Doctor Who Security and Encryption FAQ - Revision 22.3
Doctor Who Security and Encryption FAQ - Revision 22.3
by Doctor Who
There are countless reasons why someone may need the reassurance of
anonymity. The most obvious is as a protection against an over-bearing
Government. Many people reside in countries where human rights are
dubious and they need anonymity to raise public awareness and publish
these abuses to the world at large. This Faq is to help such people.
You need PGP (Pretty Good Privacy) for your Email and TrueCrypt
version 4.3 (or later) for your hard drive encrypted files.
PGP is available for all versions of Windows, Linux, Unix, Mac and
others. The source code is available for compiling your own version
should you wish.
TrueCrypt has now matured into a truly excellent open source encryption
program. It does not display any file header info to help a snooper
identify the file's purpose. The header is encrypted and shows as
random garbage. The program will encrypt both files or a complete drive
partition. There are advantages and disadvantages to both options. I
prefer the partition option. Truecrypt does not need the partition to
be formatted, nor need it display any drive letter. So it could use
a portion of unformatted space at the end of a drive. This space can be
any size you wish. I strongly urge you to study the included manual
before using it for any critical purpose.
The source code is freely available so it means anyone with the ability
can compile the same program. The importance of this cannot be too
strongly stressed. It means the possibility of a hidden back-door is
reduced to a negligible risk.
I will assume that anonymity is also very high on your list of needs
and so will concentrate on that issue further down the Faq.
Anybody sending you mail simply encrypts their message to you with your
PGP public key. The public key is obviously not secret - in fact it
may be spread far and wide so that anybody can find it if they wish to
send you encrypted Email. The easiest way to ensure this is by sending
it to a public key server. On the other hand, some prefer not to share
their key, except within a small closed group. Your choice.
The only way to decrypt this incoming message is with your secret key.
It is impossible to decrypt using the same key that was used to encrypt
the message, the public key. Thus it is called asymmetrical encryption.
PGP is simplicity itself to install and use. It even offers to send
your newly generated public key to a key server.
For your normal hard drive encryption, you will need a symmetrical type
of encryption program. This means the same key is used for both
encryption and decryption. There are many such programs. I strongly
recommend TrueCrypt.
With PGP a public key is chosen to encrypt the message. PGP will then
generate a one time session key which it uses to encrypt the message.
This session key is then itself encrypted with the public key of the
intended recipient of the message. This encrypted copy of the session
key is then wrapped in the headers and sent along with the encrypted
copy of the message to the recipient. Only the recipient has the
private key which can decrypt this session key. If there are multiple
recipients, then this session key is encrypted to the public key of each
recipient in turn. All these different encrypted versions of the
session key are then wrapped in the headers of the message. Each
recipient can decrypt his version of the session key, which will then be
able to decrypt the message. PGP also has a keystore. The keystore is
protected by the passphrase.
The sender of a PGP message may choose to sign a message. The message
may or may not be encrypted. PGP will then encrypt the hash of the
message contents using the senders private key. His public key can then
be used by the recipient to check that this hash of the message is
identical to the original, thus proving it was made using the sender's
private key. Only one private key, the sender's, can encrypt the hash
such that it will check out correctly with the sender's public key. If
even a white space between two words is closed up in a message, the
signature will show as bad. This offers a very secure method of checking
both the accuracy and the authenticiity of a message.
Truecrypt and many other symmetrical encryption programs store the key
within the headers of the partition or container. One question often
asked by newbies is whether the passphrase is also stored somewhere
within the encrypted file. No. The passphrase is passed through a hash.
It is the hash output that is stored within the headers of the encrypted
container. The program will compare this hash with the hash it produces
from your passphrase that you type in to mount (open) the container. If
they are identical, the program will use your passphrase to decrypt the
key that the program generated to encrypt the disk or container. It is
this key that will then be used to decrypt the disk or container on the
fly. Truecrypt explains this in detail within the users manual that is
downloaded with the program. I strongly urge you to read and digest.
Even with Firefox or any other Web browser it is imperative that you
disable Java and Javascript. More about the reasons why later in the
Faq.
In some countries, even this might not be enough. Such countries can
force you to hand over your passphrases to these encrypted drives by
threatening imprisonment. As more and more judicial systems seem to be
leaning ever closer to this sort of injustice (injustice because the
culprit is being forced to self-incriminate himself which is in direct
violation of Article 5 of the Bill of Rights; the right to refuse to
be a witness against oneself), so it is more and more important for
the individual to protect himself.
VMWare Workstation 6 will allow you to create a new bootable Windows (or
Linux or Solaris) operating system, after having already booted into
Windows or Linux in the usual way. It is necessary to open your
Truecrypt container or partition from within Windows first, but that is
the limit of your liability. Meaning that you then start VMWare
Workstation 6 and choose to boot into your virtual Windows from within
your now opened Truecrypt drive. There is always the slight risk of a
Trojan or Tempest attack. To minimize this risk, you must choose a good
firewall and anti-spyware program. I recommend Zonealarm for this.
