NEW CARDING CHAT IN TELEGRAM

Online Safety: A Practical Guide to Protecting Your Data and Identity

Man

Professional
Messages
2,836
Reputation
5
Reaction score
448
Points
83
Salute to all, dear friends!

It is obvious that the screws are being tightened even more... You can be held accountable for a harmless like or repost. I think there is no point in me telling you once again about what is happening in the Russian Federation and some other CIS countries at the moment. There are Telegram news channels for this, and you are not stupid, you understand everything yourself.

Today I will tell you about tools that will be useful to each of you in case of blocking of most of the Internet and surveillance by the government and other dubious individuals.

Contents of the article:
1. How to bypass Roskomnadzor blocking
1.1 Free method
1.2 Paid, but more reliable (recommended)
2. How to use TOR correctly
3. How to encrypt your computer
4. How to communicate safely on the Internet
4.1 Correct use of Telegram
4.2 Session - the recommended option
5. How to share files safely
6. How to choose a secure email, my recommendation
7. How to choose a browser that won't track you
7.1 For a computer
7.2 For a smartphone
8. How to keep your passwords safe
9. How to Automatically Reset Your Android Smartphone. Red Button
10. How to protect your router from hacking

1. How to bypass Roskomnadzor blockings​

As of today, Roskompozor has blocked more than 30 thousand sites. You must admit that with such prerequisites, it is just a stone's throw to blocking the majority of the Internet.

I suggest you prepare for this scenario in advance, so that you don't end up crying over a broken trough. Any blocking can be bypassed! I have prepared 2 ways to do this for you:
  • The first one will be completely free, but it will not work for all platforms and will require minimal technical skills.
  • The second one will cost you $5 per month, but will be as simple, convenient and reliable as possible.
In any case, you will be able to choose the method that suits you.

1.1 Free way​

1.1.1 Program for bypassing passive and active DPI

GoodbyeDPI
is a program that works as a network driver, changing your network packets on the fly so that DPIs cannot detect the presence of blocked domains in your traffic.
  • It is open source which you can view here and supports Windows 7, 8 and 10.
  • We don’t need the source code, we need the finished program, which is available for download here.

GoodbyeDPI can block packets with redirects from passive DPI, replace Host with hoSt, remove the space between the colon and the host value in the Host header, "fragment" HTTP and HTTPS packets (set TCP Window Size), and add an extra space between the HTTP method and path. The advantage of this bypass method is that it is completely autonomous: there are no external servers that can block.

By default, options aimed at maximum compatibility with providers are activated, but not at operating speed.
  • Run the program as follows:
goodbyedpi.exe -1 -a
  • If blocked sites start opening, then your provider's DPI can be bypassed.
  • Next, try running the program with the -2 parameter and visiting the blocked HTTPS site. If everything continues to work, try mode -3 and -4 (the fastest).
  • Some providers, such as Megafon and Yota, do not allow fragmented packets over HTTP, and sites stop opening at all. With such providers, use the -3 -a option

1.1.2 Program for bypassing IP blocking

In the case of IP address blocking, providers filter only outgoing requests to IP addresses from the registry, but not incoming packets from these addresses.

The ReQrypt program works as an effective proxy server: outgoing packets from the client are sent to the ReQrypt server in encrypted form, the ReQrypt server forwards them to the destination server with the outgoing IP address replaced with the client's, the destination server responds to the client directly, bypassing ReQrypt.

1daf76_4cec659637dd4836997ed79a44b67879~mv2.png


If our computer is behind NAT, we cannot simply send a request to the ReQrypt server and wait for a response from the site. The response will not arrive, because the NAT table does not have a record for this IP address.

To "punch through" NAT, ReQrypt sends the first packet in a TCP connection directly to the site, but with TTL = 3. It adds an entry to the router's NAT table, but does not reach the destination site.

For a long time, the development was frozen because the author could not find a server with spoofing capability. IP address spoofing is often used to amplify hacker attacks via DNS, NNTP and other protocols, which is why it is prohibited by the vast majority of providers. But a server was eventually found, although not the best one. The development continues.

1.2 Method, costing $5 per month. Raise a personal private proxy Amnezia, which will not allow surveillance of you and will definitely not be blocked.​

As the simplest, but at the same time reliable solution, I suggest setting up a personal private proxy Amnezia.
  • Here are some reasons in favor of this decision:
Is maximum security and anonymity on the Internet important to you? Do you no longer trust numerous public proxy services and are afraid of confidential information leaks? Do you need a static dedicated IP that no one but you uses? Are you tired of constant captchas and blocking on public proxy services?

Do you need complete freedom of action and flexibility of settings? Do you need a proxy that is guaranteed not to keep logs? If your answer is YES, then this is exactly what you need!
  • Important: in the Russian Federation I recommend using the Cloak or AmneziaWG protocols, they are guaranteed not to be blocked.
  • TO WORK:

First, we need to decide on a hosting provider from which we will purchase a server in order to set up a personal VPN on it.

I will show all further actions using the example of the hosting provider Inferno Solutions ( this is not an advertisement for the service, you can try to find any other reliable service yourself. However, my students and I use Inferno Solutions, no complaints)
  • So, let's go to the Inferno Solutions website (clickable) and select the item I highlighted in red:
  • Scroll down and see "Amnezia proxy - personal private proxy", click next:
  • Now we select the payment cycle (for how long you want to pay for the server):
  • Let's choose a country (I'll use Estonia, you can do it too):
  • As a result, we will have the following picture (other parameters, except for the payment cycle and country, do not need to be touched):
  • Click on the "Update cart" button (circled in red on the screenshot above) and proceed to payment:
  • Click "Proceed to payment" (circled in red on the screenshot above):
  • Now fill in all the necessary data (it is better to indicate not your own, but a random person, you can use an online personality generator. However, if you do not plan to do anything black, then you can enter real data)
  • After payment, you can proceed to the direct configuration of your VPN on the devices you will use. There is nothing difficult here, below you will find detailed instructions and applications for all platforms:
    1. Setup instructions
    2. Download applications
  • Once configured, your personal proxy will be ready to work!

2. How to use TOR correctly​

If you want to use Tor, I strongly advise against doing so by simply installing the Tor browser on your PC. In this case, especially if configured incorrectly, you risk exposing your real IP address, which can lead to your complete deanonymization. Do you need it?
  • So what to do?, you ask.
  • There is a solution!
And this solution is called Whonix.

Whonix is a Debian-based Linux distribution that is designed to provide enhanced security and privacy. High anonymity is achieved through VirtualBox and Tor.

Whonix reduces the threat of common attack vectors while maintaining ease of use. It provides a significant level of protection against malware and IP leaks.

1daf76_c3f1d9d229c54b969810174d8fdcb227~mv2.png


I have prepared a lecture for you in which you will learn how to create virtual machines, the traffic from which will go entirely through the TOR network, and also hide the fact of using the TOR network from providers.

3. How to encrypt your computer​

The Windows operating system cannot 100% guarantee that if there is a password, strangers will not gain access to the laptop. The account password can be found out and changed using special tools without having access to the OS itself. Therefore, there is a need to encrypt data on the hard drive. This allows you not to worry about unauthorized access if the owner locks the computer before leaving it unattended.

This type of encryption is good as a first line of defense. If someone steals your laptop or removes a drive from one of your servers, they will need to crack the encryption on your hard drive to gain access to the device. With a complex password, this could take tens, if not hundreds, of years.

With this type of protection, you can also use folder-level encryption and individual file encryption.

Disk encryption​

BitLocker Device Encryption is Microsoft's full-disk encryption tool, built into Windows 10 Pro and Enterprise. However, BitLocker has a few drawbacks:
  • If BitLocker Device Encryption was not pre-installed on your computer, installation and setup may be difficult. Microsoft has a list of devices with pre-installed Bitlocker;
  • Bitlocker functionality may vary on different devices, depending on your motherboard;
  • As mentioned earlier, BitLocker only works with Windows 10 Professional and Enterprise.

There is an alternative – the VeraCrypt program, which does not have such disadvantages:
  • VeraCrypt is much easier to install than BitLocker;
  • VeraCrypt is independent of your computer's components;
  • VeraCrypt works on any version of Windows 10.

1daf76_405a2411885d44aaa85f8c9274de9ae6~mv2.png


VeraCrypt is a free and open source (FOSS) program. Without getting into the “open source vs. closed source” debate, in our opinion, FOSS software is generally considered more secure. Plus, it’s free. Once you install VeraCrypt, you’ll just need to enter your password every time you start your computer.
  • For your convenience, I have placed a detailed step-by-step instruction on encryption in a separate manual:

4. How to communicate safely on the Internet​

4.1 Proper use of Telegram​

Telegram is an incredibly convenient thing. However, in terms of anonymity, everything is not as smooth as many people think. I have prepared a separate article for you, in which I told you how to act so that communication in Telegram is as safe and private as possible.

4.2 Session - recommended option​

In fact, the best option was and remains Jabber with OTR, configured on your own server. However, xmpp mobile applications are poor, buggy and, in addition, also with closed code.
  • However, there is a way out!
  • And this output is Session.

This application, along with Wire, has long been firmly established in the mobile devices of corrupt officials, tax officials and security forces, and these hatchlings know exactly what can be hacked and what cannot.

Well, how are we any worse? Let's tell the wiretap - F*CK and switch to Session, just like the cops and FSB guys have already done.

