/os/ - Online Security

News, techniques and methods for computer network security.

Posting mode: Reply

Check to confirm you're not a robot
Name
Email
Subject
Comment
Password
Drawing x size canvas
File(s)

Board Rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Manage Board | Moderate Thread

Return | Magrathea | Catalog | Bottom


Welcome to Online Security the place for internet and computer security, privacy and anonymity.
If you have some helpful tips please feel free to share your ideas. Start a new thread, or contribute to an existing thread.

Expand All Images


Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4
Continuing from >>>/tech/597
https://archive.is/INR3l
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.


Endwall 04/17/2016 (Sun) 21:49:24 [Preview] No. 5 del
This is good. Keep it comming.

We can come up with some best practices to increase security, minimize footprint and increase privacy.


Anonymous 04/18/2016 (Mon) 05:58:03 [Preview] No. 8 del
http://www.floppymoose.com/index.html

Better Ad Blocking for Firefox, Mozilla, Camino, and Safari
also works with the Thunderbird email client!

Tired of distracting ad images cluttering up your web experience, or even your email? Here is a simple way to keep many of these ads from displaying in your browser. The technique below works for any Gecko-based browser (Mozilla, Firefox, Camino, Netscape7). It also works for Apple's browser: Safari. See the special instructions for Safari below. And it even works with the Thunderbird mail client! See Thunderbird directions below. Also, check out the new notes on dealing with Flash advertising, below. Finally, I've improved the ad blocking based on user feedback. Already using it? Grab the latest for even better results.

How to use userContent.css with: Firefox/Mozilla/Camino/Netscape
You need to place the userContent.css file in the chrome directory of your browser user profile. The different browsers store your profile in slightly different places. For macos X, the profile chrome directory locations are:

Firefox: home:Library:Application Support:Firefox:Profiles:profilename:randomstring.default:chrome:
Mozilla or Netscape: home:Library:Mozilla:Profiles:profilename:randomstring.slt:chrome:
Camino: home:Library:Application Support:Camino:chrome:

Restart your browser to pick up the styles. Go to your favorite sites and see that many ad images are gone, but other images are still there!

How to use userContent.css with Thunderbird New!
You need to place the userContent.css file in the chrome directory of your Thunderbird user profile. For macos X, the profile chrome directory locations is:
home:Library:Application Support:Thunderbird:Profiles:profilename:randomstring.default:chrome:

Why should you use a custom user stylesheet with Thunderbird? For the same reason you should use it with your browser: to block unwanted ads! Many mail providers can place ads in your email. Using this stylesheet you can block almost all of them.


Anonymous 04/18/2016 (Mon) 06:18:28 [Preview] No. 10 del
Privacy is not Security is not Anonymity is not Pseudonymity is not your real identity, they're all different and needs to be defined separately and specifically.


Anonymous 04/18/2016 (Mon) 10:34:24 [Preview] No. 18 del
Although there's no statistical user data like in panopticlick.eff.org or amiunique.org, this website can help you see what they see in somewhat better detail: https://www.browserleaks.com/


Anonymous 04/20/2016 (Wed) 03:51:57 [Preview] No. 26 del


Anonymous 04/23/2016 (Sat) 08:52:51 [Preview] No. 28 del
ayy


Anonymous 04/23/2016 (Sat) 08:56:32 [Preview] No. 29 del
>>28
test


Anonymous 04/23/2016 (Sat) 08:58:20 [Preview] No. 30 del
work this time damn it


Anonymous 05/03/2016 (Tue) 04:20:39 [Preview] No. 31 del
Install sic IRC client
$ sudo torsocks apt-get install sic
or
$ sudo torsocks pacman -S sic

$ torsocks sic -h onionirchubx5363.onion -p 6667 -n anon39572


Anonymous 05/14/2016 (Sat) 11:35:23 [Preview] No. 47 del
Could someone explain to me how does Subgraph OS sandbox X11 and what the hell is the "Metaproxy" that they use?

Also, why do some people who use uBlock Origin don't use HTTPS Everywhere when uBlock Origin does not redirect to the HTTPS website when available? Isn't using HTTPS important and preferred in Tor?


Anonymous 05/24/2016 (Tue) 21:37:11 [Preview] No. 48 del
>>47
I guess they just forgot to install it or don't actually care about security/privacy and use uBlock for ad blocking.


Anonymous 06/14/2016 (Tue) 05:30:28 [Preview] No. 99 del


Anonymous 06/15/2016 (Wed) 23:48:55 [Preview] No. 114 del
>>113
That website's not that bad, but I can't help but to notice it's shilling for Disconnect and Veracrypt which is good for normies but I would avoid cross platform encryption methods.


Anonymous 06/28/2016 (Tue) 03:14:24 [Preview] No. 135 del
It seems like manual Socks5 Tor proxy configuration on Icecat reveals that it's not using the Tor browser but if one uses FoxyProxy to manage Tor, it pretends to use the Tor browser. I use Clean Links, Decentraleyes, FoxyProxy Basic, HTML5 Everywhere, HTTPS-Everywhere, No Resource URI Leak, Privacy Settings, Random Agent Spoofer, Self-Destructing Cookies, uBlock Origin, and uMatrix extensions. I don't know if using [code]torsocks icecat[/code] would mask Icecat as Tor Browser via ip-check.info


Anonymous 07/10/2016 (Sun) 06:39:36 [Preview] No. 161 del
Anyone know what's the most correct way to route OpenBSD's pkg_add over Tor?


Anonymous 07/11/2016 (Mon) 08:25:07 [Preview] No. 163 del
>>161
I've never used OpenBSD, but what about iptables and forcing all TCP connections through the Tor proxy and dropping all other packets?