The VMWare program installation can and should be within your usual
desktop. This might sound alarming, but it is not a problem. What
is important is that your VMWare virtual machine must be installed
within your secret TrueCrypt drive.
Once setup, you will then use it exactly as you would your usual desktop.
This means you boot into your Windows/Linux desktop, then you open your
TrueCrypt drive, then start VMWare, open your Virtual Machine by
navigating to it in your TrueCrypt drive, then starting it by clicking on
"Power on this virtual machine". You shut down by reversing this
procedure.
Note 2: It is important to tell VMWare not to share its memory with its
host (the host is your usual desktop or laptop operating system).
Yes. Using BartPE (do a search on the Web if you wish to find out
more). I found it very slow. Too slow for my purposes. The VMWare
documentation talks of creating an ISO file from your virtual machine
and presumably burning to CD or to an USB stick and then using it to
boot. However, this CD/DVD or USB stick will not be encrypted and is
therefore a possible subject for forensic examination in the case of a
search. In any case it will be very slow in use, as is the BartPE.
I recommend either PGP Tools which comes free with PGP or Kremlin. Of
course this is not necessary for files within your encrypted drive.
But is essential to clear files off your computer that are outside your
encrypted drive. Fortunately, if you follow my suggested method, there
should be no traces of any of the activities you perform within your
TrueCrypt virtual machine. As already explained, VMWare cannot see
your usual C drive, or indeed any other of your drives unless you tell
it to do so.
11. Does using both VMWare Workstation 6 and encryption slow things up?
13. I use Mac, OS2, Linux, (fill in your choice), what about me?
If you follow this FAQ, the only evidence that will be found is that
you have both VMWarer Workstation 6 and Truecrypt, among all your other
desktop programs. More details further on about ensuring good
plausible deniability with the use of Truecrypt. If you are paranoid
about temp files, I suggest using Windows Washer.
Note: Windows Washer will not remove evidence of the use of TrueCrypt.
Thus my strong recommendation that you create a honeypot version to
justify its presence on your computer.
15. What programs can I install into this new bootable operating
system?
All your usual programs that you need to use your computer normally,
plus the more specialised ones to help you achieve anonymity. See
further down the Faq. With VMWare, you are literally opening a new
window (pun intended) into your online activities. A very secret
window, with virtually no connection with your usual Windows system.
Never surf naked. Always, always use a proxy. The easiest method is
to use Tor. Tor is now bundled together with Vidalia and Privoxy.
it is simple to install and use. Vidalia is the control panel for
Tor. However, you can achieve the same by right clicking on the Tor
icon on the Taskbar.
All the files for your new (secret) Windows (or Linux) operating system
are held within your Truecrypt drive. This might be within a hidden
Truecrypt partition, recommended of course.
You will create an initial VMWare Windows (or Linux) operating system
that is openly visible for inspection as justification for its
presence on your computer.
You should also create a TrueCrypt container into which you will put
some private or moderately embarassing files as justification for the
TrueCrypt container. Again, this is justification for its presence
on your system.
But you will also create a second truly secret Truecrypt partition or
container into which you will install another virtual machine. It is
this version that will contain all your truly secret data.
Make copies of all your PGP keys, a text file of all your secret account
numbers and passwords and the other details for your secret bank
accounts, full details of your Virtual Debit Card account, copies of INI
files for critical programs, your anonymous Email account details plus
anything else that is so critical your life would be inconvenienced if
it were lost. All these details should now be stored in a folder
called "Safe" on your encrypted drive. A copy of this folder should
be stored on an encrypted CD, preferably within the hidden part of a
TrueCrypt container and stored off-site.
If you are going to rely on any variation of the ploys suggested here,
then you should keep this Faq within your hidden encrypted drive.
You will need to take further precautions whilst you are online against
threats from hackers and snoops.
20. What are these threats?
That is but the start. You also need a Web browser that does not leak
information, plus a method of passing data across your ISP's servers
strongly encrypted to prevent prying eyes from watching all that you do
on the Net.
24. I use the Net for Web browsing, Usenet and Email, am I safe?
Whilst you are online anyone could be monitoring your connection.
They do not need access to your computer to do this. They need only
have access to your ISP. To minimize these risks you must encrypt
the data passing across your ISP's servers.
You need four main programs besides the news client such as Agent (my
favorite) and the Web browser such as FireFox (again my favorite) and
the Email client such as Quicksilver, (yes, another favorite).
You can still receive HTML and attachments with Quicksilver, it just
protects you by putting them into a separate folder where you can view
them at your leisure when offline.
Other programs are: Stunnel, Freecap, Privoxy and Tor. All are free
and all are open source.
They are all very easy to use and really can be setup by a newbie if
you follow the setup instructions I offer in Part 2. They are totally
transparent to the user. Once setup there is no maintenance or
searching for proxies, etc. It is all done in the background with no
further input required from you.
Stunnel encrypts the data between you and your news server and is very
simple to use.
