The Online Privacy/Security Thread

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.

Dread First

Folk singer from 40+ years ago, now a politican
True & Honest Fan
kiwifarms.net
Joined
May 12, 2017
What this thread isn't

This isn't a guide on how to anonymise yourself on the internet. Simply put, "true" anonymity on the internet is a nigh-impossible feat to accomplish. Even if you exclusively use Tor to connect to the internet, use Monero to pay for goods/services online, and don't own any type of phone or "smart" device, you still need to be mindful of a myriad of other factors that can be used to identify you. For example, JavaScript can easily identify your exact hardware configuration (if I'm not mistaken). Furthermore, your "written" voice (i.e. your mannerisms, use of punctuation, recurring phrases/misspellings, the dialect of whatever language you're writing in, etc) on the internet can easily be used to identify you (look at how many Onision sock accounts got outed because Greg was too stupid to change up his speech patterns).

What this thread is

This thread is meant to be a general purpose guide/discussion on best practices for managing your online privacy and/or security. It's an incredibly broad topic that spans a whole bunch of different categories, which can make it daunting for the average user on the internet who wants to get their feet wet. In other words: if you're someone who's concerned about the sheer amount of overreach that Big Tech and other such entities have over our digital lives, this thread is for you! We might not have all the answers you're looking for, but it's still a good place to start. I'll periodically update the OP of this thread with various recommendations from other users but for now, here's my assessment of the subject at hand.

***

What is privacy/security?

Privacy, in the context of your online life, refers to how much (or how little) information can be tied back to your real-world identity. Similarly, security refers to how safe your data and other such digital assets are from internet attacks, breaches, leaks, malware, and so on. It's important to note that despite sharing some degree of overlap, these two terms are completely distinct entities. You can have a whole bunch of pseudonyms online to mask who you are on the internet, but none of that matters if you're the type of person who opens up your banking app while connecting over a public wifi network. Conversely, you might be the type of person who stays on top of all their security updates on mobile, PC, and such in order to avoid potential vulnerabilities/exploits but that still doesn't guarantee you privacy (especially if you're the type of person who uses the same name everywhere).

What is a threat model?

Threat modelling refers to how much convenience you're willing to sacrifice for the sake of preserving your online privacy and/or security. Big Tech has made it their MO to introduce us to countless convenient things that slowly make us relinquish more and more of our personal data over to them. Naturally, taking control of our privacy/security online means that we have to relinquish some of that convenience. However, this doesn't mean that you'll be more private/secure if you're using the most inconvenient things possible; online privacy and security are subject to the metaphorical law of diminishing returns. Because of this, it's important for you to decide where to draw the line on how much inconvenience you're willing to put up with for the sake of your own privacy/security online. Remember: everyone's needs are different, so your threat model will undoubtedly be different from mine or anyone else's (and that's okay!).

What are the 5/9/14 Eyes?

To make a long and incredibly complicated story short, the 5/9/14 Eyes are a group of countries that have comprehensive intelligence sharing agreements Techlore has a great video explaining what they are specifically, along with why it's important to know where your services are based out of.
  1. The Five Eyes consist of the USA, Canada, the UK, Australia, and New Zealand.
  2. The Nine Eyes consist of the Five Eyes countries, plus Denmark, France, the Netherlands, and Norway
  3. The Fourteen Eyes consist of both aforementioned groups, plus Germany, Belgium, Sweden, Spain, and Italy.
As a general rule of thumb, you'll want to do a fair amount of research into the jurisdictions of the companies you trust the most. Generally speaking, it's advised to avoid trusting your data with providers that exist within the 5/9/14 Eyes. In the past, there have been scandals involving companies within these jurisdictions that made lofty claims like being a "no-logs" VPN despite that not being true in the slightest. There are ways to circumvent the issue of trust, through things like transparency reports, third-party audits, and warrant canaries. However, you don't have any way of knowing for sure as to whether or not these companies have a gag order if they exist within a 14 Eyes nation.