Anonymous 07/11/2016 (Mon) 10:11:41 [Preview] No. 164 del
>>135
add this to your user.js to make it look like tor browser

// Fingerprint
user_pref("general.useragent.override", "Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0");
user_pref("intl.accept_languages", "en-US, en");
user_pref("network.http.accept.default", "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8");
user_pref("network.http.accept-encoding", "gzip, deflate");
user_pref("network.http.accept-encoding.secure", "gzip, deflate");
user_pref("privacy.donottrackheader.enabled", false);
user_pref("general.appname.override", "Netscape");
user_pref("general.appversion.override", "5.0 (Windows)");
user_pref("general.buildID.override", "20100101");
user_pref("general.oscpu.override", "Windows NT 6.1");
user_pref("general.platform.override", "Win32");
user_pref("general.productSub.override", "20100101");
user_pref("general.useragent.vendor", "");
user_pref("general.useragent.vendorSub", "");
user_pref("general.useragent.locale", "en-US");
user_pref("intl.locale.matchOS", false);


Anonymous 07/13/2016 (Wed) 20:40:15 [Preview] No. 185 del
hey niggers, I want to use links with tor pretending to be firefox or something. help me out famalam


Endwall 07/13/2016 (Wed) 21:31:23 [Preview] No. 186 del
>>>/tech/609

######### Configuring Links for Tor

1) Press ESC
SETUP->NETWORK OPTIONS -> CONNECTIONS
[X] Async DNS lookup
ESC->SETUP->SAVE OPTIONS
2) ESC-SETUP->NETWORK OPTIONS->PROXIES
socks4A proxy : 127.0.0.1:9050
[X] Connect only via proxies or SOCKS
ESC->SETUP->SAVE OPTIONS
3) ESC=>SETUP->NETWORK OPTIONS-> HTTP OPTIONS -> HEADER OPTIONS

[ ] Send fake firefox
[ ] Send do not track request
[X] No referer

Fake User Agent: Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0

ESC->SETUP->SAVE OPTIONS

4) ESC->SETUP->CACHE
Number of formated documents 5->2
[ ]Aggressive cache ## uncheck this

ESC->SETUP->SAVE OPTIONS

###DONE

use s key to bring up bookmarks and save bookmarks and g key to enter a url. Now you're ready to use tor. Use your current tor browser to bring copy over your favorite onion links and save them into your links browser bookmarks manually one by one. Do the same for youtube pages and other Clearnet pages that you frequent.
Edited last time by Endwall on 07/13/2016 (Wed) 22:32:06.


Anonymous 07/13/2016 (Wed) 22:01:41 [Preview] No. 187 del
>>185
>get links 2.13
>go to setup>network>proxies
>put "127.0.0.1:9050" into the socks proxy field
>check "connect only through proxies"
>go to setup>network>http>header
>check "fake firefox"
>done


Anonymous 07/13/2016 (Wed) 22:06:56 [Preview] No. 188 del
>>186
Oh, you beat me to it. Should have refreshed before posting.

Keep in mind that checking "fake firefox" disables several of the other relevant options. It forces no referer regardless of your referer setting. Same for the user agent.


Anonymous 07/13/2016 (Wed) 22:30:20 [Preview] No. 189 del
Using fake firefox and fake user agent just doesn't go well together as it seems that the old 38 of the fake firefox user agent overrides the custom fake user agent


Endwall 07/13/2016 (Wed) 22:31:21 [Preview] No. 190 del
>>189

Yeah I forgot to uncheck that box. I just copied the previous post with some edits.

I'll fix that now.


Anonymous 07/13/2016 (Wed) 22:38:21 [Preview] No. 191 del
I've checked with ip-check.info, it apparently knew that I was not using the tor browser


Anonymous 07/13/2016 (Wed) 22:42:37 [Preview] No. 192 del
>>191
nvm, I've turned on some unnecessary shit, now it thinks I'm using the tor browser albeit the ff 38 user agent.


Anonymous 07/14/2016 (Thu) 22:30:13 [Preview] No. 194 del
>>193
Turns out, links v2.13 already has the new useragent, just haven't rolled out fast enough in certain distros. Now we can all pretend to use the newer Tor browser but with Links!


Anonymous 08/07/2016 (Sun) 01:22:38 [Preview] No. 262 del
(5.77 KB 301x167 52543627245.jpg)
https://news.bitcoin.com/bitcoiners-use-tor-warned/

TOR and VPNs will likely be illegal in the U.S. come 2017. FBI's reach extended globally

https://news.bitcoin.com/bitcoiners-use-tor-warned/


TOR MODS Endwall 08/15/2016 (Mon) 06:00:38 [Preview] No. 283 del
tor/src/or
or.h
#define DEFAULT_ROUTE_LEN 3
change this to
#define DEFAULT_ROUTE_LEN 5

routerparse.c
digest_algorithm_t alg = DIGEST_SHA1;

Leave this alone it will break the tor handshake between each router if you change it. Disregard my previous advice on this mod.


If you know of any other good mods for tor post below or in the tor/vpn thread.

Thanks.
Edited last time by Endwall on 12/22/2016 (Thu) 05:18:39.


Endwall 08/15/2016 (Mon) 07:45:10 [Preview] No. 285 del
circuituse.c

Also change this

else if (build_state && build_state -> desired_path_len >= 4)

to be:

else if (build_state && build_state -> desired_path_len >= 6)


TOR HACKS Endwall 08/15/2016 (Mon) 08:05:31 [Preview] No. 286 del
or.h

#define CBT_DEFAULT_RECENT_CIRCUITS 20
change to
#define CBT_DEFAULT_RECENT_CIRCUITS 10

#define CBT_MAX_RECENT_CIRCUTS 1000
change to
#define CBT_MAX_RECENT_CIRCUITS 100

or.h is a config goldmine.