Freecap is also easy to setup and acts as the bridge between Stunnel
and Tor.
In basic language Tor is a socks server that accepts and encrypts data
from any program that is "socksified", meaning set up to communicate
with it.
Remember, the data is encrypted both by Tor which uses TLS (Transport
Layer Security) and by Stunnel which uses SSL (Secure Socket Layer) as
it leaves your desktop through your ISP and on into the Tor network.
Where it exists the Tor network it continues onwards as SSL encrypted
data on its way to the news server or wherever.
For Web browsing we need Privoxy. This again acts as a bridge between
your browser and Tor.
Privoxy will bridge the connection between your browser and Tor the
Socks proxy host. It will minimize pop up ads, etc. But its main
advantage is it will help prevent information leakage from your desktop
to any third party trying to sniff your data. Used in conjunction
with Tor it ensures all your Web browsing is totally anonymous.
There is no need to close Privoxy if you wish to use your news client
or whatever. These programs are totally transparent to you once they
are running. The latest version of Tor is supplied with the Vidalia
bundle that automatically installs and sets up Privoxy for you.
Vidalia also has a neat looking control panel that allows you to
choose several options when using Tor. All very easy and obvious.
27. Is the data encrypted after it leaves the remote server and Tor?
Yes, providing you are using Stunnel. The only precaution you must
take to ensure both privacy and anonymity, is to use Stunnel in
combination with FreeCap, which ensures it routes all data over the
Tor network.
You can send cash, a postal order or use a prepaid Debit Card.
There are now several news servers offering SSL (Stunnel) encrypted
connections through port 563. Thus I strongly advocate you choose one
of these. It costs no more to enjoy this extra level of security, so
why accept anything less?
There are also remailers that accept an SSL encrypted connection, which
significantly improves your Email security.
I recommend opening a simple POP3 account with one of the many sites
offering a free Email service. Provided you only ever access them via
Quicksilver and Tor, you should be safe.
One example of this is Hotpop. There are many others. Take a look here:
http://www.emailaddresses.com/email_pop.htm
All these are only soft anonymous, but they can all be hardened by using
Quicksilver and ensuring it routes only through Tor. You could use
Hotpop as your Email incoming POP3 account and send or post through Tor
and the Mixmaster remailer network.
Both Hotmail and Hushmail (and the latest version of Yahoo) insist on
you having both Java and Javascript enabled before they allow you to
open an account. This is unacceptable to me. I would never recommend
using any Email service with such a requirement. Explanations follow in
Part 2.
You need a VMWare virtual machine to run Windows (or Linux) from its
default location in "My Documents" as your honeypot.
You need TrueCrypt into which you should store personal data that may be
revealed under duress. This is your honeypot secret data. You should
also have a hidden TrueCrypt drive from which your VMWare virtual machine
is run. This is your truly secret encrypted drive.
You need PGP and Quicksilver for your Email. These recommended programs
should help you achieve a very high level of plausible deniability and
privacy.
You will need other programs to ensure you are anonymous whilst online.
You need to be anonymous online for both browsing and whilst subscribing
to any Web services. For this you need at least one, but preferably two
Pecunix accounts and a pre-paid Debit Card. You must only access your
email POP3 accounts using Quicksilver in conjunction with Tor.
Part 2
One slight problem you will likely encounter is with Windows. It will
probably tell you to validate your installation. Whether this happens
will depend on what the differences are between your existing
installation and the new virtual one.
In the following screen choose "Allocate all disk space now". This
will considerably speed up the program's operation. Of course, it is
referring to the virtual disk that you are going to create, not your
usual drive C disk.
After creating the virtual machine, you are ready to install a bootable
operating system. You will need your Windows (or Linux) installation CD.
VMWare will take care of all the little details of how to ensure there
is no conflict with your usual Windows system. When you have inserted
your Windows or Linux installation CD, on the tool bar click on "Power
on this virtual machine".
You should then see the initial black screen within the program window,
with the usual MS Windows (or Linux) startup messages of examining your
computer, copying files, etc. Just leave it to install in the usual way.
In my case I found only my external USB connected DVD writer was seen by
VMWare for installation of the windows operating system. My built-in
CD writer seemed invisible. So if your installation cannot start, check
if it is because it cannot see your CD or DVD. Once this is sorted, all
else chould be plain sailing.
This is the longest bit: installing the operating system. When it has
completed, you should click on VM > Install VMWare Tools. These will
allow you to have much improved screen resolution. In fact it allows
superb screen quality, as good as your usual desktop.
You should now check your Internet connection. If you are using an ADSL
modem connected to an ethernet port, it will be seen by VMWare by default.
If you are using an USB connected modem, there may be more hassle before
it is seen. To check, just click on Windows Update. If it connects to
the MS Website, all is well.
When you are happy with things, take a snapshot. Just click on the icon
on the tool bar. This is simply a precaution in case something goes
wrong with the installation of your future programs. You can revert
back to this state at any time by clicking on Manage Snapshots. Easy.
