Send CathInfo's owner Matthew a gift from his Amazon wish list:
https://www.amazon.com/hz/wishlist/ls/25M2B8RERL1UO

Author Topic: Internet and E-mail Privacy  (Read 5725 times)

0 Members and 1 Guest are viewing this topic.

Offline MyrrhTree

  • Newbie
  • *
  • Posts: 36
  • Reputation: +15/-0
  • Gender: Female
Internet and E-mail Privacy
« on: November 03, 2015, 04:51:44 PM »
  • Thanks!0
  • No Thanks!0
  • Hey Everyone,

    For a while now, I've been so disturbed by the NSA's violating people's privacy rights, big search engines (Google, Bing, Yahoo) monitoring internet searches, and free E-mail servers (Google, Hotmail, etc) that collect my message data.

    After doing some research, I've found some alternatives. Here are some search engines that do not track or collect your internet searches :detective:: https://duckduckgo.com
    https://www.ixquick.com

    Also, I found some private e-mail services; however, they are not free. Their prices vary:
    https://www.hushmail.com  
    https://www.startmail.com

    I hope this helps<3 Take care and God bless.

    MyrrhTree

    "God is Love, and those who live in love live in God and God lives in them" 1 Jn 4:16


    Offline Kephapaulos

    • Full Member
    • ***
    • Posts: 1809
    • Reputation: +457/-15
    • Gender: Male
    Internet and E-mail Privacy
    « Reply #1 on: November 03, 2015, 10:47:56 PM »
  • Thanks!0
  • No Thanks!0
  • Thank you, MyrrhTree. I'll make sure to look at those linked websites.
    "Non nobis, Domine, non nobis; sed nomini tuo da gloriam..." (Ps. 113:9)


    Offline HiddenServant

    • Sr. Member
    • ****
    • Posts: 2839
    • Reputation: +75/-2
    • Gender: Male
      • h
    Internet and E-mail Privacy
    « Reply #2 on: November 21, 2015, 05:44:27 PM »
  • Thanks!0
  • No Thanks!0
  • Ty for this. Looks real good.

    Offline HiddenServant

    • Sr. Member
    • ****
    • Posts: 2839
    • Reputation: +75/-2
    • Gender: Male
      • h
    Internet and E-mail Privacy
    « Reply #3 on: November 21, 2015, 05:46:39 PM »
  • Thanks!0
  • No Thanks!0
  • Slimjet i use and it is good so far.

    Offline JohnAnthonyMarie

    • Full Member
    • ***
    • Posts: 1297
    • Reputation: +603/-63
    • Gender: Male
      • TraditionalCatholic.net
    Internet and E-mail Privacy
    « Reply #4 on: November 22, 2015, 08:12:44 PM »
  • Thanks!0
  • No Thanks!0
  • If I may, let me attempt to assist with a general understanding of TCP/IP.  Every packet you transmit and receive is composed of two basic parts, a header and the payload.  The header contains the source and destination of the transmission, the payload contains data.  You can not hide these things, they are part of the protocol.  The payload data can be encrypted to some degree, but the public is generally prohibited from using any quality encryption.  Now, if your clever, you can attempt some custom scheme to encrypt your data (i.e. bitshifting, hashing, symmetric and asymmetric, etc.), but I can guarantee there is literally no way to conceal what you are doing online.
    Omnes pro Christo


    Offline Mark 79

    • Supporter
    • *****
    • Posts: 9573
    • Reputation: +6262/-940
    • Gender: Male
    Internet and E-mail Privacy
    « Reply #5 on: November 27, 2015, 01:33:28 PM »
  • Thanks!0
  • No Thanks!0
  • Quote from: JohnAnthonyMarie
    If I may, let me attempt to assist with a general understanding of TCP/IP.  Every packet you transmit and receive is composed of two basic parts, a header and the payload.  The header contains the source and destination of the transmission, the payload contains data.  You can not hide these things, they are part of the protocol.  The payload data can be encrypted to some degree, but the public is generally prohibited from using any quality encryption.  Now, if your clever, you can attempt some custom scheme to encrypt your data (i.e. bitshifting, hashing, symmetric and asymmetric, etc.), but I can guarantee there is literally no way to conceal what you are doing online.


    I have been curious about Blackphone: https://silentcircle.com

    Phil Zimmerman, formerly of PGP fame, is a principal in Blackphone.  When PGP transitioned from open source to proprietary, I understand that a "back door" was inserted, so I wonder if it s the same with Blackphone.

    Any speculation?

    Offline Mark 79

    • Supporter
    • *****
    • Posts: 9573
    • Reputation: +6262/-940
    • Gender: Male
    Internet and E-mail Privacy
    « Reply #6 on: November 27, 2015, 01:47:01 PM »
  • Thanks!0
  • No Thanks!0
  • Also, it is my understanding that One Time Pad encryption cannot be broken providing that the users observe all the standard precautions.

    There are explanations, precautions, and practice drills available at amrron.com.

    Offline JohnAnthonyMarie

    • Full Member
    • ***
    • Posts: 1297
    • Reputation: +603/-63
    • Gender: Male
      • TraditionalCatholic.net
    Internet and E-mail Privacy
    « Reply #7 on: November 27, 2015, 10:06:33 PM »
  • Thanks!0
  • No Thanks!0
  • Quote from: Mark 79
    Quote from: JohnAnthonyMarie
    If I may, let me attempt to assist with a general understanding of TCP/IP.  Every packet you transmit and receive is composed of two basic parts, a header and the payload.  The header contains the source and destination of the transmission, the payload contains data.  You can not hide these things, they are part of the protocol.  The payload data can be encrypted to some degree, but the public is generally prohibited from using any quality encryption.  Now, if your clever, you can attempt some custom scheme to encrypt your data (i.e. bitshifting, hashing, symmetric and asymmetric, etc.), but I can guarantee there is literally no way to conceal what you are doing online.


    I have been curious about Blackphone: https://silentcircle.com

    Phil Zimmerman, formerly of PGP fame, is a principal in Blackphone.  When PGP transitioned from open source to proprietary, I understand that a "back door" was inserted, so I wonder if it s the same with Blackphone.

    Any speculation?


    I would hazard an educated guess that as soon as the suspicious packet is noticed, the gears are in motion to track down the author.

    For example, some time ago, I created supersecret.net - the purpose was to provide absolute autonomy for one to one or one to many communication.  It was beautiful, a centralized server (Solaris 7 hardened to 12 packets, yea, and that's with apache, ssh, sftp).  Poking around in a lab, I found a security supplement for Solaris 7, 1024bit DES encryption, which I installed.  Ok, so the server hardware was an old X-1, a SPARC architecture.  I built the data filesystem in memory, so if power was removed so was the data.  Users interaction was two key encrypted, personal password and content password.  Basically, a unix shell supporting html for the user to communicate through.

    Inside two weeks from activation of the DES encryption, I got a call from my service provider informing me that I was in violation of the law.  Inquiring what law I was breaking, I was informed that the encryption was non-exportable.  Arguing that my server was on US soil, I was further informed that the location of the users screen is where I am exporting to.  Needless to say, I toned the encryption back to 52bits.

    Now, I can't say for sure how my packets were identified, because later that year, at a security breakout, a representative from the University of Oklahoma had a real nice presentation of this massive denial of service attack.  I was somewhat detached from the presentation (likely from playing Craps most of the night) until he says, "and the whole thing was orchestrated from supersecret.net! (which caught me offguard, because a let a small laugh out)  He and others turned in surprise, so I apologized (they assumed I meant for laughing).  Anyways, after the session, I introduced myself and further apologized.
    Omnes pro Christo


    Offline Mark 79

    • Supporter
    • *****
    • Posts: 9573
    • Reputation: +6262/-940
    • Gender: Male
    Internet and E-mail Privacy
    « Reply #8 on: November 29, 2015, 10:21:48 PM »
  • Thanks!0
  • No Thanks!0
  • There used to be both data and bank privacy havens. As far as I know all bank secrecy havens have been penetrated. Same for the data privacy havens, so there really is no physical haven for your project—and, having once developed the encryption on US soil, even if you went off-shore you would once again be "exporting."  In the days when I knew such folks as yourself, I recall being told that any serious encryption, especially any truly anonymous digitized "currency," must be developed from start to finish in one of the data privacy havens (that no longer exist).

    Privacy in communication and finances is fearsome indeed to our earthly masters.

    Again, I beg the question of One Time Pad encryption.  Properly used one time, it is unbreakable, correct?

    Offline Iuvenalis

    • Full Member
    • ***
    • Posts: 1344
    • Reputation: +1126/-2
    • Gender: Male
    Internet and E-mail Privacy
    « Reply #9 on: November 29, 2015, 11:45:49 PM »
  • Thanks!0
  • No Thanks!0
  • Quote from: JohnAnthonyMarie
    If I may, let me attempt to assist with a general understanding of TCP/IP.  Every packet you transmit and receive is composed of two basic parts, a header and the payload.  The header contains the source and destination of the transmission, the payload contains data.  You can not hide these things, they are part of the protocol

    This is what TOR is for. Go to a public wifi spot, leave your cell phone at home if you suspect a nationstate will be tracking you as a result of what you intend to transmit, and fire up TOR from a computer that you can control, is not a work machine with their desktop agents etc installed. Consider even booting into Tails on the machine.

