I want to browse anonymously and leave no trace online..

Want to browse a computer/network/internet without leaving a trace? Well get like James Bond and become elite, check out this post by lifehacker.com

17p1l4hp604vtjpg

In this post, we’ll walk through how to use a USB stick or DVD to anonymize, encrypt, and hide everything you do on a computer no matter where you are. When we say “browse without leaving a trace”, we truly mean it. Using the Linux-based, live-boot operating system Tails (The Amnesiac Incognito Live System), you can use any computer anywhere without anyone knowing you were ever on it. Tails is a portable operating system with all the security bells and whistles you’ll ever need already installed on it. You can install Tails on one of your many dust-gathering USB drives or a DVD. We’ll show you how to set up your own portable boot disc in the second section, but let’s start by taking a look at what you get with Tails. Hit Read More

Read more

Disneyland’s Local Police Force Caught Secretly Using Powerful Phone Spying Tools

article by: gizmodo.

If you’ve visited Disneyland, you may have seen a small plane fly overhead at one point. The OC is full of rich-ass people, might be a Newport Beach golfer, no big deal, right? Except, as it turns out, the Anaheim police department had access to military-grade dragnet phone spying equipment, the kind that can suck up your phone’s information from an airplane along with thousands of others.

102843261-GettyImages52763809.530x298

Anaheim isn’t a big city. With a population of 336,265, it is substantially smaller than Wichita, Kansas and Mesa, Arizona. This is how entrenched America’s berserk surveillance culture is: A suburban city’s police department had access to spying tools called dirtboxes, the same spying tools sought by the Air Force. Insane militarization isn’t just for big-city cops.

Read more

Secure Blackphone 2 Out Now

If you need maximum smartphone security and are willing to pay for it, the Blackphone 2 is now on sale. The latest handset from Silent Circle has privacy features like the Android-based PrivatOS operating system, encrypted calling and texts, and “spaces” that let you keep business separate from pleasure. But unlike the original Blackphone, the latest model is actually a decent smartphone, with a 5.5-inch 1080p screen, Qualcomm 8-core CPU, 3GB RAM, a 13-megapixel back-side illuminated camera and quick-charging 3,060 mAh battery.blackphone_2

Given the numerous privacy dangers lurking out there, what price would you pay for both security and a solid smartphone? Silent Cirlce thinks it’s $799, more than a 64GB iPhone 6s costs. However, if you need it, you need it, so assuming you’re in North America, you can grab a Blackphone 2 at Silent Circle’s website. In the UK and the rest of the world, it’s set to arrive “soon.”

 

article by: engadget

Use a VPN? You could be leaking your real IP with WebRTC

I had this fixed awhile back but since I installed a new computer/os I forgot to change my settings. If you use firefox or chrome you can be affected by the WebRTC function, i’ll post the details below but basically any web master can craft script to show him your real ip, local ip, and vpn ip. Be sure to make sure you get this fixed, otherwise using a VPN is useless.

webrtc-fix

 

article from: https://thehackernews.com/2015/02/webrtc-leaks-vpn-ip-address.html

An extremely critical vulnerability has recently been discovered in WebRTC (Web Real-Time Communication), an open-source standard that enables the browsers to make voice or video calls without needing any plug-ins.

Read more

Understanding Encryption

awesome article by: spinatomic 

130618154725-encryption-story-top

In an era where security breaches seem to be regularly making the news, encryption is a very important topic to understand.  It helps protect your data, your interactions, and your access even when attackers make end-runs around software defenses.  It’s critical to use properly because, in a public network, there are still opportunities for data to leak out, even if your software is standing guard effectively.

But it’s not necessarily an easy topic; there is no magic wand you can wave to encrypt your data and effortlessly realize gains.  Some recent high-profile stories have shown that even software developers don’t necessarily understand this topic well enough to make good decisions on how to best use encryption to protect their users.

In this post, I’ll walk you through the three most important types of encryption that protect users today, tell you why we need each one, and show you how each one addresses specific aspects of keeping systems secure.

Read more

Hack the Flag Game

Cool new hacking game to test your elite skills on. I did the first few no problem but some of the other one’s I had to use the answer key a user wrote up. It’s pretty fun to try and decode the messages and to do some SQL injections. Try it out!

Game:
http://hackthecause.info/

Answers:
http://www.anthonyferrillo.net/blog/hack-the-cause/

Also from Hack10 site, here is a link to the top hack-simulated games like this one which has a bunch of others that are a lot more intense:
http://www.hacker10.com/other-computing/best-online-hacking-wargames/

Best apps to encrypt mobile phone calls

Cool article I read by Hacker10
http://www.hacker10.com/mobile-phone/best-apps-to-encrypt-mobile-phone-calls/

975-h_main-w

The following apps allow you to make free worldwide calls to other people that have the same app installed. Security wise, not only are your calls encrypted,  additionally, VoIP apps bypass data retention laws, calls made with a calling app are not recorded by your network provider.

The best apps to make a secure call are those that are open source, available for Android and iPhone and encrypt your call with keys you only hold, you should also try to go with a company that does not have servers or offices in a country where mass surveillance is known to take place.

Click read more to see the list.

Read more

Disney World Magic Band Chips (nRF24LE1)

Going to Disney World again soon and wanted to get more information on the (magic bands) which contain RFID chips and link to your account. I wanted to see if anyone has a technical breakdown of these magic bands. Always wondering if they stored credit card info, and wanted to do some research. I will be updating this post with more about the magic bands themselves and some cool ones which I plan on buying to use! (Note: I would never try any methods in the park)

12332866133_228e0bddb9_c

IMG FROM: http://www.nova-labs.org/blog/2014/02/16/dissecting-walt-disney-worlds-rfid-bracelet/

The nRF24LE1 is a highly integrated ultra low power 2.4GHz RF System-on-Chip (SoC) for 2.4GHz ISM (Industrial, Scientific and Medical) band operation. It includes a 2.4GHz RF transceiver core, an 8-bit CPU, and embedded Flash memory. By offering a peak RX/TX current lower than 14mA, a sub-μA power down mode, advanced power management, and 1.9 to 3.6V supply range, the nRF24LE1 provides a true ultra low power solution that enables months to years of battery lifetime when running from regular coin cells or AA/AAA batteries. Finally, a rich set of on-chip analog and digital peripherals makes the nRF24LE1 a flexible, single chip solution for a wide range of applications including PC peripherals, game controllers, remote controls, sports/fitness/healthcare sensors, and toys. (these are useful for Disney parks to allow customers to use them year after year)

Read more

How to Know if You’ve Been Hacked

Awesome guide/article from http://null-byte.wonderhowto.com by user:occupytheweb.

Why Hackers Want the Use of Your Computer

Although we are familiar with the idea that hackers might be seeking our credit card numbers, bank accounts, and identity, some hackers are simply seeking the use of your computer. By infecting thousands, even millions, of computers around the world, they can create what is called a “botnet.”

A botnet is simply a network of compromised computers controlled by a single command and control center. I estimate that 30 to 50% of all consumer-level computers are part of one botnet or another.

This botnet can be used for many seemingly innocuous activities and many more malicious ones. Botnets can be used to send spam, crack passwords, conduct distributed denial of service (DDoS) attacks, etc. In all cases, they are using system resources that are not available to you. You will likely detect your own system running sluggishly or erratically.

Let’s take a look at how we can detect if such a security breach has taken place on YOUR system.

Read more

1 2