After you have installed all your programs, I suggest taking another
snapshot. You now have a safety net if anything goes wrong in the
future. Naturally, you can take as many snapshots as you please, disk
space is the limiting factor here. VMWare is an excellent vehicle
within which to test out magazine cover CD/DVD's or downloaded software
prior to normal installation on your desktop. You can at any time
revert back to a previous snapshot without worrying whether it has
messed up the computer.
Remember it is a virtual drive. Your new system when created, cannot see
or even know of the existence of your usual drive C. Thus it cannot write
to it, except to the VMWare virtual machine files within "My Documents".
In fact, unless you tell it, it cannot see any of your other computer
components, apart from your mouse your keyboard and your monitor. All
else is a closed book. You must tell it which USB components you wish it
to see and use. For example, you may choose to use an external DVD writer
or an external hard drive. To communicate with anything else, on the
Toolbar click on VM > removable devices > USB devices > click to enable
any from the drop down list. When you enable anything, expect your
desktop to tell you it is now safe to disconnect the device. This is
VMWare doing its thing by taking complete control of the component away
from your desktop.
Click on File > Import, and follow the import wizard. It really is very
easy. You can make changes to various things, such as the size of the
virtual machine's hard drive, RAM, or network connections, if necessary.
For your first attempts, I suggest just accepting the existing settings.
With practice you will realize that you should ideally allow a maximum
virtual disk size around half of the TrueCrypt drive size. Snapshots
take up gigabytes of space and it is surprising how quickly you can fill
what was originally a huge Truecrypt drive. Of course there is no need
to keep all the snapshots. You may decide to keep only the first and the
latest.
You will find that with Windows you will normally need to validate your
new installation at some point. I would not bother unless essential to
log on, until you have finished experimenting. You may decide to scrap
that install and try again and again and. . . ! There is a very steep
learning curve with VMWare. Trust me, it is well worth it. I know, I
nearly threw it away several times before I truly mastered it.
You must also defragment this virtual drive C. Do this exactly as you
would with a normal hard drive. In fact you need to do it thrice over.
Once from within the up and running virtual machine by going to "My
Computer" and right clicking on the C drive and choosing Tools and defrag
and then after shutting down VMWare displays a summary view of this virtual
machine. This shows among other parameters, the size of the hard drive.
By left clicking on the hard drive you choose utilities and defrag.
Finally, after closing this virtual machine, from within your usual desktop
you can defrag your TrueCrypt drive by right clicking on its drive letter
in "My Computer" and choosing Properties > Tools > defrag.
Nothing you do within your virtual Windows operating system should appear
in your usual Windows registry. However, the VMWare virtual machine
itself contains a Windows registry and swap file. Unless this virtual
machine is within a TrueCrypt container, data held within it will also
appear in plaintext on your real Drive C hard drive. Thus it is imperative
that your secret virtual machine be installed within a secret TrueCrypt
drive.
A few other important points. If you live in a country where there is the
possibility of being raided without any warning, you must have some means
of switching off your computer instantly. Better to lose some data than
your life. Also, ensure you have disabled the hibernation feature within
your normal desktop. I am aware this all sounds very melodramatic, but
some who will be reading this Faq live in very repressive regimes where
human rights are non-existent.
VMWare should be openly installed and visible using its initial default
choice of location in "My Documents". This is your honeypot VMWare
installation.
Your hidden Truecrypt container will probably be far larger and hold
your truly secret VMWare virtual machine. Into this installation will
be made all the programs you need for online security and anonymity.
It might also hold all data that is precious and very private. Data
that you do not wish revealed to the rest of the world.
There are many variations on the above scenario. If you can think of
a superior way of doing things, excellent! The more variant your
ideas, the better your plausible deniability will be.
Another small hint: If you ever wish to delete very large quantities
of data from your secret TrueCrypt container, you might be tempted to
simply format it using Windows. Indeed, Windows will oblige and do it.
But be prepared for similar write behind cache failed error messages.
Either delete unwanted files or use TrueCrypt to re-format the drive.
Experiment. I suspect that your first attempts will be written off and
further attempts be made before you are truly happy with all apsects of
your system. Remember, that it is likely that windows will demand you
validate these installs. Sometimes, a copy can be made without re-
validating. Some enterprising soul may realize they can import their
complete drive C and use it as their virtual machine. True. But that
install will likely contain MSIE and perhaps outlook, plus some personal
details such as credit card usage, etc. Bad news. Also, Windows will
know what you have done and perceive it as an illegal copy and may
prevent you from logging on until you have re-validated the copy. What
you are doing is perfectly acceptable to MS, provided it is on the
original machine on which the original copy of Windows was installed.
There are five other programs besides VMWare and TrueCrypt that I
recommend for security and anonymity:
And three others recommended for Email, Usenet and Web browsing:
Quicksilver, Agent and FireFox.