    Quote from: JohnAnthonyMarie

    The payload data can be encrypted to some degree, but the public is generally prohibited from using any quality encryption.  Now, if your clever, you can attempt some custom scheme to encrypt your data (i.e. bitshifting, hashing, symmetric and asymmetric, etc.), but I can guarantee there is literally no way to conceal what you are doing online.

    This is false. True crypt can encrypt data at rest. PGP (email), Securedrop (file transfer), and SSH (shell etc) can encrypt data in transit.
    Protonmail is a good anonymous email service. Hushmail is okay. Even gmail is fine if you don't associate the account with your name. All these assume use of TOR (and ideally Tails).

    Offline JohnAnthonyMarie

    • Full Member
    • ***
    • Posts: 1297
    • Reputation: +603/-63
    • Gender: Male
      • TraditionalCatholic.net
    Internet and E-mail Privacy
    « Reply #10 on: November 30, 2015, 12:55:12 AM »
  • Thanks!0
  • No Thanks!0
  • Quote from: Iuvenalis
    Quote from: JohnAnthonyMarie
    The payload data can be encrypted to some degree, but the public is generally prohibited from using any quality encryption.  Now, if your clever, you can attempt some custom scheme to encrypt your data (i.e. bitshifting, hashing, symmetric and asymmetric, etc.), but I can guarantee there is literally no way to conceal what you are doing online.

    This is false. True crypt can encrypt data at rest. PGP (email), Securedrop (file transfer), and SSH (shell etc) can encrypt data in transit.
    Protonmail is a good anonymous email service. Hushmail is okay. Even gmail is fine if you don't associate the account with your name. All these assume use of TOR (and ideally Tails).


    XKS.  

    I stand by what I say, and that is the last that I will say.
    Omnes pro Christo


    Offline JohnAnthonyMarie

    • Full Member
    • ***
    • Posts: 1297
    • Reputation: +603/-63
    • Gender: Male
      • TraditionalCatholic.net
    Omnes pro Christo

    Offline Iuvenalis

    • Full Member
    • ***
    • Posts: 1344
    • Reputation: +1126/-2
    • Gender: Male
    Internet and E-mail Privacy
    « Reply #12 on: November 30, 2015, 01:45:57 AM »
  • Thanks!0
  • No Thanks!0
  • Quote from: JohnAnthonyMarie
    http://www.ibtimes.co.uk/do-you-use-tor-care-about-online-privacy-beware-nsa-targeting-you-1455402


    TOR ia about obfuscating source and destination (source IP info)

    Encryption, you said is of no use against intelligence agencies.
    This is false.

    They're two different things, which is why I broke up my reply.

    If an intelligence gathering organization solves the TOR problem, they still haven't solved the encryption problem.


    Offline JohnAnthonyMarie

    • Full Member
    • ***
    • Posts: 1297
    • Reputation: +603/-63
    • Gender: Male
      • TraditionalCatholic.net
    Internet and E-mail Privacy
    « Reply #13 on: November 30, 2015, 10:31:58 PM »
  • Thanks!0
  • No Thanks!0
  • While I admire the trust you display, I think it is misplaced.

    In my experience, the more you do to secure your online communications, the more attention you draw to yourself.  Your MAC address uniquely identifies your computer's network interface.  The ARP protocol links your MAC address to your IP address.  When your online activity becomes suspicious, or the subject of inquiry, you can not hide from ARP tables and man-in-the-middle exploits, no matter what software you install on your computer.  Seriously, if you want to tell your mother you love her without anyone else knowing, do it verbally, in a secure location, and with audible white noise in the background.
    Omnes pro Christo

    Offline JohnAnthonyMarie

    • Full Member
    • ***
    • Posts: 1297
    • Reputation: +603/-63
    • Gender: Male
      • TraditionalCatholic.net
    Internet and E-mail Privacy
    « Reply #14 on: November 30, 2015, 10:42:34 PM »
  • Thanks!0
  • No Thanks!0
  • Inside, I once saw a poster that said, "In God we trust, everyone else we polygraph".
    If there is one thing I've learned, trust is neither deserved or earned, rather, it is maintained.
    Omnes pro Christo