![]() ![]() ![]() It provide some address anonymity for you. Having an address at a mail service foils folks doing a “Google Street View” of your home. Since I was doing it anyway, why not make it fun?Ĭhoose your level of action to match your actual needs. Realize, too, that I was “on the road” living out of a hotel for 1.6 years, so some of this was needed just to function locally. For you, you might care a great deal so will benefit from my observations, or more likely, I’m doing “way overkill” and all you really need is 1/5 what I did. But then didn’t really care about the errors for my own personal use. I did find many opportunities to ‘catch folks’ in the errors I made. Realize, too, that as I was doing this to find those places where I could “Catch A Bad Guy”, my purpose had me doing things as much as possible in the way that a criminal might want to do them. Sometimes a 2nd pass not only fixes mistakes, it provides an opportunity to clean up the trail even more. I’ve also found that in several cases I did them in a less than optimal order, or flat out screwed it up in some way. In order to know how to catch Black Hats, it is helpful to know what they do (and where they might fail). I ran through trials of some of these steps as I have, for a long time, been a White Hat doing various security functions with computers and networks. In some countries it is illegal to do some of the things that are legal where I am, so be aware of your laws. ALL of these attempt to track you, often by law. To do just about anything, you need some form of payment, or a physical address, or an email address. There are some “Chicken & Egg” problems in gaining Anonymity, especially. It will be the most trying thing about all of this. Your behaviour matters more than anything else.Ĭhanging habits and behaviour is not easy. Use WiFi at a Starbucks 1/2 way down that trip, to get a google map update? You just confirmed you are on that trip. Use Google Maps? It is tracking where you are interested in going, and possibly even when. Log in to read news? It is stealing your identity information to some extent. Note that some of THE most common applications run are in the business of spying on you, violating your privacy, and preventing anonymity. So be very sure that you just don’t do Dodgy Things on them. ![]() The most secure system is worthless if folks do dumb things like leave the password written next to the terminal, or run an insecure application on top of it.įor example, many Web Pages are just full of things to suck information about you out of your computer or phone. For that reason, the most emphasis goes into a Secure System and Secure Operations. I won’t always be complete or accurate, as things change.Ĭlearly, if your Security is breached, your Anonymity and Privacy are out the window. I’ll attempt to flag just which thing is achieved at each step, and which thing is compromised to some extent. They are VERY different things, and the methods used to attain them are also very different. Many folks confound Privacy with Anonymity. Intrusion Detection tells you when you need to fix things, and what risks you now have on you. Policing, detection, and characterization of failures in maintaining Privacy, Anonymity and Security. There’s a 4th leg to this stool, but it’s usually not the main point, so often ignored. Security: The stuff you save and the systems you use, are protected against compromise or intrusion. 3rd parties are excluded unless by invitation.Īnonymity: Someone may know A Person wrote, saved, listened to, or visited something, but do not know who it was. Privacy: What you write, save, listen to, visit is to be known only to you and those with whom you share. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |