TouchOdeath Posted December 14, 2015 Share Posted December 14, 2015 But that was for science. Science has never harmed anyone, right?*AdmiralAlkex was vaporized by V'Ger**V'Ger got 26 xp and leveled up*LOL! Your right, science itself is fine, but its mans application of it thats not always good. AdmiralAlkex 1 Link to comment Share on other sites More sharing options...
shaqan Posted January 4, 2016 Share Posted January 4, 2016 (edited) Hello guys.Could you teach me how to get the maximum level of privacy on my computer? Someone told me that a good starting point is to use the Linux OS,and to abort the usage of Windows,but i need more information. How can i get my PC away from the another's eyes? How can i hide my IP without any WEB service? Thanks in advance.Linux is not actually too secure. It's like Swiss cheese, full of "holes". That's how it becomes thanks to the way how it's being developed. It's devs are trying to be on bleeding edge all the time, various stuff gets tried out, sometimes worked out then discarded and replaced by something new. Security and flawlessness of the code take both definite back seat.Most secure from OSes is probably OpenBSD but it really works as desktop only if you have certain type of hardware. It's devs are not into binary blobs in drivers and so you have to keep in mind certain limitations. For desktop system, for example, you'd need to stick to Intel graphics. Nvidia is totally out and many of the ATI graphics cards as well.FreeBSD is compromise between OpenBSD's singleminded security and desktop usability. Nvidia graphics works. ATI/AMD graphics works up to Radeon HD7950 and Intel HD graphics works. It's stable, follows POSIX standards, contains no "linuxisms" and whole system is being developed as a whole. (Linux is kernel, + each distributor throws it's set of GNU utilities around it, mostly each following it's own preferences and it's quite of mess of differences between distros as a result). Just to make sure it's understood, BSDs are different family of Unix-like OSes, they are not Linux.You can't really hide, if you want to use Internet. Each server in web you visit, you leave your data. What browser, which OS, locale, IP etc. You can up to certain point disguise it, using proxies, Tor etc but whatfor? Is the inconvenience worth the false sense of "security". IMHO, as long as your computer stays uninfected by malware and your personal data does not leak - you are staying secure.PS. If you happen to own smartphone and still seek total privacy, throw it away for start. You would not believe how easy is to get into one provided access to certain tech. Google for GSM fake base station. Edited January 4, 2016 by shaqan Link to comment Share on other sites More sharing options...
giangnguyen Posted February 6, 2016 Share Posted February 6, 2016 It is fairly simple. Step 1: Use Tor to connect to the internet. This will make your internet slow, but safe. Step 2: Disable Windows Update. This leaks your IP to Microsoft. Step 3: Replace Microsoft Word with Libre Office. Libre is much more secure. Step 4: Use disposable/hidden email. temp-mail.org would work. Protonmail is great as well. Also try sigaint email (Accessible through Tor) Step 5: Don't use social media. Step 6: Use DuckDuckGo instead of Google That's pretty much it. Link to comment Share on other sites More sharing options...
JohnOne Posted February 7, 2016 Share Posted February 7, 2016 I'd be interested to hear your explanation of "Step 1: Use Tor to connect to the internet. This will make your internet slow, but safe." AutoIt Absolute Beginners Require a serial Pause Script Video Tutorials by Morthawt ipify Monkey's are, like, natures humans. Link to comment Share on other sites More sharing options...
water Posted February 7, 2016 Share Posted February 7, 2016 I do not think Tor makes your internet connection safe, just safer My UDFs and Tutorials: Spoiler UDFs: Active Directory (NEW 2024-07-28 - Version 1.6.3.0) - Download - General Help & Support - Example Scripts - Wiki ExcelChart (2017-07-21 - Version 0.4.0.1) - Download - General Help & Support - Example Scripts OutlookEX (2021-11-16 - Version 1.7.0.0) - Download - General Help & Support - Example Scripts - Wiki OutlookEX_GUI (2021-04-13 - Version 1.4.0.0) - Download Outlook Tools (2019-07-22 - Version 0.6.0.0) - Download - General Help & Support - Wiki PowerPoint (2021-08-31 - Version 1.5.0.0) - Download - General Help & Support - Example Scripts - Wiki Task Scheduler (2022-07-28 - Version 1.6.0.1) - Download - General Help & Support - Wiki Standard UDFs: Excel - Example Scripts - Wiki Word - Wiki Tutorials: ADO - Wiki WebDriver - Wiki Link to comment Share on other sites More sharing options...
Developers Jos Posted February 7, 2016 Developers Share Posted February 7, 2016 Don't think it makes it safer at all, just hides your source IP address, but would even claim it could make it unsafer as you have no clue how safe the proxy is you are being routed through. Jos SciTE4AutoIt3 Full installer Download page - Beta files Read before posting How to post scriptsource Forum etiquette Forum Rules Live for the present, Dream of the future, Learn from the past. Link to comment Share on other sites More sharing options...
JohnOne Posted February 7, 2016 Share Posted February 7, 2016 Probably both true, but I just remembered this a privacy thread, not a safety thread. I don't fully withdraw my question though, I'm still interested to hear. AutoIt Absolute Beginners Require a serial Pause Script Video Tutorials by Morthawt ipify Monkey's are, like, natures humans. Link to comment Share on other sites More sharing options...
iamtheky Posted February 7, 2016 Share Posted February 7, 2016 Developed by the navy, for use by the navy, and the head of the NSA and cyber command is currently an Admiral. For extra privacy you could just set them up a log forwarder on your box. ,-. .--. ________ .-. .-. ,---. ,-. .-. .-. .-. |(| / /\ \ |\ /| |__ __||| | | || .-' | |/ / \ \_/ )/ (_) / /__\ \ |(\ / | )| | | `-' | | `-. | | / __ \ (_) | | | __ | (_)\/ | (_) | | .-. | | .-' | | \ |__| ) ( | | | | |)| | \ / | | | | | |)| | `--. | |) \ | | `-' |_| (_) | |\/| | `-' /( (_)/( __.' |((_)-' /(_| '-' '-' (__) (__) (_) (__) Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now