22.05.2023 Views

Tor_and_The_Dark_Net_Remain_Anonymous_and_Evade_NSA_Spying_by_James

Tor

Tor

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

you are using it. There is no reason to give an attacker an open window into your home.

Next is your microphone, again desktops usually do not have built in microphones, but

most laptops do. A microphone can be activated to listen to you talking and you need to

find a way to physically disable it. The best way of course is to physically remove it, but I

am not writing a tutorial on how to do that.

The FBI developed a keystroke logging software called Magic Lantern. Magic Lantern

can reportedly be installed remotely, via an e-mail attachment or by exploiting common

operating system vulnerabilities, unlike previous keystroke logger programs used by the

FBI. It has been variously described as a virus and a Trojan horse. It is not known how the

program might store or communicate the recorded keystrokes.

“The FBI intends to deploy Magic Lantern in the form of an e-mail attachment.

When the attachment is opened, it installs a trojan horse on the suspect’s

computer. The trojan horse is activated when the suspect uses PGP encryption,

often used to increase the security of sent e-mail messages. When activated, the

trojan horse will log the PGP password, which allows the FBI to decrypt user

communications.

Spokesmen for the FBI soon confirmed the existence of a program called Magic

Lantern. They denied that it had been deployed, and they declined to comment

further”

https://en.wikipedia.org/wiki/Magic_Lantern_%28software%29

Then of course we have cell phones which can be activated remotely as well.

“Mobile phone (cell phone) microphones can be activated remotely, without any

need for physical access. This “roving bug” feature has been used by law

enforcement agencies and intelligence services to listen in on nearby

conversations”

https://en.wikipedia.org/wiki/Covert_listening_device#Remotely_activated_mobile_

According to a few of the sources in the Wikipedia article, the cell phone can be activated

to listen to you even when it is off. Pulling the battery will likely do the job, but there is no

guarantee. So make sure the phone is not in the same room as you if you are talking about

anything sensitive. As always, be super paranoid. Turn on the shower and put the phone in

the bathroom if you have to, or better yet if you are going somewhere and you do not need

your cell phone, leave it at home. Since most people never leave home without their cell

phones, if somebody is snooping on you, they might think you are still at home. The first

group of people that went to visit Snowden in Russia were told not to bring any laptops or

cell phones with them for those reasons.

So we know the government is actively trying to gain remote access to your computer,

they can listen to your phones, what should you do about it?

You need to do the best you can to make sure the computers that you use are not exposed

to the elements of risk. Always disable JavaScript when visiting any websites unless the

website is 100% trusted. Start phasing out the use of Microsoft Windows and MAC OSX

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!