Saturday, August 24, 2013

Encryption Guides


Since Edward Snowden exposed NSA spying with documented proof of its ""collect everything"" mentality---people have been trying to fight back against collection of emails, phone calls and web browsing----below are some guides how to accomplish different forms of encryption, data security and internet security.

Privacy matters and is an important part of the Constitution and the Bill of Rights
The 1st Amendment protects free speech----and the 4th Amendment protects us against unreasonable search and seizure, and requires law enforcement and the government to get warrants from courts, proving they have probable cause to make the search, and it is not unreasonable, and limited---it cannot legally collect everything just in case a crime happens.

""When an Agent Knocks"" by Center for Constitutional Rights When Agent Knocks



a very quick guide to HTTPS, PGP and OTR is here link here



Add on for Browsers            First Step VERY SIMPLE Basic Step everyone should do NOW!!!
                                              Install HTTPS Everywhere (for Google Chrome or Mozilla                                                                           Firefox) https://www.eff.org/https-everywhere


Search Engines                    Also GREAT NEWS is that Google has started to ENCRYPT                                                                     searches article here

                                             Encrypted Google Search  https://encrypted.google.com

                                             Startpage search and proxy https://startpage.com

                                              How StartPage protects Privacy

                                             Also IxQuick search and proxy https://ixquick.com/

IP protection services       UltraSurf   http://ultrasurf.us/

                                           How to use UltraSurf  UltraSurf Video Tutorial

                                           Hide My Ass Proxy service https://hidemyass.com/

PASSWORD security 
Passwords are not strong enough---they are too short and most people use things easy to guess
use a Pass PHRASE instead of a pass WORD

Automatic pass phrase generator    https://entima.net/diceware/


Or you can use the Diceware word list to create a random grouping of words

you will need a die, or 2 or 3 dice-----roll the dice and write the numbers in groups of 5

so for example you roll     12345  54321   78563  23786 84632

then look up the words that correspond to the numbers you rolled---from 11111 to 66666


Longer Guides                  Electronic Frontier Foundation  here

                                           Freedom of the Press Foundation  here

                                           Black Hat Guide  https://www.cyberguerrilla.org/a/2012/?p=5905

                                           some more tools here  link here
                                         
                                           And Here Guide to Tech Tools

                                           Internet Security expert Bruce Shneir's advice link here


EFF 2013 Good tech companies  link here

More tools available here  Link here for more links


EMAIL security 
Make sure only the person you SENT email to can read the email you sent them

5 apps to help you make email encryption easy link here

Encrypted Email using Mozilla Thunderbird and Enigmail add on
Mozilla Thunderbird Download

Enigmail Website

How to Use Thunderbird to Encrypt email


Email Privacy using PGP  http://www.gnupg.org/

For Windows   http://www.gpg4win.org/index.html



TOR (The Onion Router)    NSA HATES TOR----because IT WORKS!!!

NSA document about TOR

NSA tries to attack TOR

History of TOR 
State Deptartment helped develop TOR article here
A far-flung group of geeks, supported by the U.S. State Department, has built a tool for anonymous communication that's so secure that even the world's most sophisticated electronic spies haven't figured out how to crack it. That's the takeaway from the latest revelations from National Security Agency leaker Edward Snowden. The NSA has used aggressive computer attack techniques to monitor people using the Tor network, a service that's funded by the U.S. government and allows users to remain anonymous when they're connected to the Internet. But the agency has not been able to undermine the core of the Tor system, which was developed by the U.S. Naval Research Laboratory in 2002.


We see the NSA, an agency of the Defense Department, taking actions that are directly at odds with those of the State Department, which for the past few years has spent millions of dollars to develop Tor and other technologies and then distribute them overseas to political dissidents and democracy activists.


