Welcome to the Temple of Zeus's Official Forums!

Welcome to the official forums for the Temple of Zeus. Please consider registering an account to join our community.

Cybersecurity series: Part IV

disconnect is not that good ff addon.

rest up to ur desire.

~we remain invisible and we see all~

hail satan
 
fausty666 said:
disconnect is not that good ff addon.

rest up to ur desire.

~we remain invisible and we see all~

hail satan

It amuses me that you have replied to only a tiny part of what was mentioned. What I find even more amusing is that you have not provided any evidence to back up your claim. Why is Disconnect a bad Addon? Tell us more on this.
 
yeah i don't use proxies, except for one thing, and that is account based yt comment spamming, through a program i use, which automates this. for my actual browsing i simply use a vpn, and i've tested, and i have no ip leaks whatsoever.

i think however because i have the proxies on a local server running through the vpn, so there would never be a leak even if the proxy failed as the proxy comes from within.

i only use the proxy as a way to not get all my accounts deleted at once.

and if from what i read if they can access or isolate your tor exit relay your will be found.
 
SATchives said:
yeah i don't use proxies, except for one thing, and that is account based yt comment spamming, through a program i use, which automates this. for my actual browsing i simply use a vpn, and i've tested, and i have no ip leaks whatsoever.

i think however because i have the proxies on a local server running through the vpn, so there would never be a leak even if the proxy failed as the proxy comes from within.

i only use the proxy as a way to not get all my accounts deleted at once.

and if from what i read if they can access or isolate your tor exit relay your will be found.

Proxies have their use, yes. System-wide proxies are much much more secure than program-based proxies, like shadowsocks or proxychains. Browser proxies are the least secure. Another way to check for IP leaks is to use the following command on Linux (replace eth0 with your interface and INSERT.IP.HERE with your VPN's IP or proxy's IP):

sudo tcpdump -n -f -p -i eth0 not arp and not host INSERT.IP.HERE.
 
May I ask you a question regarding cybersecurity, as you seem to know a lot about this field. I'm really interested in learning pentesting; it's the branch of CS that is most appealing to me. Currently, I'm studying cs at uni, but it's seems like a such huge waste of time to me, as we mostly learn at very slow pace, the things they teach in a whole semester, I could learn probably in like 3 days; there's not much about cybersecurity there. So, my point is , should I give up on Uni and just study cyersecurity on my own? Is CS degree necessary for a Pentester job, or several of certificates and courses suffice?
 
Cinammonroll said:
May I ask you a question regarding cybersecurity, as you seem to know a lot about this field. I'm really interested in learning pentesting; it's the branch of CS that is most appealing to me. Currently, I'm studying cs at uni, but it's seems like a such huge waste of time to me, as we mostly learn at very slow pace, the things they teach in a whole semester, I could learn probably in like 3 days; there's not much about cybersecurity there. So, my point is , should I give up on Uni and just study cyersecurity on my own? Is CS degree necessary for a Pentester job, or several of certificates and courses suffice?
Knowledge versus piece of paper...

You know the answer.
 
Henu the Great said:
Cinammonroll said:
May I ask you a question regarding cybersecurity, as you seem to know a lot about this field. I'm really interested in learning pentesting; it's the branch of CS that is most appealing to me. Currently, I'm studying cs at uni, but it's seems like a such huge waste of time to me, as we mostly learn at very slow pace, the things they teach in a whole semester, I could learn probably in like 3 days; there's not much about cybersecurity there. So, my point is , should I give up on Uni and just study cyersecurity on my own? Is CS degree necessary for a Pentester job, or several of certificates and courses suffice?
Knowledge versus piece of paper...

You know the answer.

True, but I still think that I could do both at the same time. I've read that some employers take the cd degree into consideration. As long as this pandemic think is going on I think it's not a bad Idea.
 
Cinammonroll said:
True, but I still think that I could do both at the same time. I've read that some employers take the cd degree into consideration. As long as this pandemic think is going on I think it's not a bad Idea.
Yes, that's the best route. Good luck.
 
Is having computer dual booted with windows and linux safe? Does the windows still scans for information on the partitions reserved for Linux?
 
Cinammonroll said:
May I ask you a question regarding cybersecurity, as you seem to know a lot about this field. I'm really interested in learning pentesting; it's the branch of CS that is most appealing to me. Currently, I'm studying cs at uni, but it's seems like a such huge waste of time to me, as we mostly learn at very slow pace, the things they teach in a whole semester, I could learn probably in like 3 days; there's not much about cybersecurity there. So, my point is , should I give up on Uni and just study cyersecurity on my own? Is CS degree necessary for a Pentester job, or several of certificates and courses suffice?

I would suggest doing both. I never went to a course to learn cybersecurity. All of this knowledge that I am sharing with you all came from Satan and His Demons guiding me. I would not be able to get a job in this field as I do not have any piece of paper proving that I am competent (most companies only care about said paper(s).)

Cinammonroll said:
Is having computer dual booted with windows and linux safe? Does the windows still scans for information on the partitions reserved for Linux?

Windows cannot understand the Linux partition formats Ext4/Ext3, so no, it cannot spy on Linux. However, a virus might infect your Linux via Windows. Most Windows viruses do not work in Linux, but it is still possible. The best way to prevent this from happening is to encrypt your Linux partition.
 
HiddenSerpent said:
Cinammonroll said:
May I ask you a question regarding cybersecurity, as you seem to know a lot about this field. I'm really interested in learning pentesting; it's the branch of CS that is most appealing to me. Currently, I'm studying cs at uni, but it's seems like a such huge waste of time to me, as we mostly learn at very slow pace, the things they teach in a whole semester, I could learn probably in like 3 days; there's not much about cybersecurity there. So, my point is , should I give up on Uni and just study cyersecurity on my own? Is CS degree necessary for a Pentester job, or several of certificates and courses suffice?

I would suggest doing both. I never went to a course to learn cybersecurity. All of this knowledge that I am sharing with you all came from Satan and His Demons guiding me. I would not be able to get a job in this field as I do not have any piece of paper proving that I am competent (most companies only care about said paper(s).)

Cinammonroll said:
Is having computer dual booted with windows and linux safe? Does the windows still scans for information on the partitions reserved for Linux?

Windows cannot understand the Linux partition formats Ext4/Ext3, so no, it cannot spy on Linux. However, a virus might infect your Linux via Windows. Most Windows viruses do not work in Linux, but it is still possible. The best way to prevent this from happening is to encrypt your Linux partition.

Thank you for the reply. Encrypting the partition might be the best solution indeed.
 
HiddenSerpent said:

Thanks for the Firefox configurations. I already had most of these in place, but your list provided a few more I haven't found elsewhere, so feeling good having those extra steps configured now.

As for a VPN... I've been using the free version of ProtonVPN for at least a year now, if not longer. Of all the free VPNs, there are none that I trust enough, except for ProtonVPN. I've tried searching the web extensively for holes in ProtonVPNs free service, but haven't found any. Your thoughts on this?

Also, you mentioned the best way to stay secured is to use a VPN with Wireguard, or use Tor to stay secure on Tor. So am I understanding this right, that if you're using something like Firefox on Clearnet, then use a VPN... but if you're using Tor, ONLY use Tor and DO NOT also use a VPN (with or without Wireguard)?

So if I'm browsing on Tor, only use that, but when I need to use Firefox, then connect to my VPN and only use my VPN for Firefox/Clearnet usage?
 
Henu the Great said:
I use qwant as it does not filter results like DDG or searx. I can even find JoS material just fine with it if I'd have to. Not with other options as I've tried...

Based on this site here, their privacy policy is potentially misleading...
https://digdeeper.neocities.org/ghost/search.html#qwant
Blocks anonymizers, and has stated that the removal of certain results is possible. So not perfect, but perhaps still a viable option. Some on reddit have mentioned the results are better than DDG, and at the same time, France isn't as bad as the US for privacy (DDG is US-based). I'll consider this an option for Firefox/Clearnet use alongside Searx, and see if I find more may be better than the other
 
Hearsync said:
Henu the Great said:
I use qwant as it does not filter results like DDG or searx. I can even find JoS material just fine with it if I'd have to. Not with other options as I've tried...

Based on this site here, their privacy policy is potentially misleading...
https://digdeeper.neocities.org/ghost/search.html#qwant
Blocks anonymizers, and has stated that the removal of certain results is possible. So not perfect, but perhaps still a viable option. Some on reddit have mentioned the results are better than DDG, and at the same time, France isn't as bad as the US for privacy (DDG is US-based). I'll consider this an option for Firefox/Clearnet use alongside Searx, and see if I find more may be better than the other
I use vpn so I don't care about the private factor as much. The most important factor for me is that I get the results as unfiltered as possible.

France is part of the 5EYES NATO spying network so it does not matter if the servers are in US or someplace else. Here comes to play what OS and how you use it and how is your network security handled.
 
HiddenSerpent said:
Here is proof that will really shock you.

Go to this website here from Firefox: https://ipleak.net/

Scroll down until you see “Your IP addresses - WebRTC detection” You will see your real IP, even if you are using a VPN.
I tried it and it didn't show my real IP. I guess in all Linux distros, Firefox is already set-up by default to be more secure. I also use a double-hop VPN and private window mode. Anyway your series is great, I try to create myself more time to read all your posts.
 
HiddenSerpent said:

As I've been doing some searching for a potential free VPN that also supports WireGuard, I found Iceland's Cryptostorm:
https://cryptostorm.is/cryptofree
https://cryptostorm.is/wireguard

Just like ProtonVPN, they have a no-logging policy - it's unlimited bandwidth, just at slow speeds (which for me, doesn't matter as I only do very light surfing of sites, which is why I haven't bothered opting to pay for a VPN). Proton in Switzerland is neutral (not 14 eyes), as is Cryptostorm in Iceland. Found on reddit of a guy who intentially masscan attacked Proton's server to see their reaction, and post about it - and Proton's reaction seemed pretty fair. They don't keep logs - but did admit to real-time monitoring, but the only way that came about is because they were notified that their server was being attacked, and the only other way that would come about is if the perpetrator stepping forward and admitted to doing something, which could then be looked at real-time (but still no logs kept if something happened in the past).

Going to do some more research on Cryptostorm and see if they may potentially be an even better option than ProtonVPN as you can use WireGuard with their free (or paid) VPN. Also, I'm pretty sure Cryptostorm has a small network as they actually own all their servers, whereas Proton rents them (the free ones at least - not their Secure Core servers).
 
HiddenSerpent said:
Tor traffic is different from regular traffic, and the two do not mix.
Actually as far as I know they do mix well together. If you use Tor alone your ISP can see that as far as I know. WIth a VPN your ISP will only see that you are connected to a VPN, not to Tor, which is still better.

Also, a VPN changes your real IP when you enter the first Tor node with a random IP. I read a case before, NSA was able to figure out who was doing what on Tor and from where as they were observing the first and last nodes from the network. How they figured out was a matter of timing since apparently they were able to link the activity from the third node to the IPs from the first node based on the connection time and how long it took to the search to reach the third node. A VPN will change your IP so if police is monitoring Tor traffic, they will see your activity but from a totally different IP changed by the VPN. Now I'm not really sure if a build-in bridge from Tor does exactly the same thing?

Also a VPN cannot see what you do on Tor because the traffic is encrypted, also Tor's first node doesn't receive your real IP. Is a sort of win-win situation. I'm not saying it's 100% anonimity but I think a Tor with a VPN is far better than Tor without VPN. What do you think about all above?
 

Official Temple of Zeus Links

Back
Top