Hacklog Volume 1 Anonymity: it security & Ethical Hacking Handbook



Download 2,32 Mb.
Pdf ko'rish
bet25/57
Sana01.01.2022
Hajmi2,32 Mb.
#289651
1   ...   21   22   23   24   25   26   27   28   ...   57
Bog'liq
Hacklog Volume 1 Anonymity IT Security Ethical Hacking Handbook

Figure 22: a page loading on Freenet
4.3.4 Freenet useful resource
The  Freenet  ecosystem  is  kept  alive  by  the  community,  constantly  creating
new materials. Most of it is political propaganda, or whistle blowing against the
abuse perpetrated by governments or public entities, however we cannot exclude
the presence of marketplaces, pornography, and graphic content.
Freesites
Freesites  are  the  essence  of  Freenet.  They  are  user-created  and  loaded
directly from the Freenet client dashboard.
How to create one is explained here:
http://localhost:8888/insertsite/
; you can
also find tools like Sharesite and FlogHelper
[52]
to facilitate the creation, while
the list of the active sites is broken down to three tiers
[53]
:

Enzo’s Index contains all sites, sorted by language, category, etc.

The Filtered Index contains sites, excluding the disturbing ones.

     
Nerdageddon  mostly  contains  open  source  documents  and  informative
sites.
Besides  the  above  official  ones,  I  wish  to  share  some  non  official,  but
complete ones:

Linkageddon is organized as Nerdageddon but without any site filtering.

     
The Ultimate FreeNet Index is another index filled with freesites, you can
choose the category.

     
TPI: The Public Index, a website directory, autonomously managed by the
community. The instructions to reach a freesite are available at the bottom of the
page.

AFKindex, a directory updated through Freenet crawling. Erotic and porno
sites are filtered out.


Once loaded, the freesites stay within the network and are shared by peers, as
long  as  they  get  regular  views.  If  ignored  for  too  long,  they  are  automatically
deleted.
Social Networking
Freenet  has  an  internal  suite  of  programs,  allowing  communications  among
users,  something  impossible  with  the  static  freesites,  that  allow  only  “one-to-
many”  communications.  To  learn  more  about  these  tools,  visit  the
Communication page
[54]
.
Mail
Freemail  is  the  official  tool  to  communicate  with  others  in  the  Freenet
network. It is pre-installed in the Freenet package, but is not enabled by default.
To  enable,  go  to  the  plug-ins  page
[55]
,  select  Freemail  and  click  the  “Load”
button.  This  tool  allows  you  to  communicate  only  with  Freenet  user,  or,  better,
those  belonging  to  the  Web  of  Trust.  WoT  is  an  additional  plug-in  (it  must  be
enabled  just  like  Freemail)  allowing  to  have  an  identity  recognized  within  the
network.  Once  enabled,  you  have  to  setup  a  fist  alias  before  you  can  use
Freemail,  then  you  will  be  able  to  create  and  use  multiple  aliases  at  the  same
time.  In  other  words,  Freemail  can  be  used  only  by  the  registered  users  in  the
Web of Trust, and not outside the Freenet network.
4.3.5 Security in Freenet
We  assume  that  Freenet  is  a  very  secure  network,  as  long  as  it  is  used
properly. Keep in mind that your privacy will depend on the number of “friends”
you  are  connected  to  in  Freenet:  if  you  haven’t  any,  you  will  be  connected  to
strangers. For this reason, Freenet can be configured for different security levers:
you  can  change  them  in  the  dashboard  menu  under  Configuration  ->  Security
Level.  The  higher  the  level,  the  higher  the  network  security  (compromising
speed).
Furthermore,  Freenet  has  a  second  option,  in  case  your  computer  is
confiscated:  from  the  Security  Level  page,  you  can  set  one  of  four  encryption
levels,  from  the  weakest  (no  encryption  at  all)  to  the  most  paranoid  one
(everything related to Freenet is wiped at every restart). Personally, I recommend
you to use the Medium-High level on Linux Live systems (we will cover them


later), while the Paranoia Level should be used only in Virtual Machines or on
Computers you use frequently and consistently.


5. Combo Network
Now we are ready to discuss one of the hottest topics about anonymity: TOR
and VPN – how to use them jointly? Or, better, TOR via VPN or VPN via TOR?
Conventionally,  we  will  relate  to  TOR  as  an  “anonymizing”  network.  We
won’t cover the others, because their nature cannot be related to Clearnet.
Before  we  can  answer  such  questions,  we  need  to  remember  some  key
points: regardless of the use of TOR, you should always use VPNs not just to be
anonymous, but rather to protect yourself when you use an unsafe hotspot  (like
airports, hotels, bars etc.) or if you’re afraid your home router is monitored. All
networks, and especially the public ones, may be traffic-monitored. This reason
should  be  enough  to  have  an  active  VPN  all  the  time,  regardless  of  how  much
you feel safe about the hotspot you connect to.
Our  navigation  data,  or  at  least  the  ones  we  want  to  safeguard  (emails,
passwords, credit cards and whatnot) must pass through a secure VPN, in order
to avoid attacks in the local network. Also remember what we mentioned about
VPN no-logs.
It’s true that you can do the same with TOR, as long as you take the proper
precautions;  it’s  also  true,  however,  that  using  the  sole  TOR  network  could
probably  make  you  a  suspect.  Of  what,  you  may  ask?  Whether  you  are  doing
something  illegal  or  not,  the  NSA/FBI/GCC  and  all  the  other
governmental/private monitoring bodies want to know if you are using TOR or
even just Linux. One of those blacklists is known as NSA watch list online, but
we cannot exclude that others than NSA deal with this kind of business. How do
they now if you are using TOR? They just ask the ISP. Then you must not only
hide your activities to sites and online services, but also leave no visible traces to
the ISP.


5.1 TOR via VPN
This configuration follows this pattern
Computer -> VPN -> TOR -> Internet
Assuming  that  your  device  connects  to  the  Internet,  when  you  use  a  VPN
everything  passing  through  the  net  will  be  encrypted,  and  from  such  tunneling
you  will  connect  to  TOR  routering,  hiding  the  network  access  from  the  ISP.  I
mentioned no-logs above because, using a VPN you hide your activities from the
ISP,  but  if  the  VPN  doesn’t  enforce  a  serious  privacy  policy,  it  may  store  your
activities, compromising all your efforts.
Connecting  to  TOR  after  the  VPN  tunneling,  the  VPN  provider  may  know
you’re  using  the  TOR  network,  just  like  an  ISP.  The  latter  may  know  you  are
connecting to a VPN, but not to the TOR network. Then, the VPN provider may
store  all  the  non  encrypted  activities.  We  may  choose  a  TOR  over  VPN
configuration for many reasons, including:
Pro
-
     
You  hide  your  TOR  activity  from  your  ISP,  limiting  the  NSA  watch  list
effect
-
You can access the deep web (.onion addresses et similia)
-
The TOR entry node won’t get your IP but the VPN one
Cons
-
You will tell your VPN provider you’re using TOR
-
     
If the exit node is compromised, your VPN provider will be exposed (but
not your real IP), in this case, choose a really secure and logs free VPN
-
Some TOR exit nodes reject connections from VPNs.
Some  VPNs  offer  “TOR  over  VPN”  services,  simply  performing  a
configuration in OpenVPN. If your VPN provider allows that, probably you can
find a dedicated section in their website to learn how to do it.


5.1.1 How to perform TOR via VPN
As  an  Operative  System-level  solution,  you  can  connect  the  Whonix
Workstation  to  your  VPN,  while  the  Gateway  will  be  already  connected  to  the
TOR network. We will discuss Whonix later, so if you wish, take a look at that
Download 2,32 Mb.

Do'stlaringiz bilan baham:
1   ...   21   22   23   24   25   26   27   28   ...   57




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish