Some of these I posted a long time ago and others are new. Sorry if I am double posting them but here is a thread with some nice tutorials in it on how to secure your communications and other things related to internet sourcing. Here is the index each tutorial I will give a separate post. Again sorry for double posting. Index Setting up Tor Anonymity Network for Windows XP Disable the built in forensic features of Windows XP Setting up and using GPG encryption for windows Setting up truecrypt encrypted file containers with Ubuntu Linux Setting up and using GPG encryption with Ubuntu Linux Using Keepass Password Safes for Ubuntu Linux Configuring Ironkey Military Grade Security USB Setting up encrypted anonymous instant messages for windows Safely shipping drug mail for sender and recipient Truecrypt Container + Hard Drive encryption for Windows XP Anti Forensic Hard Drive Wipes for most computer systems Basic review on payment system (this is fairly accurate but I would have wrote it differently) Cracking WEP WiFi encryption (for anonymity!)
Payment Systems (credit to author who probably wishes to stay anonymous, edited moderately by me for accuracy, they made a few mistakes I think I got them all though):
Cracking WEP WiFi Encryption (credit to author above, again edited heavily by me as it seems he didn't understand some of the variables, I think it is accurate now heh):
some decent info. Although there are better ways of doing things IMO, I will post my ideas (which have been well established). And as we all know GPG isnt the golden key we all though. In a few days I will provide you all with complete anon from any illegal activity one may or may not shoose to partake in ( I ADVISE AGAINST IT) BUT IN THE SAKE OF HARM REDUCTION i WILL POST. PEACE (SORRY FOR CAPS LOCKS) HAHA
GPG is pretty much the safest way to communicate short of complicated symmetric schemes (where asymmetric encryption like GPG would still be used for key exchange), OTR messaging which is for IMs not e-mails or elliptic curve asymmetric schemes which are totally not user friendly for the majority of people. GPG offered by third party services like Hushmail is worthless, unfortunately it took most people a long time to realize this. Hushmail lead to the biggest steroid bust in the entire history of the world when they tapped online vendors E-mail accounts, look up operation Raw Deal. But GPG used by an individual, not run by a third party for an individual, is incredibly safe. There are some sophisticated attacks that can weaken and in some cases break it, such as a quantum computer could break GPG encryption if quantum computers exist (although a quantum computer couldn't break symmetric encryption such as truecrypt). But in a realistic scenario GPG will make your communications immune from being wire tapped. Even in a symmetric communications scheme you need to use asymmetric encryption for key distribution so you can never fully protect yourself from all possible cryptanalysis attacks, but realistically unless you are a foreign military or in a spy ring and being targeted by the NSA or some such thing GPG is more than adequate encryption if you use enough bits in your key (I suggest 4,096). ECDH would be better than the algorithms offered by gpg (RSA/Elgamal by default) but I know of no beginner friendly system that supports ECDH or any other elliptic curve asymmetric encryption schemes. Most people have enough trouble with GPG ;-). I am interested to see your guidelines. The methods I listed here are used by the majority of vendors I know and seem to work well so far, but always open to improvements =-).