It's important to understand that this is an extremely complicated issue, and that the recommendation to avoid providers within the 5/9/14 Eyes isn't 100% infallible. Lolcow.email and Startpage.com are based within the Netherlands (9 Eyes). DuckDuckGo, the most popular private search engine, is based out of the USA (5 Eyes). Conversely, you have Yandex which isn't in the 14 Eyes but is run by the biggest Russian tech giant. PrivateInternetAccess had their no-logs policy verified in court a few times (if I'm not mistaken), and they exist within US jurisdiction.

While it is generally advisable to avoid 14 Eyes countries, you must also remember that every country within these alliances have reasons why you could potentially trust a company that operates out of them. The USA, for example, is draconian in its practices involving gag orders, but Section 230 along with the First Amendment literally provide the strongest protections for free speech in the entire world. Similarly, the Netherlands has strong data and personal privacy protection laws that rank among the highest in the world. Remember: your threat model is what determines the sorts of services that you're willing to trust. A little bit of research can go a long way in making sure your data doesn't fall into the wrong hands.

Is a VPN necessary?

The answer depends entirely on what your threat model is like. If you're a journalist, an activist from an autocratic regime, or have some other risk of being directly targeted by private/state actors, a VPN is an important tool in your arsenal and you probably don't need me telling you that. However, the vast majority of users who are reading this post will most likely have a fairly lax threat model. In that case, using a VPN won't necessarily help you unless you use a VPN for the right reasons (listed below):
  1. You have a specific need to hide your web traffic from your ISP. If you're into torrenting or other such P2P activities, a VPN comes in handy.
  2. You're on a network that you don't trust and you want to protect yourself. Again, a VPN is always nice to have on public wifi networks.
  3. You're trying to bypass censorship or geographical blocks. Speaking as someone who comes from a third-world hellhole, VPNs are basically a must-have.
Contrary to popular belief (and most YouTube sponsorships), a VPN doesn't automatically make you more private, secure, or anonymous on the internet. A VPN is one of many tools in your arsenal to help protect yourself; it's not, nor will it ever be, a "quick fix" to the incredibly complicated privacy nightmare that we live in. If you're looking for more information on this subject, both The Hated One and Techlore have made countless videos on common VPN myths perpetuated by end users and commercial VPN marketing.

What is browser fingerprinting?

Without going into excruciating amounts of detail, your browser fingerprint refers to the bits of data from your browser that every website's able to read. This includes, but is by no means limited to: your browser's user agent string, language, time zone, screen resolution, system fonts, or even your use of an ad blocker. Each bit of information on its own isn't necessarily special, but they paint a horrifyingly accurate picture of what your browser and even your hardware looks like when combined together. What makes matters worse is that this type of fingerprinting is pretty hard to circumvent because so many of the methods that are used to gather such information in the first place are baked into web standards (i.e. Canvas, WebGL, JavaScript, etc). You can check out the EFF's CoverYourTracks tool, which shows you how web trackers view your browser data along with how unique it is.

What are some best practices for maximising my online privacy/security?

Techlore has an entire course on the subject of best practices, along with general recommendations for software to use. If you don't feel like going through the whole course, here are some of my recommendations:
  • Never use the same identity twice. If you can't be fucked to come up with an original pseudonym, you don't need to be on that website in the first place.
  • Branching off the first point, pseudonyms are your best friend. You don't need to sign up for everything with your primary email address and your IRL name; Reputable email services like Tutanota and ProtonMail exist, as do email providers for weirdos on the internet like Cock.li and Lolcow.email. Remember, it's okay to go on the internet and tell lies.
  • Never use your IRL credit card information online, unless you absolutely have to. If you're lucky enough to live in the USA, Privacy.com exists for you to create virtual debit/gift cards with specified limits so you can pay for your Netflix, Hulu, or other such online purchases. If you're willing and able to, prioritise crypto transactions for things that allow you to use crypto like certain VPNs.
  • If you don't mind dealing with broken web pages (or are used to dynamic web filtering), disable third-party scripts and frames. uBlock Origin Medium Mode is the perfect tool to use for this purpose. In fact, The Hated One has an excellent video tutorial recommended by Raymond Hill on the exact subject I'm talking about.
  • For general purpose software recommendations, I'd suggest checking out privacytools.io. You'd be surprised as to what kinds of excellent, open-source alternatives exist to the software that you currently use.
***

If there's anything I missed, please let me know!
 
