Social engineering and your behavior
Blend in with the crowd, disperse into the stream. Keep a low profile. Don't try to be special.
Don't try to be a smart . Feds are many. Heroes only exist in comic books keep that in
mind! There are no old heroes; there are only young heroes and dead heroes.
DO NOT DO THE FOLLOWING:
*Include personal information in your screen name.
*Discuss personal information, your address or where you're from.
*Mention your gender, tattoos, scars, piercings, body modifications, your weight or your
physical and/or psychological capacities (got the idea?).
*Mention your profession or hobbies or involvement in other activist groups.
*Mention whether you're in a relationship.
*Use special characters, which are existent only in your language, as they would reveal where
you are from.
*Give even bogus info. Lot's of no's, make a yes.
*Blend anything from your real life.
*Mention congresses that you have been at, schools or universities, etc.
*Mention your time zone, this can reveal where you live.
*Connect at the same time regularly. Try to alternate.
*Post on the public net while you are in the IRC, and definitely do not mention that you are
posting something on Twitter. This is easy to correlate. Stagger your loging & log out times on
FaceBook, Twitter & IRC.
*Discuss whether you are personally Do Sing or writing How-To’s or making graphics etc. or
not, just discuss general strategy.
*Post pictures hosted on Facebook. The filename contains your profile ID.
I am personally using Firefox. Google Chrome to me is **** and I've had a few problems before.
Firefox is the BEST.
Useful (mandatory) plugins/extensions for Firefox. You MUST have these.
I personally use all these plugins, they are excellent.
*Plugins & extensions for Firefox
Better Privacy (Removes persistent cookies from flash stuff >> *.sol)
AdBlock Plus (blocks Ads)
Element Hider for Adblock Plus
Ghostery (Protect your privacy. See who's tracking your web browsing and block them with
TACO (More adblocking)
RefControl (Control what gets sent as the HTTP Referer on a per-site basis.)
WorldIP (flag and datacenter, ping and traceroute)[/color]
(REAL location of web server,IP,Datacenter,Ping,Traceroute,RDNS,AS. Often shows different
countries from similar add-ons,because it is based on data from core routers worldwide,and
not on whois data.Real Google's data centers. Providers looking glasses.)
Flagfox (Shows the flag of the website)
GoogleSharing (GoogleSharing provides a level of anonymity that will prevent google from
tracking your searches and web activity.)
Scroogle.org (lets you search with Google anonymously).
User Agent Switcher (Sends bogus browser identity to servers.)
HTTPS Finder HTTPS Finder automatically detects and enforces HTTPS connections when
available. It also provides one-click creation and in-browser editing for HTTPS Everywhere rules.
Download TOR Download Torbutton for Firefox (enable or disable the browser's use of Tor)
• Make sure your cached data is securely destroyed before re-starting firefox by the following
'debug' procedure - you'll need to go to Start > Run and then open 'cmd' for Command Prompt.
Use as many security layers as possible. The question is not whether you are paranoid, but
whether you are paranoid enough? A good start is to use a VPN A proxy will also do, but it is
not as secure as a VPN. Always use as many security layers as possible. Make sure to use
them in the right way. If you don't know how to use them, learn first.
When thinking of a VPN service, think first about the legislation of the country. A USA VPN
might provide user data upon warrant issue. In other countries such as Sweden and Iceland,
enforcement agencies to get access. In addition, some servers do not keep logs of users. Also
try to get VPN services that accept anonymous payments (For those that keep user billing
More info: https://secure.wikimedia.org/wikipedia/en/wiki/Vpn
Free VPNs - Not recommended. If they aren't selling you a service they are selling you.
http://hotspotshield.com - Occasionally hijacks your traffic to redirect you to advertisers.
Use the proxies in conjunction with a VPN. *IMPORTANT*
Commercial VPN providers
http://www.bananavpn.net > logs IPs
http://www.strongvpn.com > logs IPs
Portable software is a software which you can run from an USB drive, so that it leaves almost
no traces on your computer.
NOTE: I will not go into details in here as I never tried it but it is a really good information to
The PrivacyBox provides non-tracked (and also anonymous) contact forms. It is running
primarily for journalists, bloggers and other publishers. But it is open for other people too.
Think about an electronic mailbox. https://privacybox.de/index.en.html
Security is a continuing process, not a state. Do audits on a regular and scheduled basis. And
do encrypted backups. Backups are important, as there are two types of people, those who
have backups and those who have lost their data.
Use the operating system you are familiar with (Linux and Unix are better though)
Uninstall everything you not need.
Disable all remote tools.
Shred or encrypt /temp, /var/temp and all world-readable files.
Use Linux for activism purposes. Inside Linux use virtual machines. Use truecrypt + removable
devices + hidden volumes if you plan on reusing a virtual machine more than once. - This is
just for those who have knowledge of Linux.
Encrypt your hard disk ( Truecrypt: http://www.truecrypt.org )
Never ever keep logs.
If you detect any unwanted activity INSIDE your computer, shut down the Internet, and reinstall
If you think your router might have been hacked, contact your ISP at once, reset it, and/or
reinstall its firmware or buy a new one.
I hope that you guys found this ''tutorial'' useful, as it is intended to be with information that
Feel free to ask anything, for any changes