Network Security and Hardware

Discussion in 'Home Networking' started by Nigel, Jul 8, 2015.

  1. Nigel

    Nigel Guest

    Sault,

    When organisations, Governments and IT/Tech websites talk about internet
    security they always talk of DOS, backdoors, trojans and general cyber
    crime. Whilst these things are of concern the thing I find most troubling
    is the meta data collection by governments and commercial organisations.
    E.g. talk of google collecting MAC addresses through their own software
    titles, mobile phone tracking, scanning of email threads/headers etc, even
    MS windows 8 sends reports in the background, quite brazenly I might add,
    despite attempts to prevent it.

    Can others give examples of this exploits and what can be done to mitigate
    them?

    I'm also questioning whether or not older consumer PC hardware is
    inherently less exploitable, having, I assume, less unique identifiers for
    individual pieces of hardware due to their relatively less sophisticated
    design.

    Any thoughts?
     
    Nigel, Jul 8, 2015
    #1
    1. Advertisements

  2. Nigel

    Henry Law Guest

    Well, "If you've got nothing to hide, you've got nothing to fear". So
    it says here anyway.
     
    Henry Law, Jul 8, 2015
    #2
    1. Advertisements

  3. Nigel

    Nigel Guest

    .....prolonged moralistic, but hugely intelligent, rant deleted.....

    What a load of neo-liberal, yankee crotch-rot. If you honestly feel this,
    you haven't thought it through.

    NEXT!

    Any practical advice as to decent firefox extensions, encrypting software
    etc? But please, don't just tell me the rot from webpages I've already
    read.
     
    Nigel, Jul 8, 2015
    #3
  4. Nigel

    Nigel Guest

    (That wasn't you-you, rather one, the general)
     
    Nigel, Jul 8, 2015
    #4
  5. Nigel

    Nigel Guest

    Although, with a name like Law .....
     
    Nigel, Jul 8, 2015
    #5
  6. Nigel

    Henry Law Guest

    Quite so. I ought to learn not to make ironic USENET postings, because
    they're indistinguishable (other than by smiley) from the genuinely-held
    opinions of utter wingnuts.

    On your original topic. There's not much you can do about web sites
    that you use keeping records of what you do there. For my part I adopt
    the following, most of the time anyway:

    - I force my IP address to change now and then by disconnecting the ADSL
    link, waiting five minutes, then reconnecting. (And yes it does work).

    - I use duckduckgo.com for my searches, only switching to Oogle when I
    want a second opinion. In fact I should switch to some other
    non-mainstream search engine but I haven't been sufficiently a***d to
    research those yet.

    - I try very hard not to do Oogle searches from a device which is logged
    on to anything else, FaceBoink for example. You can see instantly the
    effects of doing that: next FaceBang session, up pop adverts for
    whatever-it-was you were oogling for.

    - I run Noscript in Firefox. It's a real nuisance, and I have learned
    to disable it when making payments for things, but I think it's useful.

    - I switch to "incognito" mode in Chromium, (aka Private Sessions in
    Firefox) from time to time. I also reckon one should delete one's
    cookies at the end of each non-private session but it's dreadfully
    inconvenient.

    I wish it were easier to encrypt one's mail as a general thing.
     
    Henry Law, Jul 9, 2015
    #6
  7. <snip>

    On the note of cookies, and firefox, there is a addon/extension
    called "Self-Destructing Cookies" that will destroy the cookies
    after leaving a site automatically without you needing to do so
    "manually". Have that addon and related url at top of the below
    list, that follows the about copy.

    <start copy>
    Self-Destructing Cookies automatically removes cookies
    when they are no longer used by open browser tabs.
    With the cookies, lingering sessions, as well as information
    used to spy on you, will be expunged. Websites will only
    be permitted to identify you while you actually use them
    and can not stalk you across the entire web.
    This is the closest you will get to cookieless browsing
    without breaking every second site or tedious micromanaging.

    Tracking cookies will be detected and removed immediately.
    They are identified purely by their behaviour - no need
    for a blacklist that needs to be kept up to-date.
    Self-Destructing Cookies also has LocalStorage support
    and will treat it just like your cookie jar.
    Defend yourself against ETag tracking and other cache-based
    black-hat techniques by configuring Self-Destructing
    Cookies to automatically clean your cache every time
    you are not actively using the browser. For the first
    time ever, this provides a realistic chance of beating
    zombie-/evercookies without sacrificing usability.
    See the zombie-cookie FAQ entry for details.
    Self-Destructing Cookies can also help protect
    against CSRF attacks by ending your sessions as soon as possible.

    This add-on complements blacklist-based solutions such as Adblock
    and Ghostery very well. You can whitelist sites whose cookies
    and LocalStorage you would like to keep without an active tab
    in the Firefox cookie exception list, which can also be
    conveniently accessed from the add-on's preferences, or an
    icon in the Add-on Bar.
    <end copy>

    Listed other firefox addons below that are privacy related
    that maybe of interest for those concerned about privacy to
    investigate for themselves.

    - Self-Destructing Cookies 0.4.7.1-signed
    https://addons.mozilla.org/en-US/firefox/addon/self-destructing-cookies/?src=api

    - BetterPrivacy 1.68.1-signed
    http://nc.ddns.us/extensions.html

    - Adblock Edge 2.1.8.1-signed
    http://bitbucket.org/adstomper/adblockedge

    - Element Hiding Helper for Adblock Plus 1.3.2.1-signed
    (Works with adblock edge also)
    https://adblockplus.org/en/elemhidehelper

    - Disconnect 3.15.3.1-signed (Disabled)
    https://disconnect.me/

    - Ghostery 5.4.4.1-signed (Disabled)
    http://www.ghostery.com

    - GNU GNUzilla privacy extension 1.1 (Disabled)


    - NoScript 2.6.9.30
    https://noscript.net

    - Priv3 0.2.1-signed
    http://priv3.icsi.berkeley.edu/

    - uBlock 0.9.3.0 (Disabled)
    https://github.com/gorhill/uBlock

    - User Agent Switcher 0.7.3.1-signed
    http://chrispederick.com/work/user-agent-switcher/
     
    Kirk_Von_Rockstein, Jul 9, 2015
    #7
  8. Nigel

    Nigel Guest

    I'm going to do something that USENET will have never witnessed
    previously; I apologise! Too hasty was I, reading your post, but perhaps
    the cliche, no matter how ironically meant, spun me in to a rage. Clearly
    I'm prone to induced red-mist, but this is from long-term exposure to
    b*llends who actually believe that to which you allude.
    I think this is ISP dependent, no? Or can it be forced?

    Does this solve the problem? I understand google harvest mac addresses
    when users accept terms on installing their software? I assume 'incognito
    mode' does nothing as far as this is concerned.
    My regime is similar but it doesn't feel enough. I'm now wondering how a
    firewall may be employed; perhaps having to acknowledge every connection,
    at least on a session basis.

    At least USENET is not under surveillance!(?)
     
    Nigel, Jul 9, 2015
    #8
  9. Nigel

    Nigel Guest


    Thanks Kirk,

    That's useful stuff on the extensions front; I will check some of these
    out. What can you say about non-web browser surveillance? I'm sure it's
    not so prolific but clearly email is targeted. I feel certain PGP is
    covered in anti-terror law these days but perhaps off-shore email servers
    are under less strict regulation?
     
    Nigel, Jul 9, 2015
    #9
  10. Nigel

    Henry Law Guest

    Goodness; the gravity of your offence hardly warranted that ...
    To an extent, I suppose. If you have a fixed IP address then it's not
    going to work! My ISP assigns an address when you connect (DHCP-like)
    and the lease time seems to be very short, so it works for me. YMMV
    That's technically impossible with a normal browser. The MAC address is
    a local-segment entity and disappears with the first network hop. But I
    think Google's own "app" thing (on tablets, phones and such) may harvest
    the MAC address and send it off as metadata. I'm allergic to apps.

    I find it interesting to look at the "privileges" that downloaded
    software requires when installed on an Android phone. Why some of them
    wish to be allowed to turn on the camera, turn on the microphone, and so
    on beggars belief.

    MAC addresses can be spoofed, though presumably an app could in turn
    defeat the spoofing, depending on what level it works at.
    You are joking, aren't you? But the people who post in USENET (hell,
    the ones who even know what USENET is) are mostly ageing geeks like me
    and quite harmless.
     
    Henry Law, Jul 9, 2015
    #10
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.