Anonymous 08/18/2016 (Thu) 22:56:18 [Preview] No. 321 del
I'm seeing that some of you use links2 with Tor. I do so as well, and I have been able to mask my browser as the firefox based Tor Browser. This includes changing the HTTP headers as well. Here is my script, save it in your /usr/local/bin directory. You can use websites such as ip-check.info and browserspy.dk to see whether the browser is masked or not.

#!/bin/bash

/usr/bin/links2 -address-preference 3 -async-dns 1 -http-bugs.bug-no-accept-charset 1 -http-bugs.no-compression 0 -http.do-not-track 1 -http.extra-header "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\Accept-Language: en-US,en;q=0.5\Accept-Encoding: gzip, deflate\Connection: keep-alive" -http.fake-user-agent "Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0" -http.referer 1 -ftp-proxy 127.0.0.1:9050 -socks-proxy 127.0.0.1:9050 -only-proxies 1 -save-url-history 0 -smb.allow-hyperlinks-to-smb 0 https://check.torproject.org


Endwall 08/20/2016 (Sat) 19:48:35 [Preview] No. 345 del
Regenerate intermediate term signing key:

$ tor --keygen

This will ask you to create a passphrase and then generates the key, make up a strong passphrase before hand and store it somewhere
$ passgen


Endwall 09/04/2016 (Sun) 23:37:16 [Preview] No. 550 del
If you're forced to use Windows, and you want to browse the internet behind tor you can use the links2 windows binary,

http://links.twibright.com/download/binaries/win32/

and chain it to the tor expert bundle binary. I just tried this out and it worked fine.

http://torsiteyqk5ajx5o.onion/dist/torbrowser/6.0.4/tor-win32-0.2.8.6.zip
http://torproject.org/dist/torbrowser/6.0.4/tor-win32-0.2.8.6.zip

endtorrc works with this setup but you have to comment out the Sandbox variable.
and place the torrc, torrc-defaults, geoip, and geoip6 files in the directory C:\Users\user\AppData\Roaming\tor\


Anonymous 09/07/2016 (Wed) 18:29:36 [Preview] No. 558 del
>>321
Are you enabling do not track? I wouldn't suggest that.


Endwall 09/07/2016 (Wed) 23:21:30 [Preview] No. 559 del
>>558

I didn't post >>321, but I'm glad someone did. I incorporated the extra header bit into my setup and into the Endware scripts. I personally don't enable the do not track button. That seems to be the recomendation from JonDonym to not send that request. Thanks for pointing this out. Perhaps I should write up new instructions for setting up links2. I'll do that on the weekend.


a@a 11/07/2016 (Mon) 03:47:53 [Preview] No. 665 del
Random trivial info: the tor browser uses 1000x600, so if you're using a hardened iceweasel or something pretending to be tor, change your window resolution to 1000x600 and doublecheck via ip-check.info


Proxychains workflow Endwall 04/23/2017 (Sun) 05:00:20 [Preview] No. 884 del
Repost of a good workflow from another user (Masonator?)
originally posted here >>>/pol/39627

Rationale: Use the Tor network to obscure your originating IP, use an ssl proxy or socks5 proxy to obscure Tor network use
Stragtegy Flow: Tor -> SSL Proxy -> Clearnet
Alternate Strategies: VPN ->Tor -> Clearnet ; VPN ->Tor -> SSL Proxy -> Clearnet ; Tor -> Clearnet ; Tor browser on Tails

Proxychains Workflow

################ Materials List ##############################
you will need:
1) proxycheck.sh from >>>/os/
2) tor
3) proxychains
4) an ssl proxy

############### Work Flow ###############################

1) Go to a proxy site here is one for the sake of the tutorial:

https://txt.proxyspy.net/proxy.txt

2) Copy those proxies and paste them into this:

https://orcinustech.com/web-tools/proxy-checker.php

3) Export anonymous and or elite proxies

4) Make a text file called ssl_proxies.txt
5) Paste the exported proxies into ssl_proxies.txt
6) run this command:

$ bash proxycheck.sh ssl_proxies.txt

this will weed out the proxies that give connection errors
you should have new files with the checked working proxies I would use ssl_proxies_yt.txt and pick one from there for the proxychains configuration.

7) Go to the config file of proxychains in /etc/proxychains.conf and make sure it looks like this.

strict_chain
chain_len = 2
proxy_dns
tcp_read_time_out 12000
tcp_connect_time_out 12000
[ProxyList]
socks5 127.0.0.1 9050 # Tor socks5
http #PROXY GOES ON THIS LINE

The first proxy is tor and the second one is the working proxy that we should have a list to choose from at this point in the tutorial. It might take a few tries with the proxies but if you see that it is resolving dns requests in the output you are good to go.

8) Now with proxychains set up you are ready to open your browser lets say you use icecat run this command:

$ proxychains icecat

Now you are going through tor and able to browse the clearnet with the http proxy.

WARNING : Anonymity may require other additional settings, including browser settings, user-agents, stylometry obfuscations etc.
However the strategy presented here is an opinion about a strategy that may be helpful in the process of anonymous tcp ip communications.
Edited last time by Endwall on 04/30/2017 (Sun) 02:38:05.


Anonymous 04/23/2017 (Sun) 17:56:33 [Preview] No. 885 del
>>884
>Congratulations you are anonymized.
This is misleading. Anonymity is much more than just "use this".

Stop treating Tor and other tools as a complete solution to anonymity.

