wowana.me

website source; use git clone git://wowana.me/wowana.me.git to clone this repository.


staying-safe-online.md (6428B)


      1 # staying safe online
      2 <!--[time 201908240015.20]-->
      3 
      4 this is an E-mail I typed out and figured it'd be fitting as its own
      5 public post:
      6 
      7 > If you want the closest thing to true anonymity from software
      8 > perspective, I'd suggest Tails because it's pre-configured to proxy
      9 > everything through Tor. It can be run with a live CD / USB on bare
     10 > metal, or it can be used in a virtual machine of the user's choosing
     11 > (personally I use qemu for Linux, and I think virt-manager is a GUI
     12 > frontend for it, but a lot of people may have heard of VirtualBox
     13 > which is cross-platform). Even I use Tails for certain things
     14 > although I consider myself to be proficient and able to set up my own
     15 > anonymous system; sometimes it isn't worth the trouble when I need to
     16 > be sure that my system is safe, though.
     17 > 
     18 > If you want an "everyday setup" where anonymity isn't key, but you
     19 > still want security and casual privacy, drop Windows in favour of
     20 > Linux, and grab the Tor Browser if you want to browse the Internet
     21 > through Tor (not limited to onion websites, which seems to be a
     22 > misconception for people "exploring the deep web"). Steam can play a
     23 > lot of games in Linux, Wine can run many Windows programs, and as a
     24 > last resort, a user can set up a Windows virtual machine or set up
     25 > dual-booting (although from my understanding, Windows can fuck with
     26 > dualboot partitioning, so this might be an advanced topic. Personally
     27 > I don't trust Windows with hardware access at all, anymore). One big
     28 > issue (that unfortunately I have to face as well) is NVidia graphics
     29 > support in Linux. The best solution to any NVidia issues is to replace
     30 > the NVidia GPU with AMD, because AMD ships open-source drivers, or, if
     31 > the user doesn't do much gaming then it's likely fine to just use the
     32 > integrated graphics from the CPU. It's an unfortunate fact that NVidia
     33 > is very anti-consumer; if I had other suggestions you'd bet I would
     34 > say, but my friend and I (and many other people) have had nothing but
     35 > issues with NVidia.
     36 > 
     37 > For additional safety, no matter whether you use Tor Browser in
     38 > Tails, or Tor Browser in Linux, or even a normal browser in Linux
     39 > like I do: I strongly suggest disabling JavaScript by default for
     40 > sites you don't trust. In Tor Browser, it's as simple as clicking the
     41 > NoScript icon in the toolbar to whitelist a website. There was a
     42 > NoScript bug found not too long ago that allowed sites to bypass
     43 > settings regardless, but this has since been fixed and hopefully
     44 > there will not be similar incidents in the future. This is why I
     45 > strongly dislike modern Web browsers; they're too big to make sure
     46 > that they're entirely bug-free. (I personally use uMatrix instead of
     47 > NoScript, because it's much more configurable and can block more than
     48 > scripts, but it's probably not best to suggest in a "basic tips"
     49 > YouTube video.)
     50 > 
     51 > Like I said in my previous E-mail, a VPN does not help with anonymity
     52 > in any way. You can still stick in that sponsorship for PIA if you
     53 > make clear it's only to keep users' Internet activity away from
     54 > *their own ISP*, and it gives them a different IP address perhaps in
     55 > a different country, if they so choose. This can be useful for
     56 > accessing region-locked websites, for instance, or for casual privacy
     57 > to prevent other people from finding someone's home IP address. The
     58 > VPN can still see and track all users' activity, but my opinions of
     59 > PIA aside, I believe from a business standpoint they will be very
     60 > careful about what they do with user information. Just know though,
     61 > depending on what country a VPN is based in, they might be forced to
     62 > comply with requests for user information by law.
     63 > 
     64 > Enough about software; usually people are able to follow along until
     65 > it comes to something scary: they aren't safe until they change their
     66 > own behaviours as well. I was taught one thing as a kid, practically
     67 > every year in school there was a poster or a computer lab teacher
     68 > telling us "don't share your personal information with strangers
     69 > online". This seems to have been forgotten with the rise of social
     70 > platforms that encourage or require users to use their real info, and
     71 > it's really sad that things have taken a turn for the worse in this
     72 > regard. Even before I knew what Tor was, I never gave people so much as
     73 > my name, and to this day, while I did say some dumb shit in my early
     74 > teenage years (who hasn't done things before that seem foolish to them
     75 > now?) I can at least say I don't regret how I handled my personal
     76 > information during all these years. Nowadays, the Internet is a more
     77 > hostile place, with more people understanding the power of "big data"
     78 > and keen on collecting user information, with all the serious threats
     79 > regarding IoT security vulnerabilities (allowing for large-scale DDoS
     80 > attacks for cheap, or potentially worse attacks against the devices
     81 > themselves). So, it's more important than ever not to give anyone any
     82 > information that one might regret sharing later.
     83 > 
     84 > Keeping a healthy amount of scepticism toward other users and services
     85 > online has always been a rule of thumb as well, albeit one that's lesser
     86 > talked about. (It's normally brought up by school librarians and English
     87 > teachers, who urge students to ensure that their citation sources are
     88 > credible.) A lot of people especially on Tor phrase it as "don't trust
     89 > anyone" which is an imprecise piece of advice. It might be good advice
     90 > for people who don't yet know what signs to look out for that tell apart
     91 > a normal user from a con artist or a federal agent (and federal agents
     92 > are perhaps best-equipped to produce convincing cover identities). I
     93 > don't open up to many people online, but I have definitely made at least
     94 > a couple real connections with Tor users. A lot of people, I don't
     95 > *need* to trust, such as the people I ask to join the moderation team on
     96 > Hidden Answers, or others I ask advice / questions from, for instance.
     97 > In the former case, I give moderators just enough access to the site to
     98 > do their jobs, and if a rogue moderator happens to slip through, the
     99 > damage is normally easily reversible. And we have had some cases of
    100 > rogue moderators -- usually just scammers who abused their position for
    101 > extra credibility, though. In the latter case, I can use my own logic to
    102 > verify whether someone's advice sounds reasonable, or I can cross-verify
    103 > with other sources.