19.11.2014 Views

Anonymous – The Über-Secret Handbook

Anonymous_Security_Handbook.pdf

Anonymous_Security_Handbook.pdf

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

∗ Public access points are perfect - just about. (Correlating logins with CCTV could prove disastrous so security<br />

cameras should be avoided while using such 'free' services. Cybercafés, McDonald’s, and many companies offer<br />

free internet access, remember though, not to surf those nets without a vpn and/or Tor.<br />

∗ Keep private keys (pgp gnupgp) in a removable device, and that removable device away from curious eyes.<br />

Encrypt the private key before doing this.<br />

∗ Keep vpn certs away from curious eyes via removable device, or common hidden folders.<br />

∗ Never use the same users/passwords on reinstall. Take the time to create a new one each time.<br />

∗ Use random password generators.<br />

∗ BE paranoid. All rare activity in your computer must be checked and monitored. That will provide 2 things:<br />

knowledge once you identify it, and added safety.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!