The Creepers Trying to Steal All Your Stuff Again

What is Government stealing from you?

Piyush Badkul HackerNoon profile picture

@ piyushbadkul

Piyush Badkul

Attempting to reuse the wheel instead of reinventing it.

"Anonymity is just a perception. It'south not that somebody owns information technology but possess it"

If you are fully known to an enemy or naked in your battle, you may not even stand a gamble. If you are giving every slice of data about yourself to the enemy, then they have the power to retrieve appropriately and counter our every movement with a smarter motility before we even attacked them with it. Think most it?

By the way, I am the curator of CodesMyth, an online platform for Simplifying lawmaking and breaking Myths.

But what sense does the in a higher place things imply?

What is happening to our anonymity?

Now, we may or may non know it but the top authorities agencies from all around the world are spying on us continuously 24 X 7 past recording our phone call location, tracking our mobile GPS, Facebook & Twitter Update, online payment logs & bills, CCTV & ATM & other surveillance cameras. In fact, your every move is beingness recorded and analyzed by these professionals hiding behind the authorities mask using some serious deep Learning algorithm . Some of the regime organizations that rails us are CIA, NSA Pentagon and much more. What'southward their motive?

NSA — National security agency | CIA — Central intelligence agency
Deep learning algorithm — machine trained using algorithm to discover the pattern using the past data.
Anonymity — privacy or secure documents

Why are they doing that?

They retrieve that past being recording the action of all the persons all around the world, they have the potential to separate terrorists from the clusters of common people past analyzing their actions and pasts. They believe that they can cease these assault past predicting their time to come moves, thus trying to save millions of lives. But, hiding behind this aim they cannot gives excuses on invading the privacy of everyone which itself is a very big crime.

Does anyone give a shit almost anonymity?

Yeah, you lot may not probably know them. Hell, some of you haven't heard about them. The most popular person among all was the whistleblower Edward Snowden who used to work for NSA, U.s.a.. He was unable to give himself excuses regarding what he was doing for the regime was right. And so, he decided to blew and expose some of the documents which would be enough to evidence that the United states government is spying on usa. His classified documents tin can be found out on the deep web. Due to such act, he had to fly to Russia where he is spending current days along with his married woman. We may not know them merely a large number of whistleblowers are trying to provide anonymity so that we can have our privacy intact and untouched.

I haven't done any wrong in my entire life. Why should I worry about it?

In the today's world of digital data, the about valuable asset of whatsoever organization can be its information collected about its users that exists effectually the globe.

This isn't about y'all. No corporeality of money, gilded, diamond, bitcoin can purchase us that much information which the regime agencies and other top brands are acquiring from the unauthorized ways for free. Think about it. Google stores data which includes search queries of each Google product, our mail, drive and our other data in their cache for 8 years . Facebook does the same for v–6 years . These government agencies are now keeping track of all your whereabouts. They access all their data from these websites and cross verify them from other sources too.

With this huge big data and deep automobile learning algorithm, they already know where were you a couple of seconds ago, they can predict where yous are going to be in the adjacent couple of seconds, next one minute or next hour.

All your life will become controlled and all the other factors can be controlled in our life by these external agents. We may end up becoming a sacrificial pawn in their bigger moving-picture show.

What bug can be removing anonymity causes?

Think about it. Is it safe to provide such huge amount of information in the hands of a pocket-sized number of individuals and let them exist the undisputed rulers of the earth? What's preventing them from turning against u.s., the moment things go sideways? What's preventing them to sell our data from selling our information to the third parties if they need money very badly in society to survive? If you have zilch to hide and you are like an open up volume, and then following things may happen to y'all:

1- Your identity is never protected — If someone wants a revenge on you, all they need to know is your schedule, lifestyles and close ones.

You may not fifty-fifty know that the person sitting next to you may exist there to attempt a hit on you. Y'all may be lucky enough to survive all of these. If they come to know all near our weakness, then all the money and resources in the world won't exist enough to protect you lot.

A expert instance of this is S Korea. The Resident registration number is assigned to each denizen of South korea which is used as an identifier and is required for online registrations for online accounts on websites. According to this, each citizen can create a single business relationship because at that place volition be simply 1RRN per citizen. This would remove duplication and forgery. But things didn't become as planned. In 2006, hundreds of thousands of RNNs were leaked from various consumer databases, and these RRNs were used to create false accounts in a game called Lineage as a part of money laundering operations. The worst part is that these RNNs weren't stolen by hackers, merely were sold past company employees with database access. Every information, fifty-fifty of the credit carte du jour was compromised which is not at all acceptable.

