©ALL CONTENT OF THIS WEBSITE IS COPYRIGHTED AND CANNOT BE REPRODUCED WITHOUT THE ADMINISTRATORS CONSENT 2003-2020



Basic Internet Security Precautions

AnaSCI

ADMINISTRATOR
Sep 17, 2003
8,625
18
38
Posted by: gabe walker

Your email is not private even if you use secure email services...

email over 180 days requires only a subpoena not a warrant while less than 180 requires a warrant.. However the Justice Dept. argues that "opened" email left on servers LESS than 180 days falls under a subpoena as well..

Think secure encrypted service is the answer?
Steroid bust shows Feds can still get at ?private? and ?secure? e-mail | Ars Technica

Cloud storage is fair game.. subpoena only..do that BS that Petraeus/Broadwell thing storing email as draft... bad Al Qaeda tried that too.. They are not communications so less is needed

Txt msg falls under same guidelines....

for that try secure txt service like www.mywickr.com for iphone soon android
or Gryphn Corporation - The World's Most Secure Messaging App

Facebook, twitter... subpoena

Cell phone data like GPS or tower locations.. only requires that data contains "specific and articulable facts"

IP addys also:
Court: Feds can read e-mail, IP addresses without warrant | Ars Technica

cell phone to and from numbers .... Probable cause only required..
https://ssd.eff.org/your-computer/govt/warrants

READ THE ABOVE!!!!!!

and...
https://ssd.eff.org/
and visit
EPIC - Electronic Privacy Information Center

You must use a VPN service if you do any public internet activities... however not all are safe...
Hidemyass says it doesn't hide your ass | TG Daily

Open VPN is viable or at a minimum use the TOR network
https://www.torproject.org/projects/torbrowser.html.en
download the TOR browser bundle and read if you are not familiar with what it does...
Seven VPN Services You Should Know About | PCMag.com

can also be set up with other browsers... I use Opera mobile with the TOR Orbot for android simple to use
info here:
https://plus.google.com/111055460369309789724/posts/1ThJuiujcKY
or here:
http://forums.unixhub.net/showthread.php?tid=205

And basic basic encryption that most do not even consider.. Use Google Chrome click on settings, extensions and download HTTPS everywhere(automatically uses HTTPS on most sites) and also download Use HTTPS(forces sites to use HTTPS) ... applies to firefox as well...

Sit back and think, look around.. If LE was to sweep your home what would they find..computer, phone, paper trail, gear, pins, rec's, what?

Be careful it doesn't matter who you are.. manufacturer, seller, buyer, personal use, recreational use, everyone is vulnerable

http://www.interpol.int/Crime-areas/Pharmaceutical-crime/Operations/Operation-Pangea

There is so much more if you have anything else add to this list... Favorite VPN's, Secure txt/communication app's, Security software, add it...
 

norbit09

AnaSCI VET
Jul 14, 2012
1,063
0
0
Seattle
Just some notes from above info not trying to be a dick..

1-How Golden Frog Responds To Criminal Investigations:

Golden Frog cooperates fully with law enforcement agencies, yet there must still be a subpoena before Golden Frog provides a member's identifying information - minimal information reasonably calculated to identify and no more. In a criminal investigation Golden Frog is required by the Law to not divulge the fact of the investigation to the member.
What Golden Frog Collects From Golden Frog

Golden Frog collects personally identifiable information from end users only through voluntary web form submissions, primarily for the purpose of enabling the purchase of services and engaging in support and other conversation. Golden Frog also collects anonymous information about how visitors use our web site; for example, Golden Frog utilizes web analytics software to track, in aggregate, the number of unique views received by the pages of the web site, the domains from which users originate along with many other analytical data points. Through the use of web analytics software, the Golden Frog website may use "cookies" to assist the tracking of how users engage our website. A cookie is a piece of data that the web server stores on the browser's PC which the web browser will then send back to the web server on any future requests, to facilitate identification of the user should they visit the web site again. While much of the information that we collect from users in this manner is not personally identifiable, it may be associated with personally identifiable information that users voluntarily provide to us through our web site.

2-okayfreedom.com -Checks out pretty good

3-OpenVPN Shield Exchange -Will work with LE server is in USA.

4-proXPN - Seems good.

5-https://ssd.eff.org - I already posted that here.

6-Your email is not private even if you use secure email services. Disagree countermail with the usb key addon works and PGP.
 
Last edited:

willieaames

New member
Apr 7, 2015
10
0
0
LA, USA
IPVanish provides robust security by using the powerful 256-bit version of AES encryption to securely transmit your data. Other providers use the weaker 128-bit Blowfish (BF-CBC) version. Most importantly, IPVanish doesn’t keep logs recording your online activity, which shields your anonymity.
 
Last edited: