Massive tutorial collection

Discussion in 'Synthetic Drugs' started by binary shadow, Apr 1, 2009.

  1. binary shadow

    binary shadow Visitor

    Some of these I posted a long time ago and others are new. Sorry if I am double posting them but here is a thread with some nice tutorials in it on how to secure your communications and other things related to internet sourcing. Here is the index each tutorial I will give a separate post. Again sorry for double posting.

    Index

    Setting up Tor Anonymity Network for Windows XP
    Disable the built in forensic features of Windows XP
    Setting up and using GPG encryption for windows
    Setting up truecrypt encrypted file containers with Ubuntu Linux
    Setting up and using GPG encryption with Ubuntu Linux
    Using Keepass Password Safes for Ubuntu Linux
    Configuring Ironkey Military Grade Security USB
    Setting up encrypted anonymous instant messages for windows
    Safely shipping drug mail for sender and recipient
    Truecrypt Container + Hard Drive encryption for Windows XP
    Anti Forensic Hard Drive Wipes for most computer systems
    Basic review on payment system (this is fairly accurate but I would have wrote it differently)
    Cracking WEP WiFi encryption (for anonymity!)

     
  2. binary shadow

    binary shadow Visitor

    Tor...

     
  3. binary shadow

    binary shadow Visitor

    Disable windows XP anti forensics

     
  4. binary shadow

    binary shadow Visitor

    Disable XP forensics

     
  5. binary shadow

    binary shadow Visitor

    GPG for windows...

     
  6. binary shadow

    binary shadow Visitor

    Truecrypt for ubuntu

     
  7. binary shadow

    binary shadow Visitor

    GPG for Ubuntu

     
  8. binary shadow

    binary shadow Visitor

    Keepass for Ubuntu

     
  9. binary shadow

    binary shadow Visitor

    Ironkey (credit to author who wishes anonymity I think)

     
  10. binary shadow

    binary shadow Visitor

    Secure IM (Credit to previous author as well)

     
  11. binary shadow

    binary shadow Visitor

    Safe shipping of drug mail

     
  12. binary shadow

    binary shadow Visitor

    Encrypt windows XP hard drive + truecrypt containers

     
  13. binary shadow

    binary shadow Visitor

    Encrypt windows XP hard drive + truecrypt containers

     
  14. binary shadow

    binary shadow Visitor

    Hard drive anti-forensic wipes

     
  15. binary shadow

    binary shadow Visitor

    Payment Systems (credit to author who probably wishes to stay anonymous, edited moderately by me for accuracy, they made a few mistakes I think I got them all though):

     
  16. binary shadow

    binary shadow Visitor

    Cracking WEP WiFi Encryption (credit to author above, again edited heavily by me as it seems he didn't understand some of the variables, I think it is accurate now heh):



     
  17. Tanman35

    Tanman35 Member

    Messages:
    310
    Likes Received:
    0
    wow awesome work doing all that and putting it together im pretty sure this deserves a sticky
     
  18. xblayde

    xblayde Member

    Messages:
    44
    Likes Received:
    0
    I'd like to second that.
     
  19. Benji2

    Benji2 Member

    Messages:
    13
    Likes Received:
    0
    some decent info. Although there are better ways of doing things IMO, I will post my ideas (which have been well established). And as we all know GPG isnt the golden key we all though. In a few days I will provide you all with complete anon from any illegal activity one may or may not shoose to partake in ( I ADVISE AGAINST IT) BUT IN THE SAKE OF HARM REDUCTION i WILL POST. PEACE (SORRY FOR CAPS LOCKS) HAHA
     
  20. binary shadow

    binary shadow Visitor

    GPG is pretty much the safest way to communicate short of complicated symmetric schemes (where asymmetric encryption like GPG would still be used for key exchange), OTR messaging which is for IMs not e-mails or elliptic curve asymmetric schemes which are totally not user friendly for the majority of people.

    GPG offered by third party services like Hushmail is worthless, unfortunately it took most people a long time to realize this. Hushmail lead to the biggest steroid bust in the entire history of the world when they tapped online vendors E-mail accounts, look up operation Raw Deal. But GPG used by an individual, not run by a third party for an individual, is incredibly safe. There are some sophisticated attacks that can weaken and in some cases break it, such as a quantum computer could break GPG encryption if quantum computers exist (although a quantum computer couldn't break symmetric encryption such as truecrypt). But in a realistic scenario GPG will make your communications immune from being wire tapped. Even in a symmetric communications scheme you need to use asymmetric encryption for key distribution so you can never fully protect yourself from all possible cryptanalysis attacks, but realistically unless you are a foreign military or in a spy ring and being targeted by the NSA or some such thing GPG is more than adequate encryption if you use enough bits in your key (I suggest 4,096). ECDH would be better than the algorithms offered by gpg (RSA/Elgamal by default) but I know of no beginner friendly system that supports ECDH or any other elliptic curve asymmetric encryption schemes. Most people have enough trouble with GPG ;-).

    I am interested to see your guidelines. The methods I listed here are used by the majority of vendors I know and seem to work well so far, but always open to improvements =-).
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice