Privacy Tips for Media Lawyer?

I’m pursuing a career involving privacy, civil liberties, and surveillance from the legal side of things. The laws that govern tech are my professional specialties, but not the comp sci that underlies it.

What would Jow Forums recommend as an above-average privacy setup wherein a) I will need to use a computer, cell phone, Internet, etc. for work and personal use (can’t go tech-free), b) I will likely already be on some form of whatever ‘lists’ may be out there simply by existing in my field, c) I will need to deal with clients worrying about their privacy (attorney client privilege), and d) I will be actively fighting against surveillance advocates / the government on a legal front and would like to keep personally embarrassing or blackmail-worthy habits to myself (porn, less-than-professional private life details).

I know I’m barely scratching the surface of true privacy with my current, fairly mainstream setup (happy to describe it if anyone is actually interested in helping), but what would you consider the bare minimum for this situation?

Also, AMA - I love talking about this stuff.

Attached: image.jpg (900x863, 427K)

Other urls found in this thread:

github.com/mayfrost/guides/blob/master/SECURITY.md
en.wikipedia.org/wiki/Qubes_OS
qubes-os.org/
techsolidarity.org/resources/basic_security.htm
twitter.com/SFWRedditVideos

Get VPN.

use toor.

I use a VPN consistently.

I have used Tor on occasion (mostly to explore when I learned about it). In what circumstances would you use it realistically?

tell me more about your setup pls

>In what circumstances would you use it realistically?
I'm not an expert on the subject but I know when properly set up tor is the way to go if your looking for anonymouty. rms considers it mandatory for everyday browsing

Laptop - only used rarely - is Surface Pro 3 running Windows 10.

Desktop is iMac running latest Mac OS, encrypted drive.

Password manager is 1Password.

VPN is Private Internet Access on all devices.

I do 60% of my digital stuff on my phone, which is iPhone 7 (I know, I know). Again, encrypted backup.

On iOS, I use Brave as browser (TouchID for access), Privacy for credit cards (creates individual credit card numbers that lock to merchants with customizable restrictions), Signal for messaging with sources or for professional reasons, Keeply for encrypted photos, ProtonMail for email, I have a Google Voice # that I use for memberships, stores, etc. along with multiple throwaway / specific-use email addresses, and I’ve locked down my privacy settings on all of my accounts and devices as much as I reasonably can.

Physically, I carry my phone in a Silent Pocket sleeve so that I can slip it into the faraday cage when I don’t want to be subject to IMSI catchers. I cover all of my device cameras when I’m not using them (including electrical tape over my phone cameras) and have a privacy tempered glass cover that prevents side-viewing.

You should really be using Linux. Debian specifically. I would also become well versed in PGP/GPG and communicate with your clients only in emails using this technology. It might be too much work but keep any sensitive files or anything on an airgapped device with LUKS/dmcrypt. Other than that I would say just be careful when doing research and maybe us TOR for that.

github.com/mayfrost/guides/blob/master/SECURITY.md
Good luck.

I'd say switch to a secure linux os to avoid backdoors, same for phones, use an older android with custom rom.

Internet wise vpn+tor is the best by far but will be quite slow so pick your poison

VPN itself, go for mullvad, store quite literally zero logs or any identifying information

Attached: 1512792107349.gif (500x420, 347K)

oh shit.. youre fucked. here's a tip for you... store absolutely nothing in your computer, ever or any hard drive or any storage device that you have access to.

Get a VPS, dont skimp on it, pay for it with cash literally if you can, store your shit in it or alternatively, get a Onedrive account 7z with password whatever files you want to save and upload them to the cloud. What's the benefit?

You literally have no posession of any information on your computers, it means that if whatever reason your shit gets taken, not only is client info not comprimised, its literally not available for anyone else.

That would be the main tip you need.
Secondly, keep your HDD passworded/encrypted, that way, no one can plant anything in it.

You gonna be online on a computer? Don't use password managers. Literally keep a notebook, there is only one or two passwords you should know by heart and those are for the accounts that hold your most important stuff, and that should be no more than two or three accounts.

Use live linux for web browsing, always.

Good start but needs work. If you plan to be serious here's what you need:

Desktop/laptop: no proprietary OS. This is non-negotiable. Recommendation: use a major, non-downstream distro. That means your choices are:
>Debian
>Fedora
>openSUSE
>Arch
>Gentoo

Get rid of Brave, Chrome, etc. Do not use anything Blink-based. That means your options are:
>Firefox (stable or ESR)
>autistic qtwebkit stuff

Get rid of 1password. Use libre password manager of choice *with the restriction that it must be local-only*, in other words, no cloud shit.

VPN needs to be your own on a VPS not hosted in the US.

Now for the phone: the fact of the matter is, iPhones are fucked. It *is* possible to get a specialized Android, but requires massive amounts of autism. Your only option here is a dumbphone - calls only.

Dunno what the fuck keeply is but if they're stored in the cloud consider them datamined and compromised.

Jesus, you should know better than google voice.

Protonmail is fine. Make sure you have pgp on top.

Physical opsec sounds fine.

With all respect, 5/10 OP. You're trying, but you have a ways to go if you plan on doing actually dangerous shit.

This is fucking retarded; do the opposite of this. If you are not able to operate with 95% efficiency without an internet connection you aren't serious about opsec.

Attached: tumblr_oht88rgypb1rna0heo1_1280.png (640x400, 13K)

Daily reminder that only pedos, drug deslers and terrorists use VPN and Tor

Blatant lie, Tor can protect your IP from unwanted creeps and hackers so only pedos say Tor is only used by pedos. And by pedos I mean the NSA.

Attached: 1456792752488.png (2992x2992, 531K)

not user but which password vault would you recommend? I was looking for a offline one with 2facauth via ubikey or some shit but have found nothing.

I wish I could give a recommendation, but I've never looked for those requirements so I can't say. Just remember to verify that there are no cloud-based features and that the code is under a free license.

Attached: 1500851839372.png (592x565, 321K)

Oh well thanks anyways!
I hate how relatively few pure offline vaults there are. Everything has to be in the mystical magical cloud because fuck me if I know, maybe it sells.

This would be so very ineffective in actually being a practicing lawyer. Keep in mind, everyone, that most of my higher-level peers basically just use Signal, a VPN and know that they’ll never be 100% secure. But I just want to go the extra mile because, well, I’ve spent about a decade on Jow Forums (see: paranoid and perverse). So I want a little extra buffer.

I’m fully aware that if I was truly under investigation there wouldn’t be much I could really hide without going full sperg, but I’m just trying to be as secure as possible while still being a normal, professional, normie-presenting person.

Could probably go Linux on laptop, but way too far gone on desktop to turn back. Maybe next time. Also, can’t change phones for a little while - and nearly everyone in my field uses iOS, so I’m hesitant to change it up - my understanding is that people who are quite skilled can make Android much more secure, but that iOS security is stronger than out-of-the-box Android.

See my comments above on OS. For browser, assuming I’m still on iPhone, which would you recommend? Firefox app?

And yes, I feel bad about the Google Voice thing. I don’t use it, it’s just what I give to stores for stupid memberships. I’ve never made a call or sent a text from it.

And, for the record, not doing any dangerous shit - just going to be scrutinized by Uncle Sam and don’t want any glaring privacy holes.

Thanks for the advice, everyone, and keep it coming. This is so helpful. I’m in screenshot city.

>ctrl-f
>no qubes

OP, qubes is pretty much the best solution available for a secure/private personal OS.

en.wikipedia.org/wiki/Qubes_OS
qubes-os.org/

You can self host bitwarden on your personal cloud

I'm the third user.

Let's talk about what you mean by too far gone. I do this for a living (on the opsec side, not the law one) so I might be able to suggest ways of jumping off that train. To address your other concerns:

Apple guidelines require all 3rd-party browsers to use the Apple-branded webkit engine. So every browser on iOS - Chrome, Firefox, the whole lot - is just a reskinned Safari.

iOS is more secure "out of the box" - assuming Ivan in Ukraine is the toughest adversary you plan on facing. It's specifically *less secure* against the US government because of how tied to iCloud everything is. Also look at Cellebrite (sp?) and Greyshift devices - if the municipal police of Bumfuck, Indiana have a commerical-grade iPhone cracking solution, what makes you think it's impossible for a moderately-funded adversary?

If you're serious about this, you'll understand the danger in using GV as a throwaway number. A very clear picture can be extracted from what services you sign up for that you don't want to be spammed by. Not to mention it is certainly associated with your shadow Google profile, even worse if you have a real one.

This is good, but a little difficult and annoying for the non-technical. IMO usability is crucial and telling people to jump in head-first (especially people in such a sorry state as OP) can be off-putting.

Attached: HI0AtBm.gif (540x408, 1.48M)

Sure it's more difficult, but in this case i think it's better not to compromise, having something easier to use but more vulnerable. Also, you can run a windows container inside qubes (office, etc)

>t. senile boomer who knows nothing about modern technology

When I say too far gone, I mean the time and energy it would take to migrate would be enormous - and I don’t have it. Also, migrating away from mainstream software for day-to-day administrative (non-sensitive) data would be professionally difficult.

All of the advice has been superb - and I’ll ditch the GV account tonight - but what I’m mostly looking for is the change or security step that I can take that will a) not impede a regular, mainstream workflow, and b) give me the biggest increase in privacy / general security.

I think I can give a few tips
> 1. Get rid of surface pro 3, and maybe even your iMac, get a librebootable laptop.
Reason being all intel and amd chips past the core 2 duo, have a mini computer of sorts within the motherboard or CPU running minix, allowing backdoor, ring -3 access to intel/amd and anyone they share with. This includes complete network, hard drive, and ram access, without your knowledge, even whilst your computer is sleeping.
> 2. Personally manage your passwords
It's never good to keep your passwords on somebody elses server. You never know if they are lying to you, and secretly have the key to your passwords. Either remember them or hold them in a little notebook that never leaves your persons. Maybe even manually encrypt the data in the notebook incase it gets stolen.
> 3. VPN is good, but TOR is better.
Same as in #2, your VPN provider could be lying to you, or be under NDA, and secretly sharing data with other companies.
> 4. Nothing you can really do about phones. Wait for the librem 5 phone to be released maybe? Otherwise, the best you can do is get an android and install copperhead OS on it.
> 5. Don't use TouchID
If you are captured, they can easily force you to unlock your device, just by taking your fingerprint. It can also be used to prove the phone is yours.

This is all of course assuming they won't torture you to get information out of you.

I want to work for top security clearance jobs and I don't want them to know that I say niggers online ironically. I've pretty much accepted the fact that they probably do

why do you want to protect enemies of the public?

There is no credible evidence that the vast majority of domestic surveillance has an impact on your safety.

Would you be comfortable with federal agents living in your home, watching you? If not, consider being told that every digital message you send or receive, every bank statement, every porn site, every late-night embarrassing search - they are likely all being collected (even if just to filter for selectors, which is a flimsy claim).

I could explain other aspects of the issue that are highly problematic, but my biggest pet peeve is “well, if you have nothing to hide...” - it is the shibboleth of stupid people.

use either the trim conversation or disappearing messages features on signal; you don't want thousands of lines of text sitting on your device at rest.

VPNs are honestly laughable with NSLs being handed out like candy.

run a tor relay by the way.

i have nothing to hide

You wouldn't want to lose freedom of speech even if you have "nothing to say".

"Nothing to hide" means nothing

Where did you get a customisable credit card?

Check out Privacy dot com, it’s largely intended to prevent fraudulent charges, but is an added feeling of security knowing that my card isn’t so clearly linked to everything - though theoretically it’s still my bank account, so it’s still traceable by gov entities for sure. Can’t hurt on a consumer privacy level, though.

This.

Except those which don’t log have been shown in federal court to protect identity. There are documented instances of investigators testifying that, upon presenting NSL’s, certain companies were physically unable to provide user activity due to a lack of collection. Warrant canaries also exist.

Number one: fix your non-mobile OS. Pick something open and stable. No Windows, no OSX.

Number two: fix your cloud habits. Everything local and encrypted.

Number three: fix your mobile. Best option is to get rid of it. Second best is to use it only for calls, in which case a dumbphone suffices and you won't be tempted to install apps. If you insist on doing mobile computing, invest in a specialized Android device (Copperhead, custom Lineage).

I hope this helps you if you're still around OP, or anyone else.

Attached: tumblr_oiksrnBbGN1vla7ouo1_500.jpg (500x313, 42K)

There's already a checklist for this techsolidarity.org/resources/basic_security.htm

You don't have privacy so long as there are devices in your home capable of recording video and audio, and/or connecting to other devices over the air or through the internet via a router, modem, or even cellular modem. You want real privacy? Buy laptops and phones that have removable batteries. Remove all the batteries and power cables when you want privacy. Tear down every single one to make sure there isn't a second battery.

Also, stop having things to hide. Stop watching porn. You really wanna disarm your political opponents? Don't do dirty things. Be a good and honest person. I've had people ask me to modify firearms for them because of the tools I own. Did I do it? No. I've had people try to sell me all kinds of illegal substances. Did I buy them? No. I'm as clean as a whistle. I pay my taxes and I've never had a traffic ticket. There's nothing to blackmail me with. And that's why I'm a winner, and people like you who participate in this illegitimate talmudic legalism are all losers. I'm playing the long game. Feds would have to cut thier own balls off and sacrifice a trillion goats just to touch a single hair on my head. They know it and this infuriates them. But you make yourself an easy target because you can't stop beating your meat.

Attached: 1492062046316.png (466x451, 278K)

Libreboot x200 with parabola for a laptop and for the upcoming phone get a librem 5.

>that 30 year old boomer asking the 10 year old millennials on how to computer

Op here - thanks for all of the tips. Very helpful. Cheers!

warrant canaries are useless and are equivalent to just explicitly stating you've been subpoena'd.

specific cases of XYZ not being able to produce ABC doesn't matter; there's no actual anonymity, lack of data retention, etc. built into the specification so you're relying on DEF doing what they're saying they're doing. And again, with NSLs being handed out like candy, there's no reason to trust these unauditable entities; I can have no idea whether they've been compelled to keep logs from now on for a specific user, or hardware has been placed in their data center, whatever.

Maybe if you're using some bulletproof host in fucking China and trading the US's prying eyes for China, or you're using a hacked box, but that's not really what we're talking about here.

It's just a false sense of security.

Coppherhead is dead.

Yeah, there's the legal shit but thestinger is a damn good dev. He's just strapped for cash right now, but somebody like that always comes back to making good software like a moth to a flame.

Attached: 1508817043984.jpg (1280x960, 338K)

don't be mean about FBI agents

>why do you want to protect enemies of the public?
Mate he's working against government agencies, not protecting them.

Attached: 1489128479008.jpg (480x318, 24K)

>Also, stop having things to hide. Stop watching porn. You really wanna disarm your political opponents? Don't do dirty things. Be a good and honest person. I've had people ask me to modify firearms for them because of the tools I own. Did I do it? No. I've had people try to sell me all kinds of illegal substances. Did I buy them? No. I'm as clean as a whistle. I pay my taxes and I've never had a traffic ticket. There's nothing to blackmail me with. And that's why I'm a winner, and people like you who participate in this illegitimate talmudic legalism are all losers. I'm playing the long game. Feds would have to cut thier own balls off and sacrifice a trillion goats just to touch a single hair on my head. They know it and this infuriates them. But you make yourself an easy target because you can't stop beating your meat.

Honestly this isn't bad advice.

It absolutely should not apply to any regular person - privacy *should* be a fucking reasonable expectation (it's not, but it should be).

However for someone in OP's position, an investigative journalist, non-profit, lawyer working in tech/surveillance... Good advice to follow. This is the equivalent of blocking all side-channel attacks (character assassination, blackmail, etc). It won't help if the alphabet soup agencies are just going to straight up murder you or put a bomb in your car, but if they actually maintain even a modicum of humanity and only attack you through legal means or "personal" attacks (like blackmail, nothing physical), this kills all the "personal" attacks.

Also requires that every single fucking device you own is fully encrypted with AES-256 or some other scheme that would take billions of years to crack with current computers - not just to keep your data in, but also to keep planted data out. The FBI has one of the largest collections of child porn of any agency or group in the world, and I guarantee it's not just for "image verification".

Attached: 1514940786825.jpg (239x340, 51K)

Cut Wangblows out of your life completely. Install a Linux distro or OpenBSD which is secure by default. You can encrypt everything via Xubuntu and OpenBSD's default install.

I2P is the most secure since it was designed with privacy in mind unlike Tor, but Tor has more content.