PGP: http://www.panta-rhei.dyndns.org/downloads/PGP/pgp658ckt08.zip
TrueCrypt: http://www.truecrypt.org/
Tor comes bundled wth Vidalia and Privoxy. Get them here:
http://tor.eff.org/index.html.en
Stunnel: http://www.stunnel.org/download/binaries.html
stunnel-4.05.exe
stunnel-4.05.exe.asc (digital signature file optional but recommended)
OpenSSL Libraries (required files). These are put in the same folder
as Stunnel:
libssl32.dll
libeay32.dll
libssl32.dll.asc (optional)
libeay32.dll.asc (optional)
FreeCap: http://www.freecap.ru/eng/?p=index
Agent: http://www.forteinc.com/main/homepage.php
FireFox: http://www.mozilla.org/products/firefox/
Quicksilver: http://www.quicksilvermail.net/
Note: There are later versions of PGP. Ignore them. They are closed
source.
All instructions below assume you are installing into your secret
VMWare virtual machine with TrueCrypt.
Create a new folder called Proxy. This can be within Program Files or
in the root of the virtual drive. Open Proxy and create the following
sub-folders: FreeCap, Stunnel. Install by copying all of the
downloaded files of each of these programs into their respective
folders. Ensure the library files for Stunnel are in the same
sub-folder.
Each program can then have shortcuts made and placed on your virtual
desktop.
The latest version of Tor is now offered with the Vidalia bundle which
includes Privoxy and a Windows install. Ensure you download the latest
release. An earlier release suffered from a fatal security flaw.
Note: I recommend checking back regularly for the latest version of Tor
as it seems to be changing very frequently. I also recommend you take
the bother of reading at least the basics of how Tor works.
Copy and paste all of the following in Notepad and save it in the
Stunnel folder, name the file stunnel.conf:
#[Meganetnews_NNTPS]
#accept = 119
#connect = news.meganetnews.com:563
#delay = no
[nntps]
accept = 119
connect = news.aioe.org:563
delay = no
#[Putty_nntps]
#accept = 119
#connect = news1.meganetnews.com:563
#delay = no
#[nntps]
#accept = 119
#connect = secure.news.easynews.com:563
#delay = no
#[nntps]
#accept = 119
#connect = news.x-privat.org:563
#delay = no
#[Octanews_NNTPS]
#accept = 119
#connect = snews.octanews.com:563
#delay = no
#[putty_nntps]
#accept = 119
#connect = 127.0.0.1:563
#delay = no
Remove the # from the beginning of any bunch of lines you wish to
make active. The above is setup to optionally allow (When the # is
removed) routing through several news providers using a secure SSL
connection.
#[putty_nntps]
#accept = 119
#connect = 127.0.0.1:563
#delay = no
The file stunnel.conf does not exist until you create it. Stunnel
cannot work without its presence. You will just get some server
error. This might happen if you or Windows names it incorrectly.
You may need to get Explorer to show extensions to known file types,
otherwise Windows may save the file as stunnel.conf.txt. If you are
not sure, go to Tools > Folder Options > View > uncheck "Hide
extensions to known file types". Click on Ok.
Go > File > Settings > Proxy Settings > Default Proxy.
Type 127.0.0.1 into the server window and 9050 into Port. Click OK.
Under Protocol ensure SOCKS v5 is checked.
With the program back at the opening screen, drag and drop the Stunnel
shortcuts into the FreeCap window. You will immediately see the Stunnel
icons position themselves along the top of the screen. As each is
loaded, re-name it to easily distinguish it from the others. Do this by
right-clicking on an icon and selecting Modify. Change the name on the
top line to something self-descriptive, such as Easynews or Putty or
whatever.
You have now socksified Stunnel. That is all it takes. Whenever you
run Stunnel you must start it by clicking on one of the icons from
within FreeCap, which obviously means first starting Freecap. Stunnel
secures the programs and by socksifying it with Freecap, ensures all
data is routed over the Tor network. Just minimize Freecap after
starting Stunnel. To close Stunnel, right click on its icon on the
taskbar and select Exit. Always close Stunnel prior to closing Freecap.
This ensures that no data jumps across, bypassing Tor.
http://www.socks.permeo.com/Download/SocksCapDownload/index.asp
To ensure your browser chooses to route through Tor you must now go to
its Proxy settings Window. With FireFox this is > Tools > Options >
Connection Settings.
Input 127.0.0.1 into each line except Socks Host. Leave that line
completely clear. Input 8118 into the Port window for each line, but
again leave the Socks Host line clear. Privoxy listens for connections
on port 8118 by default. This is telling Privoxy to pass on its
connections to Tor which is listening on Port 9050 by default.
Click on > Tools > Options > Web Features and uncheck "Enable Java"
and "Enable Javascript". This is very important to ensure no remote
site can take control of your desktop and invade your privacy. I
would also disable "allow Web Sites to install software"
You will find some Web sites will not now work correctly. This is the
penalty of ensuring you do not give away your private details to any
snooper who may be trying to sniff them.
Another tweak, in Control Panel > System > Advanced > Error Reporting >
click on "Disable error reporting". As a further precaution I would
do the same within both your usual desktop and your virtual machine.