2- Personal Harassment is not a new term in our digital world —one of the most amazing things near the Internet is that it tin can requite voices to those who are actively beingness silenced, assuasive them to speak without fear of repercussion from the shadows. Only after removing the anonymity, personal views volition be replaced by fear of repercussions thus eliminating the productive and constructive decisions in the era. Some examples of harassment include Doxing, swattingand revenge porn.

In 2011, Mohammed Al-Maskati — an outspoken political activist in Bahrain — as arrested and sequestered for eight days , only existence released after having signed an understanding to never again mention Bahrain in any form of media. This merely happened because he chooses to use his real proper name instead of imitation name.

3- The sensitive issues will exist diminished. They refer to those who need more information on a given topic only don't want to be defenseless seeking out that information. Near people really fall into this group without realizing information technology.

1 such example is a person who's struggling with their sexuality, hasn't gone public with that struggle, merely has many unvoiced questions and concerns. This person can ask all of their questions in an online community where anonymity exists thereby reducing the risks.

The list goes on: people who struggle with mental health issues, people who are adulterous in relationships, people who need divorce communication, people who are caught upwards in legal problems and don't desire to incriminate themselves, etc.

Is 100%-real online anonymity possible?

In my personal stance, NO. A big NO. No, 100%-existent anonymity does not exist at all. No matter how much advance technologies you are using, complete online anonymity is not possible.

It depends on the number of authorities agencies and hackers willing to dedicate their time and resource to put on the use and the importance and sensitivity of the event that they are handling determines how far they tin can go to track u.s.a..

When someone is tracking usa, then all we can do is to brand their job hard by using the right set of tools and techniques and not be there at the signal where the trail ends. But effort to create it into a dead end. It generally takes months to years in tracking someone who doesn't desire to be tracked.

We tin can employ tools, techniques, and concepts (when Implemented) for improving our security, thus reducing the amount of the surveillance and data drove going on, resulting in increasing our anonymity and privacy .

These advice matters from person to person and may not be possible for everyone to implement. The risk involved in using these should non exist ignored. Hence, before using them we should learn in deep about them.Let's begin with the listing, shall we?

Can you protect your password?

Mostly, in some cases, we can see that a large corporeality of email id and password leaked and distributed for costless. We can remove this problem by creating a password by hashing the URL of the website with our original password. Didn't get information technology. Let me tell y'all in detail.

Nosotros demand an extension for the browsers, in which we will implement a uncomplicated procedure. As soon every bit we click submit after inbound our user id and password along with other credentials to create our account, then that extension will get-go performing its role. Information technology volition excerpt the proper noun of the website and countersign from the Create an Account/Login page and and then process them through a hash role.

All of this will happen seamlessly . This way, the password generated volition be long, random and nobody will be able to copy it or generate it with ease. This style, the password will get dissimilar for the different website.This piece of work has been done by some Stanford professors. This volition also brand information technology difficult for the hackers to fissure our password by beast force or whatever other method since that also will accept a large number of dedicated years and resources. This fashion, the organizations won't be having any details of our password.

SEAMLESSLY — Smoothly and continuously without any gaps.
Hash function — a function that can exist used to map data of capricious size to fixed size.

Tin can you protect your information through paste?

A large number of people share information through various online Pastebin unaware that their data is existence recorded. Peculiarly coders and developer share their work with peers in the Pastebin. Thus, we should use ZeroBin. ZeroBin is a minimalist, opensource online Pastebin where the server has cipher knowledge of pasted information. Data is encrypted/decrypted in the browserusing 256 bits AES.

Image source: Google Images

Tin can you protect yourselves from all the websites yous visit?

Google Chrome saves all our history. To avert all these, we should utilize Tor Browser which should supersede Google Chrome or any other browser. Tor generally uses the proxy and our IP'due south are jumped from unlike places at from 3 to 8 times. For east.k., your IP may bound from Honk Kong to Germany to India to Japan. More often than not, the hackers tin can track united states of america within 2–3 levels and hence Tor Browsers are most secure till engagement.

Epitome source: Google Images

What is Tor network and websites?