Last edited:
I don't have much to add, but if you are talking about paying crypto to certain VPNs I would nominate Mullvad as the best VPN for anonymity, you can literally just send them money by post for your account (or use crypto if that's your thing). No email and no card (unless you wanted to pay by card) required, if there are any other companies with that model by all means list them, but I would say Mullvad > Nord.
 
nice thread
i got some recommendations for people who are paranoid like me

VeraCrypt will encrypt hard drives for you. you can use it to encrypt external drives (like usb sticks for example) or internal hard drives, or single partitions only, or even for full system encryption. anything that has been properly encrypted this way will be impossible to access without knowing the encryption key (the password you set) which is very nice if you ever lose a portable drive, or it gets stolen, or someone accesses your PC at work while you're not there, or police seize your computer, etc.

Tor Browser lets you surf the web (and darknet) through the tor network, which makes it near impossible to track your activities. Can be slow and unstable sometimes, it's dogshit for large file downloads (because low bandwidth inside the network) and doesn't work with bittorrent (cause bittorrent by design exposes your real ip) so don't use it for pirating stuff, but for general purpose web browsing it's the safest and strongest anonymity you can get.
 
What are peoples opinions on I2P? I have seen it being shilled on other boards but haven't looked into it so far.
 
What are peoples opinions on I2P? I have seen it being shilled on other boards but haven't looked into it so far.

IVPN wrote a fantastic post comparing Tor to I2P; the main differences between the two boil down to how they're designed. Tor tries to anonymise you through the internet as we know it, but I2P was designed from the ground-up for Darknet services. Personally, I've never used I2P but it sounds like a fun technology to toy around with.
 
If you use any cloud storage system (Dropbox, Google Drive, iCloud, etc) you need Cryptomator. It's free and encrypts each file on a per-file basis, which is perfect for the cloud. (As opposed to something like VeraCrypt, where if you change a single file you have to reupload the entire encrypted container.)
 
Okay so if i just have a shitty chromebook i have no chance of being remotely anonymous right
 
Okay so if i just have a shitty chromebook i have no chance of being remotely anonymous right

Technically no, but if you're autistic like I am, you could try running some form of Linux on it meant for lower-spec hardware like Chromebooks.

***

Also, updated the OP with information regarding the 5/9/14 Eyes. I'd greatly appreciate some feedback to make sure I'm not giving out inaccurate information.
 
  • Like
Reactions: Falcos_Commisar
Okay so if i just have a shitty chromebook i have no chance of being remotely anonymous right

You can use tails on almost any laptop which is enough privacy to let you contact people or buy drugs online safely (or guns too if you're russian), but if you're hardcore paranoid you need to get a laptop with the intel IME removed or remove it yourself (which is complicated and requires buying extra hardware tools)
 
  • DRINK!
Reactions: IbnTaymiyyah
View attachment 297828
In light of Verizon deanonymizing users, I think now is a good time to discuss VPNs. The link you're given for a VPN isn't free though, they want, albeit it's a decent deal, $6 a month.
This post is three years old and surprise! Things have not gotten better. What was once a couple ISPs is now most ISPs. Regardless of your use case VPNs are absolutely essential. If you only employ a single tool in your arsenal it's the easiest, most valuable. Opsec is hard. Compartmentation is hard. Crypto (done right) is hard. VPNs are easy. That doesn't mean they're sufficient on their own, but they're powerful.

Also privacytools.io is insufficient and imho suspicious. See also
Tech - Privacy, Security, & OPSEC
PRISM-Break prism-break.org - "good info on skirting around the Government's eye" Catalogue of privacy and freedom respecting software and service alternatives to the 800lb gorillas.
Privacy Tools privacytools.io - "lot of good info. has links to other sites too" One of the oldest metasites on privacy in the modern era. Details privacy practice, software, and pop philosophy. Warning: implicitly endorses software and services that run counter to its stated goals and has a repressively censorious code of conduct.
Restore Privacy restoreprivacy.com - Blog containing many security and privacy guides.
Router Security routersecurity.org - "just what it sounds like."
Spyware Watchdog spyware.neocities.org - "Has a useful article ranking all web-browsers in terms of privacy if you're into such things." Extends beyond browsers, useful for finding software and scarequote "services" unscarequote that are spying on you.
[...]
VPN Comparison by That One Privacy Guy https://www.safetydetectives.com/best-vpns/ - "info on VPNs. Good resource." Probably the single most comprehensive resource on individual VPNs, and doesn't appear to be afflicted by the pay-for-play VPN coverage cancer.
 
This post is three years old and surprise! Things have not gotten better. What was once a couple ISPs is now most ISPs. Regardless of your use case VPNs are absolutely essential. If you only employ a single tool in your arsenal it's the easiest, most valuable. Opsec is hard. Compartmentation is hard. Crypto (done right) is hard. VPNs are easy. That doesn't mean they're sufficient on their own, but they're powerful.

I don't disagree with you, but let's not forget that VPNs have become the most over-advertised thing in the marketplace and that their marketing has become fucking ghastly. I know that there are websites dedicated to honest VPN reviews, but the marketing practices of some of these companies truly is scummy. That's not even getting into the two biggest scandals of 2019 in the VPN world: PIA got bought out by an Israeli advertising/malware company (Kape Technologies) and how NordVPN had a data breach, didn't tell anyone about it, and then tried to play it off like it's no big deal.

The fact of the matter is that unless you're into self-hosting your own VPN, you'll have to put a lot of trust into a commercial VPN provider. As proven time and again, VPN companies aren't without their own investments and are more than willing to embellish or even outright lie about what their products can/can't do. There are legitimately great services being offered, but again: VPN companies aren't above scummy practices that we'd expect from other places.

Also privacytools.io is insufficient and imho suspicious. See also

Thanks for the links, m8! Will definitely update the OP with these soon.

Keystroke fingerprinting is a very real concern. I found this neat little tool a while ago:

It's only for linux, but if you're on windows, you have no privacy anyway.

I'm surprised I forgot to mention how comprehensive fingerprinting has become. Thanks for the heads up!
 
The fact of the matter is that unless you're into self-hosting your own VPN, you'll have to put a lot of trust into a commercial VPN provider.
No you don't. Follow basic opsec and double vpn if you care, or insert tor or a remote proxy into your trust chain. If someone with the power to compromise a decent vpn (sane privacy policy and passed an audit) is after you, they're going to get you. This non-issue only runs as deep as treating vpns as a panacea or buying a product you intend to rely on without doing your due diligence. Both are so obvious they shouldn't even bear mention.
 
No you don't. Follow basic opsec and double vpn if you care, or insert tor or a remote proxy into your trust chain. If someone with the power to compromise a decent vpn (sane privacy policy and passed an audit) is after you, they're going to get you. This non-issue only runs as deep as treating vpns as a panacea or buying a product you intend to rely on without doing your due diligence. Both are so obvious they shouldn't even bear mention.
I absolutely never understood the "host your own vpn argument". Here are the situations:

A) you are self hosting on equipment you own on a place you own. The IPs that box is making contact with has direct association to your name (not to mention that you lose ANY semblance of anonymization by grouping traffic from other users).

B) you rent a box in a remote data center somewhere. You had to pay for that box somehow. The data center is presumably going to know who is connecting and when, plus what that box is connecting to. Zero anonymity. Even if you pay with anonymously obtained bitcoin, you are STILL going to be associating your home IP with whatever requests come out of that box.

What am I missing here?
 
Okay so if i just have a shitty chromebook i have no chance of being remotely anonymous right
You should look into doing a full linux install (NOT cruton, actual full replacement). There are special distribs made specifically to run on converted chromebooks.

I've done it and it's not that hard, but you need to be diligent about research to make sure what you're doing is compatible. Though unlikely, it's possible to brick your device if you're careless. Afterwards though, you'll have a machine that is very very compatible with linux.
 
You should look into doing a full linux install (NOT cruton, actual full replacement). There are special distribs made specifically to run on converted chromebooks.

I've done it and it's not that hard, but you need to be diligent about research to make sure what you're doing is compatible. Though unlikely, it's possible to brick your device if you're careless. Afterwards though, you'll have a machine that is very very compatible with linux.
Out of curiosity: what chromebook with which SoC?
 
Back