Catholic Info

Traditional Catholic Faith => Computers, Technology, Websites => Topic started by: MyrrhTree on November 03, 2015, 04:51:44 PM

Title: Internet and E-mail Privacy
Post by: MyrrhTree on November 03, 2015, 04:51:44 PM
Hey Everyone,

For a while now, I've been so disturbed by the NSA's violating people's privacy rights, big search engines (Google, Bing, Yahoo) monitoring internet searches, and free E-mail servers (Google, Hotmail, etc) that collect my message data.

After doing some research, I've found some alternatives. Here are some search engines that do not track or collect your internet searches :detective:: https://duckduckgo.com
https://www.ixquick.com

Also, I found some private e-mail services; however, they are not free. Their prices vary:
https://www.hushmail.com  
https://www.startmail.com

I hope this helps<3 Take care and God bless.

MyrrhTree

Title: Internet and E-mail Privacy
Post by: Kephapaulos on November 03, 2015, 10:47:56 PM
Thank you, MyrrhTree. I'll make sure to look at those linked websites.
Title: Internet and E-mail Privacy
Post by: HiddenServant on November 21, 2015, 05:44:27 PM
Ty for this. Looks real good.
Title: Internet and E-mail Privacy
Post by: HiddenServant on November 21, 2015, 05:46:39 PM
Slimjet i use and it is good so far.
Title: Internet and E-mail Privacy
Post by: JohnAnthonyMarie on November 22, 2015, 08:12:44 PM
If I may, let me attempt to assist with a general understanding of TCP/IP.  Every packet you transmit and receive is composed of two basic parts, a header and the payload.  The header contains the source and destination of the transmission, the payload contains data.  You can not hide these things, they are part of the protocol.  The payload data can be encrypted to some degree, but the public is generally prohibited from using any quality encryption.  Now, if your clever, you can attempt some custom scheme to encrypt your data (i.e. bitshifting, hashing, symmetric and asymmetric, etc.), but I can guarantee there is literally no way to conceal what you are doing online.
Title: Internet and E-mail Privacy
Post by: Mark 79 on November 27, 2015, 01:33:28 PM
Quote from: JohnAnthonyMarie
If I may, let me attempt to assist with a general understanding of TCP/IP.  Every packet you transmit and receive is composed of two basic parts, a header and the payload.  The header contains the source and destination of the transmission, the payload contains data.  You can not hide these things, they are part of the protocol.  The payload data can be encrypted to some degree, but the public is generally prohibited from using any quality encryption.  Now, if your clever, you can attempt some custom scheme to encrypt your data (i.e. bitshifting, hashing, symmetric and asymmetric, etc.), but I can guarantee there is literally no way to conceal what you are doing online.


I have been curious about Blackphone: https://silentcircle.com

Phil Zimmerman, formerly of PGP fame, is a principal in Blackphone.  When PGP transitioned from open source to proprietary, I understand that a "back door" was inserted, so I wonder if it s the same with Blackphone.

Any speculation?
Title: Internet and E-mail Privacy
Post by: Mark 79 on November 27, 2015, 01:47:01 PM
Also, it is my understanding that One Time Pad encryption cannot be broken providing that the users observe all the standard precautions.

There are explanations, precautions, and practice drills available at amrron.com.
Title: Internet and E-mail Privacy
Post by: JohnAnthonyMarie on November 27, 2015, 10:06:33 PM
Quote from: Mark 79
Quote from: JohnAnthonyMarie
If I may, let me attempt to assist with a general understanding of TCP/IP.  Every packet you transmit and receive is composed of two basic parts, a header and the payload.  The header contains the source and destination of the transmission, the payload contains data.  You can not hide these things, they are part of the protocol.  The payload data can be encrypted to some degree, but the public is generally prohibited from using any quality encryption.  Now, if your clever, you can attempt some custom scheme to encrypt your data (i.e. bitshifting, hashing, symmetric and asymmetric, etc.), but I can guarantee there is literally no way to conceal what you are doing online.


I have been curious about Blackphone: https://silentcircle.com

Phil Zimmerman, formerly of PGP fame, is a principal in Blackphone.  When PGP transitioned from open source to proprietary, I understand that a "back door" was inserted, so I wonder if it s the same with Blackphone.

Any speculation?


I would hazard an educated guess that as soon as the suspicious packet is noticed, the gears are in motion to track down the author.

For example, some time ago, I created supersecret.net - the purpose was to provide absolute autonomy for one to one or one to many communication.  It was beautiful, a centralized server (Solaris 7 hardened to 12 packets, yea, and that's with apache, ssh, sftp).  Poking around in a lab, I found a security supplement for Solaris 7, 1024bit DES encryption, which I installed.  Ok, so the server hardware was an old X-1, a SPARC architecture.  I built the data filesystem in memory, so if power was removed so was the data.  Users interaction was two key encrypted, personal password and content password.  Basically, a unix shell supporting html for the user to communicate through.

Inside two weeks from activation of the DES encryption, I got a call from my service provider informing me that I was in violation of the law.  Inquiring what law I was breaking, I was informed that the encryption was non-exportable.  Arguing that my server was on US soil, I was further informed that the location of the users screen is where I am exporting to.  Needless to say, I toned the encryption back to 52bits.

Now, I can't say for sure how my packets were identified, because later that year, at a security breakout, a representative from the University of Oklahoma had a real nice presentation of this massive denial of service attack.  I was somewhat detached from the presentation (likely from playing Craps most of the night) until he says, "and the whole thing was orchestrated from supersecret.net! (which caught me offguard, because a let a small laugh out)  He and others turned in surprise, so I apologized (they assumed I meant for laughing).  Anyways, after the session, I introduced myself and further apologized.
Title: Internet and E-mail Privacy
Post by: Mark 79 on November 29, 2015, 10:21:48 PM
There used to be both data and bank privacy havens. As far as I know all bank secrecy havens have been penetrated. Same for the data privacy havens, so there really is no physical haven for your project—and, having once developed the encryption on US soil, even if you went off-shore you would once again be "exporting."  In the days when I knew such folks as yourself, I recall being told that any serious encryption, especially any truly anonymous digitized "currency," must be developed from start to finish in one of the data privacy havens (that no longer exist).

Privacy in communication and finances is fearsome indeed to our earthly masters.

Again, I beg the question of One Time Pad encryption.  Properly used one time, it is unbreakable, correct?
Title: Internet and E-mail Privacy
Post by: Iuvenalis on November 29, 2015, 11:45:49 PM
Quote from: JohnAnthonyMarie
If I may, let me attempt to assist with a general understanding of TCP/IP.  Every packet you transmit and receive is composed of two basic parts, a header and the payload.  The header contains the source and destination of the transmission, the payload contains data.  You can not hide these things, they are part of the protocol

This is what TOR is for. Go to a public wifi spot, leave your cell phone at home if you suspect a nationstate will be tracking you as a result of what you intend to transmit, and fire up TOR from a computer that you can control, is not a work machine with their desktop agents etc installed. Consider even booting into Tails on the machine.

Quote from: JohnAnthonyMarie

The payload data can be encrypted to some degree, but the public is generally prohibited from using any quality encryption.  Now, if your clever, you can attempt some custom scheme to encrypt your data (i.e. bitshifting, hashing, symmetric and asymmetric, etc.), but I can guarantee there is literally no way to conceal what you are doing online.

This is false. True crypt can encrypt data at rest. PGP (email), Securedrop (file transfer), and SSH (shell etc) can encrypt data in transit.
Protonmail is a good anonymous email service. Hushmail is okay. Even gmail is fine if you don't associate the account with your name. All these assume use of TOR (and ideally Tails).
Title: Internet and E-mail Privacy
Post by: JohnAnthonyMarie on November 30, 2015, 12:55:12 AM
Quote from: Iuvenalis
Quote from: JohnAnthonyMarie
The payload data can be encrypted to some degree, but the public is generally prohibited from using any quality encryption.  Now, if your clever, you can attempt some custom scheme to encrypt your data (i.e. bitshifting, hashing, symmetric and asymmetric, etc.), but I can guarantee there is literally no way to conceal what you are doing online.

This is false. True crypt can encrypt data at rest. PGP (email), Securedrop (file transfer), and SSH (shell etc) can encrypt data in transit.
Protonmail is a good anonymous email service. Hushmail is okay. Even gmail is fine if you don't associate the account with your name. All these assume use of TOR (and ideally Tails).


XKS.  

I stand by what I say, and that is the last that I will say.
Title: Internet and E-mail Privacy
Post by: JohnAnthonyMarie on November 30, 2015, 01:08:22 AM
http://www.ibtimes.co.uk/do-you-use-tor-care-about-online-privacy-beware-nsa-targeting-you-1455402
Title: Internet and E-mail Privacy
Post by: Iuvenalis on November 30, 2015, 01:45:57 AM
Quote from: JohnAnthonyMarie
http://www.ibtimes.co.uk/do-you-use-tor-care-about-online-privacy-beware-nsa-targeting-you-1455402


TOR ia about obfuscating source and destination (source IP info)

Encryption, you said is of no use against intelligence agencies.
This is false.

They're two different things, which is why I broke up my reply.

If an intelligence gathering organization solves the TOR problem, they still haven't solved the encryption problem.

Title: Internet and E-mail Privacy
Post by: JohnAnthonyMarie on November 30, 2015, 10:31:58 PM
While I admire the trust you display, I think it is misplaced.

In my experience, the more you do to secure your online communications, the more attention you draw to yourself.  Your MAC address uniquely identifies your computer's network interface.  The ARP protocol links your MAC address to your IP address.  When your online activity becomes suspicious, or the subject of inquiry, you can not hide from ARP tables and man-in-the-middle exploits, no matter what software you install on your computer.  Seriously, if you want to tell your mother you love her without anyone else knowing, do it verbally, in a secure location, and with audible white noise in the background.
Title: Internet and E-mail Privacy
Post by: JohnAnthonyMarie on November 30, 2015, 10:42:34 PM
Inside, I once saw a poster that said, "In God we trust, everyone else we polygraph".
If there is one thing I've learned, trust is neither deserved or earned, rather, it is maintained.
Title: Internet and E-mail Privacy
Post by: Iuvenalis on December 01, 2015, 01:29:12 AM
Quote from: JohnAnthonyMarie
While I admire the trust you display, I think it is misplaced.

In my experience, the more you do to secure your online communications, the more attention you draw to yourself.  Your MAC address uniquely identifies your computer's network interface.  The ARP protocol links your MAC address to your IP address.  When your online activity becomes suspicious, or the subject of inquiry, you can not hide from ARP tables and man-in-the-middle exploits, no matter what software you install on your computer.  Seriously, if you want to tell your mother you love her without anyone else knowing, do it verbally, in a secure location, and with audible white noise in the background.


You use a lot of terms you clearly do not understand.

ARPs are only layer 2, so only the switch your machine is plugged into has your MAC.

Not that that matters, MACs can be obfuscated (spoofed).

Not that *that* matters either, as that is not how you'd be identified across a *routed* network anyway.

Title: Internet and E-mail Privacy
Post by: MariaCatherine on December 01, 2015, 02:00:01 PM
I don't know how relevant this may be, but for the short time I used TOR I was denied access to a Catholic forum (not this one) and received a message saying (paraphrased) "We don't allow anonymous people to access our forum.  Go troll somewhere else."
Title: Internet and E-mail Privacy
Post by: rum on December 01, 2015, 02:46:52 PM
Quote from: Iuvenalis

Protonmail is a good anonymous email service. Hushmail is okay. Even gmail is fine if you don't associate the account with your name. All these assume use of TOR (and ideally Tails).


Thanks for the ProtonMail tip. There's also Riseup.net, which is promoted as a safe email service for leftist activists.

Even if you don't use Gmail with your real name, they can still tell which IP address most often accesses your account, right?
Title: Internet and E-mail Privacy
Post by: rum on December 01, 2015, 02:50:57 PM
Quote from: MariaCatherine
I don't know how relevant this may be, but for the short time I used TOR I was denied access to a Catholic forum (not this one) and received a message saying (paraphrased) "We don't allow anonymous people to access our forum.  Go troll somewhere else."


Some troll using that particular IP was banned, along with the TOR IP. To get around that you just try some other TOR IPs by going into TOR settings and clicking "New Identity." Then TOR will refresh with a new IP.
Title: Internet and E-mail Privacy
Post by: JohnAnthonyMarie on December 01, 2015, 03:07:47 PM
Quote from: Iuvenalis
You use a lot of terms you clearly do not understand.


I'll pass your opinion on to my employer, and thank you for your input.
Title: Internet and E-mail Privacy
Post by: JohnAnthonyMarie on December 01, 2015, 03:16:12 PM
ARP spoofing is at Layer 3.
MAC spoofing is at Layer 2.
Title: Internet and E-mail Privacy
Post by: Iuvenalis on December 02, 2015, 12:21:27 AM
Quote from: JohnAnthonyMarie
ARP spoofing is at Layer 3.
MAC spoofing is at Layer 2.


Who are you talking to?

English isn't your native language is it?
Title: Internet and E-mail Privacy
Post by: JohnAnthonyMarie on December 02, 2015, 03:20:13 PM
Quote from: Iuvenalis
Quote from: JohnAnthonyMarie
ARP spoofing is at Layer 3.
MAC spoofing is at Layer 2.


Who are you talking to?

English isn't your native language is it?


Whatever.