A Tor network is a network which is completely subconscious and provides the capability of anonymity . It also provides access to the night section of the web which are the unindexed pages which the Clearnet search engines cannot open. These unindexed onion websites on the deep web are known every bit Tor websites and can be used for legal/not-legal purposes. Tor websites are and so secure because each hidden service website has a public key and a corresponding private fundamental. The onion accost is generated by hashing the public fundamental and taking half of it. Nobody can impersonate the subconscious service because you need the individual fundamental for it which is known to you just.

To add on to this: If your private key is compromised, your domain is gone forever, and you lot basically accept to get a new domain. So, y'all get the idea of security.
ProTip: If someone requests you for proof that you own a domain on the dark spider web, you can take the public key that corresponds to the domain's private key and gives information technology to them. They will use that public key to encrypt that bulletin, and then y'all tell them what their message was by decrypting it with the domain'southward private key. If they desire to verify it, they can hash it themselves and see the results.

Onion Address- such address are not dns address. they uses proxy software. They can be opened through the web browser with the help of tor network

Actress security in Tor for anonymity?

I assume that if yous are using the Tor Browser Bundle right now, to be "secure", then you should disable JavaScript and any other plug-ins, you practise that past clicking the "South" likewise the Tor onion in your browser, that "S" is NoScript, an Add together-on for Firefox.

When you accept clicked it, and then click "Forestall Scripts Globally (brash)", that will brand sure no website yous visit tin run scripts , which may be used to uncover your IP or other terrible things.

You are advised to stop scripts because it is believed that some websites of dark web have the power to notice your laptop size, your location and information and even create a backdoor on your organisation just at the moment y'all arrived on these sites with the assist of the scripts.

Tin you protect your electronic mail? — Random emails.

Sometimes nosotros demand to provide our electronic mail address or sign up in gild to get hold of a particular item on the Clearnet. Information technology can exist books, a song, a video or movie. But because nosotros need that item, we end up entering our e-mail or terminate up authenticating via social websites for sign-upwardly where nosotros cease up providing too much information considering we are way besides much lazy to go other way around.

As a result, we end up having spams in our mail service and have to get through the trouble to unsubscribe them. One uncomplicated hack is going for randomly generated email id and these email ids tin can be permanently deleted as before long equally our cookie from the local browser is deleted. One such post service is YOPMAIL which provides us randomly generated mail service for as long as we need them.

Learn more than about YOPMAIL from here.

Image source: Google Images
Clearnet- Clearnet is also known every bit the surface web and it is the net that we uses every day for normal work.

Simply, tin you protect the data that is going to be stored in the online servers?

We all tin fix ourselves to save the data which is stored in our owns system. Merely what can we do with the information that is stored up in the cloud or server? What about the chats that we accept? What almost the social media handles that we accept? Eventually, the government, hacker or a rogue employee will find a way and and then expose everything y'all wrote anywhere.

A uncomplicated solution for this is an open source project named Privly provides Encryption as the only solution. Privly enables people to trust whatsoever storage provider by stealing their ability to read your content. The Privly extensions encrypt our data before you send it to a server for storage. Encrypting your data means the server only sees a scrambled version of your content, a link . This way, you tin can store your data anywhere without losing your privacy. What it does is that it ends up providing seamless injection into our posts converting the text that is to be stored in the database into a link which will point to that text. If you want to larn more nigh privly past clicking on the following link:

http://www.codesmyth.com/index.php/2017/07/03/privly-share-individual-ly/

Learn more about Privly from here.

Paradigm source: Google Images
Storage provider— places where our data is stored safely in servers or clouds

But, what well-nigh the e-mail that I sent?

What if someone uses a postal service you sent them in a incorrect manner? What if they used your documents in a fashion that you cannot recollect almost? A simple solution for these is by generating a PGP cardinal. PGP stands for Pretty skillful privacy . In PGP , each person has two " keys ": a "public cardinal " that you requite to other people, and a " private fundamental " that only you lot know. You utilize public keys to encrypt messages and files for others or to add users to PGP Virtual Disk volumes. Thus, sign your emails and other documents including your files with PGP code digitally.One mode to generate your PGP primal is through IGolder

Learn more than about PGP key generation through Here

An case of PGP signature is shown beneath.

Image source: Google Images

What can we practice in android?

In Android, autonomously from the privly Android app for posting to social media, nosotros can utilize Orbot and Orfox. Orbot helps in the proxy and routing the network ofttimes, making information technology hard for tracking. Orbot tin work for all the Android apps. Orfox is the web browser where yous tin browse the nighttime web and open other websites. It basically works on the principal of TOR and is one of the master project of THE TOR FOUNDATION .