TOR the Anonymous web browser 
 link here  Download the Bundle here    see video here TOR install video

How to install Tor correctly Link here
http://www.torproject.org

Here is how to do so:
1. Click on “Download TOR”, or “Download”.
2. You will see text that says, “The Tor Browser Bundle contains everything you need … Just extract it and run. Learn more >> LINK HERE

3. Click on this “Learn more” link. for the “Tor Browser Bundle”

6. Run this file.
7. You will be prompted to extract this to a directory. By default, it will be set to C:UsersYouDownloads This is perfectly ok. You can also choose a different directory if you wish.
8. Click “Extract”
That’s it. TOR Browser is NOW installed. Time to test it out!

=== 2 : Using and Testing Tor Browser for the first time ===

Now, inside the “Downloads” folder, double click on the folder called “Tor Browser”.
Lastly, double click on the application: “Start Tor Browser”
When you do, you will see the Vidalia Control Panel appear, and you will observe as you connect to the TOR network.
When this is complete, your web browser will open up and will automatically connect to the web address:
check.torproject.org
This is to confirm that you are in fact using TOR. If you have followed this guide correctly, then you will see the following green text, or something similar:
“Congratulations. Your browser is configured to use Tor.”
Now you can use this web browser the same as any other. You can go to any website you wish, and neither your ISP or anyone else will be able to see where you are going, or what you are doing.


Disk Encryption Options for hiding files on your computer securely 
EFF Guide
https://ssd.eff.org/tech/disk-encryption


TrueCrypt
http://www.truecrypt.org/downloads

How to create, test and use True Crypt
Section 4 of this guide https://www.cyberguerrilla.org/a/2012/?p=5905



TAILS (The Amnesiac Live System) an anonymous operating system that runs on Linux
I found it hard to install and set up at first---but this helped
How to install TAILS 

Very easy to download, write image to DVD using a copying program, then put in DVD and start computer


Chat and Instant Messages    Off the Record Chat with PIDGIN

Pidgin IM Chat  https://pidgin.im/

Pidgin OTR link

Pidgin Encryption download here



Press and Internet Freedom Organizations
https://pressfreedomfoundation.org/

https://www.eff.org/

http://www.freedomhouse.org/issues/internet-freedom

http://www.humanrightsfirst.org/our-work/business-and-human-rights/internet-freedom-and-privacy/




I found this easy website to encrypt and decrypt emails
https://www.igolder.com/pgp/encryption/

it works well

First you generate a key to encrypt emails https://www.igolder.com/pgp/generate-key/

just remember to copy and paste ENTIRE KEY to use it


THIS is igolder.com PUBLIC KEY as an example of showing the entire key

If you wish to contact us using PGP-encrypted messages, feel free to use our public PGP key iGolder.asc.  If you include your public PGP key, we will provide you an encrypted reply.