Dual authentication is cool. You can use a card or USB dongle and a password to log in. That's more physical security, so whenever somebody comes into your place of business and wants to log on to your computer. If they don't have both of those things, then they're SOL.

Use VeraCrypt for encrypting files. It does plausible deniability as well as encryption.

Use an encrypted phone, rooted. Android, of course. Maintain physical security of it at all times, and encrypt everything. Replace all Jewgle bullshit with F-Droid, the Yalp Store, and Open GAPPs.

Have a VPN provider in a country not in the fourteen eyes if possible, and if it's in one of the five eyes countries, then the VPN is botnet.

Don't use fucking Brave, use IceCat. Failing that, use Firefox. Use NoScript and uBlock. Signal uses Jewgle servers, use Noise or Silence. I use the latter, but both should be fine. Riseup and Tutanota are as good as ProtonMail. Conversations is also great. Also, if you want to be a cheap nigger, you can use a bunch of aluminium foil as an extremely effective Faraday cage. I think the privacy glass is a bit much - you shouldn't be discussing sensitive information in a non-secure (i.e. public) area. All you'd be doing is killing your viewing angles.

Doubtless, there will be a few shills that will tell you that the best option to keep the NSA out of your life is to not attract their attention. This is a fucking lie, don't believe them for a fucking second.

Also, don't use proprietary software if you can help it.

Oh, and Microsoft, Google, and Apple work with PRISM. Cut them out of your life as much as possible. Also, help out the networks who protect others! Run a Tor node/relay, an I2P router, anything.

Replace the firmware on your router and laptop. The former is really easy if you have a compatible router, and the latter mitigates the use of proprietary dogshit.

One last thing - read the fucking sticky, there's a lot of good information under the Fucko and Anonymizing Yourself articles in the wiki.

>You really wanna disarm your political opponents? Don't do dirty things. Be a good and honest person.
Naive.
Really, those bastards can plant stuff on you as easily as anything. Unless you can have security strong enough to make it not worth your while they can hack into your stuff and "find" CP, ISIS propaganda, stolen credit card numbers, confidential documents and things that any sane person would want hidden.
You can't afford to be passive. You need to be seen to be pro-actively beneficial to society. You need to be clean enough that mud won't stick.
You'll note that there aren't many people who achieved this. Even Mother Theresa had her detractors.

This is bullshit, don't listen to this guy.

Encryption is secure, and don't keep your fucking passwords in cleartext on LITERAL PAPER if you don't want your passwords stolen. Remember: physical security is the easiest for LEAs to break, and the ones that they are legally allowed to do so in almost all circumstances.

And with keeping your shit on "the cloud" - fucking seriously? OneDrive is owned by Micro$hit, who cooperates with the NSA in PRISM, and is inherently insecure because YOU don't have the data. Modern encryption is 100% secure and will be well into the foreseeable future. Therefore, just keep your shit on encrypted drives and use VeraCrypt for plausible deniability.

Warrant canarys are a thing, too. If a service you use hasn't updated theirs, it means they got a gag order and you should fucking run to another one.

Oh, and spoof headers for your browser. I use Blender, but it hasn't been updated in a while. You can use Panopticlick to get a rough picture of how well you've protected yourself.

VPN and Tor is ridiculous, Tor is secure if you're not a mouth-breather. Just read the fucking first page and use NoScript how it was intended to be used.

It might be, but I think I remember reading something about tor not being fully inpregnable, plus its and added layer of security when you need it, this is by no means a daily driver

The only way Tor is penetrable is if LEAs have a mental FUCKton of nodes. That vulnerability was back in 2014 or something, and has since been fixed.

Also, I think the Tor developers said that VPNs would decrease your security, not increase it. I might be wrong, though.

And by fuckton, I mean over 80% of the network. It’s just not possible, even for them.

Is this bait? I don't think it is bait, I think the poster is serious, just look at how many words he put in

nsa pls go

>>>>> normie
Never gonna make it. If you aren’t serious, why even ask?

>cmd + f "usbkill"
>0 results

Did no one learn from the silk road guy? Mini USB drive on a lanyard attached to you somehow, especially in public.

> dumbphone
Even more botnet than a smartphone DESU.

>MUH FREEZE PEACH
>>Jow Forums