Larn more than about Orbot here

Epitome source: Google Images

Learn more virtually Orfox here.

Image source: Google Images

Acquire more about Privly Android App here

Image source: Google Images

What tin can the common human being use?

In full general, ever use VPN, since it creates simulated network or proxies and the hacker tracking you ends up in the location of that false network. One such case is Hotspot Shield.

VPN — virtual private network

Image source: Google Images

Some other method is to apply Bitcoin where ever possible. Payment by bitcoin is past far the virtually successful ways to transfer money online. Money transferred with the assist of the banks are traced and hence violate privacy.

Epitome source: Google Images

This concept, if implemented, will have a neat role to play in our anonymity. I haven't been able to detect out Os with such features till now.

An Effective OS — A Concept:

An Bone for people who hate surveillance of the NSA and governments. An OS for the paranoid and the realistic. The following Techs would make it better than other OS'south:

· It should perform a full Remote Mobile Wipe (with encrypted password)if any of its data is compromised.

· It should provide a Total multi-layer encryption for the users and all other software.

· It should use Tor as a browser. No other browser should be used without routing its network packets through Tor Network

· A full proof Virus detection and counter data stealing methods (I kind of used some of the blackphones ideas hither). A blackphone is a smartphone built to ensure privacy by providing net access through VPN.

· Information technology should ever block PRISM-related software/sites and the definitions for these protocols should be updated from fourth dimension to time

· Identity Creator software (Creates profiles and online identities for faux name and adds pics and bio you select) should be installed to use some one-time services offered by the third party. You tin use these on prism sites.

· A USB's demand to exist verified before utilize with admin Countersign to prevent some other from creating a backdoor into our system.

· Information technology should Automatically encrypt all files and folders as soon as they accomplish the system.

· Preventing software's/viruses from detecting/deleting files and folders

· Automatically password protects files uploaded to the cyberspace and other devices past using a primary password.

· If any PC is connected to the Bluetooth, and then our Bone should internally observe Bluetooth devices in the expanse and if they are suspected of being NSA/PRISM related, and then the user is warned and Bluetooth hacking software will be opened for user to shut down the devices connectivity. All the same, if no activity is taken inside i minute it automatically is hacked. (Don't know this tin can be done from Wi-Fi too)

· Using Automatic VPN/proxies use and Proxies will rotate in a suitable interval of time.

· Free bearding email installed. Tor Mail can be used in this context.

· Anonymous video chat pre-installed- Have not heard about such software beingness implemented.

· Anonymous Torrent programs — The seeders and Leachers from the Clearnet torrent does not allow the TOR to function properly and may terminate up giving our verbal location.

· Wipe PC hotkey and one verification for password and then erases with 40 passes.

· An Anti-animate being force with five tries for password and and then machine wipe or unlock from mobile which has some secret key.

· Anti-remote administration to know what's happening around our organisation when nosotros are non there

· 2d countersign that if entered will erase everything (Anti-fed)

· Warns if the NSA-related hardware is installed or trying to change administrative permissions.

This concept is inspired by a technical word of the dark web.

TAILS Os

We tin can also employ TAILS Os which is a live Operating System designed to directly all your net traffic through Tor, y'all tin use it in a Virtual Machine but it is probably all-time if you fire information technology to a DVD or USB. Tails will go out no trace on the computer you are using and provides all the other security measures.

It will be adept if we all endeavor to larn some privacy rather than not having information technology all.

These methods help usa in acquiring and protecting our personal information. Still, information technology is not possible for all of us to implement these, but we tin can do whatever information technology is in our potential to make our lives more secure, make our world more secure and prove it to anybody else that

Security is not just an illusion out in the real earth.

Other than that, don't be stupid, don't say or practise anything that could reveal the real identity, don't use nicknames, passwords or anything else that you've used on the Clearnet which then could be used to identify you lot.

Simply none of this makes any sense if are you are not intendance full and leave hints of who yous are here and there. Call back, the three letters agencies are VERY good on profiling.

Tags

# security# government

Related Stories

elmorewhatim1988.blogspot.com

Source: https://hackernoon.com/what-is-government-stealing-from-you-a772b8c7df0b

0 Response to "The Creepers Trying to Steal All Your Stuff Again"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel