Korea, and others). In most cases, there is an agreement with the administration, which, for a certain fee, undertakes to ignore complaints to the abuse service and not keep logs.

A VPN consists of two parts: a secure "internal" network and an "external" network that passes through a secure connection (usually the Internet). As a rule, there is a Firewall between the external network and the internal one. When connecting a remote user (or when connecting to another secure network), the Firewall requires authorization, based on which the user's (or remote network's) permissions are determined. Uses encryption for all tunnel traffic to ensure confidentiality and protect transmitted data over public networks.

So why do you need a VPN?
Exclusively for encrypting traffic, although it hides the ip, its main task is to hide traffic. A VPN is used in conjunction with a proxy. First, ip and most importantly encryption of all traffic, that is, even if they record the traffic, they will decrypt it for 20 years. It's a super system. But there are some disadvantages, official VPNs and most of them will not go, although they are not connected to Sorm-2, they give out all your logs on a call or request. Our option is a VPN, which is used by hackers, phreakers, terrorists, etc. comrades.

5a6b00c41c48f2ccf9d73.png


Where can I get a VPN?
vpn-service.us (not advertising)
cryptovpn.com (not advertising)

Is the VPN secure?
VPN is a security tool, it is not designed to hide the ip address, there is a proxy for this.

VPN Recommendations
  • You can also use a program that automatically disconnects the Internet when the encrypted channel is broken.
  • Be sure to use a proxy, the VPN itself for encrypting traffic.
  • Use a double or triple VPN, if you can afford it.
  • The VPN service provider must have servers located in countries such as Singapore, China, have a double VPN service, and have 2048-bit channel encryption.
  • We use Open VPN Portable to hide the presence of a VPN on your PC.

b8266680adea197ea6427.jpg


SSH tunneling
SSH (Secure Shell) - a network protocol that allows remote computer management and file transfer. Uses encryption algorithms for transmitted information.

SSH tunneling can be considered as a cheap replacement for a VPN. The principle of this implementation is as follows: all network software on the computer is forwarded to the assigned port (your localhost), on which the service is connected via SSH to the server (and as we know, the SSH connection is encrypted) and tunneling all requests; then all your traffic (no longer encrypted) can be forwarded from the server to a proxy (which supports tunneling) or socks, which transmit all traffic to the necessary addresses. You don't need to have a proxy or socks server.

Advantages of this system:
  1. To organize this scheme, you do not need to install server software (because you can easily get an SSH account and socks on the Internet);
  2. Since the traffic is encrypted and compressed during an SSH connection, we get a small increase in the speed of work on the Internet (this is true when the socks daemon is located on the same server);
  3. If the socks server is located on a different host, we get an additional chain of servers that increase our security and anonymity.
SSH still loses out in the reliability of Open VPN.

JAP
In one of the German institutes, a rather clever way of maintaining anonymity was developed. A special JAP proxy program is installed on the user's system. It accepts all user requests for connections, encrypts them (AES with a 128-bit key length), and sends them in safe mode to a special intermediate server (the so-called mix). The fact is that the mix simultaneously uses a huge number of users, and the system is designed so that each of them is indistinguishable from the server.

c4a3d17cf8e9ed465d8d4.jpg


TOR
Tor is a network of virtual tunnels.
In fact, it is very difficult to track a person through the Tor, even for special services, you just need to unwind giant chains of users.

Is TOR a complete security solution?
No, TOR is the most reliable method of providing free security.
There were several repeated cases of arrests of people who were sitting under the Tor, although not related to the opposition, in Germany several Tor servers were arrested for storing porn.

Minuses:
If a bank is hacked under your IP or another crime is committed, you will be very long and tedious to prove that you are not an ass and in any case your PC will be sent for a detailed scan.
The servers that your traffic passes through are unknown to you because there is no encryption, any of them can write traffic. This means that if the last chain of servers is close to you (and this is exactly the case, in the US there is a whole network of FBI TOR servers, and in the states there is its own (well, what did you think? are they fools if anyone can make their own server in Torah?)) so they will come to you at the last ip address and check if necessary.
By setting up a Tor server, you will be exposed to hack attacks and Trojans much more than regular PCs, since your PC will be publicly accessible on certain ports.
All Tor users sit under their home IP and each has its own real MAC tied to the local IPS, so the chain is untwisted. But it is much more difficult to promote a chain of proxies, because proxies do not write logs, many are generally on carding machines, others on VPS, others on abusive sites in China, Malaysia, etc. In general, it is MUCH more difficult to dig in proxies than to promote Thor's home users.

Conclusion: Tor is not used for hacking or serious cases, the maximum is browsing sites and correspondence on forums (it is advisable to have at least one proxy and remove it in the settings of the RF server) and it is better to have a VPN at the same time.

86301bbf899e0d4fa0a13.jpg


Identification tools:
Cookies - everyone knows what they are, so let's get down to business: you can't use cookies to determine your IP address. However, when you first log in to a web site, the client's IP address (defined by the server, i.e. IP proxy) may be stored in cookies by the server. The next time you log in to the site, the server detects your IP address again and compares it with the one stored in cookies. And if the IP addresses (old and new) differ, the server "can draw conclusions". And if you don't prohibit cookies in your browser, no proxy will help you.

Java Script - scripts are designed to run active scripts on your computer. They are quite simple, and have limited functions, but theoretically they can detect the real IP, and many other browser settings. The only solution may be to disable scripts in the browser. A program written in this language can easily determine your real IP address and any browser settings. For protection, there is only one solution: completely disable Java, since it has so many different network functions and it is problematic to prohibit them all.

Active X is a full-fledged program that runs on the user's computer. Their capabilities are even steeper than the previous two. They can easily detect any browser settings, "calculate" your real IP address, and even easily change the proxy settings. Protection against them is a complete ban on ActiveX.

c9bc976177c4edfb75987.jpg


Bulletproofs
A derivative of the words abuse (from the English complaint) means the resource's resistance to various kinds of complaints, SORMS and Echelons, and court decisions.

There are 4 types of bulletproofs:
  1. Weak warez (full in Russia, too).
  2. Any Warez (Holland, part of Europe, Asia).
  3. Spam, Trojans, rootkits, viruses - these are real bulletproofs and all claims (except for the association of banks) These are mainly China, Malaysia, and Taiwan.
  4. The last level is already "black" data centers for their own, where the coolest spammers are hosted, Trojans and botnets go from there, and sites of terrorist organizations sit there. These centers are usually pirated to the optics and are periodically caught by special forces and or the police (again, they prefer not to contact banks and the US FBI).
In general, by and large, all the abuse for serious cases is fake, for serious cases the best option is a data center in China and Malaysia with its own person and server, or a pirate connection to the main optical fiber. It is important to know that the best option for hosting your own proxy, VPN, and website is bulletproofs hosting. Prices-from$ 15, for servers-from $ 150.

b3be95308883544f68e4a.jpg


Social Engineering
We constantly use different passwords and names to log in to our home emails, websites, and networks, and remember that search engines are giant spies. You can be identified by repeated requests. Basic requirement when you are anonymous, you must behave like another person. If you registered on some resource under your real ip, or accidentally left a message - you are under the hood. The way out: we drop your nickname, start a new name, it's not easy - but it's more important than the fact that you will get in trouble, at best for your views and statements.

It is also worth attributing this to the fact that you specified your email, ICQ, or other system that was registered earlier, under your real IP, DNS, MAC, you will be very quickly promoted according to this data, professionals are sitting in the office. In many forums, the ip is linked to each of your publications and messages, and an ip log of your resource attendance is necessarily compiled (the time of a person with the current ip, the duration of the connection).

The IPS - 2 database is already almost 5 Petabytes, and the Echelon is almost 70 petabytes.
We live in a real matrix - be able to hide in it. I will also note such a thing as tests, a huge number of tests that measure a person's IQ, think they earn money on SMS, no, you didn't guess, these are huge spy systems that collect information about a person with a high IQ level, and forward it to the databases of customer companies, and people with high IQ are entered in IPS - 2 and Echelon. This is behind the scenes, do not use these tests ever, these systems are stuffed with port scanners and hidden worms on the most do not mess around.

Either bypass it, or pass it from under the VM so that the result is no more than that of a moron. It's all these little things that social engineering deals with.

The main rule: don't confuse your profiles.
This means, do not go under a proxy in your mail, do not get real ip even accidentally on dangerous resources, it is on these little things that 90 % of people fall under the cap. Create a profile, and these are (proxy, ip, mail) that are linked to a specific site or group of sites. Don't use just one profile. The most standard methods when caught, a person registered on the resource, specified mail, and forgot that the mail was issued with a real ip, or got a new nickname, and left the old ip, etc. cases.

DNS - information about your domain is not hidden as easily as ip, VPN is hidden. In other cases, it requires special configuration or special traffic falsifier programs.

MAC address of the network card - the internal address of the network card that is linked to your IP address, according to this principle, SORM, as well as banks, e-commerce programs determine your IP, even after it is replaced.

System identifiers - various characteristics, processor number, HDD number, OS type, OS language, browser, and a bunch of other parameters by which the server determines your uniqueness and remembers these parameters.
 
Top