You must now configure your news client by inputting 127.0.0.1 into the
window which asks for your news server name. If you have never used a
proxy prior to this, go to the screen displaying "News Server". In
Agent 1.91 this will be Options > User and System Profile > User.
Enter 127.0.0.1 for the server name. Click OK. The port is set in the
Agent.ini file to 119, do not change that. Stunnel has already been
configured to listen on port 119 anyway and to forward through port 563.
Yes, you can change this port, but only do so if you know what you are
about.
Note: Stunnel can only be used with a news provider that offers a
secure (NNTPS) connection (by default on port 563). For other news
providers Stunnel is useless. For these less secure sites I suggest
socksifying Agent, by dragging and dropping the Agent shortcut into
FreeCap. Not nearly as secure, as your data will not be encrypted after
it leaves the Tor network on its way to the News provider. It costs no
more to subscribe to a secure news provider than it does to one that
does not offer an encrypted connection. So why choose anything less?
Each of these four programs, Stunnel, FreeCap, Privoxy and Tor accepts
connections from either your Web browser, into Privoxy and on to Tor, or
from your News client into Stunnel, socksified by FreeCap and again on to
Tor. Many programs can be socksified, not just those mentioned. The
procedure is exactly the same, just drag and drop the shortcut of the
program to be socksified into Freecap.
You should see the Privoxy main page with the following:
If you see "p.p. could not be found, please check the name and try
again." You are definitely not accessing via Privoxy.
Note: This is an internal test, not via the Web. It just proves that
Privoxy was invoked to display that page from its own folder, which you
will see displayed if you click on "View and change the current
configuration"
You will then see a clear display of all the configuration settings.
Do not change anything unless you have a backup file and know what you
are doing.
Let's assume your Web browser is functioning as it should and you see
the p.p. page displaying the confirmatory message.
Open FreeCap and click on the Stunnel icon in the FreeCap Window.
Without opening Tor at this stage, start your news client. As a small
precaution ensure you are in an appropriate newsgroup and attempt to
download its headers. You should see connecting to 127.0.0.1
displayed on the lower taskbar in Agent or wherever in the version you
are using, followed by error reported by Winsock driver. Good. This
proves Stunnel was attempting to connect to Tor which is offline of
course, thus no connection was possible.
Now start Tor. Try again. Hopefully this time you will have more
success and it should connect to the news server and start downloading
headers.
Re-start Tor. Re-establish the connection with the server and start
over. This time close FreeCap. Notice the download will continue.
Do not panic! It is still accessing via Tor. Prove this for yourself
by closing Tor and notice the download again stops immediately and
there is the same Winsock error. However, do not normally close any
of these programs until you are ready to go offline. Always close
the news reader first to ensure no data is being accessed which might
just possibly jump across and appear in the clear.
The usual way to open each of these programs is go online with your
ISP. Open Tor, open Freecap, start Stunnel from within FreeCap. Then
last of all open your news reader. Test the system from time to time
to satisfy yourself all is as it should be. Closing down is the reverse
of this procedure.
If you have got this far, you have succeeded in creating a secure and
truly anonymous network connection for both your browser and your Usenet
posting/downloading.
46. What if no exit server exists on Tor with port 563 (or 119)
enabled?
Since choosing to use SSL via port 563, I have not experienced any
bother whatsoever in connecting to Usenet.
If you would prefer to subscribe to a Secure Shell host, then you need
to use Putty as the SSH client.
You will still need Stunnel to allow the NNTPS (encrypted) connection
into your news provider and FreeCap to act as a bridge between Stunnel
and Tor. Tor is the socks proxy that hides your true IP from the
Secure Shell host server. Putty will channel everything through port
22, which should not be a problem.
The sequence is: Agent > Stunnel > Freecap > Tor > SSH server > news
server (or wherever).
Contrast that with the usual newby connection of Agent > news server,
or worse, Outlook Express > server.
Open Putty. Load one of your SSH servers, but do not yet open the
connection.
Go down to Tunnels.
L563 secure.news.easynews.com:563
Absolutely. If you choose to use Agent, it will always use your news
provider as the posting host. This is why I recommend you subscribe
anonymously to this news provider - see further down regarding anonymous
subscriptions.
If you are into heavy posting then you should use Power Post or
something similar that allows you to choose whole folders of files for
posting.
If you use Quicksilver for posting to Usenet it will always use one of
the mail2news gateways. All data from your desktop is encrypted
through to the first remailer and then on through the Mixmaster
remailers and onto Usenet. The one and only down side is that the
anonymous remailer network does not readily accept large files, such as
binaries. The remailer network was set up to transmit text files, not
binaries.
Agent can ensure that text files are included within the body of the
message, rather than being sent as an attachment. To do this ensure
you are in the posting frame and the focus is in the message frame.
Go File > "Insert text file" > and navigate to your chosen text file.
This better suits the remailer network which does not normally accept
attachments.
To post binaries use Agent or Power Post or similar and post via your
socksified Stunnel and Tor.
A warning: If you post illegal material, you may find your anonymous
account closed without warning and no possibility of any refund! Of
course no such opportunity exists when you channel through the remailer
network, which is precisely why so many choose to use it.
Fcc: outbox
Tor: 127.0.0.1:9050,4a; nowhere.invalid;
Host: panta-rhei.dyndns.org:2525
From: kwiktime <[email protected]>
From: urnym.goes.here
Chain: panta,*,*,*; copies=2
References:
To: [email protected],
[email protected]
Newsgroups:
X-No-Archive: yes
X-Hashcash:
Subject:
Unzip and install in a convenient folder. After installation go > Start >
Programs > Universal Hashcash Minter and copy or drag and drop the
shortcuts shown into your desktop, or wherever. Now all you need to
do is click on the shortcut to mint tokens, copy one of these tokens to
the clipboard so you can paste it into the header of your Quicksilver
template. Then delete that token from the list of availables.
Although not perfect (nothing is), it does offer a level of anonymity well
above and beyond what simple anonymous services (such as Hotpop) offer.
It uses the Mixmaster remailers and has protocols to ensure your messages
are very difficult to trace and decrypt. Remember, by using Quicksilver
in the recommended way, you are not just using Mixmaster, but also using
the Tor network which then sends all data on to the Mixmaster remailer
service.
In the above cases, this anonymity is further reinforced by using the Tor
network to anonymize you from the panta-rhei or banana first remailer in
the Mixmaster network. Double anonymity - excellent.
You can set up Quicksilver to look for Emails on any POP server such as
Fastmail.fm or hotpop.com. All your mail is then recovered via the Tor
network which helps you remain anonymous.
Go > Tools > POP Accounts > Proxy > 127.0.0.1 for Proxy Server, 9050 for
Port and Socks level 5. Ignore the two lower lines. This will route
your Email path through Tor. You can choose to ensure that quicksilver
only downloads PGP encrypted mail and to delete or leave on the server.
Very flexible.
P2P using eMule or whatever is very risky from a privacy view point,
unless you know what you are doing. I believe some have used it in
conjunction with Find.not, but you will have to do your own research
about this. I am sorry I cannot help as I have never tried it.
The Tor Website claims you can use Tor for IRC and IM, but again, I have
never used Tor in this fashion myself.
Apply on their sites. But always access via Tor and ensure you subscribe
anonymously. The easiest way is by means of a prepaid Debit Card.
54. I want a Pre-paid Debit Card, how and where do I get one?
They will accept many forms of payment. Pecunix is now my preferred way
using two different accounts back to back.
The Debit Card is acceptable to many more web sites, especially news
providers, than Pecunix (or my earlier choice, e-Gold). Note this card
is solely for Net use. It is a virtual card. You get Emailed the card
details, you do not receive a physical card through snail mail. Thus the
name and address you supply need only match the name and address you have
used when creating your second Pecunix account. Naturally, this is the
same address you must use when using your card to subscribe to a Web site.
But this name and address is your choice! If in the United States, the
Zip code must match your choice of address. But so far as I can tell,
that is the only check that is made. Just take an address out of the
phone book, but change the name and house number.
Of course the Email address you offer, must be accurate, secure and most
importantly, anonymous.
Cost. They charge you 50 US Dollars, plus 6 percent of the value you
wish to load into the card. At the end of the year, you need to re-
apply for another. It can only be used for Web purchases.
HKEY_CURRENT_USER\Software\Microsoft\WindowsMedia\WMSDK\General\UniqueID
This ID number can be retrieved by any web site through the use of
JavaScript. Hence the reason why it MUST be disabled. The ID number is
called a supercookie because it can be retrieved by any web site. This
supercookie can be retrieved by any site to track you and web sites can
share this information with each other, allowing them to create a
sophisticated profile about your Internet usage. Worse, cookie blockers
cannot block its use!
The easy way to fix the problem is in Windows Media Player > Tools >
Options > Player. In the "Internet settings" section, uncheck the box
next to "Allow Internet sites to uniquely identify your Player."
Or you can ensure that Windows Media Player is not enabled at all. To
do this go Start > Settings > Control Panel > Add/Remove Programs > Set
Program Acess and Defaults > Custom > clear the button for both Real
Player (another bad one) and Windows Media Player and also clear the
button where it says "Enable access to this player" for both of them.
I choose both of the above methods as I believe in belts and braces
when it comes to privacy.
58. Surely all this is totally over the top for the majority of users?
It is certainly over the top for 99 per cent of users for 99 per cent of
the time. If, however, you are the one in a hundredth and you do not
much like the idea of being at risk for 1 per cent of the time, then no,
it is not over the top at all.
In any case, using these tactics helps create smoke which in turn helps
protect those who really do need all the protection and security they
can get.
Remember this Faq is intended to help many different people. Some may
be living in deprived conditions, in countries where human rights abuses
are a daily fact of life. There are many more undemocratic countries
than democratic ones.
