22.05.2023 Views

Tor_and_The_Dark_Net_Remain_Anonymous_and_Evade_NSA_Spying_by_James

Tor

Tor

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PGP, TAILS, VIRTUAL BOX

So keep in mind that if you are a user of the Deep Web, or any other form of activism, you

never want to enter any identifying details about yourself online. Make it so that even if

the NSA intercepted and decrypted, or compromised the website you are accessing that the

only information they have against you is your username and password. How safe is that

username and password? Does your password contain any identifying information? Is it

the same password that you use for your personal email? Does it contain a name of

somebody you know personally? Always keep all of these factors in mind.

Another step you must take, especially when communicating with other users on sites in

the Deep Web is using PGP encryption. This is not always possible, such as in cases when

you are logging into a website, filling out a form, logging into an email, etc.. Consider any

type of information you enter into a website using plain text possibly compromised. Never

put anything sensitive in any type of plain text format online. PGP comes into play

because it uses a very strong method of encryption called cryptography. PGP stands

for Pretty Good Privacy, and it is used for encrypting, decrypting and signing texts, e-

mails, files, directories, and whole disk partitions and to increase the security of e-mail

communications.

For the more technical users, it uses a serial combination of hashing, data compression,

symmetric-key cryptography, and finally public-key cryptography. For the less technical

users, the process of encrypting messages using PGP is as follows. You create a private

key and a public key. The public key is the key you give out to people you want to send

you encrypted messages. Your private key, is kept privately by you. This private key is the

only key that can unlock messages that were previously locked with your public key.

If you are still confused, think about it like this. Think about a public key that can go

around locking boxes that are intended for you. Anyone can lock a box that is intended for

you, but you are the only one with the key to unlock the box. Either if the person who sent

you a message locked a box (message) with your public key, they themselves cannot

unlock it. Only the person possessing the private key can unlock it. If you wish to respond

to this person, you must use their public key to encrypt the message you intend to send to

them. And they themselves, use their own private key to decrypt the message you sent

them.

If you are still with me, I am glad I haven’t lost you yet. This is called cryptography and

was designed so that anybody intercepting your message could not decrypt the message

without your private key. Even if you yourself, lose your private key, there is no method of

key recovery. You can consider that message locked forever. So how do you use PGP?

Well before we get to that, I want to introduce you to a Live Operating System, which

makes using PGP encryption and decryption very easy. A live operating system is an

operating system that you can run on top of your current operating system. So for

example, if you are a Windows user, you have 2 choices. You can download the live

operating system, burn it to a CD or DVD and then boot your computer from that DVD or

CD. This will make your computer run as if you have this operating system installed on

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!