Personality Cafe banner
1 - 20 of 33 Posts

·
Registered
Joined
·
6,983 Posts
Discussion Starter · #1 ·

·
Banned
Joined
·
3,980 Posts
what are you trying to hide? I wish there was a way to give anonymous tips to the government.
 

·
Registered
Joined
·
695 Posts
Because then the people I report might know I reported them and come after me
How would they know unless you're called in to testify against them in court? What would you report them to the government for, anyway? Drug use? Porn surfing habits? :dry: That's hardly a matter of national security.
 

·
Banned
Joined
·
3,980 Posts
How would they know unless you're called in to testify against them in court? What would you report them to the government for, anyway? Drug use? Porn surfing habits? :dry: That's hardly a matter of national security.
If someone is as determined to protect the information of what they're doing on the internet as the person who started this thread, they might be a terrorist
 

·
Registered
Joined
·
25,999 Posts
What's the best way to avoid data retention?
Ah, the old bait and switch.
 

·
Registered
Joined
·
6,983 Posts
Discussion Starter · #9 · (Edited)
You can't hide from your ISPs.
So.
Have fun with that.
Russian, Swiss, Israeli browsers and Tor are good ways. Yandex gained some western popularity because it is guaranteed 100% NSA and Data Retention/ASIO-Free. Any private foreign services would work well.

If someday they got rid of capitalism and outlawed corporate data mining then the ISP spying will no longer be a problem altogether.
 

·
Registered
Joined
·
6,983 Posts
Discussion Starter · #10 · (Edited)
what are you trying to hide? I wish there was a way to give anonymous tips to the government.
Because merely disagreeing and expressing your disagreement can get you labelled "terrorist" if they wanted.

It's called privacy and independence. I don't need or want their "protection". I am sick of a corporate government taking away our ability to fend for ourselves? Why not just leave us on our own, unban weapons and leave me/us to fend for ourselves?

Ernst Thalmann's legacy is more relevant than ever now. We need another figure like him here.
 

·
Banned
Joined
·
3,980 Posts
Because merely disagreeing and expressing your disagreement can get you labelled "terrorist" if they wanted.

It's called privacy and independence. I don't need or want their "protection". I am sick of a corporate government taking away our ability to fend for ourselves? Why not just leave us on our own, unban weapons and leave me/us to fend for ourselves?

Ernst Thalmann's legacy is more relevant than ever now. We need another figure like him here.
Capitalism and corporations can do way better at providing everyone a good standard of living than the fucking "workers" can.
 

·
Banned
Joined
·
1,428 Posts
Craig Thomas said:
Data Retention [in Australia!] has nothing to do with the information that a VPN will encrypt. A VPN has no effect on the "metadata" your ISP records.

1. Interception is hardly going to defeat attention from law enforcement/security agencies/very organised crime, for any one of three reasons that spring to mind.The simple answer to encryption, if somebody has the power/resources and wants to see the content of your communications, is: Man-in-the-middle attack - Wikipedia, the free encyclopedia

Ironically, you should probably assume, if you choose to subscribe to a foreign VPN service, that this makes your private data far easier/cheaper to obtain by whoever it is who wants it, then if you had it all going unencrypted via your Australian ISP.

"metadata", in the context of this Data Retention, applies only to the connections that connect a user's device to that user's service provider.

For example - you get home and turn on your domestic internet router: your ISP logs your ID, your assigned IP address, date and time.Then, you open up a browser window and connect to The Conversation website: your ISP logs absolutely nothing in relation this communication, because it is a communication that is quite specifically excluded from this Act.

Paragraph (4) even includes 3 "Note:"s which make it absolutely clear that the ISP is not logging any of: URLs, destination IP addresses, nor communications that are carried over the communication to the ISP that is the subject of the Act.

It is astounding how few of the commentators in the media seem to have bothered to read the Bill before writing their scary stories.

http://parlinfo.aph.gov.au/parlInfo...toc_pdf/14242b01.pdf;fileType=application/pdf
Com Com said:
User 1 browses stuff on the internet (HTTP, SMTP, HTTPS, etc.)

Without a VPN the ISPs meta data would include the correct source and destination L3/4 data.

Once that users activates their VPN the ISP would only see 500(ESP) and UDP4500 layer 4 information and a source of the user and destination of the VPN server.

This means that all information for what actual services the user is using is not able to be logged as a tunnel mode VPN will encapsulate the L3 Header.
Owning Virtual Private Networks (VPN) must be irresistible for secret services. Advantage of a small VPN like CyberGhost from Romania with servers in few countries where many customers share few IP addresses, compared to Hide My Ass (HMA):

CyberGhost said:
Log data: CyberGhost keeps no logs which enable interference with your IP address, the moment or content of your data traffic. We make express reference to the fact that we do not record in logs communication contents or data regarding the accessed websites or the IP addresses.

https://www.cyberghostvpn.com/en_us/privacypolicy
1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold and for how long?

2. Under what jurisdiction(s) does your company operate?

3. What tools are used to monitor and mitigate abuse of your service?

4. Do you use any external email providers (e.g. Google Apps) or support tools ( e.g Live support, Zendesk) that hold information provided by users?

5. In the event you receive a DMCA takedown notice or European equivalent, how are these handled?

6. What steps are taken when a valid court order requires your company to identify an active user of your service? Has this ever happened?

7. Does your company have a warrant canary or a similar solution to alert customers to gag orders?

8. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?

9. Which payment systems do you use and how are these linked to individual user accounts?

10. What is the most secure VPN connection and encryption algorithm you would recommend to your users? Do you provide tools such as “kill switches” if a connection drops and DNS leak protection?

11. Do you use your own DNS servers? (if not, which servers do you use?)

12. Do you have physical control over your VPN servers and network or are they outsourced and hosted by a third party (if so, which ones)? Where are your servers located?

https://torrentfreak.com/anonymous-vpn-service-provider-review-2015-150228/3/


https://www.dnsleaktest.com/what-is-a-dns-leak.html

Electronic Frontier Foundation: Tips, Tools and How-tos for Safer Online Communications

OVERVIEWS:

What Is Encryption?
An Introduction to Threat Modeling
Seven Steps To Digital Security
Choosing Your Tools
Creating Strong Passwords
Keeping Your Data Safe


TUTORIALS:

How to: Use RedPhone (Android)
How to: Use PGP for Windows
How to: Use OTR for Mac
How to: Use Tor for Windows
How to: Use OTR for Windows
How to: Use TextSecure (Android)
How to: Use PGP for Linux
How to: Use PGP for Mac OS X


How to: Circumvent Online Censorship
https://ssd.eff.org/en/module/how-circumvent-online-censorship
https://flossmanuals.net/bypassing-censorship/


How to: Use Signal – Private Messenger
How to: Delete your Data Securely on Linux
How to: Encrypt Your iPhone
How to: Delete Your Data Securely on Windows
How to: Encrypt Your Windows Device
How to: Delete Your Data Securely on Mac OS X
How to: Install and Use ChatSecure
How to: Use KeePassX


BRIEFINGS:

Key Verification
Protecting Yourself on Social Networks
Attending Protests (United States)
The Problem with Mobile Phones
Things to Consider When Crossing the US Border
Communicating with Others
Choosing the VPN That's Right for You
How Do I Protect Myself Against Malware?
An Introduction to Public Key Cryptography and PGP
Attending Protests (International)


https://ssd.eff.org/


https://www.eff.org/secure-messaging-scorecard

https://www.eff.org/https-everywhere

Browser Fingerprinting Test: https://panopticlick.eff.org/

https://www.torproject.org/projects/torbrowser.html.en
 

·
Registered
Joined
·
6,983 Posts
Discussion Starter · #13 · (Edited)
Capitalism and corporations can do way better at providing everyone a good standard of living than the fucking "workers" can.
It's a good thing that capitalism and the CEOs of production industries will no longer be able to function in coming decades. Unless you go back to Feudalism(Statism), or adopt Socialism where workers truly own the means of production/how things are produced through workplace democracy and a democratic government where the majority rule over the minority. Choice is between the two.

Industrial civilisation is headed for collapse if somebody or the workers in general don't seize control of the means of production from the hands of CEOs, who will only do what is profitable and not what is sustainable:

Nasa-funded study: industrial civilisation headed for 'irreversible collapse'? | Nafeez Ahmed | Environment | The Guardian
 

·
Registered
Joined
·
2,887 Posts
If i'm getting suspicious i would just change my IP and hope for the best ? lol this would confuse people at least and make it difficult for them.

i guess if you overload your connection with porn, then it would make it harder for ISPs or other organizations to bear through invading your privacy. it's obviously going to be classified with 'personal content' after the fact.

I wouldn't worry about it too much, if they brought it up in court, it would definitely be arguably unconstitutional or illegal to have gotten that information in the first place. Besides, living in australia, everyone 'illegally' downloads movies and music, so it's totally fine if that's what you're doing - indeterminate liability - so much people doing it in their everyday lives, you can't identify which one would be compensated for and you courts can take measures to provide justice against every bugger who downloads the new Game of Thrones episode. but if you're on the other end , sharing the information or engaging in terrorist death threats for example, that would probably get you busted, i guess that's why they passed it any way - counter-terrorism or "serious" crime allegations.

any legislation would be invalid to the extent that it invades privacy or the common sense of what rights you possess. that's the purpose of the constitution.
 

·
Registered
Joined
·
622 Posts
There is no way to stop them, and it sucks........

Stay away from all big business services Google etc.
Read the TOS on every service you use, if they say that they will share your information with others and law enforcement forget about it.
No social networking at all.
Block all cookies and scripts, they use them to get info on you.
Do not use your ISPs DNS.
Uninstall Windows cause it records everything you do, I'm serious about this, there is no telling what MS knows about you.
Look for services in countries that have great privacy laws
Don't trust Tor right now unless you own your own exit node
Vpn that accepts bit coin and doesn't log things and resides in a country with awesome privacy laws.....
ENCRYPT Everthing.....
No cloud storage....
Get rid of your smartphone, that thing gives up so much of your information it isn't funny.

If all else fails unplug your computer and use some thermite on it
 

·
Registered
Joined
·
2,887 Posts




Owning Virtual Private Networks (VPN) must be irresistible for secret services. Advantage of a small VPN like CyberGhost from Romania with servers in few countries where many customers share few IP addresses, compared to Hide My Ass (HMA):







https://www.dnsleaktest.com/what-is-a-dns-leak.html

Electronic Frontier Foundation: Tips, Tools and How-tos for Safer Online Communications

OVERVIEWS:

What Is Encryption?
An Introduction to Threat Modeling
Seven Steps To Digital Security
Choosing Your Tools
Creating Strong Passwords
Keeping Your Data Safe


TUTORIALS:

How to: Use RedPhone (Android)
How to: Use PGP for Windows
How to: Use OTR for Mac
How to: Use Tor for Windows
How to: Use OTR for Windows
How to: Use TextSecure (Android)
How to: Use PGP for Linux
How to: Use PGP for Mac OS X


How to: Circumvent Online Censorship
https://ssd.eff.org/en/module/how-circumvent-online-censorship
https://flossmanuals.net/bypassing-censorship/


How to: Use Signal – Private Messenger
How to: Delete your Data Securely on Linux
How to: Encrypt Your iPhone
How to: Delete Your Data Securely on Windows
How to: Encrypt Your Windows Device
How to: Delete Your Data Securely on Mac OS X
How to: Install and Use ChatSecure
How to: Use KeePassX


BRIEFINGS:

Key Verification
Protecting Yourself on Social Networks
Attending Protests (United States)
The Problem with Mobile Phones
Things to Consider When Crossing the US Border
Communicating with Others
Choosing the VPN That's Right for You
How Do I Protect Myself Against Malware?
An Introduction to Public Key Cryptography and PGP
Attending Protests (International)


https://ssd.eff.org/


https://www.eff.org/secure-messaging-scorecard

https://www.eff.org/https-everywhere

Browser Fingerprinting Test:
https://panopticlick.eff.org/

https://www.torproject.org/projects/torbrowser.html.en

Very informative. I do not know too much about IT, but generally, who's to say the ISP wouldn't still be able to track you?
I mean, even if you can stand the slower connection while changing your IP to a foreign IP, and you don't change your IP back to your original IP. there would still be government organizations which could identify whether the computer is outside or inside the country by where the data is coming from, to determine whether they are inside or outside the country. I think NSA had something similar to this, where they look at the data as coming from a network either foreign or inside the US.
 

·
Registered
Joined
·
622 Posts
Very informative. I do not know too much about IT, but generally, who's to say the ISP wouldn't still be able to track you?
I mean, even if you can stand the slower connection while changing your IP to a foreign IP, and you don't change your IP back to your original IP. there would still be government organizations which could identify whether the computer is outside or inside the country by where the data is coming from, to determine whether they are inside or outside the country. I think NSA had something similar to this, where they look at the data as coming from a network either foreign or inside the US.
Read this http://en.m.wikipedia.org/wiki/Room_641A it has happened oh and another thing never use the modem supplied by your is and remember to spoof your Mac address.
 

·
Registered
Joined
·
6,146 Posts
Russian, Swiss, Israeli browsers and Tor are good ways. Yandex gained some western popularity because it is guaranteed 100% NSA and Data Retention/ASIO-Free. Any private foreign services would work well.

If someday they got rid of capitalism and outlawed corporate data mining then the ISP spying will no longer be a problem altogether.
The problem is ISP's aren't foreign services, not to mention "if they got rid" of capitalism, ISPs won't exist. No ISP, no P2P, no internet.
 

·
Registered
Joined
·
5,225 Posts
There is none, at least not if you'd like to stay online and/or connected.

As for ISPs - ISPs themselves have very little interest in what you're doing. It's generally governments or other institutions pushing for surveillance and implementation of surveillance mechanisms rather than ISPs themselves.

For ISPs amassing data is nothing but immense cost.

That is of course only if the ISP is not actual part of the state.
 
1 - 20 of 33 Posts
This is an older thread, you may not receive a response, and could be reviving an old thread. Please consider creating a new thread.
Top