Restoring is just as simple. Just open the secret container and copy
into your TrueCrypt partition.
60. Are there any other hints?
A few items that may be of interest if you run Windows XP, although not
of any value as snoop protection. To make your system run faster do
this: Right-click on the Start menu button > Properties > Start
Menu > Classic Start menu > Customize > Advanced Start > scroll down to
"Show Small Icons in Start menu" and uncheck the box. Click OK, again
OK. Now right-click on your Desktop > Properties > Appearance > effects.
Uncheck everything. Click OK in the Display Properties dialog and OK
again. You have just got rid of much of the Windows kludge. It will
run faster and will seem more enthusiastic about everything.
...............................................................
I am aware that this Faq has grown over the years and will seem very
daunting to someone new to the Net. My suggestion is to take it one
step at a time. Experiment with PGP. Generate a few keys, test them
out by sending Email to yourself. Only when you understand what you
are doing should you then go on to the next step. I would suggest this
might be by investing in a new hard drive and experiment with encrypting
it using TrueCrypt.
Only then should you try installing VMWare and attempting to create a
virtual machine. Again, take it one step at a time. Do not over-reach
yourself.
Remember, anybody can call themselves by my Nic, but there can only
be one key fingerprint like the above - mine. It thus ensures you
are reading a Faq prepared by me and no one else.
TrueCrypt: http://www.truecrypt.org/
Tor: http://tor.eff.org/index.html.en
Stunnel: http://www.stunnel.org/download/binaries.html
stunnel-4.05.exe
stunnel-4.05.exe.asc (digital signature file optional but recommended)
libssl32.dll
libeay32.dll
libssl32.dll.asc (optional)
libeay32.dll.asc (optional)
Putty: http://www.tucows.com/preview/195286.html
or here:
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Quicksilver: http://www.quicksilvermail.net/
Kremlin: http://kremlinencrypt.com/download.php
Pecunix:
Agent: http://www.forteinc.com/main/homepage.php
Zonealarm: http://www.zonelabs.com/store/content/home.jsp
Other links that might be of interest:
UUDeview: http://www.fpx.de/fp/Software/UUDeview/
Jstrip: http://www.davidcrowell.com/
BLJoin: http://www.all4you.dk/FreewareWorld/links.php?id=8866
WinHex: http://www.winhex.com/winhex/order.html.
ACDSee: http://www.acdsystems.com/english/products/acdsee/index
VuePro: http://www.hamrick.com
Freenet: http://freenet.sourceforge.net/
http://www.gn.apc.org/duncan/stoa_cover.htm
Useful programs:
HJSplit: http://www.freebyte.com/hjsplit/
Mastersplitter: http://www.tomasoft.com/mswin95.htm
PowerPost: http://www.cosmicwolf.com/
Quickpar: http://www.pbclements.co.uk/QuickPar/
SmartPar: http://www.smr-usenet.com/tutor/smartpar.shtml
WinAce: http://www.winace.com/
WinRAR: http://www.rararchiver.com/
YProxy: http://www.brawnylads.com/yproxy/
Media Player Classic: http://sourceforge.net/projects/guliverkli/
http://www.worldnet-news.com/software.htm
http://www.skuz.net/potatoware/index.html
http://www.skuz.net/potatoware/jbn/index.html
http://packetderm.cotse.com/
http://www.cotse.com/refs.htm
http://freeyellow.com/members3/fantan/pgp.html
http://www.all-nettools.com/privacy/
http://Privacy.net/
http://www.geocities.com/CapeCanaveral/3969/gotcha.html
http://www.junkbusters.com/ht/en/links.html
http://www.skuz.net/potatoware/privacy.txt
http://www.stack.nl/~galactus/remailers/bg2pgp.txt
http://axion.physics.ubc.ca/pgp-begin.html#index
Anonymous Posting:
http://www.skuz.net/Thanatop/contents.htm
Nym Creation:
http://www.stack.nl/~galactus/remailers/nym.html
General info:
http://www.stack.nl/~galactus/remailers/index-pgp.html
Revision 22.3
iQEVAwUBRsRtMWToeXEUpganAQG9WQgAhQQ359LIV2HiOIi8G0DGLlt/+Rp57eHu
JrouYyw937dQkdwH8aezNJPNW1piFEgYkjhLXNqVSLhS3a3pM26D/dE0VMajsndn
0yoilcHyVjyGPxqZw0zwrizw26tpEvkIDba//3J3jpVzhoTj/siPkf6s9OlvoSfJ
Wqrdg2u8Cmja/ZTWB/53jiioc4MHt6n2jAPgDdtoxo/K56IUFQetpGDwdhq2g0vT
t6qdRIXqq2+u0hFYineNjtSeL6VHoioW5LZM+yDP65q3cNzF2CuHhhNZrS4TFTB0
b2icfhMZP9XmaxT3K3SEcNyp61YoUoPaV3mFxDsdYol1MhfHf3pSRw==
=Bpth
-----END PGP SIGNATURE-----