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP Desktop 10.0.0

mQENBEuUuccBCACz6AsQjJ+ulHUL9Z9xDIHw+dwgmRu6dPHD86u21itAUiM7nenN
p4MGJ8XuPqGfchR76KTscL4DLugI8srfwjbOFuZYGqZzEp9Pr1BfVkI1XRbT/4x2
OUULqjo+BIDJdSm2ZO1DKh2HYTL9iiT4HD12JZ3RUCbcUvfCrFwu8l54Pp7qJxqV
zndJIRpJXQ8M6EV9LcBIf7GLJaq4exq0j1kRCBLTZ763gN8KDGeltq8AvsA0YZes
Awm+XR94XFbdqp9nAb0ZkugKnnYVGSjgO/MiQNP9mCO1mcjr0g3R1ZJSi03HO9va
6FUTVcyxX4ywyHKMAiVQakhmthwuw3TpiXT7ABEBAAG0GmlHb2xkZXIgPGluZm9A
aUdvbGRlci5jb20+iQFtBBABAgBXBQJLlLnHMBSAAAAAACAAB3ByZWZlcnJlZC1l
bWFpbC1lbmNvZGluZ0BwZ3AuY29tcGdwbWltZQcLCQgHAwIKAhkBBRsDAAAAAxYC
AQUeAQAAAAQVCAkKAAoJEPZOydKs2KFleiUIAIhVcQOp5ZCdh1nC5MK0rOZ78J67
Bhy/IExz7nHqcgsp5VC76v2RX2VAtqVtb7o/v3E1cT9/+R1ZaxxKN4wD/hOYatS5
K/gg4GNma5fYnZCIUWdqmLTZo51W4DjHeUuFCoFLfoJQyrrwdVw06cAHfs0GLSh1
01ZmLCd2wiVuaIf+Q0TRo7kyWRAZr0NqlUvLw+oZjdKFCs2kzYTm4U6y1/dn5drr
Agr0N5swfEv2VHcie07PDiYsxNTEpSvmikGu51fUj0w5Tn74lJwCpwrRYPU88j9c
HucGDY3rzcqJywq5AX5HDuND8uuFLwBBJptxWumVLzvSiIXWbPLrnpopAkG5AQ0E
S5S5xwEIAMa43D9wf13F/a+ieTKWGsQ2rWWRjxH50Nc1ncEPj0aLbQygEquls6gJ
6Evl95paD1cdWuB+hRAqF5C4nbFZzDy8QFKQ0XOdc+1EF98dEe3jpWjyf3laYvAT
ow0zNqQxeFYzSG+gQeiUi0G2wJ+YFBTLGVkye8ujaqOtPWZdBe9FKdkMd1LteiVy
rwnHQAyjW6Kn8eXqZ+kjv4bGiM3hVW98BucR8oUqe2xJfUwwBDDlNb1J09vqsKAE
J5Vkrq90FZd0m2n224AhIOXIxT3HVfMnxYV5yJ15z7Nk8b5R79HCCJeX0W423i/S
wM9LpyhXARbm21DWwjDhV8Y+U8zhT7cAEQEAAYkCQQQYAQIBKwUCS5S5yAUbDAAA
AMBdIAQZAQgABgUCS5S5xwAKCRCBYe0ctxtBdNqqB/9Ipr8LcQcmjK95sWu7HPk0
BkM0LEJBGpIgzv9N/3vgQtH7uf19zyr45kUiGmAu0zlzxyGnhTGdgZHJ6AIO0Heb
TdceSCiKYbk81QMeoBc9Z3OtFlcNMOU3xSBzT06yIpnN6vbBuUL0yJm7On2j9pgN
UVRjpdD+VxJbfszitoheyjqBgckHENXRjb6LTtwYi9DNPmZcG822ULKthnkZtV1g
qKP6f9zLkZEy+8TA27Lpet8Qjoxjm4D+I6RWdvTh51jURk0s09Si2ehEEhySd1Sf
ngkP5JF321xhqo5bIOx9OfkSjdR48sN33NbZmxK8SRMF0gA1kH74DVBpo4hPAnpe
AAoJEPZOydKs2KFllnsIAJo3puuq2CFY4c4EWx3xaEpbz/IT2RmLZ0aERkLAbk15
1W1XFXyO4lq6CIx2GwyBNhAgc1cK1r032rJxL237+gkuUnydeWfyPa1NO1GqlBQC
i/gxMKJCNl3N2MueEcc7a4sPWpliLguoToiR54edet/IrvRstwgbyfVcDpdvcQ+f
Nit+jikkx3t1MHMHoqvKxv067Aoh/r8C82mzgXqwdAMOb87M7vTQsmk85bXZehQb
w0SC9XEK7nmfV++WY10DLdseqlmEwWCBHjjs7su7fYO/9oVRzzMuX6OQPzoi1K/R
KINaU6lXrAd3po+eBbPu5v6T0HzRz4QjwGl+7oyUPzw=
=jsGe
-----END PGP PUBLIC KEY BLOCK-----



No comments:

Post a Comment