1daf76_427c03c19ee74c238f7349481d46dd67~mv2.png


All users of the messenger remain completely anonymous. So much so that it will be impossible to find out the IP address of any of them.

When registering, there is no need to provide a phone number, as is usually the case with competing messengers.
  • Session keeps your communications private, secure and anonymous:
When using Session, all your traffic is sent to its destination only through the decentralized network, using a system the developers call "Onion requests." Onion requests protect user privacy by ensuring that no server ever knows the source and destination of a message.

Session is available for PC, under the following operating systems:
  • Windows
  • Mac OS
  • Linux

You can also install Session on mobile devices with the following operating systems:

5. How to share files safely​

1daf76_4f7ec54648af48b18c40fcc72469a259~mv2.png

I would like to introduce you to a great service: Wormhole is a simple and convenient file sharing service that uses end-to- end encryption.

An interesting solution is the ability to choose the link's validity period (from 60 minutes to 24 hours), as well as its automatic deletion after a certain number of downloads (from 1 to 100)

1daf76_097659001622417d9af6465b6c33bd5a~mv2.png


This way you can maintain your privacy and be sure that your materials will not be spread all over the web and will not remain here forever.

6. How to choose secure mail​

Here I would recommend taking a closer look at MailFence, a Belgian secure email service with no tracking or ads (almost). It supports GnuPrivacy Guard (GPG) encryption and does not give out user data to third parties.

The basic account is free (it's quite enough), but you can buy more space and extended technical support.

The service donates 15% of its profits to support the Electronic Frontier Foundation and the European Digital Rights Foundation.

Some of you may have the service blocked by the government, which can be considered a sign of quality today :) Therefore, if you cannot access the MailFence website, use the tools from point 1 of this article.

7. How to choose a browser that won't track you​

7.1 For computer​


1daf76_05deb804a2cd4b32acd4500d536a42a7~mv2.png


I'm sure experienced computer users will agree with me that Firefox is one of the best browsers for computers. However, many users are wary of the telemetry services built into the Mozilla product.

The vast majority of people prefer to have their default browser set to maximum privacy and security.

LibreWolf solves this problem. The browser is free of Firefox's distracting features and focuses on maximum privacy "straight out of the box".

This is what I recommend you use on your computer. LibreWolf is available for the following OS:

1daf76_1b8dafaa0feb404eb756eae5b1b35474~mv2.png


🌐 You can download it from the official website by simply clicking here

7.2 For smartphone​

As a good solution for a smartphone, I can recommend DuckDuckGo Privacy Browser – a browser for Android and iOS, focused on anonymous Internet search and safe visits to Internet sites, without the risk of leaking confidential data. It is completely sufficient for the needs of an ordinary user.

1daf76_379625251a0f419b94e6686166ed8a91~mv2.png

🌐 You can download it from the official website by simply clicking here

8. How to keep your passwords safe​

Every person who uses the Internet has many passwords. And hardly any of you will be happy if these same passwords leak into the hands of intruders.

To prevent this from happening, you need to follow two simple rules when choosing passwords:
  • They have to be complex.
  • They should be different on different sites, services, programs.
However, following these rules is almost impossible for a person with an average memory. I highly doubt that any of you are capable of remembering a hundred complex passwords. Fortunately, this is no longer necessary - there are programs for storing passwords.

Introducing KeePassXC - the #1 password manager​


1daf76_4cc04505fe9e401397422527e3ab4fe3~mv2.png


  • In the manual below I have covered in great detail the installation and use of this password manager:

9. How to Automatically Reset Your Android Smartphone. Red Button​

Another trick, thanks to which your local police officer will remain without a bonus this month, and you will be free.

I will teach you how to set up emergency deletion of all information on your phone. And one good program will help us with this.

How to delete all data on your smartphone:​

1. First, we need to enable the data encryption function on the smartphone.

On different versions, the encryption option is located in different places, usually in "Settings" -> "Security" -> Data encryption, Data protection, Screen lock, Encrypt device.

Encryption is necessary to ensure that there is no possibility of recovering files after deleting them using the method we described.

2. Next, download the "AutoWipe" program to your Android smartphone. 👉You can download it: From this link

To install, enable the "Installing applications from unknown sources" option in the settings.

After installation is complete, open the application, activate "admin" and confirm in the settings.

The AutoWipe settings themselves.​

1. In the first place, we find that very useful setting - Deleting files when entering the screen lock password unsuccessfully.

This useful software does not stop at just one function. Next comes an equally useful item:

2. Deleting files via SMS. That is, the program will delete everything from the phone if the smartphone receives an SMS message with a certain code word 😎

This feature will be useful to everyone without exception.

Next comes a simple, but no less useful option for the "especially cunning" comrades in uniform:

3. Deleting data when the Subscriber ID changes, for example, the SIM card in the phone is removed or replaced.

4. Well, and finally, we will need to protect the "AutoWipe" application itself and, of course, do not forget to enable the option to delete data from the SD card.

Ready​

After violating the established restrictions, the phone will turn off and begin the process of data reset (zeroing), and the encryption configured at the very beginning will not allow this data to be restored.

10. How to protect your router from hacking​

It is very important to use secure routing devices or routers. With the help of these devices, packets are exchanged between network devices and the provider based on rules and routing tables. By accessing the router, you can get various information that can be used for different purposes. For example, this can be information about devices, visited sites, settings, etc.

I used a TP-LINK router. Depending on the company and model, the admin panel may differ. There is a lot of information on the Internet for each model. Setting it up will not take you much time.

How can I access the router?​

Hackers use automatic scanners on specific networks. Routing device scanners scan ports that are traditionally occupied by routers. Scanning is done to find standard ports with specific login data. If your router has standard settings, then there is a very high probability that a hacker will be able to access your data.

Using one of the scanning programs as an example, 73 successful routers were obtained in 40 minutes of work.
Considering that on average 3-4 devices use a router, this is quite a large number of users:

1daf76_f61731b16f504893bd81f2390f914005~mv2.png


How to reduce the chances of hacking to zero?​

In order to reduce the chances and minimize the risk of hacking, you need to complete a short list of actions.
  • Changing the default IP address for local management
First, you need to check the address where the admin panel is located. To do this, enter two addresses in the browser:

As a rule, login and password admin/admin or a similar standard combination are used to log in. Thus, the first thing to do is to change the address of the admin panel, login and password. This will protect us from mass scanning tools, such as Router Scan.
  • Changes to login credentials
You can change your username and password in the System Tools -> Password section:
  • Limiting the list of computers for local management
Next, you need to prohibit access to administrative tools from outside. For our router, you need to go to the section "Security" -> "Local Management".
In our case, you can specify the MAC addresses of computers that will have access to the admin panel. This method can be used for open networks with a large number of participants.
  • MAC address filtering
Creating a filter allows you to add to the list of devices those users who are not dangerous. This can be bypassed, but it is an additional barrier that can stop school hackers.
TP-Link routers allow you to create a list of wanted and unwanted devices for your network. This method has advantages with large networks.
  • Changes to the remote control port
Additionally, it is necessary to change the port that can be used for remote control. This action will protect against automatic scanners that scan addresses on ports 80 and 8080. These are standard router ports. Automatic scanning programs will not check all values from 1 to 65534. Therefore, it is better to change the standard ports to other values. Yes, hackers can scan all ports on routing tools with separate software, but this will take a loooong time.
Ideally, it is better to disable the remote control function altogether. It is enough to specify the IP address 0.0.0.0. Then this function will be disabled by default.
  • Disabling DHCP Server
The DHCP protocol is used to automatically assign an IP address, default gateway, DNS server, etc. This protocol uses UDP as a transport, which means that we can easily replace all the fields of interest to us in the network packet, starting from the channel layer: MAC address, IP address, ports - that is, everything we want. Therefore, to save yourself from various kinds of attacks, it is better to disable DHCP on the router.
  • Binding MAC address and IP
You can bind in the IP & MAC Binding menu. Binding via the ARP protocol is a convenient function for controlling access to computers located in the local network. The list of devices can be viewed in the ARP table.
  • Hidden SSID
As a rule, almost all WiFi networks have their own name. This name is the SSID (Service Set Identifier). This name can be seen by scanning the networks around. By default, routers show the name to everyone who wants it. A hidden SSID will reduce the number of different attacks that will be carried out on your network.
In TP-Link routers, this can be done in the main menu (Wireless settings).
  • Disable WPS connection
Wi-Fi Protected Setup (WPS) is a hardware network connection technology that works on a simplified principle of connecting to a WiFi network. It has quite a few vulnerabilities, so it is better to refuse to use it.
  • Network Monitoring with AirSnare

1daf76_3b05e975855b4b48977962edc6bb0400~mv2.png


This program allows you to control all network devices. If a new device appears, the software can send a message to the mail, write a log to the journal or display this information in the program interface. Additionally, the program can send a message to the connected device with a label that it is being closely monitored.

Thus, we were able to secure our router as much as possible. Of course, we should not forget about two things. Firstly, almost all modems have a reset button. Therefore, it is better to place the router in a place where there is no physical access for other users. Secondly, if you download a file with an exploit/virus and run it on your computer, then there is no point in protection. Since the hacker will get access to all your data. Therefore, it is worth carefully checking the data that you download and open.

Steps to ensure your safety and anonymity online in a world of global surveillance ⚡
 
Top