Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

There's a limit to DPI, if you use an efficient encryption and ssh, you should be fine unless they really want to get you.


sort by: page size:

ah yes. unless they are actively listening in am i not safe enough as compared to DPI censorship and network analyzers mandated by the said oppressive government?

This over reach is so terrifying it's almost funny. Always use a VPN and/or Tor.

6. Own your pipes. ISPs with DPI can undo much of your efforts as they try to monetize you. This might be mitigated by encryption everywhere, but I think you're still subject to the state, which can still identify you if sufficiently motivated. Or alternatively, make it attempts at bypassing identification illegal and prosecute all those who do ("Why do you have something to hide?")

It depends on what services you are exposing. If it's just SSH and HTTP, the risk and difficulties are really low if you follow a few simple rules. The bonus is that you can learn many interesting things in an experiential, personal way.

The only thing that will save you is your enemies incompetence :P

Make sure you encrypt ALL communication and not just the password or cookie.


Even then, you'll run into firewalls and whitelists. Like I said, paranoid.

It entirely depends on how motivated and how much resources they're willing to dedicate to finding you. They're probably not going to go to great lengths to catch a single copyright violation, so simple precautions may be good enough.

If you're a legit threat to national security, then yeah, they're probably going to find you no matter what you do.


I'd say just be paranoid, and you should be fine. Incognito tab, VPN if you feel the need, anonymous communication method (ricochet.im?), etc.

Israel will hack your devices, Mossad could come into your home when you're not there, encryption is kind of useless if you're actually targeted.

PGP and Luks could get you tortured.

Leave this hellhole or do nothing "incriminating".


The threat is using your IP address to do illegal stuff (read: serve/proxy CSAM).

1. You could still be targeted just for wearing such a device in the wrong place, then.

2. Do you really hope for each and everything you see to be uploaded to a remote server?


Only use your private key with Tinfoil Hat Linux on an offline air-gapped computer: http://tinfoilhat.shmoo.com/

I recommend disconnecting your monitor and only receiving output by having it blinked out at you through your capslock light on your keyboard. Bonus points if you can get your hands on some TEMPEST hardened hardware, and/or tamper-resistant hardware.

Anything less will leave you vulnerable to the black helicopters!

Note: I'm joking obviously, but this is something to take seriously.


Sure, but what if you get hacked, or defaced, or your client info gets out?

It could kill you too. It's a balance.


> Use PGP and Tor if you want true privacy.

Don't use email for starters, really.


If you can access using this so can others when you cross borders, are stopped by police, have spying spouse, etc. Those are real and sometimes fatal threat models.

What do they do if I send: AFBC67CEDA7AD?

Ban all “non-intelligible” content?

Who can stop me from hiding information in very normal looking sentences?

If you want privacy, there will always be a way.


They're still going to be able to see exactly what you are doing, they probably have all that data indexed and easily searchable by keyword. So it wont matter if you visit hundreds of random websites, they will still be a record of the exact the sites you are trying to hide from them. But I applaud your creativity and cleverness. Hiding via obscurity is not proper security. You would be better off buying a cheap vps and creating your own private vpn over ssh for web browsing.

Still unsafe because I'll reveal it if they (e.g., NSA, CIA) torture me, threaten to kill my family etc.

Presumably none of this is taken in isolation. If all you do is use encryption and camp I doubt they're going to think you're a terrorist.
next

Legal | privacy