Stop suggesting such complicated methods. The users who need this are better off using the Tor Browser with security settings on high, preferably on Tails.
Point people to information like the official Tor documentation, if you think they are lacking try to improve them.


Anonymous 04/29/2017 (Sat) 09:51:29 [Preview] No. 887 del
use proxies with a similar address to chain multiple proxies.


Anonymous 04/29/2017 (Sat) 09:54:31 [Preview] No. 888 del
>>887
they also have to be fast so would buying proxies help or hurt anonymity past the tor hops? I guess that would depend if they accept bitcoin right?


a@a 04/29/2017 (Sat) 10:02:25 [Preview] No. 889 del
>>884
That's not really me, but a@a can be nothing more than an empty hollow identity for anyone that likes your stuff and is passionate about OPSEC, so yes it's a@a though it's masonnigger because he used to be easily identified by not articulating well enough and making common spelling errors that only he makes, hence, the stylometry suggestion.


Endwall 04/30/2017 (Sun) 02:53:50 [Preview] No. 893 del
>>889 sorry to confuse you with Masonator

>>890, good post, good summary from the Tor Project and Whonix. Thanks for posting that.

I saw the following information in the same thread from pol:

Heads: Devuan GNU+Linux non systemd version of Tails with only Free Software:

http://fz474h2o46o2u7xj.onion
https://heads.dyne.org/

https://www.dyne.org

I'll place this into the sticky.

Keep the tips coming in.
Edited last time by Endwall on 04/30/2017 (Sun) 03:15:58.


Anonymous 05/01/2017 (Mon) 12:07:42 [Preview] No. 895 del
https://youtube.com/watch?v=jZhex1mcPZA [Embed]

Since anything transatlantic is absolutely intercepted, how fucked are we?


Endwall 05/03/2017 (Wed) 05:49:28 [Preview] No. 897 del
>>895

First of all interesting video from Mr. Satan, with his eyebrow rubs. 3 eyebrow rubs, then 6 eyebrow rubs with his pentagram tatoo with an eye in it. On the upper right hand corner he has a triangle baseball cap, and the letters "Illu" ? below that. Lux et Veritas (Light and Truth)? More like Lux In Tenebras (Light in the Darkness).

Theoria Apophasis https://www.youtube.com/user/kathodosdotcom . Who is this guy supposed to be? Pro Photographer:

"Analyzing the nature of professional photography in its fundamental roots, getting past the gear-sniffing and measuring, and getting to the metaphysics and heart of true professional photography. There are NO UNTRUE photographs, only compositionally and technically inept ones. A professional photographer is a master of composition and light manipulation, it is no more complex than this."

I'm not sure what the source of his "This has been confirmed" statements are, but he seems to think that he's on the winnning team.

Secondly don't be transatlantic. Build a city wide lan. Or better yet build a city wide BBS over modem in your locality. Restrict acceess to modem only by your local area code, and use some HTTPS or TLS scheme. Disconnect ethernet from the BBS server. Then have fun chatting with locals about local things. If you do that, does your local government have the lawful authority to collect your conversations (phone tapping)? Then you can be anonymouse by going to any building with a telephone connection and dialing the BBS. No TCP/IP just random building phone #. Wear a ski mask when you go there. That's anonymouse.

Basically I have faith in the encryption protocols, but I believe (assertion without proof) that all of the OS distributions of linux are vulnerable, and given the Intel AMT debacle that was disclosed recently, I'm pretty sure its worse than Ring 0, more like Ring -3 security intrusion. Get off of Intel. We need a new paradigm. Tor isn't going to help you if you're rooted at the hardware level.
Edited last time by Endwall on 05/03/2017 (Wed) 07:55:58.


Endwall 05/05/2017 (Fri) 10:49:07 [Preview] No. 901 del
This is legitimate. I'm not sure what to do with this right now.

$ unar search_extract_links.rar
upacks to search_extract_links.dat

which is a text file containing http links
Contains 1265976 records.

$ cat -n search_extract_links.dat
...
...
1265955 http://www.turkhackteam.org/genel-guvenlik/1489040-06-04-2017-proxy-listesi.html
1265956 http://memoryhackers.net/konu-29-04-2017-l2-anonymous-proxy-list.mh
1265957 http://memoryhackers.net/konu-fast-proxy-guncel-fresh-20-04-2017.mh
1265958 https://www.ruyaforum.com/48-post9.html
1265959 https://baybilisim.com/01-05-17-l2-anonymous-proxy-list/
1265960 https://baybilisim.com/25-04-2017-l2-anonymous-proxy-list/
1265961 https://baybilisim.com/26-04-17-l2-anonymous-proxy-list/
1265962 http://www.forumsohbeti.com/guncel-proxy-listeleri/2429-07-04-17-fast-proxy-server-list.html
1265963 http://www.forumsohbeti.com/g-ncel-proxy-listeleri/2817-08-04-17-fast-proxy-server-list.html
1265964 http://www.forumsohbeti.com/g-ncel-proxy-listeleri/2430-07-04-17-free-proxy-server-list-1490-a.html
1265965 http://www.forumsohbeti.com/3054-post2.html
1265966 https://www.proxydocker.com/freeproxylist/Germany/Hesse
1265967 http://es.proxyservers.pro/proxy/207.154.231.208
1265968 http://proxydb.net/180.250.46.227/8080
1265969 https://freevpn.ninja/free-proxy/id/170529
1265970 https://proxyrox.com/proxy/180.250.46.227-8080
1265971 https://es.proxyrox.com/proxy/180.250.46.227-8080
1265972 http://proxylist.me/proxys/details/74086/indonesia
1265973 https://www.proxydocker.com/freeproxylist/Indonesia/Somewhere?sort=p.type&direction=asc&page=1
1265974 https://www.proxydocker.com/freeproxylist/Indonesia?page=2
1265975 https://orcinustech.com/web-tools/export-proxies.php?scanid=iSJoWDXn02T3clizwmXlk3H2IY0GWH0fAJE&results=all-proxies
1265976 https://orcinustech.com/web-tools/export-proxies.php?scanid=kL3Nge3r14sV83yPPkfA8F6SpxDHtMLNyPB&results=all-proxies

I'll leave the link up in case it's useful to someone else.

I'll work on this list to prune it down to just the main root websites, as you mentioned there is duplication. It may be useful at that point. Right now it's too big.

I'm not sure how this list was generated. Could you elaborate on how it was created? Thanks.


Anonymous 05/05/2017 (Fri) 11:11:32 [Preview] No. 902 del
>>901
Well I was looking through the list of proxysites earlier in the thread it lead to this forum https://www.blackhatworld.com/seo/proxie-scraping-links.464079/page-15#post-10005280 The huge list is for a program on windowss called scrapebox. Fuck windows you can use this for the same effect http://www.proxydb.net/leecher

the list it updates almost every day and gets bigger and bigger still a lot of dupes though. I thought it was useful.


Anonymous 05/05/2017 (Fri) 11:15:09 [Preview] No. 903 del
>>902
Apparently that thread goes back to 2012 and they just added to it.


Anonymous 05/05/2017 (Fri) 11:16:09 [Preview] No. 904 del
>>897
Most of the stuff he mentions is actually old info, or covered by Wikileaks, and of course, common sense. https://en.wikipedia.org/wiki/Upstream_collection https://en.wikipedia.org/wiki/Utah_Data_Center

The guy in the video had been harassed by the government because of his controversial book about magnetism. He also was one of the top guys in Apple customer support. Here's some example links: https://youtube.com/watch?v=rjkYccijTFA [Embed] https://discussions.apple.com/docs/DOC-6031


Anonymous 05/05/2017 (Fri) 17:48:20 [Preview] No. 905 del
>>898
That site requires javascript to download. Upload the file here.


Endwall 05/06/2017 (Sat) 03:43:57 [Preview] No. 906 del
$ lspci
...
....
Communication controller: Intel Corporation 9 Series Chipset Family ME Interface #1
....

Thanks Intel.

I've been experiencing weird shit on my computer for the last couple of months. Strange lock ups etc. This might explain it. MFW.


Endwall 05/06/2017 (Sat) 04:13:16 [Preview] No. 909 del
>>905
Here is the proxy website list run through
$ sort -du

Alphabetical sort unique

Cuts the file from 75MB uncompressed to 6.8 MB. lines from 1.2 Million down to 111,000.
Edited last time by Endwall on 05/06/2017 (Sat) 04:40:47.


Anonymous 05/08/2017 (Mon) 02:52:23 [Preview] No. 912 del
>>909
Wonderful thanks!


Tmux + Links in text mode Endwall 06/01/2017 (Thu) 08:28:16 [Preview] No. 934 del
Drop out of the gui into the shell in text mode. Have tmux, and links installed and configured for tor.

in what follows ; means follow the first command with the second command.

$ tmux
$ CNTRL + b ; SHIFT + "
$ CNTRL + b ; SHIFT + "
repeat until there is a 2 line command window at the bottom of the screen. then let's remove the windows that we won't be using
$ CNTRL + b ; UP arrow
$ exit
$ CNTRL + b ; UP arrow
$ exit
so now you have a large window and a fame at the bottom with a command line.

in the large window frame, start up links
$ links

now you can browse and copy links and type stuff in the command window. To get a new tab type:

$ CNTRL + b ; c

this brings up a new window that is clear, you can repeat this step to make more windows and switch between them using
the numbers

$ CNTRL + b ; 0
$ CNTRL + b ; 1
etc

I like to open a window with endradio to listen to the news, while I browse the news and endchan, 8chan etc in the links text window. If I need to download a youtube video or some file that I see I use oldtube or endtube or endget or endloads to download the content that I collect from youtube or from some other source. I use this methodology to be productive in shells and environments that don't have a gui but that have the above tools. Try it out in a terminal emulator first to get the hang of it, then use it in text mode for low profile security.


Anonymous 06/04/2017 (Sun) 18:01:05 [Preview] No. 935 del
>>934
That is much more complicated than it needs to be.
All that can be done with:
tmux new links \; split-window -l 2

Which will
Create a new session running links
Create a new pane 2 line tall


Endwall 06/12/2017 (Mon) 06:11:39 [Preview] No. 939 del
>>935
This is more efficient. It didn't work straight from the command line as presented though.

I have to enter command mode to do this.

$ tmux new links
$ Ctrl + b ; Shift + :
: split-window -l 2

Then repeat with a new window to multi tab
$ Ctrl +b ; c

As you can tell I don't know what the hell I'm doing. Another case of RTFM for Endwall.

Thanks for the tip.


Anonymous 06/12/2017 (Mon) 19:02:35 [Preview] No. 941 del
>>939
>It didn't work straight from the command line as presented though.
Were you already in tmux? Try this, copy it exactly:
tmux neww links \; split-window -l 2


Endwall 06/12/2017 (Mon) 21:25:43 [Preview] No. 942 del
>>941

Yeah it works, I'm not sure why it wasn't working earlier, I can't recall.
You typed an extra w in new. Thanks.


Anonymous 06/14/2017 (Wed) 18:27:58 [Preview] No. 943 del
>>942
>You typed an extra w in new.
That is for if you are already in tmux.


Anonymous 06/29/2017 (Thu) 21:15:02 [Preview] No. 958 del
Router questions: Should I enable NAT? How about UPnP?


Anonymous 06/30/2017 (Fri) 00:45:42 [Preview] No. 959 del
>>958
BTW, I don't play any consoles and only have a few wireless devices.


Anonymous 06/30/2017 (Fri) 03:46:01 [Preview] No. 960 del
>>958
yes and yes.


Endwall 06/30/2017 (Fri) 03:55:38 [Preview] No. 961 del
>>958
Universal Plug and Play UPnP is a bad idea. If you get malware they can own your network. Open the ports that you want open and only those ports and protocols, block everything else. The first line in your firewall chain on you router should be:
BLOCK ALL INCOMING
BLOCK ALL OUTGOING.
What ever way that is set up according to your router.
Then slowly open things up, starting with DNS, then HTTP, HTTPS, then whatever other ports and protocols you need. This will take more time but it will give you more control.

NAT Network Address Translation. This should be OK to turn on.

UPnP No, NAT OK.

Those are my thoughts on it. I'm not an expert. Open only what you need and don't let your software on your OS control your router at will, set it up yourself.


Anonymous 09/15/2017 (Fri) 14:47:07 [Preview] No. 1020 del
>>884
With i2p isn't there an ip you can plug in like with tor (socks5 127.0.0.1:9050) I think port 4444?? If so then you can add i2p to the mix. I think it called an out-proxy. You can also use this to run i2pd with proxychains i2pd.I have found this proxychains setup useful because running i2pd with torsocks doesn't work.


Anonymous 10/02/2017 (Mon) 20:41:27 [Preview] No. 1041 del
https://sourceforge.net/projects/vpnchains/

Been foolin around with this.


Anonymous 10/13/2017 (Fri) 11:23:28 [Preview] No. 1050 del
>>958
others are correct on UPnP

wifi is insecure, use cables as much as possible

NAT should be enabled, but it isn't as important as making sure your router isn't compromised. There is FOSS router software available for maximum security, have a gander and lurk.


Anonymous 10/13/2017 (Fri) 11:57:40 [Preview] No. 1051 del
I use a cheap but private VPN service, with encryption and (allegedly) no IP logging reading the ToS.

I do not use wifi, that is insecure. My wifi chip in my computer (along with the bluetooth chip and camera) have been physically removed. Linux of-course.

I use Mozilla Firefox for the most part, sometimes Tor too.

One thing I do is make sure I manually program Bleachbit to scrub sqlite files in my browser directory routinely. Logs, caches, cookies etc: content-prefs.sqlite, cookies.sqlite, formhistory.sqlite, healthreport.sqlite, places.sqlite, signons.sqlite, webappsstore.sqlite (and their associated file formats) from my browser directory. Tor too stores these same kinds of databases, so any browser you use you'll want to learn what is in those directories and what they store.

Then, I also use Random Agent Spoofer to spoof my browser agent (spoofing metadata about what OS I use, what kind of browser it is, headers, get requests, etc.) and also allows me to disable webgl and geolocation in chrome.

I also use noscript and HTTPS Everywhere. Scrub noscript whitelist and reconfigure the list to your liking, whatever suites your browsing habits.

Go to about:config and learn how to use it, but be careful!!! There are some tweaks you can use to fortify and secure your browser, and to make it stop bragging about data.


Anonymous 11/21/2017 (Tue) 07:31:49 [Preview] No.1069 del
Whats the deal with using i2p to torrent? Would you use a udp or tcp vpn?


Anonymous 12/10/2017 (Sun) 21:16:55 [Preview] No.1079 del
>>1069
I torrent behind tor. Not sure about doing this with I2P.

I use deluge with gtk and set the proxies to port 9050. Then add the torrent through a link, magnet or the actual torrent file. Then manually edit the trackers so that they are http only. It should start downloading after that.


Anonymous 12/15/2017 (Fri) 02:09:43 [Preview] No.1082 del
>>1079
Yo, stop torrenting from behind tor right now. Either use i2p or a VPN, but for the love of god quit slowing down the network.It also doesn't even protect your identity.
https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea
https://blog.torproject.org/why-tor-slow-and-what-were-going-do-about-it


Anonymous 12/15/2017 (Fri) 05:00:11 [Preview] No.1083 del
>>1082
The proxying works fine in Deluge. It's not leaking. The trackers communicate by TCP, the traffic is TCP. It works. The attack that is mentioned in the second article stem from applications that ignore your proxy and send traffic by UDP without tor. That doesn't happen here. Both the trackers and the traffic are proxied through Tor as TCP connections. I dissmiss that complaint/claim.

As for slowing down the networks, with download speeds at 250KB/s I doubt it. Thats about what I get using wget behind tor. Rate throttle it if you want to be polite.


Youtube Endwall 12/28/2017 (Thu) 06:27:02 [Preview] No.1093 del
Searching Youtube

$ endjail
$ torsocks --shell
$ youtube-viewer

=>> Search for YouTube videos (:h for help)
> Endchan
1. EndChan/InifNow question and answer (by OdiliTime) [01:10:35]
2. The Old 4Chan (by That Guy With A Voice) [01:48]
3. The Voice Teens Philippines Battle Round: Clark vs. Chan - In The End (by The Voice Teens Philippines) [05:14]
...
=>> Select one or more videos to play (:h for help)
> 1
URL: https://youtube.com/watch?v=ParATBARwic [Embed]
-> Channel : OdiliTime
-> ChannelID : UC9YYaqKNOZa5ue-sxE0cuPA
-> Definition: HD
-> Duration : 01:10:35
...
Copy the URL into a text file, list.txt , in leafpad, nano etc. and repeat
=>> Select one or more videos to play (:h for help)
> :q

$ oldtube --list list.txt
$ oldtube https://youtube.com/watch?v=ParATBARwic [Embed]

Using proxies:
$ proxyload
Format the first line of ssl_proxies.txt to remove everything but the ip address at the end (or just delete the first line)
$ protofix https ssl_proxies.txt | sort -R | sort -R >> sort_ssl.txt
$ endtube --ua-rand --proxylist sort_ssl.txt --list list.txt

Add proxycheck to the workflow to get working proxies only.
$ proxycheck ssl_proxies.txt
$ protofix ssl_proxies_yt.txt | sort -R | sort -R >> sort_ssl_chk.txt

If you have a better workflow feel free to share.


Anonymous 02/14/2018 (Wed) 11:24:26 [Preview] No.1119 del


Anonymous 02/15/2018 (Thu) 04:23:43 [Preview] No.1126 del
>>1119
Thanks for this, it's coincidentally at an opportune time and will be of use to a project I just started.
>ghostery phoning home
I did a quick sweep and didn't find anything, but I mostly skimmed. There's a few links I'm not too privy too and I didn't look deeper into any of the XMHL or send requests though, they're a mess.
https://pastebin.com/raw/czfymKNi
https://pastebin.com/raw/6mZmcSiH
IP greps bring back nothing of note: https://pastebin.com/raw/6mZmcSiH
https://pastebin.com/raw/puaX68W5
Did you make the image yourself? You can mess with the settings on most apps, repack them, and run them your way instead of having them screw with everything.


Anonymous 02/15/2018 (Thu) 06:51:46 [Preview] No.1129 del
>>1126
I didnt make the image I found it on one of the rebeccablack/tech/ archives. Ghostery I still never was crazy about because it is like noscript if it noscript was bloated and didnt work.
I always try and remember the addons I am missing when configuring a firefox fork and that was a good image to use back a year or 2 ago.
>You can mess with the settings on most apps, repack them, and run them your way instead of having them screw with everything.

That is something I will keep in mind because some addons stop working like "white noise generator" which did what "trackmenot" does but in a seperate window with tabs randomly switching to random webpages.

I have a few suggestions to add to the list
adnausium, dolus, tamperdata and http nowhere

if I did not lock the prefs.js I will use https://jm42.github.io/compare-user.js/ for about:config modifying.


Anonymous 02/15/2018 (Thu) 13:50:29 [Preview] No.1130 del
>>1129
>if I did not lock the prefs.js
I just read up on this. It seems like locking is temporary and all you need to do to reverse it, is delete the lockfile.
>I will use https://jm42.github.io/compare-user.js/ for about:config modifying.
These might be useful to you:
https://pastebin.com/pdEbeX1m
Full list of all prefs defined in Mozilla's source code for 52. Some of them are hidden/ i.e not set in about:config so there'll be no way to know about them. And: http://kb.mozillazine.org/About:config_entries
Is a nice util for quickly finding out what each does, and available settings.


Anonymous 02/15/2018 (Thu) 14:48:33 [Preview] No.1131 del
>>1129
And if you're using a beta version or one with a "MOZ_TELEMETRY_ON_BY_DEFAULT", telemetry is perma-on, so be careful.
firefox-52.0esr/modules/libpref/preferences.cpp


Anonymous 02/15/2018 (Thu) 18:05:59 [Preview] No.1132 del
>>1130
>>1131
Thanks I always got confused about that. But you can never be too sure with firefox even forks have things like

camera.control.face_detection.enabled

set to true on default.


Anonymous 03/12/2018 (Mon) 02:03:56 [Preview] No.1160 del
I'm pretty sure Ghostery can be analyzed. I saw somewhere recently that they made it open source, so basically you can look through the source code if you want. Might be something worthwhile to do, but isn't necessarily something I would be able to do since I don't know shit about coding.


Skywriter 05/31/2018 (Thu) 13:53:11 [Preview] No.1220 del
>>902
Seems like ipproxyscraper works well for thesse links. It's a python script, so the source is viewable and it can be run on any OS.
https://sourceforge.net/projects/ipproxyscraperlinux/


Anonymous 06/01/2018 (Fri) 06:02:08 [Preview] No.1222 del
>>1220
Python2 will be deprecated soon, if it's not a python3 script, it'll probably not work.


Anonymous 06/01/2018 (Fri) 08:08:44 [Preview] No.1223 del
>>1222
oh nvm, there's still some time.

https://pythonclock.org/


Anonymous 06/02/2018 (Sat) 03:24:04 [Preview] No.1224 del
lightweight rss readers

I know there are simple scripts to read rss feeds. But as far as feed reader that is important because for example:

>manually clicking on a subscriber yt channel
>updating an rss feed is a less footprint.

Updating an rss feed id less of a footprint. I wonder if its worth it to obfuscate rss feed patterns like the trackmenot addon adds irrelevant searches to the browsers history? To do this you Just add a bunch of irrelevant feeds with your regular feeds.

Newsbeuter - simple terminal rss reader

NewsBoat - https://github.com/newsboat/newsboat simular to newsbeuter but more intricate.

>>1220
Really appreciate that program I never knew about it thanks for posting it. I usually use http://www.proxydb.net/leecher that has a 10 url limit the program you posted can do unlimited urls. With the files it crashes for me with big lists but if you curate a bunch of good links or rss feed xml pages even you can scrape a lot of proxies.


Anonymous 06/02/2018 (Sat) 03:44:08 [Preview] No.1226 del
>>1224
whoops I described newsboat wrong its not more intricate
from the website
>Newsboat is a fork of Newsbeuter, an RSS/Atom feed reader for the text console. The only difference is that Newsboat is actively maintained while Newsbeuter isn't.

https://newsboat.org/


Skywriter 06/03/2018 (Sun) 21:12:12 [Preview] No.1228 del
>>1225
This source is good, but are they all http/s, or are there socks proxies involved as well? After running ipproxyscraper on it (which took hours, file related is my final result. Might save someone the effort), I got a list of IPs with ports, but no protocols specified.


ZyBxVLcAxIx Grace 06/09/2018 (Sat) 09:30:28 [Preview] No.1229 del
David Beckham has admitted that a big part of him has questioned whether he was right to retire from professional football but that he has been too busy over the past four months to dwell on the decision.

Hey that's great news. He's still in pretty good shape. He'll be signed in no time. Hope he gets a good contract!
No Spam 6 Month Ban
Edited last time by Endwall on 06/11/2018 (Mon) 07:00:31.


Anonymous 07/05/2018 (Thu) 23:59:13 [Preview] No.1241 del
Check out the bleeding edge tor source code!!

The 6-hop mod BREAKS THE COMPILING


torsocks git clone http://dccbbv6cooddgcrq.onion/tor.git


Anonymous 07/06/2018 (Fri) 01:26:42 [Preview] No.1242 del
>>1241
You can still do the 6 hop mod but in src/core/or/circuituse.c after you change default_path_len to 7 delete the line under it that says
else if fourhop_cutoff

also in src/core/or/or.h you can still change default_route_len to 6 but there is no option to modify max_recent_circuits from 1000 to 100


Endwall 07/06/2018 (Fri) 03:46:26 [Preview] No.1243 del
It compiled for me and linked in

src/app/tor

I haven't fully tested it yet though.

But you're correct the options have all been removed from or.h . Also much of the code has been moved around and segregated into different sub directories.

Keep an eye on this. Also if you have any other good Tor mods please feel free to share.


Endwall 07/06/2018 (Fri) 04:03:41 [Preview] No.1244 del
circuitstats.h: * 1000 is approx 2.5 days worth of continual-use circuits. */
circuitstats.h:#define CBT_NCIRCUITS_TO_OBSERVE 1000
circuitstats.h:#define CBT_MAX_RECENT_CIRCUITS 1000
circuitstats.h:#define CBT_MAX_MAX_RECENT_TIMEOUT_COUNT 10000
circuitstats.h:#define CBT_MAX_MIN_CIRCUITS_TO_OBSERVE 10000
circuitstats.h:#define CBT_DEFAULT_TIMEOUT_INITIAL_VALUE (60*1000)

this seems to have been moved into src/cor/or/circuitstats.h

use grep to search for other missing / moved variables. Thanks for the tip >>1241 , >>1242 .


IRC Endwall 12/30/2018 (Sun) 15:41:05 [Preview] No.1357 del
IRC Workflow
STEP 0) grab endsh.sh

https://raw.githubusercontent.com/endwall2/endtools/master/endsh.sh

requires torsocks and firejail

STEP 1) Install IRSSI

$ su
# torsocks -i pacman -S irssi
# exit

STEP 2) Modify config file
$ cd ~
$ cd .irssi
$ nano config

scroll to the bottom find the settings section,

settings = {
core = {
real_name = "LSnIudlVU3PkBGRuT9VXSOW2WFJ8";
user_name = "XPDNanEmI6yIFnJf7XStT5wr1SKG";
nick = "Endwall";
hostname = "7N3lxpzNCuNgRAslLgsTCBVkPopY";
};
"fe-text" = { actlist_sort = "refnum"; };
};

find the settings section and put in random characters, use passgen, change your nick here manually.

$ passgen --bytes 21

STEP 3) Connect

// get a torsocks shell and enter irssi
$ endsh
$ irssi
[(status)] /connect endchan.net 6667
[(status)] /join #ENDCHAN
[#ENDCHAN] /window left
[(status)] /help
[(status)] /window right
[#ENDCHAN] /part
[(status)] /disconnect
[(status)] /quit
$ exit
$ exit

for a site with SSL connect with the command

[(status)] /connect -tls irc.cyberguerrilla.org 6697

[(status)] /connect -tls irc.blackhats.ru 6697
[(status)] /join #SECURITY

[#SECURITY] /part
[(status)] /disconnect
[(status)] /quit
$ exit
$ exit

Note: this method doesn't seem to work with .onion addresses, as it attempts to operate on local host and is denied by torsocks.
I seem to remember being able to access onion irc servers but I used a different program (I can't recall which client). Feel free to add or fill in the blanks.
Edited last time by Endwall on 03/09/2019 (Sat) 06:52:35.


Endwall 12/31/2018 (Mon) 02:26:09 [Preview] No.1360 del
>>1357

You can also set up proxying to 127.0.0.1:9050 in Hexchat. This works when connecting to the .onion addresses.

Settings->Preferences->Network-> Network Setup

Fill in the socks5 proxy information. Then Add the new server in the connection tab using the .onion address and port number. Works.


Anonymous 02/17/2019 (Sun) 03:15:44 [Preview] No.1369 del
Unless there is a discount for buying a vpn with bitcoin. It is not necessarily an anonymous transaction because you theoretically connect to your raw ip with the bitcoin purchased vpn.


Anonymous 07/29/2022 (Fri) 10:40:37 [Preview] No.1792 del
What is the search engine that should we use?


Anonymous 12/22/2022 (Thu) 09:20 [Preview] No.1824 del
>>1792
Use Tor browser for whatever you choose. Some use Searx onion, some use DuckDuckGo onion. I use bookmarks.


Anonymous 03/18/2023 (Sat) 13:12 [Preview] No.1832 del
I use https://iptotal.io/ to find free socks proxies



Top | Catalog | Post a reply | Magrathea | Return