Cyber Security questions

Hey anons,

I am a cyber security brainlet. I wanna start improving my awareness skills and not get tracked by (((them))). What browser, search engine and VPNs do you guys recommend?

I sure could use some help, I have no idea, and you guys are literally the best source of like minded people I can find.

Thanks in advance

Attached: sparde.png (400x400, 32K)

Other urls found in this thread:

gnu.org/distros/free-distros.html
twitter.com/SFWRedditGifs

Too late, I interned for the NSA. The fact you already connected to the internet means it's over

Of course user, but surely using Tor and meme search engine like DuckDuckGo would be a good start right? I using Trisquel atm and gnu icecat as my default browser. Would the change for a more secure browser benefit my goals?

Btw user, how did you landed that NSA internship? I'm legit curious. WEre you in the military?

Yes it's a start but the NSA by law doesn't hold data and instead your ISP and other services you use online does. So at any point they can request your data from up to 3 months and build your profile as such.

>how did you landed that NSA internship?
I did data science, I'm not a CS major nor was I in the military but I did apply and showed them the research that I did was very math and data intensive. Then I had to take a test (they tell you what to study for mainly) and then the interview

Fascinating stuff user. Really.

Would the use of the Tor browser circumvent the profiling my ISP has on me?

Also what would you reccomend for me to use, not get tracked (or at least try not to) while browsing online? I am currently working on my MsC. and I use the web extensively.

Many thanks

Attached: proxy.duckduckgo.com.png (683x601, 47K)

Duckduckgo is compromised
1. Its owned by a jew
2. Its based in the usa > nsa and fbi has access
3. For a couple milliseconds when loading u get unsecured http leaking your search (try it yourself)

Use startpage and Tor
If you use your home network u dont need a vpn for Tor, except if Tor illegal to use in your country (which its probably not) or you have mandatory data retention laws

I live in a kinda liberalish european country. Tor is not blocked here by any means.

Also I was searching for these awsers on the installgentoowiki but could not find shit, nor a list of Jow Forums approved software. Thanks for your reply mate

Attached: fug.jpg (917x708, 125K)

If u want the most security with little effort just use Tails, the Tor operating system with default settings and 1000x1000 window

If u have a intel cpu built after 2011 u have Intel Management Engine which may be a NSA/Mossad backdoor
There are librebooted old thinkpads that have this removed for sale on the web

Amd is probably not any better, and has nsa backdoors too
Your not hackproof but u can make it much harder for them if u use Tails at least

>Would the use of the Tor browser circumvent the profiling my ISP has on me?
I don't know, I only managed the data. I have no idea how they collect since I didn't have the clearance for it
>Also what would you reccomend for me to use, not get tracked (or at least try not to) while browsing online? I am currently working on my MsC. and I use the web extensively.
Honestly, Tor, tails, startpage, like other anons here say. I've effectively given up

I'm using an HP desktop atm with a post-2011 i5 unfortunately. I dunno if I can libreboot this shit, but I'm highly considering it.

About the thinkpad, I own a t400 which I librebooted myself thanks to you guys here in Jow Forums. Unfortunately I'm using kubuntu on that shit, so I might reconsider changing OS to tails like you've mentioned.

I've been using Trisquel so far on this PC so far and I was satisfied, but as of recently I started going paranoid for some reason lol.

Yeah, I know I am not hackproof, I just want to have stronger defenses instead of acting like the brainlet I have been so far

Attached: 1385945513535.png (1130x840, 188K)

Alright mate, I guess that's fair, those were some nice tips anyway.

Thanks

Attached: ocelot.jpg (1400x827, 321K)

nobody gives a fuck about you
nobody is going to waste their time to hack your shit and copy your kiddy porn stash

You probably cant libreboot it
If you have no idea what youre doing id suggest buying a laptop already librebooted from a trusted source
It requires disassembling your laptop and putting clips on a specific chips and connecting it to a raspberry pi to flash it, and it might brick your pc
Also you cannot fully remove management engine on your cpu

Jokes on you you filthy kike, I don't watch the degenerate stuff your race produces.

Seriously can't wait for the day of the rope, and see you kike shills hanging

Attached: kikes.jpg (999x1364, 160K)

Yeah I don't think I can either. My desktop is a HP 8200 which I bought from ebay. The only mod I did to it was upgrading its RAM speed.

Btw shall I continue and try to use as much FOSS as possible? I dunno really, man. I think I am trying to hard. But at the same time I am the kind of guy that wants to be as clean as possible when it comes to this shit

Attached: hitler.png (627x554, 123K)

Dude, libreboot isn't going to stop the feds from finding out about your school shooting plans.

Yes continue with the FOSS meme, get a good linux distro
Here are some recommended by richard stallman
gnu.org/distros/free-distros.html

Some of them are arch based. If you want a challenge try to build your own arch setup

Use Tor

Thanks man those are some good tips.

I've been using Trisquel on this desktop mainly because of the FOSS meme, and whilst I am still kinda used to Ubuntu I admit it does its job.

Thanks for your replies and not thinking this was a troll thread.

Ubuntu is not 100% free btw

But trisquel is

Metadata can be used to associated relatively unrelated events.

One IP with two usernames collected, those usernames are used on different IPs, those IPs are now associated together with those usernames, and any activity on said IP addresses are now linked to those usernames. Any time you use a username and hit a tracker, your activity is recorded to your metadata profile. The collection agencies know more about you than you probably remember about yourself, even if it's just metadata. Any time you've used those IP addresses or usernames, and were on a gps enabled device, it's likely your location data is compromised as well. It's also likely that your ISP collects metadata as well.

It gets worse, if you consider hardware based profiling can also narrow down almost to a point where its directly isolating down to your machine.

There's not much you can do about your past, but you can completely disassociate yourself from your past as best as possible. VPN or VPS in a non-collecting country is the best start, although your ISP will immediately tag you as using a foreign IP address constantly. TOR is potentially an option, but again many of the nodes are recorded and your ISP will have records of using those IP addresses. While your ISP may not work directly with collection agencies, there isn't much they can do when they come knocking. Using TOR is not incriminating by itself, but it can be used as a point of data in a way to incriminate you for other crimes.

The only way I think you could actually 'disappear' is if you move to a non collecting country as a nomad, renouncing your citizenship.


>>>>TINFOILHAT.JPG

Switzerland, iceland, finland and norway are good countries to use a vpn in
Norway is a 14 eyes country but has no mandatory data retention
However i think the norwegian cia niggers and military keeps track of who uses tor, but that shouldnt be a problem with a vpn
Though id recommend saving your money and connect directly to tor for your daily browsing

That was a great explanation man. I've read about that as well, but you summed it up very, very well.

Which VPN software should I use? And which VPN servers shall I use when using that software? What I meant is, after having my VPN software running, where can I find decent VPN servers?

I get that paid VPNs are better, but If a legal authority like the feds told that they needed info on me, they would disclose it right away, right?

Attached: 1455475751246.gif (482x800, 29K)

There's also the thought of tunneling through a common interface to obfuscate your destination. If you had a server that uses cloudflare or some other similar legitimate purpose proxy system. Your ISP can only see you connecting to the cloudflare service, which you could then use the server as a base of operations to bring data back and forth. You'd truly have to trust which ever service you use, though, as they can just as easily collect your routing informaiton. It's basically the same concept as TOR, except legitimate business.