19.11.2014 Views

Anonymous – The Über-Secret Handbook

Anonymous_Security_Handbook.pdf

Anonymous_Security_Handbook.pdf

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Technical<br />

Basic Rule: Use as many security layers as possible. <strong>The</strong> question is not whether you are paranoid, but whether you<br />

are paranoid enough?<br />

A good start is to use a VPN and run <strong>Anonymous</strong> related Software from a USB device. A proxy will also do, but it is not as<br />

secure as a VPN.<br />

Always use as many security layers as possible. Make sure to use them in the right way. If you don't know how to use them,<br />

learn first.<br />

Most <strong>Anonymous</strong>’ use VPN to hide their traces. <strong>The</strong>y use SSL encrypted connections and #vhost when they are on<br />

irc.anonops.ru.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!