Hacklog Volume 1 Anonymity: it security & Ethical Hacking Handbook


particularly touchy, you could have never noticed them, but trust me, you can be



Download 2,32 Mb.
Pdf ko'rish
bet53/57
Sana01.01.2022
Hajmi2,32 Mb.
#289651
1   ...   49   50   51   52   53   54   55   56   57
Bog'liq
Hacklog Volume 1 Anonymity IT Security Ethical Hacking Handbook


particularly touchy, you could have never noticed them, but trust me, you can be
identified just for the way you act or write.
Some time ago, we had a moderator who was removed for his negligence in
some  tasks.  This  person  wanted  to  have  “revenge”,  disrupting  our
communication channels with his residual powers; he did it using nicknames he
often  used  among  friends  as  well.  Although  we  already  obtained  evidence  by
comparing IPs, it was enough to see his messages to identify him.
What  about  activity  times?  Are  you  predictable  or  do  you  work  H24?
Remember that – especially at the governmental level – monitoring is performed
manically. Every text is thoroughly analyzed, and the writing person’s character
is profiled.


11.4 Disposable email
Disposable  or  Temporary  Email  services  allow  to  create  e-mail  addresses
that are not entitled to physical persons and don’t require any registration.
They’re  partially  designed  to  allow  sign  up  for  portals  that  require
subscription  without  being  included  in  annoying  mailing  lists  sending  SPAM
materials for an indefinite period of time.
Some  Temporary  Emails  allow  to  receive  and  send  mails  in  complete
anonymity;  obviously,  the  user  will  lose  the  entire  history  of  sent  and  received
messages once the digital hourglass expires (some services allow to extend time
at regular intervals).
Among the services allowing the sole mail reception, you can find:

http://www.throwawaymail.com

https://temp-mail.org

http://it.getairmail.com

https://www.mailinator.com

http://www.dispostable.com

https://www.emailondeck.com/

https://maildrop.cc

https://10minutemail.com/

https://www.mohmal.com/it
while those also allowing to send mail include:



https://www.guerrillamail.com

https://mytemp.email

http://www.yopmail.com/en/

https://www.crazymailing.com
It’s up to you to decide how you can use them. My only suggestion is: treat
them  as  disposable  sites,  therefore  they  shouldn’t  be  used  for  confidential
information;  furthermore,  ensure  to  be  properly  anonymous  before  accessing
them.
11.5 If you manage a Site/Blog/Forum
If  you’re  mainly  interested  in  anonymity  because  you  wish  to  hide  your
identity, ensure to follow this guidance:
-
     
If  you’re  launching  a  new  website,  you  may  want  to  start  with  a  free
hosting  service.  There  are  lots  of  them  out  there,  and  some  are  designed  with
pre-installed CMSs (just like
wordpress.com
). Keep in mind that, if you wish to
make  a  qualitative  leap,  probably  you’ll  be  offered  some  paid  solutions.
Anyway, you should prefer services that WON’T require billing information and
also  offer  anonymous  payment  methods,  just  like  Bitcoins  (please,  refer  to  the
crypto-currencies chapter).
-
     
It is quite improbable that the portal you’re managing gets compromised;
however,  this  is  not  impossible.  Languages  like  JavaScript  allow  to  apply
stylometry techniques to analyze the number of keyboard inputs per minute and
the mouse operations; such data may help someone obtaining useful information
about  the  way  you  write,  your  skills,  your  frequent  grammar  errors,  your
punctuation style, your dominant hand and so on. In this case, it may be useful
writing your articles or posts on a local editor first, then copying and pasting the
text on the site you’re managing.
-
     
Especially  in  blogs,  you  can  schedule  when  your  articles  must  be
published.  That  can  be  a  good  way  to  remove  traces  for  who’s  trying  to  geo-
localize you.


-
     
Don’t forget to erase all the metadata from the files you’re uploading, in
Download 2,32 Mb.

Do'stlaringiz bilan baham:
1   ...   49   50   51   52   53   54   55   56   57




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish