Categories > Etc > Software & Hardware >

[Answered] How to not get dox? How to keep your accounts online safe? The ultimate privacy guide


New Reply

Posts: 2

Threads: 1

Joined: Mar, 2023

Reputation: 0

  • 0

Posted

The content of Privacy Taj is big so I won't be able to just send the text here. P.S I made it on my own and posted it to my server (Not advertisting) so please if you repost give credits.

 

Download

 

Quick Previews

Obsidian - https://i.ibb.co/3pwSPWp/51251252521.png

Discord Forum Post - https://i.ibb.co/WHxShF9/6426266.png

Posts: 213

Threads: 13

Joined: Dec, 2017

Reputation: 25

  • 0

Replied

While the explanations provided are good for an introduction to said topics, I wouldn't say it's 100% the ultimate privacy guide.

Tails is mentioned throughout the guide, but is a very clunky solution to use for long periods of time. Tails is meant to be an offhand operating system; loaded when the user needs to be sure all traffic is being anonymized. This is fine for doing the occasional Monero transaction, but the distribution not being intended for primary usage is a bit of a holdback. Instead, Qubes OS can be used if you are going down the path of total security, as every application can be configured to start its own virtual machine, and every virtual machine can individually be configured to network uniquely.

In the guide, you recommend using a USB drive to boot tails, but concerns of the NAND flash chips on the drive decaying from harsh usage should also be an issue. Qubes OS can be installed to a standard hard drive or SSD, both of which have a much longer lifespan and can withstand long term encryption and decryption cycles better than chips on a USB.

https://blog.torproject.org/tor-heart-qubes-os/

To shut down quickly and easily, encryption should already be configured on your boot drive, with a strong password used. A Linux udev rule can then be used for physical USB actions (ex, unplugging or plugging in) like a wireless mouse dongle or USB drive. This rule can be anything you want such as writing over ram and shutting down to even nuking the drive entirely by deleting the LUKS header. Deleting this header will make the drive unrecoverable, even if your adversary knows the password, as the password hash and random salt used for encryption is deleted from the block storage itself.

For messaging, if you want to go 100% of the way, Briar should be your only consideration. Briar directly peer to peer, not using a centralized server for any message transaction. These transactions take place over the tor network, if on the internet, and over Bluetooth or local Wi-Fi if internet connections are a concern. Messages are only sent when both parties are online, and are held on the sender's device when offline.

There's probably some other stuff I could talk about in the future for this guide, as an ex mod and I named Texas have basically done most of what this guide details at some point in time.

NZXT H510i, MSI X470 & 650W PSU, 1TB Crucial MX200 SSD
Seagate 1TB HDD, EVGA RTX 3060ti
Ryzen 5 5600x, 2x16GB Corsair @3600Mhz


New Reply

Users viewing this thread:


( Members: 0, Guests: 3, Total: 3 )